Physical product reengineering with embedded information technology.
Leveraging the flexibility of your data warehouse.
Why we compete in DARPA's Urban Challenge autonomous robot race.
News track.
Necessary measures: metric-driven information security risk assessment and decision making.
Top 10 downloads from ACM's digital library.
[Getting ideas to market] Current issues faced by technology entrepreneurs.
Editorial pointers.
Inspiring students to pursue computing degrees.
Extreme programming compared with Microsoft-style iterative development.
[Software patents] The good, the bad, and the messy.
Nearshore locations in three principal global clusters and their respective attributes.
Post-conflict communications: the case of Liberia.
Toward a safer and more secure cyberspace.
Knowledge services on the semantic web.
Business applications of unstructured text.
Deterring internal information systems misuse.
Does copyright law need to be reformed?
Forum.
Social phishing.
Business process development life cycle methodology.
Reflections and trends in the expansion of cellular wireless services in the U.S. and China.
Why 'nearshore' means that distance matters.