[author : Michael Swaine]
Erik Demaine is this year's recipient of the Katyanagi Don't count Cobol out. It's a key element in modern distributed business software architectures.
[author : Gwyn Fisher]
Gwyn examines several types of coding vulnerabilities and examines how you can mitigate the risk of exploit within your code.
[author : Oliver Goldman]
Adobe AIR requires that all AIR-based applications be signed for to secure delivery.
[author : Jeremy Weiskotten]
OpenID is an open standard that defines a way that web-based applications can authenticate users via a single identity.
[author : Dejan Ristanovic and Jelica Protic]
The Book cipher algorithm uses letters of subsequent words in some text or book as a key to encode messages.
[author : Adelene Ng]
Lucene.NET is a high-performance text retrieval library that Adelene uses to index and search image files.
[author : Maciej Zawadzki]
Traditional Continuous Integration has been constrained so that it provides only a partial picture of software quality. Maciej suggests alternatives.
[author : Scott W. Ambler]
Scott examines the best ways to address nonfunctional requirements.
[author : Herb Sutter]
Herb continues his exploration of lock-free code—this time focusing on creating a lock-free queue.
[author : Jonathan Erickson]
Visualizing organic information.
[author : Michael Swindell]
Despite reports to the contrary, native code remains the core foundation of application development.
[author : edited by Michael Swaine]
Profiles of programmers, descriptions of developers.
[author : compiled by the DDJ Staff]
New development products.
[author : Jonathan Erickson]
Checking in with expert Bruce Schneier about the state of security.
[author : Michael Swaine]
Fun with puzzles!