DEPARTMENT: Editorial pointers
Diane Crawford
Page 5
DEPARTMENT: News track
CACM Staff
Pages 9-10
DEPARTMENT: Forum
Pages 11-13
COLUMN: Technical opinion
A powerful software algorithm is utilized for a variety of video-enhancing applications.
Gary F. Templeton
Pages 15-18
COLUMN: International perspectives
Reflecting on recent history and the context of current events.
Siri Birgitte Uldal, Muhammad Aimal Marjan
Pages 19-24
COLUMN: Legally speaking
Should software developers be required to include infringement-inhibitingcomponents such as filters in their technologies?
Pamela Samuelson
Pages 25-30
COLUMN: Technology strategy and management
Exploring how Russia's nascent software industry measures up to other countries.
Michael A. Cusumano
Pages 31-34
COLUMN: Viewpoint
Failing to share control, the U.S. risks driving disaffected countries to establish their own competing, independent root servers, thus creating parallel Internets.
Nanda Kumar, Abbe Mowshowitz
Pages 35-37
DEPARTMENT: Hot links
Pages 39-40
COLUMN: President's letter
The ACM Job Migration study was released last month, and it includes many recommendations for current and future computing professionals and educators.
David A. Patterson
Pages 41-42
SPECIAL ISSUE: Next-generation cyber forensics
Brajendra Panda, Joseph Giordano, Daniel Kalil
Pages 44-47
Sophisticated intruders take full advantage of the lack of forensic readiness. To respond more effectively to such attacks, computer security professionals and digital investigators must combine talents and work together.
Eoghan Casey
Pages 48-55
Live analysis tools have made a significant difference in capturing evidence during forensic investigations. Such tools, however, are far from infallible.
Brian D. Carrier
Pages 56-61
Live forensics gathers data from running systems, providing additional contextual information that is not available in a disk-only forensic analysis.
Frank Adelstein
Pages 63-66
The Common Digital Evidence Storage Format Working Group
Pages 67-68
Chet Hosmer
Pages 69-70
The ability to display mountains of data in a graphical manner significantly enhances the time needed to locate and analyze suspicious files.
Sheldon Teelink, Robert F. Erbacher
Pages 71-75
The digital forensics community requires new tools and strategies for the rapid turnaround of large forensic targets.
Golden G. Richard, Vassil Roussev
Pages 76-80
Rahul Bhaskar
Pages 81-83
Simson L. Garfinkel
Pages 85-87
Metadata promises too much value as a business management tool to dismiss its implementation and maintenance effort as the equivalent of Sisyphean torture.
Ganesan Shankaranarayanan, Adir Even
Pages 88-94
It guides e-commerce firms implementing B2C Web sites intended to attract customers, earn their trust, and entice them to buy while helping integrate the firms' internal business processes.
Pak-Lok Poon, Amy H.L. Lau
Pages 96-103
In the last few years, high-speed wireless access to the Internet has grown rapidly. Surprisingly, this growth has not come through cellular phone networks as many had expected, but through IEEE 802.11 standards-based wireless …
Jan Damsgaard, Mihir A. Parikh, Bharat Rao
Pages 104-109
DEPARTMENT: Student de-charter notice
CACM Staff
Page 110
Focusing on end users' needs rather than those of archiving institutions.
H. M. Gladney
Pages 111-116
Protocol analysis is an evidence-gathering technique with an established record in experimental psychology. Here, it is applied to study how programmers solve problems.
Stephen Owen, Pearl Brereton, David Budgen
Pages 117-122
A two-construct taxonomy is used to define the essential elements of object orientation through analysis of existing literature.
Deborah J. Armstrong
Pages 123-128
Computer science programs neglect diverse student needs.
Roli Varma
Pages 129-134
COLUMN: Inside risks
Peter G. Neumann
Page 152