[author : Jonathan Erickson] #Edito
[author : Michael O. Rabin and Dennis E. Shasha]
The security approach presented here is a privacy-preserving, flexible, antipiracy solution that does not suffer from "Break Once, Run Everywhere."
[author : Amir Herzberg and Ahmad Jbara]
The TrustBar browser extension provides improved security, identification, and trust indicators.
[author : Daniel Stoleru]
Visual cryptography is a graphical form of information concealing.
[author : Joel Gyllenskog]
Joel lifts the hood on his USB security key.
[author : Ted O'Connor and Martin Snyder]
The JSR-168 portlet specification defines APIs for building applications viewed inside portal frameworks.
[author : Andy Kaylor]
The Eclipse Test and Performance Tools Platform provides open Standards for interoperability.
[author : Tom Thompson]
Steve Jobs dropped a bombshell when he told software developers that the Macintosh will switch from PowerPC to Intel x86 processors.
[author : Shah Datardina]
Need to utilize legacy software? Here are techniques for calling unmanaged code written in C from C#.
[author : Rich Newman]
It's crucial to address potential memory errors before porting to 64-bit platforms.
[author : Thorsten Ottosen]
Smart containers are useful and safe utilities that can lead to flawless object-oriented programming.
[author : Michael Lindahl]
Michael examines embedded-systems performance-analysis techniques, and discusses some of their inherent limitations.
[author : Michael Swaine]
Ringtones are where the money is—for now anyway.
[author : Ed Nisley]
Large, complex embedded systems have more places for things to go wrong.
[author : Jerry Pournelle]
Jerry looks back when inventing the future, and looks forward to the world of 64-bit computing.
[author : Michelle Levesque]
Michelle examines Greg Wilson's Data Crunching: Solving Everyday Problems Using Java, Python, and More.
[author : you]
[author : Dennis E. Shasha]
[author : DDJ Staff]
[author : Benjamin Booth]
[author : DDJ Staff]
[author : Michael Swaine]