DEPARTMENT: Editorial pointers
DEPARTMENT: News track
COLUMN: Technical opinion
A powerful software algorithm is utilized for a variety of video-enhancing applications.
COLUMN: International perspectives
Reflecting on recent history and the context of current events.
COLUMN: Legally speaking
Should software developers be required to include infringement-inhibitingcomponents such as filters in their technologies?
COLUMN: Technology strategy and management
Exploring how Russia's nascent software industry measures up to other countries.
Failing to share control, the U.S. risks driving disaffected countries to establish their own competing, independent root servers, thus creating parallel Internets.
DEPARTMENT: Hot links
COLUMN: President's letter
The ACM Job Migration study was released last month, and it includes many recommendations for current and future computing professionals and educators.
SPECIAL ISSUE: Next-generation cyber forensics
Sophisticated intruders take full advantage of the lack of forensic readiness. To respond more effectively to such attacks, computer security professionals and digital investigators must combine talents and work together.
Live analysis tools have made a significant difference in capturing evidence during forensic investigations. Such tools, however, are far from infallible.
Live forensics gathers data from running systems, providing additional contextual information that is not available in a disk-only forensic analysis.
The ability to display mountains of data in a graphical manner significantly enhances the time needed to locate and analyze suspicious files.
The digital forensics community requires new tools and strategies for the rapid turnaround of large forensic targets.
Metadata promises too much value as a business management tool to dismiss its implementation and maintenance effort as the equivalent of Sisyphean torture.
It guides e-commerce firms implementing B2C Web sites intended to attract customers, earn their trust, and entice them to buy while helping integrate the firms' internal business processes.
In the last few years, high-speed wireless access to the Internet has grown rapidly. Surprisingly, this growth has not come through cellular phone networks as many had expected, but through IEEE 802.11 standards-based wireless …
DEPARTMENT: Student de-charter notice
Focusing on end users' needs rather than those of archiving institutions.
Protocol analysis is an evidence-gathering technique with an established record in experimental psychology. Here, it is applied to study how programmers solve problems.
A two-construct taxonomy is used to define the essential elements of object orientation through analysis of existing literature.
Computer science programs neglect diverse student needs.
COLUMN: Inside risks