default search action
ACM Queue, Volume 3
Volume 3, Number 1, February 2005
- Edward Grossman:
Puttin' the Queue in QA. 8
- Edward Grossman:
Letters. 10
- Edward Grossman:
What's on your hard drive? 11
- George V. Neville-Neil:
Kode vicious: the return. 12-13
- Jim Gray:
A conversation with Tim Bray. 20-25
- Stuart I. Feldman:
Quality assurance: much more than testing. 26-29 - Keith Stobie:
Too darned big to test. 30-37 - William W. White:
Sifting through the software sandbox: SCM meets QA. 38-44 - Michael Donat:
Orchestrating an automated test lab. 46-53
- Mark Kobayashi-Hillary:
A passage to India. 54-60
- Arun Ektare:
Review of "Designing Software for the Mobile Context: A Practitioner's Guide (Computer Communications and Networks) by Roman Longoria (Ed.)". 61 - Radu State:
Review of "Network Security Architectures by Sean Convery". 61
- Edward Grossman:
Calendar. 62
- Terry Coatta:
Traipsing through the QA tools desert. 64-
Volume 3, Number 2, March 2005
- David J. Brown:
An update on software updates. 10-11
- Edward Grossman:
Letters. 12-14
- John Stanik:
News 2.0. 16
- Edward Grossman:
What's on your hard drive? 18
- George V. Neville-Neil:
Kode vicious reloaded. 20
- Joseph Dadzie:
Understanding software patching. 24-30 - George Brandman:
Patching the enterprise. 32-39 - Dorian Birsan:
On plug-ins and extensible architectures. 40-46
- Alex E. Bell:
UML fever: diagnosis and recovery. 48-56
- R. S. Chang:
Review of "Integration-Ready Architecture and Design: Software Engineering with XML, Java, .NET, Wireless, Speech, and Knowledge Technologies by Jeff Zhuk". 58 - David Bellin:
Review of "PHP5 and MySQL Bible by Tim Converse and Joyce Park". 58
- Edward Grossman:
Calendar. 60
- Jef Raskin:
Comments are more important than code. 64-
Volume 3, Number 3, April 2005
- Edward Grossman:
I am an abstraction layer. 8
- Edward Grossman:
Letters. 10
- John Stanik:
News 2.0. 11
- Edward Grossman:
What's on your hard drive. 14
- George V. Neville-Neil:
Kode vicious battles on. 15-17
- James R. Hamilton:
A conversation with Pat Selinger. 18-28
- Jim Gray, Mark Compton:
A call to arms. 30-38 - James Ostell:
Databases of discovery. 40-48 - Margo I. Seltzer:
Beyond relational databases. 50-58
- André Mariën:
Review of "Exploiting Software: How to Break Code by Greg Hoglund and Gary McGraw". 60 - Carlos F. Enguix:
Review of "Explorer's Guide to the Semantic Web by Thomas B. Passin". 61
- Edward Grossman:
Calendar. 62
- Stan Kelly-Bootle:
File under "unknowable!". 64-
Volume 3, Number 4, May 2005
- John Stanik:
Mobile applications get real. 8
- Edward Grossman:
Letters. 10
- John Stanik:
News 2.0. 14
- Edward Grossman:
What's on your hard drive. 15
- George V. Neville-Neil:
Kode vicious vs. Mothra. 16-18
- Marshall K. McKusick:
A conversation with Tim Marsland. 20-28
- Bruce Zenel:
Enterprise-grade wireless. 30-37 - Frederick L. Kitson:
Mobile media: making it a reality. 38-47 - Streams and standards: delivering mobile video. 48-53
- Kevin R. Fall, Steven McCanne:
You don't know jack about network performance. 54-59
- Review of "Expert .NET Programming by Simon Robinson". 60
- Review of "Building Clustered Linux Systems by Robert W. Lucke". 60
- Edward Grossman:
Calendar. 61
- Phillip A. Laplante:
Mal managerium: a field guide. 64-
Volume 3, Number 5, June 2005
- Randy Harr:
On feeling secure in an unsafe world. 8
- Jim Maurer:
Letters. 12
- John Stanik:
News 2.0. 14
- Jim Maurer:
What's on your hard drive? 16
- George V. Neville-Neil:
Kode vicious gets dirty. 18-20
- Jim Maurer:
A conversation with Peter Tippett and Steven Hofmeyr. 22-32
- Thomas Wadlow:
The answer is 42 of course. 34-39 - John Viega:
Security---problem solved? 40-50 - Bruce Schneier:
Attack trends: 2004 and 2005. 52-53
- Ken Arnold:
Programmers are people, too. 54-59
- Don Chand:
Review of "Privacy: What Developers and IT Professionals Should Know by J. C. Cannon". 60 - André Mariën:
Review of "IPv6 Network Programming by Jun-ichiro itojun Hagino". 60
- Jim Maurer:
Calendar. 61
- Rodney Bates:
Syntactic heroin. 64-
Volume 3, Number 6, July/August 2005
- Stuart I. Feldman:
Distributed computing in the modern enterprise. 8
- John Stanik:
News 2.0. 10
- Jim Maurer:
What's on your hard drive? 12
- George V. Neville-Neil:
Kode vicious. 14-16
- Jim Maurer:
A conversation with David Anderson. 18-25
- Ian T. Foster, Steven Tuecke:
Describing the elephant: the different faces of IT as service. 26-29 - Dean Jacobs:
Enterprise software as service. 36-42 - Pankaj Kumar:
Web services and IT management. 44-49 - Paul Strong:
Enterprise grid computing. 50-59
- Sajjad Khan:
Review of "Struts Recipes by George Franciscus and Danilo Gurovich". 60 - Radu State:
Review of "Gray Hat Hacking: The Ethical Hacker's Handbook by Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, and Michael Lester". 60
- Jim Maurer:
Calendar. 61
- Stanley Kelly-Bootle:
Call that gibberish. 64-
Volume 3, Number 7, September 2005
- Jim Maurer:
News 2.0. 8
- Jim Maurer:
What's on your hard drive? 10
- George V. Neville-Neil:
Kode vicious. 12-14
- Jim Maurer:
A conversation with Roger Sessions and Terry Coatta. 16-25
- Kunle Olukotun, Lance Hammond:
The future of microprocessors. 26-29 - Richard McDougall:
Extreme software scaling. 36-46 - Luiz André Barroso:
The price of performance. 48-53 - Herb Sutter, James R. Larus:
Software and the concurrency revolution. 54-62
- Mache Creeger:
Multicore CPUs for the masses. 64-
Volume 3, Number 8, October 2005
- Charlene O'Hanlon:
Unstructured, but not really. 8
- John Stanik:
News 2.0. 10
- Charlene O'Hanlon:
What's on your hard drive? 12
- George V. Neville-Neil:
Kode Vicious unscripted. 14-16
- Daniela Florescu:
Managing semi-structured data. 18-24 - Adam Bosworth:
Learning from the web. 26-32 - C. M. Sperberg-McQueen:
XML <and semi-structured data>. 34-41 - Natalya Fridman Noy:
Order from chaos. 42-49 - Alon Y. Halevy:
Why your data won't mix. 50-58
- John S. Edwards:
Review of "Slamming Spam: A Guide for System Adminstrators by Robert Haskins and Dale Nielsen". 60 - Neil Karl:
Review of "Official Eclipse 3.0 FAQs by John Arthorne and Chris Laffra". 60
- Charlene O'Hanlon:
Calendar. 61
- Chris Suver:
The cost of data. 64-
Volume 3, Number 9, November 2005
- Charlene O'Hanlon:
Socially acceptable behavior. 8
- John Stanik:
News 2.0. 10
- Charlene O'Hanlon:
What's on your hard drive? 12
- George V. Neville-Neil:
Kode Vicious unscripted. 14-16
- Charlene O'Hanlon:
A conversation with Ray Ozzie. 18-26
- David R. Millen, Jonathan Feinberg, Bernard Kerr:
Social bookmarking in the enterprise. 28-35 - Andreas Gustafsson:
Threads without the pain. 34-41 - Vipul Ved Prakash, Adam J. O'Donnell:
Fighting spam with reputation systems. 36-41 - Andrew McCallum:
Information extraction: distilling structured data from unstructured text. 48-57
- G. K. Jenkins:
Review of "The Linux enterprise cluster by Karl Kopper", No Starch Press, 2005, Isbn 1593270364. 58 - Fernando Berzal Galiano:
Review of "Working effectively with legacy code by Michael Feathers". 58
- Charlene O'Hanlon:
Calendar. 60
- David A. Patterson:
Stop whining about outsourcing! 64-
Volume 3, Number 10, December 2005
- Charlene O'Hanlon:
In with the new. 8
- John Stanik:
News 2.0. 10
- Charlene O'Hanlon:
What's on your hard drive? 11
- George V. Neville-Neil:
Vicious XSS. 12-15
- Charlene O'Hanlon:
A conversation with Phil Smoot. 16-24
- Daniel Rogers:
Lessons from the floor. 26-32 - Bill Hoffman:
Monitoring, at your service. 34-43 - Friedrich Steimann, Thomas Kühne:
Coding for the code. 44-51
- A. K. Menon:
Review of "Open Systems and Standards for Software Product Development by P. A. Dargan". 52 - Andreas Tomek:
Review of "Intrusion Prevention and Active Response: Deploying Network and Host IPS by Michael Rash, Angela D. Orebaugh, Graham Clark, Becky Pinkard, and Jake Babbin". 52
- Stan Kelly-Bootle:
Anything Su Doku, I can do better. 56-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.