Mark Russinovich: Confidential Computing: Elevating Cloud Security and Privacy: Working toward a more secure and innovative future.ACM Queue21(4): 44-48 (2023)
Kelly Shortridge, Josiah Dykstra: Opportunity Cost and Missed Chances in Optimizing Cybersecurity: The loss of potential gain from other alternatives when one alternative is chosen.ACM Queue21(1): 30-56 (2023)
Zachary Tellman: Designing a Framework for Conversational Interfaces: Combining the latest advances in machine learning with earlier approaches.ACM Queue21(1): 85-101 (2023)
Phil Vachon: Security Mismatch: Security must be a business enabler, not a hinderer.ACM Queue21(3): 23-28 (2023)
Phil Vachon: The Security Jawbreaker: Access to a system should not imply authority to use it. Enter the principle of complete mediation.ACM Queue21(5): 13-21 (2023)
Alvaro Videla: Echoes of Intelligence: Textual interpretation and large language models.ACM Queue21(3): 36-53 (2023)
2022
James Agnew, Pat Helland, Adam Cole: FHIR: Reducing Friction in the Exchange of Healthcare Data: A discussion with James Agnew, Pat Helland, and Adam Cole.ACM Queue20(2): 67-88 (2022)
Matthew Bush, Atefeh Mashatan: From Zero to One Hundred: Demystifying zero trust and its implications on enterprise people, process, and technology.ACM Queue20(4): 80-106 (2022)
Mache Creeger: The Rise of Fully Homomorphic Encryption: Often called the Holy Grail of cryptography, commercial FHE is near.ACM Queue20(4): 39-60 (2022)
Pat Helland: Autonomous Computing: We frequently compute across autonomous boundaries but the implications of the patterns to ensure independence are rarely discussed.ACM Queue20(1): 80-104 (2022)
Pat Helland: I'm Probably Less Deterministic Than I Used to Be: Embracing randomness is necessary in cloud environments.ACM Queue20(3): 5-13 (2022)
James P. Hughes, Whitfield Diffie: The Challenges of IoT, TLS, and Random Number Generators in the Real World: Bad random numbers are still with us and are proliferating in modern systems.ACM Queue20(3): 18-40 (2022)