Table of Contents
In a sensible world—at least as defined by computer scientists who, as we all know, are eminently sensible people—there would be no need for the ACM Education Policy
Here are synopses of four Virtual Extension articles that are now available in their entirety to ACM members via the Digital Library.
DEPARTMENT: Letters to the editor
I found much to agree with in Stephen Davies's article "Still Building the Memex" (Feb. 2011) but also feel one of his suggestions went off in the wrong direction.
Jason Hong discusses how Apple creates well-designed products and what the human-computer interaction community can learn from its methods.
DEPARTMENT: CACM online
Over the coming weeks, ACM will be diving headfirst into the world of mobility. Our strategy is essentially two-pronged. The first is the development of a mobile version of
It's not easy to generate a string of numbers that lack any pattern or rule, or even to define exactly what randomness means.
Advancements in mobile electronics have led to several prosthetics innovations in recent years, but providing reliable touch sensations to users remains an elusive goal.
The popularity of virtual goods and currencies in online gaming is changing how people think and act about money.
After a year of turmoil, computer scientists at King's College London have retained their jobs, but substantial challenges lie ahead.
COLUMN: Emerging markets
Successful global IT team managers combine general distributed team management skills enhanced with cultural sensitivity.
COLUMN: Historical reflections
Reflections on recruiting and training programmers during the early period of computing.
COLUMN: Technology strategy and management
The world can absorb more social media sites, but how many?
COLUMN: Kode Vicious
Programming is a creative endeavor, and therefore there is such a thing as coder's block. What does it take to clear the blockage?
Since the beginning of the debate on network neutrality, and perhaps as an inheritance of that beginning, the controversy has been restricted to fixed broadband networks.
COLUMN: Viewpoints: Virtual extension
The decline in undergraduate enrollment at the university level is well documented and it begins in high school. We advocate university faculty reaching out to high school
Exposing SIMD units within interpreted languages could simplify programs and unleash floods of untapped processor power.
Knowing where to begin is half the battle.
Contrary to popular belief, SQL and noSQL are really just two sides of the same coin.
SECTION: Contributed articles
How to identify, instantiate, and evaluate domain-specific design principles for creating more effective visualizations.
Despite earlier claims, Software Transactional Memory outperforms sequential code.
Finding 10 balloons across the U.S. illustrates how the Internet has changed the way we solve highly distributed problems.
SECTION: Contributed articles: Virtual extension
Emergent serendipity fosters volunteerism driven by creative problem solving, not simply following directions.
Looking back on the first decade of the Doctor of Professional Studies in Computing---an ambitious doctoral track for people who want to do research in an industrial setting.
SECTION: Review articles
The practice of crowdsourcing is transforming the Web and giving rise to a new field.
SECTION: Review articles: Virtual extension
Deeply understanding the intricacies of software must always come before any considerations for modifying it.
SECTION: Research highlights
The paper by LeMétayer et al. addresses one technical issue in a large and serious problem in the production of mass-market software (MMSW), that of the lack of liability
This paper reports on the results of a multidisciplinary project involving lawyers and computer scientists with the aim to put forward a set of methods and tools to (1) define software liability in a precise and unambiguous way
Is the number 9021960864034418159813 random? To my limited mind, the string appears random. Is there a way to use some formal mathematics to justify my naïveté?
The question of determining which (weak) forms of randomness "fool" (or seem totally random to) a given algorithm is a basic and fundamental question in the modern theory
COLUMN: Last byte
Kelly Gotlieb recalls the early days of computer science in Canada.