Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 14, Issue 1January-February 2016Containers
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:1542-7730
EISSN:1542-7749
Published In:
queue
Reflects downloads up to 05 Jan 2025Bibliometrics
Skip Table Of Content Section
FEATURE: Features
research-article
Open Access
Borg, Omega, and Kubernetes: Lessons learned from three container-management systems over a decade

Though widespread interest in software containers is a relatively recent phenomenon, at Google we have been managing Linux containers at scale for more than ten years and built three different container-management systems in that time. Each system was ...

research-article
Open Access
Statistics for Engineers: Applying statistical techniques to operations data

Modern IT systems collect an increasing wealth of data from network gear, operating systems, applications, and other components. This data needs to be analyzed to derive vital information about the user experience and business performance. For instance, ...

research-article
Open Access
Use-Case 2.0: The Hub of Software Development

Use cases have been around for almost 30 years as a requirements approach and have been part of the inspiration for more-recent techniques such as user stories. Now the inspiration has flown in the other direction. Use-Case 2.0 is the new generation of ...

research-article
Open Access
Why Logical Clocks are Easy: Sometimes all you need is the right language.

Any computing system can be described as executing sequences of actions, with an action being any relevant change in the state of the system. For example, reading a file to memory, modifying the contents of the file in memory, or writing the new ...

DEPARTMENT: The Bikeshed
column
Open Access
More Encryption Means Less Privacy: Retaining electronic privacy requires more political engagement.

When Edward Snowden made it known to the world that pretty much all traffic on the Internet was collected and searched by the NSA, GCHQ (the UK Government Communications Headquarters) and various other countries’ secret services as well, the IT and ...

DEPARTMENT: Kode Vicious
column
Open Access
GNL is Not Linux: What’s in a Name?

What, indeed, is in a name? As you’ve already seen, this quasi-technical topic continues to cause a bit of heat in the software community, particularly in the open-source world. You can find the narrative from the GNU side by clicking on the link ...

DEPARTMENT: The Soft Side of Software
department
Open Access
Delegation as Art: Be someone who makes everyone else better.

When I started my career as a junior engineer, I couldn’t wait to be senior. I would regularly review our promotion guidelines and assess my progress and contributions against them. Of course, at the time I didn’t really understand what being senior ...

Subjects

Currently Not Available

Comments