default search action
ACM Queue, Volume 4
Volume 4, Number 1 , February 2006
- Charlene O'Hanlon:
Quality really is job #1. 8
- John Stanik:
News 2.0. 10
- Charlene O'Hanlon:
What's on your hard drive? 11
- George V. Neville-Neil:
Gettin' your kode on. 12-14
- Charlene O'Hanlon:
A conversation with Jarod Jenson. 16-24
- Bryan Cantrill:
Hidden in plain sight. 26-36 - Philip Beevers:
A high-performance team. 38-43 - Bart Smaalders:
Performance anti-patterns. 44-50 - Mark Purdy:
Modern Performance Monitoring. 48-57
- Arthur Gittleman:
Review of "Foundations of Ajax by Ryan Asleson, " Nathaniel Schutta, APress, 2005, ISBN 1590595823. 62 - Radu State:
Review of "Switching to VoIP by Ted Wallingford, " O'Reilly & Associates, 2005, ISBN 0596008686. 62
- Phillip A. Laplante:
It isn't your father's realtime anymore. 64-
Volume 4, Number 2, March 2006
- Charlene O'Hanlon:
Letters. 7
- John Stanik:
News 2.0. 8
- Charlene O'Hanlon:
What's on your hard drive? 9
- George V. Neville-Neil:
Human-KV interaction. 10-12
- Charlene O'Hanlon:
A conversation with Steve Ross-Talbot. 14-23
- Peter de Jong:
Going with the flow. 24-32 - James Champy:
People and process. 34-38 - Derek Miers:
Best practice (BPM). 40-48 - Duncan Johnston-Watt:
Under new management. 50-58
- Marc Paquette:
Review of "Wiki: Web Collaboration by Anja Ebersbach, Markus Glaser and Richard Heigl, " Springer, 2005, ISBN 3540259953. 59 - Elliot Jaffe:
Review of "Pro Perl by Peter Wainwright, " Apress, 2005, ISBN 159059438X. 59
- Charlene O'Hanlon:
Calendar. 60-61
- Stan Kelly-Bootle:
But, having said that, ... 64-
Volume 4, Number 3, April 2006
- Charlene O'Hanlon:
The private universe. 7
- John Stanik:
News 2.0. 8
- Charlene O'Hanlon:
What's on your hard drive? 9
- George V. Neville-Neil:
Kode vicious bugs out. 10-12
- Charlene O'Hanlon:
A conversation with Chuck McManis. 13-21
- Terry Coatta:
The (not so) hidden computer. 22-26 - Jim Barton:
TiVo-lution. 28-35 - Stephen Johnson:
Java in a teacup. 36-41
- Radu State:
Review of "Extrusion Detection: Security Monitoring for Internal Intrusions by Richard Bejtlich, " Adddison-Wesley Professional, 2005, ISBN: 0321349962. 42 - Andrea Paramithiotti:
Review of "Grid Database Design by April Wells, " Auerbach Publications, 2005, ISBN: 0849328004. 42
- Mache Creeger:
Evolution or revolution? 56-
Volume 4, Number 4, May 2006
- Charlene O'Hanlon:
The domino effect. 8
- John Stanik:
News 2.0. 9
- Charlene O'Hanlon:
What's on your hard drive? 10-11
- George V. Neville-Neil:
Phishing for solutions. 12-13
- Charlene O'Hanlon:
A conversation with Werner Vogels. 14-22
- Jeff Barr, Luis-Felipe Cabrera:
AI gets a brain. 24-29 - Ryan Barrows, Jim Traverso:
Search considered integral. 30-36 - Taf Anthias, Krishna Sankar:
The network's new role. 38-46
- Andreas Tomek:
Review of "Protect your Windows Network: From Perimeter to Data by Jesper Johansson and Steve Riely, " Addison-Wesley Professional, 2005, ISBN: 0321336437. 42 - Bernard Kuc:
Review of "Open Source Wireless Java Tools Suite by Robert Virkus, " Apress, 2005, ISBN: 1590595033. 48 - George Hacken:
Review of "High-Assurance Design: Architecting Secure and Reliable Enterprise Applications by Clifford Berg, " Addison-Wesley Professional, 2005, ISBN: 0321375777. 50 - Jose Lloret:
Review of "Securing Storage: A Practical Guide to SAN and NAS Security by Himanshu Dwivedi, " Addison-Wesley Professional, 2005, ISBN: 0321349954. 50
- Charlene O'Hanlon:
Calendar. 52-53
- Stan Kelly-Bootle:
The calculus formally known as pi. 56-
Volume 4, Number 5, June 2006
- Charlene O'Hanlon:
Accessorizing. 6
- John Stanik:
News 2.0. 7
- Charlene O'Hanlon:
What's on your hard drive? 8
- George V. Neville-Neil:
Phishing for solutions. 9-10
- Charlene O'Hanlon:
A conversation with Leo Chang of ClickShift. 12-18
- Greg Olsen:
From COM to Common. 20-26 - Michi Henning:
The rise and fall of CORBA. 28-34 - Chris Richardson:
Untangling enterprise Java. 36-44 - Len Takeuchi:
ASPs: the integration challenge. 46-52
- A. Moreno:
Review of "Agile Estimating and Planning by Mike Cohn, " Prentice Hall PTR, 2005, ISBN: 0131479415. 59 - Michael Laszlo:
Review of "Component-Oriented Programming by Andy Ju An Wang and Kai Qian, " Wiley-Interscience, 2005, ISBN: 0471644463. 59
- Charlene O'Hanlon:
Calendar. 60-61
- Alex E. Bell:
Software development amidst the whiz of silver bullets... 64-
Volume 4, Number 6, July-August 2006
- Charlene O'Hanlon:
Able bodies. 8
- John Stanik:
News 2.0. 9
- Charlene O'Hanlon:
What's on your hard drive? 10
- George V. Neville-Neil:
Pointless PKI. 11-12
- Charlene O'Hanlon:
A conversation with Jordan Cohen. 14-23
- John F. Canny:
The future of human-computer interaction. 24-32 - James L. Crowley:
Social perception. 34-43 - Gaetano Borriello:
The inivisble assistant. 44-49 - Jim Christensen, Jeremy B. Sussman, Stephen Levy, William E. Bennett, Tracee Vetting Wolf, Wendy A. Kellogg:
Too much information. 50-57
- Bayard Kohlhepp:
Review of "Windows and Linux Integration: Hands-on Solutions for a Mixed Environment by Jermy Moskowitz and Thomas Boutell, " Sybex Inc., 2005, ISBN: 0782144284. 58 - Melissa C. Stange:
Review of "Pro .NET 1.1 Remoting, Reflection, and Threading by David Curran, Fabio Ferracchiati, Syed Gilani, et al., " Apress, 2005, ISBN: 1590594525. 58
- Charlene O'Hanlon:
Calendar. 59
- Stan Kelly-Bootle:
Like a podcast in the sea: mean ol' LoTech blues. 64-
Volume 4, Number 7, September 2006
- Charlene O'Hanlon:
Playing by the rules. 8
- John Stanik:
News 2.0. 10
- Charlene O'Hanlon:
What's on your hard drive? 10
- George V. Neville-Neil:
Facing the strain. 12-13
- Mache Creeger:
Rationalizing a home terabyte server. 14-17
- Eric Allman:
Complying with compliance. 18-21 - George W. Beeler Jr., Dana Gardner:
A requirements primer. 22-26 - John Bostick:
Box their SOXes off. 28-29 - J. C. Cannon, Marilee Byers:
Compliance deconstructed. 30-37 - Tracy Ragan:
Keeping score in the IT compliance game. 38-43
- Vladan M. Jovanovic:
Review of "Refactoring Databases: Evolutionary Database Design by Scott Ambler and Pramodkumar Sadalage, " Addison-Wesley Professional, 2006, ISBN: 0321293533. 44 - Radu State:
Review of "Software Security: Building Security In by Gary McGraw, " Addison-Wesley Professional, 2006, ISBN: 0321356705. 44
- Greg A. Nolann:
Seeking compliance nirvana. 72-
Volume 4, Number 8, October 2006
- Charlene O'Hanlon:
Reality vs. perception. 7
- John Stanik:
News 2.0. 8
- Charlene O'Hanlon:
What's on your hard drive? 9
- George V. Neville-Neil:
Saddle up, aspiring code jockeys. 10-11
- Charlene O'Hanlon:
A conversation with David Brown. 14-23
- John R. Mashey:
The long road to 64 bits. 24-35 - Dan Rubel:
The heart of eclipse. 36-44 - Damon Poole:
Breaking the major release habit. 46-51
- Charlene O'Hanlon:
Calendar. 52
- Stan Kelly-Bootle:
You can look it up: or maybe not. 56-
Volume 4, Number 9, November 2006
- Charlene O'Hanlon:
The criminal mind. 7
- John Stanik:
News 2.0. 8
- Charlene O'Hanlon:
What's on your hard drive? 9
- George V. Neville-Neil:
Understanding the problem. 10-12
- Mache Creeger:
Better health care through technology. 13-15
- Charlene O'Hanlon:
A conversation with Douglas W. Jones and Peter G. Neumann. 16-23
- Team Cymru:
Cybercrime: an epidemic. 24-35 - Eric Allman:
E-mail authentication: what, why, how? 30-34 - Thomas Wadlow, Vlad Gorelik:
Criminal code: the making of a cybercriminal. 36-41 - Daniel E. Geer Jr.:
Playing for keeps. 42-48
- Radu State:
Review of "Phishing Exposed by Lance James and Joe Stewart, " Syngress Publishing, 2005, ISBN: 159749030X. 50 - Markus Wolf:
Review of "Spring in Action by Craig Walls and Ryan Breidenbach, " Manning Publications, 2005, ISBN: 1932394354. 50
- Charlene O'Hanlon:
Calendar. 52
- Phillip A. Laplante:
The joy of spam. 56-
Volume 4, Number 10, December 2006 - January 2007
- Charlene O'Hanlon:
Forward thinking. 8
- John Stanik:
News 2.0. 10
- Charlene O'Hanlon:
What's on your hard drive? 11
- George V. Neville-Neil:
Peerless P2P. 12-13
- Charlene O'Hanlon:
A conversation with John Hennessy and David Patterson. 14-22
- Ali-Reza Adl-Tabatabai, Christos Kozyrakis, Bratin Saha:
Unlocking concurrency. 24-33 - Simon Crosby, David Brown:
The virtualization reality. 34-41 - Brian E. Carpenter:
Better, faster, more secure. 42-48
- Diomidis Spinellis:
Review of "Sustainable Software Development: An Agile Perspective by Kevin Tate, " Addison-Wesley Professional, 2005, ISBN: 0321286081. 49 - Radu State:
Review of "Hacking Exposed: Web Applications, 2nd edition by Joel Scambray, Mike Shema, and Caleb Sima, " McGraw-Hill Osborne Media, 2006, ISBN: 0072262990. 49
- Charlene O'Hanlon:
Calendar. 50
- Stan Kelly-Bootle:
Will the real bots stand up? 56-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.