Columns: Kode Vicious
-
Divided by Division
Is there a "best used by" date for software?
-
Rethinking Passwords
Our authentication system is lacking. Is improvement possible?
-
Splinternet Behind the Great Firewall of China
Once China opened its door to the world, it could not close it again.
Related: Security - Problem Solved? | Building Secure Web Applications | LinkedIn Password Leak: Salt Their Hide
-
Thinking Methodically about Performance
The USE method addresses shortcomings in other commonly used methodologies.
Related: The Price of Performance | Performance Anti-Patterns | Thinking Clearly about Performance
-
Node Summit: The Evolution of Javascript
The little scripting language that became one of the most popular programming languages in the world.
-
Browser Security Case Study: Appearances Can Be Deceiving
A discussion with Jeremiah Grossman, Ben Livshits, Rebecca Bace, and George Neville-Neil
-
The Web Won't Be Safe or Secure until We Break It
Unless you've taken very particular precautions, assume every Web site you visit knows exactly who you are.
Related: Java Security Architecture Revisited
| CTO Roundtable: Malware Defense Overview | Building Secure Web Applications
Related: Browser Security | Security In The Browser | Cybercrime 2.0: When The Cloud Turns Dark
-
Condos and Clouds
Constraints in an environment empower the services.
Related: Fighting Physics: A Tough Battle
| Commentary: A Trip Without a Roadmap
| CTO Roundtable: Cloud Computing
-
The Essence of Software Engineering: The SEMAT Kernel
A thinking framework in the form of an actionable kernel
Related: There's No Such Thing as a Free (Software) Lunch | Purpose-Built Languages | Open Source to the Core
-
Anatomy of a Solid-state Drive
While the ubiquitous SSD shares many features with the hard-disk drive, under the surface they are completely different.
-
Disks from the Perspective of a File System
Disks lie. And the controllers that run them are partners in crime.
Related: Enterprise SSDs | Flash Storage Today | Flash Disk Opportunity for Server Applications
Related: Building Systems to Be Shared, Securely | The Five-Minute Rule 20 Years Later: and How Flash Memory Changes the Rules | GFS: Evolution on Fast-forward
-
Sender-side Buffers and the Case for Multimedia Adaptation
A proposal to improve the performance and availability of streaming video and other time-sensitive media
Related: Four Billion Little Brothers?: Privacy, mobile phones, and ubiquitous data collection | VoIP: What is it Good for? | Data in Flight
Columns: The Bikeshed
- A Generation Lost in the Bazaar
Quality happens only when someone is responsible for it.
Related: Open vs. Closed: Which Source is More Secure? |
The Hyperdimensional Tar Pit | Broken Builds