{"title":"Challenges in Adopting and Sustaining Microservice-based Software Development","authors":"Padmal Vitharana, Shahir A. Daya","doi":"10.1145/3649402","DOIUrl":"https://doi.org/10.1145/3649402","url":null,"abstract":"MS (microservice) has become the latest buzzword in software development. The MS approach to software development offers an alternative to the conventional monolith style. While benefits of MS-based development over monolith style are clear, industry experts agree that neither style provides an absolute advantage in all situations. Proponents contend that an MS approach to software development more readily facilitates mapping organizational changes manifesting from a more dynamic business environment to corresponding IT/IS (information technology/information systems) changes. This article identifies key challenges from the initial decision to adopt MSs to the ongoing task of sustaining the new paradigm over the long haul. It aims to provide insights to those considering MS-based software development.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"177 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140418019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Drift","authors":"George Neville-Neil","doi":"10.1145/3649297","DOIUrl":"https://doi.org/10.1145/3649297","url":null,"abstract":"Since the systems have a common parent, they probably work in the same technical domain, and therefore the features and fixes that are going to be added are probably similar. KV happens to have an example case at hand: two operating systems that diverged before they added SMP (symmetric multiprocessing) support. When an operating system adds SMP to an existing kernel, the first thing we think of is locks, those handy-dandy little performance killers that we've all been sprinkling around our code since the end of Dennard scaling.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"72 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140421248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A \"Perspectival\" Mirror of the Elephant","authors":"Queenie Luo, Michael J. Puett, Michael D. Smith","doi":"10.1145/3649303","DOIUrl":"https://doi.org/10.1145/3649303","url":null,"abstract":"Many people turn to Internet-based, software platforms such as Google, YouTube, Wikipedia, and more recently ChatGPT to find the answers to their questions. Most people tend to trust Google Search when it states that its mission is to deliver information from \"many angles so you can form your own understanding of the world.\" Yet, our work finds that queries involving complex topics yield results focused on a narrow set of culturally dominant views, and these views are correlated with the language used in the search phrase. We call this phenomenon language bias, and this article shows how it occurs using the example of two complex topics: Buddhism and liberalism. Language bias sets a strong yet invisible cultural barrier online with serious socio-political implications for how these platforms hinder efforts to reach across societal divides.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"11 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140419294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"From Open Access to Guarded Trust","authors":"Yifei Wang","doi":"10.1145/3649305","DOIUrl":"https://doi.org/10.1145/3649305","url":null,"abstract":"The last decade witnessed the emergence and strengthening of data protection regulations. For software engineers, this new era poses a unique challenge: How do you maintain the precision and efficacy of your platforms when complete data access, one of your most potent tools, is gradually being taken off the table? The mission is clear: Reinvent the toolkit. The way we perceive, handle, and experiment with data needs a drastic overhaul to navigate this brave new world.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"24 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140420245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Give Your Project a Name","authors":"Kate Matsudaira","doi":"10.1145/3649296","DOIUrl":"https://doi.org/10.1145/3649296","url":null,"abstract":"While some people are driven by infinite backlogs and iteration, others prefer launches and deadlines. Over the years, I have found certain milestones to be instrumental in creating a cohesive team with strong morale. When people have to work together to get through a challenging task, reaching those milestones brings them together.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"102 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140418209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Free and Open Source Software - and Other Market Failures","authors":"Poul-Henning Kamp","doi":"10.1145/3649298","DOIUrl":"https://doi.org/10.1145/3649298","url":null,"abstract":"Open source was not so much the goal itself as a means to an end, which is freedom: freedom to fix broken things, freedom from people who thought they could clutch the source code tightly and wield our ignorance of it as a weapon to force us all to pay for and run Windows Vista. But the FOSS movement has won what it wanted, and no matter how much oldsters dream about their glorious days as young revolutionaries, it is not coming back, because the frustrations and anger of IT in 2024 are entirely different from those of 1991.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"476 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140417134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developer Ecosystems for Software Safety","authors":"Christoph Kern","doi":"10.1145/3648601","DOIUrl":"https://doi.org/10.1145/3648601","url":null,"abstract":"How to design and implement information systems so that they are safe and secure is a complex topic. Both high-level design principles and implementation guidance for software safety and security are well established and broadly accepted. For example, Jerome Saltzer and Michael Schroeder's seminal overview of principles of secure design was published almost 50 years ago, and various community and governmental bodies have published comprehensive best practices about how to avoid common software weaknesses. This article argues, based on experience at Google, that focusing on developer ecosystems is both practical and effective, and can achieve a drastic reduction in the rate of common classes of defects across hundreds of applications being developed by thousands of developers.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"34 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140419849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
QueuePub Date : 2023-12-01Epub Date: 2023-08-24DOI: 10.5397/cise.2023.00339
Hyungsuk Kim, Younsung Jung, Hyun Seok Song
{"title":"Plate prebending using a three-dimensional-printed model affords effective anatomical reduction in clavicular shaft fractures.","authors":"Hyungsuk Kim, Younsung Jung, Hyun Seok Song","doi":"10.5397/cise.2023.00339","DOIUrl":"10.5397/cise.2023.00339","url":null,"abstract":"<p><strong>Background: </strong>A precontoured plate rarely fits properly within the patient's clavicle and must be bent intraoperatively. This study aimed to determine whether anatomical reduction could be achieved using a plate bent before surgery.</p><p><strong>Methods: </strong>This study included 87 consecutive patients with displaced mid-shaft clavicle fractures who underwent plate fixation and were followed-up for a minimum of 1 year. After exclusions, 39 consecutive patients underwent fixation with a precontoured plate bent intraoperatively (intraoperative bending group), and 28 underwent fixation with the plate bent preoperatively (preoperative bending group). Using free software and a three-dimensional (3D) printer, ipsilateral clavicle 3D-printed models were constructed. Using plain radiographs, the distance between the edge of the lateral inferior cortex and the medial inferior cortex was measured. The angle between the line connecting the inferior cortex edge and the line passing through the flat portion of the superior cortex of the distal clavicle was measured.</p><p><strong>Results: </strong>Mean length differences between the ipsilateral and contralateral clavicle were smaller on both anteroposterior (AP; P=0.032) and axial images (P=0.029) in the preoperative bending group. The mean angular differences on both AP (P=0.045) and axial images (P=0.008) were smaller in the preoperative bending group. No significant differences were observed between the two groups in functional scores at the last follow-up.</p><p><strong>Conclusions: </strong>Smaller differences in length and angle between the ipsilateral and contralateral clavicle, indicative of reduction, were observed in the preoperative bending group. Using the precontoured technique with low expense, the operation was performed more effectively as reflected by a shorter operation time. Level of evidence: III.</p>","PeriodicalId":39042,"journal":{"name":"Queue","volume":"9 1","pages":"397-405"},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10698127/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86187899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Device Onboarding using FDO and the Untrusted Installer Model","authors":"Geoffrey H. Cooper","doi":"10.1145/3631327","DOIUrl":"https://doi.org/10.1145/3631327","url":null,"abstract":"Automatic onboarding of devices is an important technique to handle the increasing number of \"edge\" and IoT devices being installed. Onboarding of devices is different from most device-management functions because the device?s trust transitions from the factory and supply chain to the target application. To speed the process with automatic onboarding, the trust relationship in the supply chain must be formalized in the device to allow the transition to be automated.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"153 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135978943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Managers' Guide to Operational Excellence","authors":"Kate Matsudaira","doi":"10.1145/3631176","DOIUrl":"https://doi.org/10.1145/3631176","url":null,"abstract":"Software engineering managers (or any senior technical leaders) have many responsibilities: the care and feeding of the team, delivering on business outcomes, and keeping the product/system/application up and running and in good order. Each of these areas can benefit from a systematic approach. The one I present here is setting up checks and balances for the team's operational excellence.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"11 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136017574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}