Fumbling the Future: How Xerox Invented, Then Ignored, the First Personal Computer
tells the gripping story of how Xerox invented the personal-computing technology in the …
DEPARTMENT: Letters to the editor
In "Regulating the Information Gatekeepers" (Nov. 2010), Patrick Vogl and Michael Barrett said a counterargument against the regulation of search-engine bias is that "Search …
created the Virtual Extension (VE) to expand the page limitations of the print edition by bringing readers the same high-quality articles in an online-only format. VE articles are available in their entirety to …
DEPARTMENT: [email protected]
Mark Guzdial discusses what scientists and engineers should know about computer science, such as Alan Kay's "Triple Whammy." Greg Linden writes about industry's different approaches to research and how to organize researchers …
DEPARTMENT: CACM online
The list of add-on features for Communications
' Web site began to take form shortly after the site was launched two years ago, and was a starting point for revisions now under …
Outreach programs and usability improvements are drawing many researchers to grid computing from disciplines that have not traditionally used such resources.
Researchers are mining Twitter's vast flow of data to measure public sentiment, follow political activity, and detect earthquakes and flu outbreaks.
A presidential report asserts the value of U.S. government investments in the cross-agency Networking and Information Technology Research and Development program and specifies areas needing greater focus …
The device may revolutionize data storage, replacing flash memory and perhaps even disks. Whether they can be reliably and cheaply manufactured, though, is an open question.
He raised important public issues, such as the impact of computers and the Internet on society, and encouraged social responsibility for computer professionals.
COLUMN: Legally speaking
Examining the fine print concerning your rights in your copies of purchased software.
COLUMN: Computing ethics
A chilling scenario portends a possible future.
COLUMN: The profession of IT
Professionals overwhelmed with information glut can find hope from new insights about time management.
COLUMN: Broadening participation
Changing the trajectory of participation in computing for students at various stages of development.
Mathematics is no longer the only foundation for computing and information research and education in academia.
As we progress into an information age, humans will need to work less like the machines they use and embrace knowledge-based approaches. That means exploiting simple …
Despite the global and borderless nature of the Internet's underlying protocols and driving philosophy, there are significant ways in which it remains substantively territorial …
Why can't we all use standard libraries for commonly needed algorithms?
SECTION: Contributed articles
Compose "dream tools" from continuously evolving bundles of software to make sense of complex scientific data sets.
Effective countermeasures depend on first understanding how users naturally fall victim to fraudsters.
SECTION: Review articles
The advent of multicore processors as the standard computing platform will force major changes in software design.
SECTION: Research highlights
In the opening of Sibelius' Violin Concerto, a soloist plays delicately. The orchestra responds in kind. As the piece progresses, soloist and orchestra alternatively …
A system for musical accompaniment is presented in which a computer-driven orchestra follows and learns from a soloist in a concerto-like setting. The system's connections with machine learning are highlighted, showing current …
The Internet is increasingly a platform for online services running on rack after rack of servers. With the advent of large data centers, the study of the networks that interconnect these servers has become an important topic …
VL2 is a practical network architecture that scales to support huge data centers with uniform high capacity between servers, performance isolation between services, and Ethernet layer-2 semantics.
COLUMN: Last byte
Last month (February 2011, p. 112) we posted a trio of brainteasers, including one as yet unsolved, concerning partitions of Ms. Feldman's fifth-grade class. Here, we offer solutions to at least two of them. How did you do?
I envisioned and wrote the first computer virus in 1969 but failed to see that viruses would become widespread. Technologies don't always evolve as we'd like. I learned this …
COLUMN: Viewpoints: Virtual extension
Why computer scientists should come out from "behind the scenes" more often and work with the media to draw public attention to their fundamental innovations.
SECTION: Contributed articles: Virtual extension
The 2008 U.S. presidential election demonstrated the Internet is a major source of political information and expression.
Grounding principles to get the most out of enterprise 2.0 investments.