ACMQueue
Sat, Jun 30, 2007
Columns: Curmudgeon Geek@Home Interviews Kode Vicious | Conference Calendar Issue Index Site Map |












CRC Career Resource Center
· Web Application Developer
· Back-End Developer for Social Media Startup (NYC)
· Junior Localization Engineer
· Research Scientist and Engineer Positions
· Software Developer/ R&D


Queue focus: Data Management

   


Data Management

Bringing IT All Together
Liquid Computing co-founder and CTO Mike Kemp explains why a piecemeal approach to building a data center is not always the best approach.

Orienting Oracle
Amlan Debnath of Oracle discusses his company's evolving game plan as it expands to embraces SOA and events-driven architectures.

As Big as a Barn?
Taking Measure of Measurement
Stan Kelly-Bootle, Author
from the SIP: Session Initiation Protocol issue, March 2007

APIs with an Appetite
The classic, and perhaps now cliche, example of a good API is the Unix open, close, read, write, ioctl set of system calls...
Kode Vicious
from the SIP: Session Initiation Protocol issue, March 2007

A SIP Glossary
SIP is in a continual state of improvement through extension and clarification.
Robert Sparks, Estacado Systems
from the SIP: Session Initiation Protocol issue, March 2007

A License to Kode
While it's sometimes tempting to blame the coders, the seeds of many problems are sown well before any lines of code have been written.
Kode Vicious
from the Open Source Security issue, February 2007

Peerless P2P
The two faces of peer-to-peer networking
Kode Vicious
from the Computer Architecture issue, December 2006 / January 2007

Criminal Code: The Making of a Cybercriminal
Queue's first-ever narrative chronicles one man's transition from small-time hacker to big-time crook.
Thomas Wadlow, Independent Consultant, and Vlad Gorelik, Sana Security
from the Cybercrime issue, November 2006

E-mail Authentication: What? Why? How?
There are ways to know for sure that that e-mail really was sent by your bank, but which method is best?
Eric Allman, Sendmail
from the Cybercrime issue, November 2006

You Can Look It Up - Or Maybe Not
Chasing citations through endless, mislabeled nodes
Stan Kelly-Bootle, Author
from the Legacy Systems issue, October 2006

Saddle Up, Aspiring Code Jockeys
A koder with attitude, KV answers your questions. Miss Manners he ain't.
Kode Vicious
from the Legacy Systems issue, October 2006

Large Scale Systems: Best Practices - Transcript
Transcript of interview with Jerod Jenson, Enron Online
from the Legacy Systems issue, October 2006

Box Their SOXes Off
Soon everyone will be asking for an SAS 70 Type II audit. Is your company ready?
John Bostick, dbaDirect
from the Compliance issue, September 2006

What's on Your Hard Drive? Core Programs
Emacs, TOAD, NetBeans, Visio
from the Compliance issue, September 2006

Complying with Compliance
Blowing it off is not an option.
Eric Allman, Sendmail
from the Compliance issue, September 2006

The Invisible Assistant
A cell biology lab puts ubiquitous computing technology to the test.
Gaetano Borriello, University of Washington
from the HCI issue, July/August 2006

Untangling Enterprise Java
Are today's noninvasive, POJO-based frameworks the answer to enterprise Java woes?
Chris Richardson, Consultant
from the Component Technologies issue, June 2006

Logging on with KV
I am amazed at the number of people who go to great lengths to encrypt data but then just chuck it all, unceremoniously, in plain form, into the logs.
Kode Vicious
from the Component Technologies issue, June 2006

Human-KV Interaction
The last thing you want to do is baby-sit the designers as they complain that every time they build the code, it breaks.
Kode Vicious
from the Workflow Systems issue, March 2006

What's on Your Hard Drive?
Ain't that the truth!
from the Workflow Systems issue, March 2006

It Isn't Your Fathers Realtime Anymore
The Misuse and Abuse of a Noble Term
Phillip Laplante, Penn State University
from the System Performance issue, February 2006

Modern Performance Monitoring
Today's diverse and decentralized computer world demands new thinking about performance monitoring and analysis.
Mark Purdy, Pursoft
from the System Performance issue, February 2006

Gettin’ Your Kode On
What language you use has very little to do with the quality of the code.
Kode Vicious
from the System Performance issue, February 2006

Stop Whining About Outsourcing!
The facts about IT job growth show no reason to complain.
David Patterson, ACM
from the Social Computing issue, November 2005

Information Extraction: Distilling Structured Data from Unstructured Text
Much of the world’s information is locked within unstructured, natural language text. Information extraction techniques can help set it free.
Andrew McCallum, University of Massachusetts, Amherst
from the Social Computing issue, November 2005

Fighting Spam with Reputation Systems
Leveraging the power of communities and reputations can be an effective weapon against spam.
Vipul Ved Prakash and Adam O’Donnell, Cloudmark
from the Social Computing issue, November 2005

Kode Vicious Unscripted
Computers make it too easy to copy data.
from the Semi-Structured Data issue, October 2005

Learning from THE WEB
The Web has taught us many lessons about distributed computing, but some of the most important ones have yet to fully take hold.
Adam Bosworth, Google
from the Semi-Structured Data issue, October 2005

Unstructured, But Not Really
Data that Doesn't Fit the Mold
Charlene O'Hanlon, ACM Queue
from the Semi-Structured Data issue, October 2005

What's on Your Hard Drive?
Visitors to our Web site are invited to tell us about the tools they love—and the tools they hate.
from the Multiprocessors issue, September 2005

Call That Gibberish?
Detecting the real from the fake is getting harder.
Stan Kelly-Bootle
from the Enterprise Distributed Computing issue, July/August 2005

Kode Vicious Cycles On
Avid Bicyclists and Old Europeans
Kode Vicious
from the Enterprise Distributed Computing issue, July/August 2005

Enterprise Software as Service
Online services are changing the nature of software.
Dean Jacobs, salesforce.com
from the Enterprise Distributed Computing issue, July/August 2005

Kode Vicious Gets Dirty
What about all that low-level, nitty-gritty koding stuff?
Kode Vicious
from the Security issue, June 2005

What's on Your Hard Drive?
Visitors to our Web site were invited to tell us about tools they love - and tools they hate.
ACM Queue
from the Mobile Applications issue, May 2005

Kode Vicious vs. Mothra!
A koder with attitude, KV answers your questions. Miss Manners he ain’t.
Kode Vicious
from the Mobile Applications issue, May 2005

Mobile Applications Get Real
Yes, you can do actual work on a PDA.
John Stanik, ACM Queue
from the Mobile Applications issue, May 2005

Beyond Relational Databases
There is more to data access than SQL.
MARGO SELTZER, SLEEPYCAT
from the Databases issue, April 2005

File Under “Unknowable!”
It’s been a hard day’s night—proving nonexistence!
Stan Kelly-Bootle
from the Databases issue, April 2005

Databases of Discovery
Open-ended database ecosystems promote new discoveries in biotech. Can they help your organization, too?
JAMES OSTELL, NCBI
from the Databases issue, April 2005

Kode Vicious Battles On
A koder with attitude, KV answers your questions. Miss Manners he ain’t.
Kode Vicious
from the Databases issue, April 2005

A Call to Arms
Long anticipated, the arrival of radically restructured database architectures is now finally at hand.
JIM GRAY, MICROSOFT
MARK COMPTON, CONSULTANT

from the Databases issue, April 2005

Comments Are More Important Than Code
The thorough use of internal documentation is one of the most-overlooked ways of improving software quality and speeding implementation.
Jef Raskin, Independent Consultant
from the Software Updates issue, March 2005

On Plug-ins and Extensible Architectures
Extensible application architectures such as Eclipse offer many advantages, but one must be careful to avoid
Dorian Birsan, Eclipse
from the Software Updates issue, March 2005

A Passage to India
Pitfalls that the outsourcing vendor forgot to mention.
MARK KOBAYASHI-HILLARY, OFFSHORE ADVISORY SERVICES
from the Quality Assurance issue, February 2005

A Conversation with Tim Bray
Searching for ways to tame the world’s vast stores of information.
from the Quality Assurance issue, February 2005

Traipsing through the QA Tools Desert
Who’s really to blame for buggy code?
Terry Coatta
from the Quality Assurance issue, February 2005

Kode Vicious Unleashed
A koder with attitude, KV answers your questions. Miss Manners he ain’t.
Kode Vicious
from the Quality Assurance issue, February 2005

Kode Vicious: The Return
A koder with attitude, KV answers your questions. Miss Manners he ain’t.
Kode Vicious
from the Programming Languages issue, Dec/Jan 2004-2005

Extensible Programming for the 21st Century
Is an open, more flexible programming environment just around the corner?
GREGORY V. WILSON, UNIVERSITY OF TORONTO
from the Programming Languages issue, Dec/Jan 2004-2005

Cyber warfare: steganography vs. steganalysis
For every clever method and tool being developed to hide information in multimedia data, an equal number of clever methods and tools are being developed to detect and reveal its secrets.
Huaiqing Wang, Shuozhong Wang
from the Programming Languages issue, Dec/Jan 2004-2005

Viewpoint: Globalization and the American IT worker
Exporting IT jobs and importing IT workers not only harms U.S. IT workers, it also harms U.S. firms and the broader economy.
Norman Matloff
from the Programming Languages issue, Dec/Jan 2004-2005

Error Messages: What's the Problem?
Real-world tales of woe shed some light
Paul P. Maglio and Eser Kandogan, IBM Research
from the Error Recovery issue, November 2004

A Conversation with Bruce Lindsay
Designing for failure may be the key to success.
from the Error Recovery issue, November 2004

Thread Scheduling in FreeBSD 5.2
To help get a better handle on thread scheduling, we take a look at how FreeBSD 5.2 handles it.
MARSHALL KIRK McKUSICK, CONSULTANT; GEORGE V. NEVILLE-NEIL, CONSULTANT
from the RFID issue, October 2004

A Conversation with Donald Peterson
What will the coming revolution merging voice and data communications with business applications bring?
from the VoIP issue, September 2004

Negotiating in Service-Oriented Environments
Buy or rent? This question applies not only to houses and cars, but now to software.
Ahmed Elfatatry, University of Alexandria; Paul Layzell, University of Manchester
from the Virtual Machines issue, July/August 2004

Who Should Work with Whom? Building Effective Software Project Teams
Personality type analysis can help take the guesswork out of putting together a high-performance software project team.
Narasimhaiah Gorla, Wayne State University; Yan Wah Lam, Hong Kong Polytechnic University
from the Virtual Machines issue, July/August 2004

Technology strategy and management: More lawyers than programmers?
Microsoft must alter its strategy to avoid an increasingly litigious future.
Michael A. Cusumano, MIT
from the Virtual Machines issue, July/August 2004

Network Forensics
Hackers are notorious for covering their tracks--can a postmortem analysis be carried out?
Ben Laurie, A. L. Digital
from the Security issue, June 2004

A Bigot by Any Other Name...
Are you an Open Source Bigot?
Josh Coates, Internet Archive
from the Open Source issue, May 2004

From IR to Search and Beyond
How is the evolution from information retrieval to text mining affecting the information workspace?
Ramana Rao, Inxight Software
from the Open Source issue, May 2004

Buffer Overrun Madness
Why do good programmers follow bad practices?
Rodney Bates, Wichita State University
from the Open Source issue, May 2004

Searching Vs. Finding
How do you help computers find the information people really want?
William A. Woods, Sun Microsystems Laboratories
from the Enterprise Search issue, April 2004

AI in Computer Games
Can Computer Games Employ AI Artfully?
Alexander Nareyek, Guest Researcher, Carnegie Mellon University
from the Game Development issue, February 2004

Massively Multiplayer Middleware
Dealing with scaling and latency when a (virtual) life is on the line
Michi Henning, ZeroC
from the Game Development issue, February 2004

"The Demise of the Waterfall Model Is Imminent" and Other Urban Myths
In software engineering, how common is common sense?
Phillip A. Laplante and Colin J. Neill, Penn State University
from the Game Development issue, February 2004

The Economics of Spam
How did we end up with recipients paying the price?
Eric Allman, Sendmail
from the Distributed Development issue, December/January 2003-2004

Culture Surprises in Remote Software Development Teams
You can't hide from culture, yours or anyone else's.
Judith S. Olson, University of Michigan; Gary M. Olson, University of Michigan and Collaboratory for Research on Electronic Work
from the Distributed Development issue, December/January 2003-2004

A Conversation with Steve Hagan
At Oracle, distributed development is a way of life.
from the Distributed Development issue, December/January 2003-2004

Silicon Superstitions
When we don't understand a process, we fall into magical thinking about results.
Jef Raskin, Consultant
from the Distributed Development issue, December/January 2003-2004

Uprooting Software Defects at the Source
So many bugs, so few bug hunters. Fight back!
Seth Hallem, David Park, Dawson Engler, Coverity
from the Instant Messaging issue, November 2003

A Closer Look at Our Common Wisdom
An AT&T Labs study of IM use
Ellen Isaacs, Freelance Interaction Designer and Researcher
from the Instant Messaging issue, November 2003

Beyond Instant Messaging
IM isn't just for play anymore. Find out what's next.
John C. Tang, Sun Labs, James "Bo" Begole, Sun Labs
from the Instant Messaging issue, November 2003

A Conversation with Peter Ford
The IM world according to a Messenger architect
from the Instant Messaging issue, November 2003

On Helicopters and Submarines
You're not going to get any savings through integrating IM with your SIP infrastructure.
Marshall T. Rose, Invisible Worlds
from the Instant Messaging issue, November 2003

Reach Out and Touch Someone
IM is still in an early stage of development
Wendy A. Kellogg, Queue
from the Instant Messaging issue, November 2003

Wireless Networking Considered Flaky
WiFi is Flaky
Eric Allman, Sendmail
from the Power issue, October 2003

Coding Smart: People vs.Tools
Even the best tools can't help bad coding habits.
Donn M. Seeley, Wind River Systems
from the Developer Tools issue, September 2003

Debugging in an Asynchronous World
How do you even begin to understand the behavior of asynchronous code?
Michael Donat, Silicon Chalk
from the Developer Tools issue, September 2003

The Developer's Art Today: Aikido or Sumo?
Do software tools help or hurt productivity?
David J. Brown, Queue Advisory Board Member
from the Developer Tools issue, September 2003

You Don't Know Jack about Disks
The geometric programming model that coincided with the physical organization of data posed several challenges for the programmer.
Dave Anderson, Seagate Technology
from the Storage issue, June 2003

How Much Storage is Enough?
In 1999, the world produced about 1.5 exabytes of storable content—equivalent to about 250 megabytes for every man, woman, and child on earth.
Peter Lyman and Hal R. Varian, U.C. Berkeley
from the Storage issue, June 2003

Scripting Web Service Prototypes
We hope our approach can help script programmers and veteran software engineers alike move quickly from idea to implementation
Christopher Vincent, IBM Systems Group
from the Building Web Services issue, March 2003

Queue Partners




Free QueueNews Email Newsletter
QueueNews is a weekly newsletter featuring a listing and excerpts of the latest articles to appear on Queue's Web site.
Subscribing is quick and easy! Just fill out the form below.
- HTML version
- plaintext version
Please type in the captcha number:
 
privacy policy


Place Your Link Here
AllinfoDir Web Directory Apartments for rent Counter Strike Hacks Credit Cards Elegant Directory
Web development & buy MLB tickets.
Free Themes online blackjack osCommerce Modules & Mods phone cards WoW Hacks


ACM Home
About Queue Advertise with Queue Advisory Board Back Issues Contact Us Dev Tools Roadmap Free Subscription Privacy Policy Writer Faq RSS feeds
© ACM, Inc. All rights reserved.