Bringing IT All Together Liquid Computing co-founder and CTO Mike Kemp explains why a piecemeal approach to building a data center is not always the best approach.
Orienting Oracle Amlan Debnath of Oracle discusses his company's evolving game plan as it expands to embraces SOA and events-driven architectures.
APIs with an Appetite The classic, and perhaps now cliche, example of a good API is the Unix open, close, read, write, ioctl set of system calls...
Kode Vicious from the SIP: Session Initiation Protocol issue, March 2007
A SIP Glossary SIP is in a continual state of improvement through extension and clarification.
Robert Sparks, Estacado Systems from the SIP: Session Initiation Protocol issue, March 2007
A License to Kode While it's sometimes tempting to blame the coders, the seeds of many problems are sown well before any lines of code have been written.
Kode Vicious from the Open Source Security issue, February 2007
Peerless P2P The two faces of peer-to-peer networking
Kode Vicious from the Computer Architecture issue, December 2006 / January 2007
Criminal Code: The Making of a Cybercriminal Queue's first-ever narrative chronicles one man's transition from small-time hacker to big-time crook.
Thomas Wadlow, Independent Consultant, and Vlad Gorelik, Sana Security from the Cybercrime issue, November 2006
E-mail Authentication: What? Why? How? There are ways to know for sure that that e-mail really was sent by your bank, but which method is best?
Eric Allman, Sendmail from the Cybercrime issue, November 2006
Box Their SOXes Off Soon everyone will be asking for an SAS 70 Type II audit. Is your company ready?
John Bostick, dbaDirect from the Compliance issue, September 2006
The Invisible Assistant A cell biology lab puts ubiquitous computing technology to the test.
Gaetano Borriello, University of Washington from the HCI issue, July/August 2006
Logging on with KV I am amazed at the number of people who go to great lengths to encrypt data but then just chuck it all, unceremoniously, in plain form, into the logs.
Kode Vicious from the Component Technologies issue, June 2006
Human-KV Interaction The last thing you want to do is baby-sit the designers as they complain that every time they build the code, it breaks.
Kode Vicious from the Workflow Systems issue, March 2006
Modern Performance Monitoring Today's diverse and decentralized computer world demands new thinking about performance monitoring and analysis.
Mark Purdy, Pursoft from the System Performance issue, February 2006
Gettin’ Your Kode On What language you use has very little to do with the quality of the code.
Kode Vicious from the System Performance issue, February 2006
Fighting Spam with Reputation Systems Leveraging the power of communities and reputations can be an effective weapon against spam.
Vipul Ved Prakash and Adam O’Donnell, Cloudmark from the Social Computing issue, November 2005
Learning from THE WEB The Web has taught us many lessons about distributed computing, but some of the most important ones have yet to fully take hold.
Adam Bosworth, Google from the Semi-Structured Data issue, October 2005
What's on Your Hard Drive? Visitors to our Web site are invited to tell us about the tools they love—and the tools they hate.
from the Multiprocessors issue, September 2005
Databases of Discovery Open-ended database ecosystems promote new discoveries in biotech. Can they help your organization, too?
JAMES OSTELL, NCBI from the Databases issue, April 2005
Kode Vicious Battles On A koder with attitude, KV answers your questions. Miss Manners he ain’t.
Kode Vicious from the Databases issue, April 2005
A Call to Arms Long anticipated, the arrival of radically restructured database architectures is now finally at hand.
JIM GRAY, MICROSOFT MARK COMPTON, CONSULTANT from the Databases issue, April 2005
Comments Are More Important Than Code The thorough use of internal documentation is one of the most-overlooked ways of improving software quality and speeding implementation.
Jef Raskin, Independent Consultant from the Software Updates issue, March 2005
A Passage to India Pitfalls that the outsourcing vendor forgot to mention.
MARK KOBAYASHI-HILLARY, OFFSHORE ADVISORY SERVICES from the Quality Assurance issue, February 2005
Kode Vicious Unleashed A koder with attitude, KV answers your questions. Miss Manners he ain’t.
Kode Vicious from the Quality Assurance issue, February 2005
Cyber warfare: steganography vs. steganalysis For every clever method and tool being developed to hide information in multimedia data, an equal number of clever methods and tools are being developed to detect and reveal its secrets.
Huaiqing Wang, Shuozhong Wang from the Programming Languages issue, Dec/Jan 2004-2005
Thread Scheduling in FreeBSD 5.2 To help get a better handle on thread scheduling, we take a look at how FreeBSD 5.2 handles it.
MARSHALL KIRK McKUSICK, CONSULTANT; GEORGE V. NEVILLE-NEIL, CONSULTANT from the RFID issue, October 2004
A Conversation with Donald Peterson What will the coming revolution merging voice and data communications with business applications bring?
from the VoIP issue, September 2004
Negotiating in Service-Oriented Environments Buy or rent? This question applies not only to houses and cars, but now to software.
Ahmed Elfatatry, University of Alexandria; Paul Layzell, University of Manchester from the Virtual Machines issue, July/August 2004
Network Forensics Hackers are notorious for covering their tracks--can a postmortem analysis be carried out?
Ben Laurie, A. L. Digital from the Security issue, June 2004
From IR to Search and Beyond How is the evolution from information retrieval to text mining affecting the information workspace?
Ramana Rao, Inxight Software from the Open Source issue, May 2004
Buffer Overrun Madness Why do good programmers follow bad practices?
Rodney Bates, Wichita State University from the Open Source issue, May 2004
Searching Vs. Finding How do you help computers find the information people really want?
William A. Woods, Sun Microsystems Laboratories from the Enterprise Search issue, April 2004
AI in Computer Games Can Computer Games Employ AI Artfully?
Alexander Nareyek, Guest Researcher, Carnegie Mellon University from the Game Development issue, February 2004
Silicon Superstitions When we don't understand a process, we fall into magical thinking about results.
Jef Raskin, Consultant from the Distributed Development issue, December/January 2003-2004
Beyond Instant Messaging IM isn't just for play anymore. Find out what's next.
John C. Tang, Sun Labs, James "Bo" Begole, Sun Labs from the Instant Messaging issue, November 2003
On Helicopters and Submarines You're not going to get any savings through integrating IM with your SIP infrastructure.
Marshall T. Rose, Invisible Worlds from the Instant Messaging issue, November 2003
You Don't Know Jack about Disks The geometric programming model that coincided with the physical organization of data posed several challenges for the programmer.
Dave Anderson, Seagate Technology from the Storage issue, June 2003
How Much Storage is Enough? In 1999, the world produced about 1.5 exabytes of storable content—equivalent to about 250 megabytes for every man, woman, and child on earth.
Peter Lyman and Hal R. Varian, U.C. Berkeley from the Storage issue, June 2003
Scripting Web Service Prototypes We hope our approach can help script programmers and veteran software engineers alike move quickly from idea to implementation
Christopher Vincent, IBM Systems Group from the Building Web Services issue, March 2003