In the opening remarks of his article on page 38, Daniel Keim tells us that one million terabytes (or one exabyte) of data are now generated globally each year, and 99.9%…
August 2001 - Vol. 44 No. 8
Features
A global network of sensors initially designed to listen for clandestine nuclear blasts is now being used to detect violent winds, volcanic eruptions, and the crash of…
Digital: The Y2k E-Commerce Tumble
The real millennium catastrophe was an overreliance on technology to overcome the weaknesses of a bad business model.
The Profession of IT: The IT Schools Movement
Building an education for an IT professional without the idiosyncratic constraints of any particular specialty . . . from the ground up.
Viewpoint: Free Speech Rights For Programmers
Misuse of copyright law is an affront to the rights of computer scientists.
Viewpoint: Pondering Pixelized Pixies
Should digital images, even those some consider pornography, have the same constitutional protection as any other form of expression?
What Storytelling Can Do For Information Visualization
Storytelling allows visualization to reveal information as effectively and intuitively as if the viewer were watching a movie.
Visual Exploration of Large Data Sets
In the rising tide of business transaction data, these tools help distinguish which are strategic assets and which are not worth collecting in the first place.
Look and learn which page of perhaps thousands Web site visitors linger on before clicking yes and no, which drove them to the exit button, and many more actionable…
Populating the Hermitage Museum’s New Web Site
Experts from around the world tackle one of the most ambitious Web-based museum projects and the result captures the true artistry of teamwork, technology, and yes, art.
The Internet Is Changing the Music Industry
An emerging distribution paradigm is redefining the roles of traditional music retailers, tightening competition within the industry and allowing more efficient ways for…
Exploring the Web with Reconnaissance Agents
Why surf alone? New agent technology can scout out the online terrain and recommend the best paths for you to follow.
Coping with Rapid Changes in IT
Rapidly changing information technology is challenging IT management, requiring development of coping strategies.
Inside Risks: Risks in Email Security
It is easy to create bogus email with someone else’s email name and address: SMTP servers don’t check sender authenticity. Secure/Multipurpose Internet Mail…