Follow
DAVID D GEER
DAVID D GEER
Geer Communications
Verified email at davidgeer.com - Homepage
Title
Cited by
Cited by
Year
Chip makers turn to multicore processors
D Geer
Computer 38 (5), 11-13, 2005
8042005
Malicious bots threaten network security
D Geer
Computer 38 (1), 18-20, 2005
1692005
Reducing the storage burden via data deduplication
D Geer
Computer 41 (12), 15-17, 2008
1532008
Eclipse becomes the dominant Java IDE
D Geer
Computer 38 (7), 16-18, 2005
1222005
Users make a Beeline for ZigBee sensor technology
D Geer
Computer 38 (12), 16-19, 2005
1072005
Taking steps to secure web services
D Geer
Computer 36 (10), 14-16, 2003
1012003
Are companies actually using secure development life cycles?
D Geer
Computer 43 (6), 12-16, 2010
932010
Security technologies go phishing
D Geer
Computer 38 (6), 18-21, 2005
802005
Is it time for clockless chips?[Asynchronous processor chips]
D Geer
Computer 38 (3), 18-21, 2005
682005
Security of critical control systems sparks concern
D Geer
Computer 39 (1), 20-23, 2006
622006
Will gesture recognition technology point the way?
D Geer
Computer 37 (10), 20-23, 2004
602004
Taking the graphics processor beyond graphics
D Geer
Computer 38 (9), 14-16, 2005
582005
Will binary XML speed network traffic?
D Geer
Computer 38 (4), 16-18, 2005
472005
For programmers, multicore chips mean multiple challenges
D Geer
Computer 40 (9), 17-19, 2007
432007
Will software developers ride ruby on rails to success?
D Geer
Computer 39 (2), 18-20, 2006
372006
Digital rights technology sparks interoperability concerns
D Geer
Computer 37 (12), 20-22, 2004
372004
Will new standards help curb spam?
D Geer
Computer 37 (2), 14-16, 2004
372004
Building converged networks with IMS technology
D Geer
Computer 38 (11), 14-16, 2005
342005
Behavior-based network security goes mainstream
D Geer
Computer 39 (3), 14-17, 2006
322006
Statistical machine translation gains respect
D Geer
Computer 38 (10), 18-21, 2005
312005
The system can't perform the operation now. Try again later.
Articles 1–20