Journal: ACM Queue

Volume 3, Issue 9

8 -- 0Charlene O Hanlon. Socially acceptable behavior
10 -- 0John Stanik. News 2.0
12 -- 0Charlene O Hanlon. What s on your hard drive?
14 -- 16George Neville-Neil. Kode Vicious unscripted
18 -- 26Charlene O Hanlon. A conversation with Ray Ozzie
28 -- 35David R. Millen, Jonathan Feinberg, Bernard Kerr. Social bookmarking in the enterprise
34 -- 41Andreas Gustafsson. Threads without the pain
36 -- 41Vipul Ved Prakash, Adam J. O Donnell. Fighting spam with reputation systems
48 -- 57Andrew McCallum. Information extraction: distilling structured data from unstructured text
58 -- 0Fernando Berzal Galiano. Review of Working effectively with legacy code by Michael Feathers
58 -- 0G. K. Jenkins. Review of The Linux enterprise cluster by Karl Kopper , No Starch Press, 2005, Isbn 1593270364
60 -- 0Charlene O Hanlon. Calendar
64 -- 0David A. Patterson. Stop whining about outsourcing!

Volume 3, Issue 8

8 -- 0Charlene O Hanlon. Unstructured, but not really
10 -- 0John Stanik. News 2.0
12 -- 0Charlene O Hanlon. What s on your hard drive?
14 -- 16George Neville-Neil. Kode Vicious unscripted
18 -- 24Daniela Florescu. Managing semi-structured data
26 -- 32Adam Bosworth. Learning from the web
34 -- 41C. M. Sperberg-McQueen. XML <and semi-structured data>
42 -- 49Natalya Fridman Noy. Order from chaos
50 -- 58Alon Y. Halevy. Why your data won t mix
60 -- 0J. S. Edwards. Review of Slamming Spam: A Guide for System Adminstrators by Robert Haskins and Dale Nielsen
61 -- 0Charlene O Hanlon. Calendar
64 -- 0Chris Suver. The cost of data

Volume 3, Issue 7

8 -- 0Jim Maurer. News 2.0
10 -- 0Jim Maurer. What s on your hard drive?
12 -- 14George Neville-Neil. Kode vicious
16 -- 25Jim Maurer. A conversation with Roger Sessions and Terry Coatta
26 -- 29Kunle Olukotun, Lance Hammond. The future of microprocessors
36 -- 46Richard McDougall. Extreme software scaling
48 -- 53Luiz André Barroso. The price of performance
54 -- 62Herb Sutter, James R. Larus. Software and the concurrency revolution
64 -- 0Mache Creeger. Multicore CPUs for the masses

Volume 3, Issue 6

8 -- 0Stuart I. Feldman. Distributed computing in the modern enterprise
10 -- 0John Stanik. News 2.0
12 -- 0Jim Maurer. What s on your hard drive?
14 -- 16George Neville-Neil. Kode vicious
18 -- 25Jim Maurer. A conversation with David Anderson
26 -- 29Ian T. Foster, Steven Tuecke. Describing the elephant: the different faces of IT as service
36 -- 42Dean Jacobs. Enterprise software as service
44 -- 49Pankaj Kumar. Web services and IT management
50 -- 59Paul Strong. Enterprise grid computing
60 -- 0Radu State. Review of Gray Hat Hacking: The Ethical Hacker s Handbook by Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, and Michael Lester
60 -- 0Sajjad Khan. Review of "Struts Recipes by George Franciscus and Danilo Gurovich"
61 -- 0Jim Maurer. Calendar

Volume 3, Issue 5

8 -- 0Randy Harr. On feeling secure in an unsafe world
12 -- 0Jim Maurer. Letters
14 -- 0John Stanik. News 2.0
16 -- 0Jim Maurer. What s on your hard drive?
18 -- 20George Neville-Neil. Kode vicious gets dirty
22 -- 32Jim Maurer. A conversation with Peter Tippett and Steven Hofmeyr
34 -- 39Thomas Wadlow. The answer is 42 of course
40 -- 50John Viega. Security---problem solved?
52 -- 53Bruce Schneier. Attack trends: 2004 and 2005
54 -- 59Ken Arnold. Programmers are people, too
60 -- 0André Mariën. Review of IPv6 Network Programming by Jun-ichiro itojun Hagino
61 -- 0Jim Maurer. Calendar
64 -- 0Rodney Bates. Syntactic heroin

Volume 3, Issue 4

8 -- 0John Stanik. Mobile applications get real
10 -- 0Edward Grossman. Letters
14 -- 0John Stanik. News 2.0
15 -- 0Edward Grossman. What s on your hard drive
16 -- 18George Neville-Neil. Kode vicious vs. Mothra
20 -- 28Marshall K. McKusick. A conversation with Tim Marsland
30 -- 37Bruce Zenel. Enterprise-grade wireless
38 -- 47Frederick L. Kitson. Mobile media: making it a reality
48 -- 53. Streams and standards: delivering mobile video
54 -- 59Kevin R. Fall, Steven McCanne. You don t know jack about network performance
60 -- 0. Review of Building Clustered Linux Systems by Robert W. Lucke
60 -- 0. Review of Expert .NET Programming by Simon Robinson
61 -- 0Edward Grossman. Calendar
64 -- 0Phillip A. Laplante. Mal managerium: a field guide

Volume 3, Issue 3

8 -- 0Edward Grossman. I am an abstraction layer
10 -- 0Edward Grossman. Letters
11 -- 0John Stanik. News 2.0
14 -- 0Edward Grossman. What s on your hard drive
15 -- 17George Neville-Neil. Kode vicious battles on
18 -- 28James R. Hamilton. A conversation with Pat Selinger
30 -- 38Jim Gray 0001, Mark Compton. A call to arms
40 -- 48James Ostell. Databases of discovery
50 -- 58Margo I. Seltzer. Beyond relational databases
60 -- 0André Mariën. Review of Exploiting Software: How to Break Code by Greg Hoglund and Gary McGraw
61 -- 0Carlos F. Enguix. Review of Explorer s Guide to the Semantic Web by Thomas B. Passin
62 -- 0Edward Grossman. Calendar
64 -- 0Stan Kelly-Bootle. File under unknowable!

Volume 3, Issue 2

10 -- 11David J. Brown. An update on software updates
12 -- 14Edward Grossman. Letters
16 -- 0John Stanik. News 2.0
18 -- 0Edward Grossman. What s on your hard drive?
20 -- 0George Neville-Neil. Kode vicious reloaded
24 -- 30Joseph Dadzie. Understanding software patching
40 -- 46Dorian Birsan. On plug-ins and extensible architectures
48 -- 56Alex E. Bell. UML fever: diagnosis and recovery
58 -- 0David Bellin. Review of PHP5 and MySQL Bible by Tim Converse and Joyce Park
58 -- 0R.-S. Chang. Review of Integration-Ready Architecture and Design: Software Engineering with XML, Java, .NET, Wireless, Speech, and Knowledge Technologies by Jeff Zhuk
60 -- 0Edward Grossman. Calendar
64 -- 0Jef Raskin. Comments are more important than code

Volume 3, Issue 10

8 -- 0Charlene O Hanlon. In with the new
10 -- 0John Stanik. News 2.0
11 -- 0Charlene O Hanlon. What s on your hard drive?
12 -- 15George Neville-Neil. Vicious XSS
16 -- 24Charlene O Hanlon. A conversation with Phil Smoot
26 -- 32Daniel Rogers. Lessons from the floor
34 -- 43Bill Hoffman. Monitoring, at your service
44 -- 51Friedrich Steimann, Thomas Kühne. Coding for the code
52 -- 0Andreas Tomek. Review of Intrusion Prevention and Active Response: Deploying Network and Host IPS by Michael Rash, Angela D. Orebaugh, Graham Clark, Becky Pinkard, and Jake Babbin
56 -- 0Stan Kelly-Bootle. Anything Su Doku, I can do better

Volume 3, Issue 1

8 -- 0Edward Grossman. Puttin the Queue in QA
10 -- 0Edward Grossman. Letters
11 -- 0Edward Grossman. What s on your hard drive?
12 -- 13George Neville-Neil. Kode vicious: the return
20 -- 25Jim Gray. A conversation with Tim Bray
26 -- 29Stuart I. Feldman. Quality assurance: much more than testing
30 -- 37Keith Stobie. Too darned big to test
38 -- 44William W. White. Sifting through the software sandbox: SCM meets QA
46 -- 53Michael Donat. Orchestrating an automated test lab
54 -- 60Mark Kobayashi-Hillary. A passage to India
61 -- 0Radu State. Review of Network Security Architectures by Sean Convery
61 -- 0Arun Ektare. Review of Designing Software for the Mobile Context: A Practitioner s Guide (Computer Communications and Networks) by Roman Longoria (Ed.)
62 -- 0Edward Grossman. Calendar
64 -- 0Terry Coatta. Traipsing through the QA tools desert