Volume 3,
Number 1,
February 2005
From the editors
Letters
Reader files
Kode vicious
Interview
- Jim Gray:
A conversation with Tim Bray.
20-25
Q focus:
quality assurance
Features
REVIEWS
- Arun Ektare:
Review of "Designing Software for the Mobile Context: A Practitioner's Guide (Computer Communications and Networks) by Roman Longoria (Ed.)".
61
- Radu State:
Review of "Network Security Architectures by Sean Convery".
61
Calendar
Curmedgeon
Volume 3,
Number 2,
March 2005
Patching and deployment
Letters
News 2.0
Reader files
Kode vicious
Q focus:
patch and deploy
Features
Book reviews
- R. S. Chang:
Review of "Integration-Ready Architecture and Design: Software Engineering with XML, Java, .NET, Wireless, Speech, and Knowledge Technologies by Jeff Zhuk".
58
- David Bellin:
Review of "PHP5 and MySQL Bible by Tim Converse and Joyce Park".
58
Calendar
Curmedgeon
- Jef Raskin:
Comments are more important than code.
64-
Volume 3,
Number 3,
April 2005
Databases:
a brave new world From the editors
Letters
News 2.0
What's on your hard drive
Kode vicious
Interview
Q focus:
databases
REVIEWS
- André Mariën:
Review of "Exploiting Software: How to Break Code by Greg Hoglund and Gary McGraw".
60
- Carlos F. Enguix:
Review of "Explorer's Guide to the Semantic Web by Thomas B. Passin".
61
Calendar
Curmudgeon
Volume 3,
Number 4,
May 2005
Going mobile From the editors
Letters
News 2.0
Reader files
Kode vicious
Interview
Q focus:
mobile applications
- Bruce Zenel:
Enterprise-grade wireless.
30-37
- Frederick L. Kitson:
Mobile media: making it a reality.
38-47
- Streams and standards: delivering mobile video.
48-53
Feature
Reviews
- Review of "Expert .NET Programming by Simon Robinson".
60
- Review of "Building Clustered Linux Systems by Robert W. Lucke".
60
Calendar
Curmudgeon
Volume 3,
Number 5,
June 2005
Security:
a war without end From the editors
- Randy Harr:
On feeling secure in an unsafe world.
8
Letters
News 2.0
Reader files
Kode vicious
Interview
- Jim Maurer:
A conversation with Peter Tippett and Steven Hofmeyr.
22-32
Q focus:
security
Feature
REVIEWS
- Don Chand:
Review of "Privacy: What Developers and IT Professionals Should Know by J. C. Cannon".
60
- André Mariën:
Review of "IPv6 Network Programming by Jun-ichiro itojun Hagino".
60
Calendar
Curmudgeon
Volume 3,
Number 6,
July/August 2005
Enterprise distributed computing From the editors
News 2.0
What's on your hard drive
Kode vicious
Interview
- Jim Maurer:
A conversation with David Anderson.
18-25
Q focus:
enterprise distributed computing
Reviews
- Sajjad Khan:
Review of "Struts Recipes by George Franciscus and Danilo Gurovich".
60
- Radu State:
Review of "Gray Hat Hacking: The Ethical Hacker's Handbook by Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, and Michael Lester".
60
Calendar
Curmudgeon
Volume 3,
Number 7,
September 2005
Make way for multiprocessors News 2.0
What's on your hard drive
Kode vicious
Interview
- Jim Maurer:
A conversation with Roger Sessions and Terry Coatta.
16-25
Q focus:
multiprocessors
Curmudgeon
Volume 3,
Number 8,
October 2005
Dealing with semi-structured data From the editors
News 2.0
Reader files
Kode vicious
Q focus:
semi-structured data
Reviews
- J. S. Edwards:
Review of "Slamming Spam: A Guide for System Adminstrators by Robert Haskins and Dale Nielsen".
60
- Neil Karl:
Review of "Official Eclipse 3.0 FAQs by John Arthorne and Chris Laffra".
60
Calendar
Curmudgeon
Volume 3,
Number 9,
November 2005
Social computing From the editors
News 2.0
Reader files
Kode vicious
Interview
Q focus:
social computing
Reviews
- G. K. Jenkins:
Review of "The Linux enterprise cluster by Karl Kopper", No Starch Press, 2005, Isbn 1593270364.
58
- Fernando Berzal Galiano:
Review of "Working effectively with legacy code by Michael Feathers".
58
Calendar
Curmudgeon
Volume 3,
Number 10,
December 2005
Managing megaservices From the editors
News 2.0
Reader files
Kode vicious
Interview
Q focus:
managing megaservices
Reviews
- A. K. Menon:
Review of "Open Systems and Standards for Software Product Development by P. A. Dargan".
52
- Andreas Tomek:
Review of "Intrusion Prevention and Active Response: Deploying Network and Host IPS by Michael Rash, Angela D. Orebaugh, Graham Clark, Becky Pinkard, and Jake Babbin".
52
Curmudgeon
Copyright © Fri Mar 12 17:31:55 2010
by Michael Ley (ley@uni-trier.de)