Journal: ACM Queue

Volume 4, Issue 9

7 -- 0Charlene O Hanlon. The criminal mind
8 -- 0John Stanik. News 2.0
9 -- 0Charlene O Hanlon. What s on your hard drive?
10 -- 12George Neville-Neil. Understanding the problem
13 -- 15Mache Creeger. Better health care through technology
16 -- 23Charlene O Hanlon. A conversation with Douglas W. Jones and Peter G. Neumann
24 -- 35Team Cymru. Cybercrime: an epidemic
30 -- 34Eric Allman. E-mail authentication: what, why, how?
36 -- 41Thomas Wadlow, Vlad Gorelik. Criminal code: the making of a cybercriminal
42 -- 48Daniel E. Geer Jr.. Playing for keeps
50 -- 0Radu State. Review of Phishing Exposed by Lance James and Joe Stewart, Syngress Publishing, 2005, ISBN: 159749030X
50 -- 0Markus Wolf. Review of Spring in Action by Craig Walls and Ryan Breidenbach, Manning Publications, 2005, ISBN: 1932394354
52 -- 0Charlene O Hanlon. Calendar
56 -- 0Phillip A. Laplante. The joy of spam

Volume 4, Issue 8

7 -- 0Charlene O Hanlon. Reality vs. perception
8 -- 0John Stanik. News 2.0
9 -- 0Charlene O Hanlon. What s on your hard drive?
10 -- 11George Neville-Neil. Saddle up, aspiring code jockeys
14 -- 23Charlene O Hanlon. A conversation with David Brown
24 -- 35John R. Mashey. The long road to 64 bits
36 -- 44Dan Rubel. The heart of eclipse
52 -- 0Charlene O Hanlon. Calendar
56 -- 0Stan Kelly-Bootle. You can look it up: or maybe not

Volume 4, Issue 7

8 -- 0Charlene O Hanlon. Playing by the rules
10 -- 0Charlene O Hanlon. What s on your hard drive?
10 -- 0John Stanik. News 2.0
12 -- 13George Neville-Neil. Facing the strain
14 -- 17Mache Creeger. Rationalizing a home terabyte server
18 -- 21Eric Allman. Complying with compliance
22 -- 26George W. Beeler Jr., Dana Gardner. A requirements primer
28 -- 29John Bostick. Box their SOXes off
30 -- 37J. C. Cannon, Marilee Byers. Compliance deconstructed
38 -- 43Tracy Ragan. Keeping score in the IT compliance game
44 -- 0Radu State. Review of Software Security: Building Security In by Gary McGraw, Addison-Wesley Professional, 2006, ISBN: 0321356705
44 -- 0Vladan Jovanovic. Review of Refactoring Databases: Evolutionary Database Design by Scott Ambler and Pramodkumar Sadalage, Addison-Wesley Professional, 2006, ISBN: 0321293533
72 -- 0Greg A. Nolann. Seeking compliance nirvana

Volume 4, Issue 6

8 -- 0Charlene O Hanlon. Able bodies
9 -- 0John Stanik. News 2.0
10 -- 0Charlene O Hanlon. What s on your hard drive?
11 -- 12George Neville-Neil. Pointless PKI
14 -- 23Charlene O Hanlon. A conversation with Jordan Cohen
24 -- 32John Canny. The future of human-computer interaction
34 -- 43James L. Crowley. Social perception
44 -- 49Gaetano Borriello. The inivisble assistant
50 -- 57Jim Christensen, Jeremy B. Sussman, Stephen Levy, William E. Bennett, Tracee Vetting Wolf, Wendy A. Kellogg. Too much information
58 -- 0Melissa C. Stange. Review of Pro .NET 1.1 Remoting, Reflection, and Threading by David Curran, Fabio Ferracchiati, Syed Gilani, et al., Apress, 2005, ISBN: 1590594525
58 -- 0Bayard Kohlhepp. Review of Windows and Linux Integration: Hands-on Solutions for a Mixed Environment by Jermy Moskowitz and Thomas Boutell, Sybex Inc., 2005, ISBN: 0782144284
59 -- 0Charlene O Hanlon. Calendar
64 -- 0Stan Kelly-Bootle. Like a podcast in the sea: mean ol LoTech blues

Volume 4, Issue 5

6 -- 0Charlene O Hanlon. Accessorizing
7 -- 0John Stanik. News 2.0
8 -- 0Charlene O Hanlon. What s on your hard drive?
9 -- 10George Neville-Neil. Phishing for solutions
12 -- 18Charlene O Hanlon. A conversation with Leo Chang of ClickShift
20 -- 26Greg Olsen. From COM to Common
28 -- 34Michi Henning. The rise and fall of CORBA
36 -- 44Chris Richardson. Untangling enterprise Java
46 -- 52Len Takeuchi. ASPs: the integration challenge
59 -- 0A. Moreno. Review of Agile Estimating and Planning by Mike Cohn, Prentice Hall PTR, 2005, ISBN: 0131479415
59 -- 0Michael Laszlo. Review of Component-Oriented Programming by Andy Ju An Wang and Kai Qian, Wiley-Interscience, 2005, ISBN: 0471644463
60 -- 61Charlene O Hanlon. Calendar
64 -- 0Alex E. Bell. Software development amidst the whiz of silver bullets..

Volume 4, Issue 4

8 -- 0Charlene O Hanlon. The domino effect
9 -- 0John Stanik. News 2.0
10 -- 11Charlene O Hanlon. What s on your hard drive?
12 -- 13George Neville-Neil. Phishing for solutions
14 -- 22Charlene O Hanlon. A conversation with Werner Vogels
24 -- 29Jeff Barr, Luis-Felipe Cabrera. AI gets a brain
38 -- 46Taf Anthias, Krishna Sankar. The network s new role
42 -- 0Andreas Tomek. Review of Protect your Windows Network: From Perimeter to Data by Jesper Johansson and Steve Riely, Addison-Wesley Professional, 2005, ISBN: 0321336437
48 -- 0Bernard Kuc. Review of Open Source Wireless Java Tools Suite by Robert Virkus, Apress, 2005, ISBN: 1590595033
50 -- 0George Hacken. Review of High-Assurance Design: Architecting Secure and Reliable Enterprise Applications by Clifford Berg, Addison-Wesley Professional, 2005, ISBN: 0321375777
50 -- 0Jose Lloret. Review of Securing Storage: A Practical Guide to SAN and NAS Security by Himanshu Dwivedi, Addison-Wesley Professional, 2005, ISBN: 0321349954
52 -- 53Charlene O Hanlon. Calendar
56 -- 0Stan Kelly-Bootle. The calculus formally known as pi

Volume 4, Issue 3

7 -- 0Charlene O Hanlon. The private universe
8 -- 0John Stanik. News 2.0
9 -- 0Charlene O Hanlon. What s on your hard drive?
10 -- 12George Neville-Neil. Kode vicious bugs out
13 -- 21Charlene O Hanlon. A conversation with Chuck McManis
22 -- 26Terry Coatta. The (not so) hidden computer
28 -- 35Jim Barton. TiVo-lution
36 -- 41Stephen Johnson. Java in a teacup
42 -- 0Andrea Paramithiotti. Review of Grid Database Design by April Wells, Auerbach Publications, 2005, ISBN: 0849328004
42 -- 0Radu State. Review of Extrusion Detection: Security Monitoring for Internal Intrusions by Richard Bejtlich, Adddison-Wesley Professional, 2005, ISBN: 0321349962
56 -- 0Mache Creeger. Evolution or revolution?

Volume 4, Issue 2

7 -- 0Charlene O Hanlon. Letters
8 -- 0John Stanik. News 2.0
9 -- 0Charlene O Hanlon. What s on your hard drive?
10 -- 12George Neville-Neil. Human-KV interaction
14 -- 23Charlene O Hanlon. A conversation with Steve Ross-Talbot
24 -- 32Peter de Jong. Going with the flow
50 -- 58Duncan Johnston-Watt. Under new management
59 -- 0Elliot Jaffe. Review of Pro Perl by Peter Wainwright, Apress, 2005, ISBN 159059438X
60 -- 61Charlene O Hanlon. Calendar
64 -- 0Stan Kelly-Bootle. But, having said that, ..

Volume 4, Issue 10

8 -- 0Charlene O Hanlon. Forward thinking
10 -- 0John Stanik. News 2.0
11 -- 0Charlene O Hanlon. What s on your hard drive?
12 -- 13George Neville-Neil. Peerless P2P
14 -- 22Charlene O Hanlon. A conversation with John Hennessy and David Patterson
24 -- 33Ali-Reza Adl-Tabatabai, Christos Kozyrakis, Bratin Saha. Unlocking concurrency
34 -- 41Simon Crosby, David Brown. The virtualization reality
42 -- 48Brian E. Carpenter. Better, faster, more secure
49 -- 0Radu State. Review of Hacking Exposed: Web Applications, 2nd edition by Joel Scambray, Mike Shema, and Caleb Sima, McGraw-Hill Osborne Media, 2006, ISBN: 0072262990
49 -- 0Diomidis Spinellis. Review of Sustainable Software Development: An Agile Perspective by Kevin Tate, Addison-Wesley Professional, 2005, ISBN: 0321286081
50 -- 0Charlene O Hanlon. Calendar
56 -- 0Stan Kelly-Bootle. Will the real bots stand up?

Volume 4, Issue 1

8 -- 0Charlene O Hanlon. Quality really is job #1
10 -- 0John Stanik. News 2.0
11 -- 0Charlene O Hanlon. What s on your hard drive?
12 -- 14George Neville-Neil. Gettin your kode on
16 -- 24Charlene O Hanlon. A conversation with Jarod Jenson
26 -- 36Bryan Cantrill. Hidden in plain sight
38 -- 43Philip Beevers. A high-performance team
44 -- 50Bart Smaalders. Performance anti-patterns
48 -- 57Mark Purdy. Modern Performance Monitoring
62 -- 0Radu State. Review of Switching to VoIP by Ted Wallingford, O Reilly & Associates, 2005, ISBN 0596008686
62 -- 0Arthur Gittleman. Review of Foundations of Ajax by Ryan Asleson, Nathaniel Schutta, APress, 2005, ISBN 1590595823
64 -- 0Phillip A. Laplante. It isn t your father s realtime anymore