February 1999 - Vol. 42 No. 2

February 1999 issue cover image

Features

Opinion

Editorial Pointers

The Internet may have opened the world to us, but it’s a world we’d prefer to tour privately. We want the freedom to roam terrain on our own terms; and we want assurances we will leave no identifying footprints in our wake. We want our presence to remain faceless—albeit, nameless—in the crowd. Alas, that’s the […]
News

News Track

The transfer of sensitive U.S. space technology to China is under investigation by the U.S. Justice Department, reports CNN. A preliminary Defense Department report found that Hughes Electronics gave China potentially damaging information after a Chinese rocket carrying a Hughes-built satellite crashed in 1995. After satellites belonging to Hughes and Loral were destroyed in two […]
Opinion

Electronic Frontier: The Privacy Hoax

Privacy in the digital age is dead. At best, one of our most cherished rights as members of a free society is on life support, kept alive by cybercratic ramblings of an electronic fringe unable to come to grips with reality. In a police lineup of the usual suspects fingered as the biggest privacy abusers, […]
Opinion

Forum: More Ugly Truths About Consulting Assignments

I enjoyed reading Robert Glass’s column "How Not to Prepare for a Consulting Assignment, and Other Ugly Consultancy Truths" ("Practical Programmer," Dec. 1998, p. 11). From my perspective as an experienced software developer, Glass hit the nail on the head—as far as impossible schedules being a common problem and management not wanting to compromise schedule […]
Research and Advances

Internet Privacy

Privacy was a sensitive issue long before the advent of computers. Concerns have been magnified, however, by the existence and wide- spread use of large computer databases that make it easy to compile a dossier about an individual from many different data sources. Privacy issues are further exacerbated now that the World-Wide Web makes it […]
Opinion

Inside Risks: Robust Open-Source Software

Closed-source proprietary software, which is seemingly the lifeblood of computer system entrepreneurs, tends to have associated risks: Unavailability of source code reduces on-site adaptability and repairability. Inscrutability of code prohibits open peer analysis (which otherwise might improve reliability and security), and masks the reality that state-of-the-art development methods do not produce adequately robust systems. Lack […]

Recent Issues

  1. January 2025 cover
    January 2025 Vol. 68 No. 1
  2. December 2024 CACM cover
    December 2024 Vol. 67 No. 12
  3. November 2024 CACM cover
    November 2024 Vol. 67 No. 11
  4. October 2024 CACM cover
    October 2024 Vol. 67 No. 10