


default search action
ACM Queue, Volume 4
Volume 4, Number 1 , February 2006
- Charlene O'Hanlon:

Quality really is job #1. 8
- John Stanik:

News 2.0. 10
- Charlene O'Hanlon:

What's on your hard drive? 11
- George V. Neville-Neil:

Gettin' your kode on. 12-14
- Charlene O'Hanlon:

A conversation with Jarod Jenson. 16-24
- Bryan Cantrill:

Hidden in plain sight. 26-36 - Philip Beevers:

A high-performance team. 38-43 - Bart Smaalders:

Performance anti-patterns. 44-50 - Mark Purdy:

Modern Performance Monitoring. 48-57
- Arthur Gittleman:

Review of "Foundations of Ajax by Ryan Asleson, " Nathaniel Schutta, APress, 2005, ISBN 1590595823. 62 - Radu State:

Review of "Switching to VoIP by Ted Wallingford, " O'Reilly & Associates, 2005, ISBN 0596008686. 62
- Phillip A. Laplante:

It isn't your father's realtime anymore. 64-
Volume 4, Number 2, March 2006
- Charlene O'Hanlon:

Letters. 7
- John Stanik:

News 2.0. 8
- Charlene O'Hanlon:

What's on your hard drive? 9
- George V. Neville-Neil:

Human-KV interaction. 10-12
- Charlene O'Hanlon:

A conversation with Steve Ross-Talbot. 14-23
- Peter de Jong:

Going with the flow. 24-32 - James Champy:

People and process. 34-38 - Derek Miers:

Best practice (BPM). 40-48 - Duncan Johnston-Watt:

Under new management. 50-58
- Marc Paquette:

Review of "Wiki: Web Collaboration by Anja Ebersbach, Markus Glaser and Richard Heigl, " Springer, 2005, ISBN 3540259953. 59 - Elliot Jaffe:

Review of "Pro Perl by Peter Wainwright, " Apress, 2005, ISBN 159059438X. 59
- Charlene O'Hanlon:

Calendar. 60-61
- Stan Kelly-Bootle:

But, having said that, ... 64-
Volume 4, Number 3, April 2006
- Charlene O'Hanlon:

The private universe. 7
- John Stanik:

News 2.0. 8
- Charlene O'Hanlon:

What's on your hard drive? 9
- George V. Neville-Neil

:
Kode vicious bugs out. 10-12
- Charlene O'Hanlon:

A conversation with Chuck McManis. 13-21
- Terry Coatta:

The (not so) hidden computer. 22-26 - Jim Barton:

TiVo-lution. 28-35 - Stephen Johnson:

Java in a teacup. 36-41
- Radu State:

Review of "Extrusion Detection: Security Monitoring for Internal Intrusions by Richard Bejtlich, " Adddison-Wesley Professional, 2005, ISBN: 0321349962. 42 - Andrea Paramithiotti:

Review of "Grid Database Design by April Wells, " Auerbach Publications, 2005, ISBN: 0849328004. 42
- Mache Creeger:

Evolution or revolution? 56-
Volume 4, Number 4, May 2006
- Charlene O'Hanlon:

The domino effect. 8
- John Stanik:

News 2.0. 9
- Charlene O'Hanlon:

What's on your hard drive? 10-11
- George V. Neville-Neil

:
Phishing for solutions. 12-13
- Charlene O'Hanlon:

A conversation with Werner Vogels. 14-22
- Jeff Barr, Luis-Felipe Cabrera:

AI gets a brain. 24-29 - Ryan Barrows, Jim Traverso:

Search considered integral. 30-36 - Taf Anthias, Krishna Sankar:

The network's new role. 38-46
- Andreas Tomek:

Review of "Protect your Windows Network: From Perimeter to Data by Jesper Johansson and Steve Riely, " Addison-Wesley Professional, 2005, ISBN: 0321336437. 42 - Bernard Kuc:

Review of "Open Source Wireless Java Tools Suite by Robert Virkus, " Apress, 2005, ISBN: 1590595033. 48 - George Hacken:

Review of "High-Assurance Design: Architecting Secure and Reliable Enterprise Applications by Clifford Berg, " Addison-Wesley Professional, 2005, ISBN: 0321375777. 50 - Jose Lloret:

Review of "Securing Storage: A Practical Guide to SAN and NAS Security by Himanshu Dwivedi, " Addison-Wesley Professional, 2005, ISBN: 0321349954. 50
- Charlene O'Hanlon:

Calendar. 52-53
- Stan Kelly-Bootle:

The calculus formally known as pi. 56-
Volume 4, Number 5, June 2006
- Charlene O'Hanlon:

Accessorizing. 6
- John Stanik:

News 2.0. 7
- Charlene O'Hanlon:

What's on your hard drive? 8
- George V. Neville-Neil:

Phishing for solutions. 9-10
- Charlene O'Hanlon:

A conversation with Leo Chang of ClickShift. 12-18
- Greg Olsen:

From COM to Common. 20-26 - Michi Henning:

The rise and fall of CORBA. 28-34 - Chris Richardson:

Untangling enterprise Java. 36-44 - Len Takeuchi:

ASPs: the integration challenge. 46-52
- A. Moreno:

Review of "Agile Estimating and Planning by Mike Cohn, " Prentice Hall PTR, 2005, ISBN: 0131479415. 59 - Michael Laszlo:

Review of "Component-Oriented Programming by Andy Ju An Wang and Kai Qian, " Wiley-Interscience, 2005, ISBN: 0471644463. 59
- Charlene O'Hanlon:

Calendar. 60-61
- Alex E. Bell:

Software development amidst the whiz of silver bullets... 64-
Volume 4, Number 6, July-August 2006
- Charlene O'Hanlon:

Able bodies. 8
- John Stanik:

News 2.0. 9
- Charlene O'Hanlon:

What's on your hard drive? 10
- George V. Neville-Neil

:
Pointless PKI. 11-12
- Charlene O'Hanlon:

A conversation with Jordan Cohen. 14-23
- John F. Canny:

The future of human-computer interaction. 24-32 - James L. Crowley:

Social perception. 34-43 - Gaetano Borriello:

The inivisble assistant. 44-49 - Jim Christensen, Jeremy B. Sussman, Stephen Levy, William E. Bennett, Tracee Vetting Wolf, Wendy A. Kellogg:

Too much information. 50-57
- Bayard Kohlhepp:

Review of "Windows and Linux Integration: Hands-on Solutions for a Mixed Environment by Jermy Moskowitz and Thomas Boutell, " Sybex Inc., 2005, ISBN: 0782144284. 58 - Melissa C. Stange:

Review of "Pro .NET 1.1 Remoting, Reflection, and Threading by David Curran, Fabio Ferracchiati, Syed Gilani, et al., " Apress, 2005, ISBN: 1590594525. 58
- Charlene O'Hanlon:

Calendar. 59
- Stan Kelly-Bootle:

Like a podcast in the sea: mean ol' LoTech blues. 64-
Volume 4, Number 7, September 2006
- Charlene O'Hanlon:

Playing by the rules. 8
- John Stanik:

News 2.0. 10
- Charlene O'Hanlon:

What's on your hard drive? 10
- George V. Neville-Neil

:
Facing the strain. 12-13
- Mache Creeger:

Rationalizing a home terabyte server. 14-17
- Eric Allman:

Complying with compliance. 18-21 - George W. Beeler Jr., Dana Gardner:

A requirements primer. 22-26 - John Bostick:

Box their SOXes off. 28-29 - J. C. Cannon, Marilee Byers:

Compliance deconstructed. 30-37 - Tracy Ragan:

Keeping score in the IT compliance game. 38-43
- Vladan M. Jovanovic:

Review of "Refactoring Databases: Evolutionary Database Design by Scott Ambler and Pramodkumar Sadalage, " Addison-Wesley Professional, 2006, ISBN: 0321293533. 44 - Radu State:

Review of "Software Security: Building Security In by Gary McGraw, " Addison-Wesley Professional, 2006, ISBN: 0321356705. 44
- Greg A. Nolann:

Seeking compliance nirvana. 72-
Volume 4, Number 8, October 2006
- Charlene O'Hanlon:

Reality vs. perception. 7
- John Stanik:

News 2.0. 8
- Charlene O'Hanlon:

What's on your hard drive? 9
- George V. Neville-Neil

:
Saddle up, aspiring code jockeys. 10-11
- Charlene O'Hanlon:

A conversation with David Brown. 14-23
- John R. Mashey:

The long road to 64 bits. 24-35 - Dan Rubel:

The heart of eclipse. 36-44 - Damon Poole:

Breaking the major release habit. 46-51
- Charlene O'Hanlon:

Calendar. 52
- Stan Kelly-Bootle:

You can look it up: or maybe not. 56-
Volume 4, Number 9, November 2006
- Charlene O'Hanlon:

The criminal mind. 7
- John Stanik:

News 2.0. 8
- Charlene O'Hanlon:

What's on your hard drive? 9
- George V. Neville-Neil

:
Understanding the problem. 10-12
- Mache Creeger:

Better health care through technology. 13-15
- Charlene O'Hanlon:

A conversation with Douglas W. Jones and Peter G. Neumann. 16-23
- Team Cymru:

Cybercrime: an epidemic. 24-35 - Eric Allman:

E-mail authentication: what, why, how? 30-34 - Thomas Wadlow, Vlad Gorelik:

Criminal code: the making of a cybercriminal. 36-41 - Daniel E. Geer Jr.:

Playing for keeps. 42-48
- Radu State:

Review of "Phishing Exposed by Lance James and Joe Stewart, " Syngress Publishing, 2005, ISBN: 159749030X. 50 - Markus Wolf:

Review of "Spring in Action by Craig Walls and Ryan Breidenbach, " Manning Publications, 2005, ISBN: 1932394354. 50
- Charlene O'Hanlon:

Calendar. 52
- Phillip A. Laplante:

The joy of spam. 56-
Volume 4, Number 10, December 2006 - January 2007
- Charlene O'Hanlon:

Forward thinking. 8
- John Stanik:

News 2.0. 10
- Charlene O'Hanlon:

What's on your hard drive? 11
- George V. Neville-Neil

:
Peerless P2P. 12-13
- Charlene O'Hanlon:

A conversation with John Hennessy and David Patterson. 14-22
- Ali-Reza Adl-Tabatabai, Christos Kozyrakis, Bratin Saha:

Unlocking concurrency. 24-33 - Simon Crosby, David Brown:

The virtualization reality. 34-41 - Brian E. Carpenter:

Better, faster, more secure. 42-48
- Diomidis Spinellis:

Review of "Sustainable Software Development: An Agile Perspective by Kevin Tate, " Addison-Wesley Professional, 2005, ISBN: 0321286081. 49 - Radu State:

Review of "Hacking Exposed: Web Applications, 2nd edition by Joel Scambray, Mike Shema, and Caleb Sima, " McGraw-Hill Osborne Media, 2006, ISBN: 0072262990. 49
- Charlene O'Hanlon:

Calendar. 50
- Stan Kelly-Bootle:

Will the real bots stand up? 56-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














