Chip makers turn to multicore processors D Geer Computer 38 (5), 11-13, 2005 | 804 | 2005 |
Malicious bots threaten network security D Geer Computer 38 (1), 18-20, 2005 | 169 | 2005 |
Reducing the storage burden via data deduplication D Geer Computer 41 (12), 15-17, 2008 | 153 | 2008 |
Eclipse becomes the dominant Java IDE D Geer Computer 38 (7), 16-18, 2005 | 122 | 2005 |
Users make a Beeline for ZigBee sensor technology D Geer Computer 38 (12), 16-19, 2005 | 107 | 2005 |
Taking steps to secure web services D Geer Computer 36 (10), 14-16, 2003 | 101 | 2003 |
Are companies actually using secure development life cycles? D Geer Computer 43 (6), 12-16, 2010 | 93 | 2010 |
Security technologies go phishing D Geer Computer 38 (6), 18-21, 2005 | 80 | 2005 |
Is it time for clockless chips?[Asynchronous processor chips] D Geer Computer 38 (3), 18-21, 2005 | 68 | 2005 |
Security of critical control systems sparks concern D Geer Computer 39 (1), 20-23, 2006 | 62 | 2006 |
Will gesture recognition technology point the way? D Geer Computer 37 (10), 20-23, 2004 | 60 | 2004 |
Taking the graphics processor beyond graphics D Geer Computer 38 (9), 14-16, 2005 | 58 | 2005 |
Will binary XML speed network traffic? D Geer Computer 38 (4), 16-18, 2005 | 47 | 2005 |
For programmers, multicore chips mean multiple challenges D Geer Computer 40 (9), 17-19, 2007 | 43 | 2007 |
Will software developers ride ruby on rails to success? D Geer Computer 39 (2), 18-20, 2006 | 37 | 2006 |
Digital rights technology sparks interoperability concerns D Geer Computer 37 (12), 20-22, 2004 | 37 | 2004 |
Will new standards help curb spam? D Geer Computer 37 (2), 14-16, 2004 | 37 | 2004 |
Building converged networks with IMS technology D Geer Computer 38 (11), 14-16, 2005 | 34 | 2005 |
Behavior-based network security goes mainstream D Geer Computer 39 (3), 14-17, 2006 | 32 | 2006 |
Statistical machine translation gains respect D Geer Computer 38 (10), 18-21, 2005 | 31 | 2005 |