By writing code for the elephant that is Posix, we lose the chance to take advantage of modern hardware.
通过为Posix这个大象编写代码,我们失去了利用现代硬件的机会。
{"title":"The Elephant in the Room","authors":"George Neville-Neil","doi":"10.1145/3570921","DOIUrl":"https://doi.org/10.1145/3570921","url":null,"abstract":"By writing code for the elephant that is Posix, we lose the chance to take advantage of modern hardware.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"20 1","pages":"14 - 19"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44489042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This team?s low morale and high stress were a result of the members feeling overwhelmed by too many responsibilities. The 10-by-10 communication structure made it difficult to achieve consensus, there were too many meetings, and everyone was suffering from the high cognitive load. By splitting into two teams, each can be more nimble, which the manager likes, and have a lower cognitive load, which the team likes. There is more opportunity for repetition, which lets people develop skills and demonstrate them. Altogether, this helps reduce stress and improve morale.
{"title":"Split Your Overwhelmed Teams","authors":"Thomas A. Limoncelli","doi":"10.1145/3570920","DOIUrl":"https://doi.org/10.1145/3570920","url":null,"abstract":"This team?s low morale and high stress were a result of the members feeling overwhelmed by too many responsibilities. The 10-by-10 communication structure made it difficult to achieve consensus, there were too many meetings, and everyone was suffering from the high cognitive load. By splitting into two teams, each can be more nimble, which the manager likes, and have a lower cognitive load, which the team likes. There is more opportunity for repetition, which lets people develop skills and demonstrate them. Altogether, this helps reduce stress and improve morale.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"20 1","pages":"5 - 13"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44065912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Backend subsetting is useful for reducing costs and may even be necessary for operating within the system limits. For more than a decade, Google used deterministic subsetting as its default backend subsetting algorithm, but although this algorithm balances the number of connections per backend task, deterministic subsetting has a high level of connection churn. Our goal at Google was to design an algorithm with reduced connection churn that could replace deterministic subsetting as the default backend subsetting algorithm.
{"title":"Reinventing Backend Subsetting at Google","authors":"Peter Ward, Paul Wankadia, Kavita Guliani","doi":"10.1145/3570937","DOIUrl":"https://doi.org/10.1145/3570937","url":null,"abstract":"Backend subsetting is useful for reducing costs and may even be necessary for operating within the system limits. For more than a decade, Google used deterministic subsetting as its default backend subsetting algorithm, but although this algorithm balances the number of connections per backend task, deterministic subsetting has a high level of connection churn. Our goal at Google was to design an algorithm with reduced connection churn that could replace deterministic subsetting as the default backend subsetting algorithm.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"20 1","pages":"33 - 57"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41870821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-14eCollection Date: 2022-01-01DOI: 10.3389/fopht.2022.994566
Malia M Edwards, D Scott McLeod, Rhonda Grebe, Imran A Bhutto, Richa Dahake, Kelly Crumley, Gerard A Lutty
Choroideremia (CHM) is a recessive, X-linked disease that affects 1 in 50,000 people worldwide. CHM causes night blindness in teenage years with vision loss progressing over the next two to three decades. While CHM is known to cause progressive loss of retinal pigment epithelial (RPE) cells, photoreceptors and choroidal vessels, little attention has been given to retinal glial changes in eyes with CHM. In addition, while choroidal loss has been observed clinically, no histopathologic assessment of choroidal loss has been done. We investigated glial remodeling and activation as well as choriocapillaris changes and their association with RPE loss in postmortem eyes from two donors with CHM. Eyes were fixed and cryopreserved or the retina and choroid/RPE were processed as flatmounts with a small piece cut for transmission electron microscopy. A dense glial membrane, made up of vimentin and GFAP double-positive cells, occupied the subretinal space in the area of RPE and photoreceptor loss of both eyes. The membranes did not extend into the far periphery, where RPE and photoreceptors were viable. A glial membrane was also found on the vitreoretinal surface. Transmission electron microscopy analysis demonstrated prominence and disorganization of glial cells, which contained exosome-like vesicles. UEA lectin demonstrated complete absence of choriocapillaris in areas with RPE loss while some large choroidal vessels remained viable. In the far periphery, where the RPE monolayer was intact, choriocapillaris appeared normal. The extensive glial remodeling present in eyes with CHM should be taken into account when therapies such as stem cell replacement are considered as it could impede cells entering the retina. This gliosis would also need to be reversed to some extent for Müller cells to perform their normal homeostatic functions in the retina. Future studies investigating donor eyes as well as clinical imaging from carriers or those with earlier stages of CHM will prove valuable in understanding the glial changes, which could affect disease progression if they occur early. This would also provide insights into the progression of disease in the photoreceptor/RPE/choriocapillaris complex, which is crucial for identifying new treatments and finding the windows for treatment.
{"title":"Glial remodeling and choroidal vascular pathology in eyes from two donors with Choroideremia.","authors":"Malia M Edwards, D Scott McLeod, Rhonda Grebe, Imran A Bhutto, Richa Dahake, Kelly Crumley, Gerard A Lutty","doi":"10.3389/fopht.2022.994566","DOIUrl":"10.3389/fopht.2022.994566","url":null,"abstract":"<p><p>Choroideremia (CHM) is a recessive, X-linked disease that affects 1 in 50,000 people worldwide. CHM causes night blindness in teenage years with vision loss progressing over the next two to three decades. While CHM is known to cause progressive loss of retinal pigment epithelial (RPE) cells, photoreceptors and choroidal vessels, little attention has been given to retinal glial changes in eyes with CHM. In addition, while choroidal loss has been observed clinically, no histopathologic assessment of choroidal loss has been done. We investigated glial remodeling and activation as well as choriocapillaris changes and their association with RPE loss in postmortem eyes from two donors with CHM. Eyes were fixed and cryopreserved or the retina and choroid/RPE were processed as flatmounts with a small piece cut for transmission electron microscopy. A dense glial membrane, made up of vimentin and GFAP double-positive cells, occupied the subretinal space in the area of RPE and photoreceptor loss of both eyes. The membranes did not extend into the far periphery, where RPE and photoreceptors were viable. A glial membrane was also found on the vitreoretinal surface. Transmission electron microscopy analysis demonstrated prominence and disorganization of glial cells, which contained exosome-like vesicles. UEA lectin demonstrated complete absence of choriocapillaris in areas with RPE loss while some large choroidal vessels remained viable. In the far periphery, where the RPE monolayer was intact, choriocapillaris appeared normal. The extensive glial remodeling present in eyes with CHM should be taken into account when therapies such as stem cell replacement are considered as it could impede cells entering the retina. This gliosis would also need to be reversed to some extent for Müller cells to perform their normal homeostatic functions in the retina. Future studies investigating donor eyes as well as clinical imaging from carriers or those with earlier stages of CHM will prove valuable in understanding the glial changes, which could affect disease progression if they occur early. This would also provide insights into the progression of disease in the photoreceptor/RPE/choriocapillaris complex, which is crucial for identifying new treatments and finding the windows for treatment.</p>","PeriodicalId":39042,"journal":{"name":"Queue","volume":"2 1","pages":"994566"},"PeriodicalIF":0.0,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11182301/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86126621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Once commercial FHE is achieved, data access will become completely separated from unrestricted data processing, and provably secure storage and computation on untrusted platforms will become both relatively inexpensive and widely accessible. In ways similar to the impact of the database, cloud computing, PKE, and AI, FHE will invoke a sea change in how confidential information is protected, processed, and shared, and will fundamentally change the course of computing at a foundational level.
{"title":"The Rise of Fully Homomorphic Encryption","authors":"M. Creeger","doi":"10.1145/3561800","DOIUrl":"https://doi.org/10.1145/3561800","url":null,"abstract":"Once commercial FHE is achieved, data access will become completely separated from unrestricted data processing, and provably secure storage and computation on untrusted platforms will become both relatively inexpensive and widely accessible. In ways similar to the impact of the database, cloud computing, PKE, and AI, FHE will invoke a sea change in how confidential information is protected, processed, and shared, and will fundamentally change the course of computing at a foundational level.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"20 1","pages":"39 - 60"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41796437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
KV has talked about various measures of software quality in past columns, but perhaps falling software quality is one of the most objective measures that a team is failing. This Pestilence, brought about by the low morale engendered in the team by War and Famine, is a clear sign that something is wrong. In the real world, a diseased animal can be culled so that disease does not spread and become a pestilence over the land. Increasing bug counts, especially in the absence of increased functionality, is a sure sign of a coming project apocalypse.
{"title":"The Four Horsemen of an Ailing Software Project","authors":"George Neville-Neil","doi":"10.1145/3561798","DOIUrl":"https://doi.org/10.1145/3561798","url":null,"abstract":"KV has talked about various measures of software quality in past columns, but perhaps falling software quality is one of the most objective measures that a team is failing. This Pestilence, brought about by the low morale engendered in the team by War and Famine, is a clear sign that something is wrong. In the real world, a diseased animal can be culled so that disease does not spread and become a pestilence over the land. Increasing bug counts, especially in the absence of increased functionality, is a sure sign of a coming project apocalypse.","PeriodicalId":39042,"journal":{"name":"Queue","volume":" ","pages":"11 - 15"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48312641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Keeping data safe in the presence of crashes is a fundamental problem in storage systems. Although the high-level ideas for crash consistency are relatively well understood, realizing them in practice is surprisingly complex and full of challenges. The systems research community is actively working on solving this challenge, and the papers examined here offer three solutions.
{"title":"Crash Consistency","authors":"R. Alagappan, P. Alvaro","doi":"10.1145/3561654","DOIUrl":"https://doi.org/10.1145/3561654","url":null,"abstract":"Keeping data safe in the presence of crashes is a fundamental problem in storage systems. Although the high-level ideas for crash consistency are relatively well understood, realizing them in practice is surprisingly complex and full of challenges. The systems research community is actively working on solving this challenge, and the papers examined here offer three solutions.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"20 1","pages":"107 - 115"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44778880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Raphael A. Auer, Rainer Böhme, Jeremy Clark, Didem Demirag
As central banks all over the world move to digitize cash, the issue of privacy needs to move to the forefront. The path taken may depend on the needs of each stakeholder group: privacy-conscious users, data holders, and law enforcement.
{"title":"Mapping the Privacy Landscape for Central Bank Digital Currencies","authors":"Raphael A. Auer, Rainer Böhme, Jeremy Clark, Didem Demirag","doi":"10.1145/3561796","DOIUrl":"https://doi.org/10.1145/3561796","url":null,"abstract":"As central banks all over the world move to digitize cash, the issue of privacy needs to move to the forefront. The path taken may depend on the needs of each stakeholder group: privacy-conscious users, data holders, and law enforcement.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"20 1","pages":"16 - 38"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45417188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Michael Loftus, Andrew Vezina, Rick Doten, Atefeh Mashatan
It used to be that enterprise cybersecurity was all castle and moat. First, secure the perimeter and then, in terms of what went on inside that, Trust, but verify. The perimeter, of course, was the corporate network. But what does that even mean at this point? With most employees now working from home at least some of the time and organizations relying increasingly on cloud computing, there is no such thing as a single, enterprise-wide perimeter anymore. And, with corporate security breaches having become a regular news item over the past two decades, trust has essentially evaporated as well.
{"title":"The Arrival of Zero Trust: What Does it Mean?","authors":"Michael Loftus, Andrew Vezina, Rick Doten, Atefeh Mashatan","doi":"10.1145/3561826","DOIUrl":"https://doi.org/10.1145/3561826","url":null,"abstract":"It used to be that enterprise cybersecurity was all castle and moat. First, secure the perimeter and then, in terms of what went on inside that, Trust, but verify. The perimeter, of course, was the corporate network. But what does that even mean at this point? With most employees now working from home at least some of the time and organizations relying increasingly on cloud computing, there is no such thing as a single, enterprise-wide perimeter anymore. And, with corporate security breaches having become a regular news item over the past two decades, trust has essentially evaporated as well.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"20 1","pages":"61 - 79"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43227621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We in FOSS need to become much better at documenting design decisions in a way and a place where the right people will find it, read it, and understand it, before they do something ill-advised or downright stupid with our code.
{"title":"CSRB's Opus One","authors":"Poul-Henning Kamp","doi":"10.1145/3561797","DOIUrl":"https://doi.org/10.1145/3561797","url":null,"abstract":"We in FOSS need to become much better at documenting design decisions in a way and a place where the right people will find it, read it, and understand it, before they do something ill-advised or downright stupid with our code.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"20 1","pages":"5 - 10"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46487726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}