March 2004 - Vol. 47 No. 3

March 2004 issue cover image

Features

Opinion Editorial pointers

Editorial Pointers

This month marks my 17th year with Communications. During that time this magazine has chronicled the evolution of practically every known—and heretofore unknown—discipline within computer science. Indeed, we watched the computing field itself evolve into a global arena of unprecedented triumphs and erratic spirals. But with it all, it’s still difficult to accept that events […]
News News track

News Track

The U.S. Government, bowing to repeated Secret Service requests, is now deliberately obscuring its highest-quality aerial photographs over Washington in an effort to hide visible objects on the roofs of the White House, Capitol, and Treasury departments. The Associated Press reports this blurring policy also includes views of the Naval Observatory where the Vice President […]
Opinion Forum

Forum

Simone Santini’s comment (Forum, Dec. 2003) brought to mind something I constantly tell my students: There is nothing new about computers; they simply mechanize the application of logical principles that have been around since Socrates, a logic that can be formally expressed through the mathematics invented by George Boole. The two best courses I ever […]
News ACM fellows

ACM Fellows

The ACM Fellows Program was established by Council in 1993 to recognize and honor outstanding ACM members for their achievements in computer science and information technology and for their significant contributions to the mission of the ACM. The ACM Fellows serve as distinguished colleagues to whom the ACM and its members look for guidance and […]
Research and Advances Emerging technologies for homeland security

Introduction

The catastrophic events of September 11, 2001, dramatically demonstrated the reach and effects of terrorism and made protecting the security of citizens a top priority and a major challenge for many governments worldwide. The formation of the Department of Homeland Security is an exemplar response by the U.S. to such a challenge, drawing upon the […]
Research and Advances Emerging technologies for homeland security

Cyber Defense Technology Networking and Evaluation

Creating an experimental infrastructure for developing next-generation information security technologies.
Opinion Inside risks

Risks of Monoculture

The W32/Blaster worm burst onto the Internet scene in August of 2003. By exploiting a buffer overflow in Windows, the worm was able to infect more than 1.4 million systems worldwide in less than a month. More diversity in the OS market would have limited the number of susceptible systems, thereby reducing the level of […]

Recent Issues

  1. July 2024 CACM cover
    July 2024 Vol. 67 No. 7
  2. June 2024 Vol. 67 No. 6
  3. May 2024 CACM cover
    May 2024 Vol. 67 No. 5
  4. April 2024 CACM cover with text
    April 2024 Vol. 67 No. 4