"Another reason to ditch ACM," thundered an ACM member in a social-media posting during recent debate over the Research Works Act, introduced by Congress in 2011. While deep concerns with the bill were widespread, the nasty tone …
Moshe Y. Vardi
DEPARTMENT: Letters to the editor
While I largely agree with Sarah Spiekermann's "The Challenges of Privacy by Design" (July 2012), I want to make it clear that many organizations do understand the need to embed privacy in their systems and technologies and …
Bertrand Meyer asks why too many research agencies seem obsessed with funding only groundbreaking projects.
Thanks to the University of New South Wales and IBM Research, scientists are moving closer to the junction of quantum and digital computing.
After decades in Flatland, the end of Moore's Law is pushing semiconductors into the third dimension.
Security researchers used malware to investigate large-scale Internet censorship in Egypt and Libya.
Thirty-two of the 39 living A.M. Turing Award laureates gathered in San Francisco to pay tribute to "the father of CS" and discuss the past, present, and future of computing.
COLUMN: Historical reflections
Journalists, historians, and the invention of email.
COLUMN: The profession of IT
Wise experts and powerful machines are no match for chaotic events and human declarations. Beware of their predictions and be humble in your own.
Peter J. Denning
COLUMN: Law and technology
A few predictions about predictions.
Tal Z. Zarsky
COLUMN: Broadening participation
Seeking to improve the process for writing and reviewing proposals for new educational programs.
Richard E. Ladner, Elizabeth Litzler
Some thoughts about author order in research papers.
Esperanza Marcos, Juan Manuel Vara, Valeria de Castro
A personal account of Alan Turing's life and impact.
Christos H. Papadimitriou
Backward compatibility always trumps new features.
Finding and fixing bugs in deployed software is difficult and time-consuming. Here are some alternatives.
Emery D. Berger
In the big open world of the cloud, highly available distributed objects will rule.
SECTION: Contributed articles
Trust between client organization and cloud provider is a strong predictor of successful cloud deployment.
Gary Garrison, Sanghyun Kim, Robin L. Wakefield
Continually verify self-adaptation decisions taken by critical software in response to changes in the operating environment.
Radu Calinescu, Carlo Ghezzi, Marta Kwiatkowska, Raffaela Mirandola
SECTION: Review articles
Three-dimensional user interfaces are uniquely able to achieve superior interaction fidelity, and this naturalism can be a huge advantage.
Doug A. Bowman, Ryan P. McMahan, Eric D. Ragan
SECTION: Research highlights
The history of the relationship between writing systems and technology is as long as it is varied. Likewise, the challenge of entering text using portable gadgets has a long history.
William A. Buxton
As computing technologies expanded beyond the confines of the desktop, the need for effective text entry methods alternative to the ubiquitous desktop keyboards has inspired both academic researchers and the information technology …
Shumin Zhai, Per Ola Kristensson
There is some risk in trusting the cloud providers with sensitive data. Why not encrypt the data stored in cloud services?
An ideal solution to satisfying the dual goals of protecting data confidentiality and running computations is to enable a server to compute over encrypted data, without the server ever decrypting the data to plaintext.
Raluca Ada Popa, Catherine M. S. Redfield, Nickolai Zeldovich, Hari Balakrishnan
COLUMN: Last byte
Last month (August 2012) we posted a
trio of brainteasers
concerning "magic sets." Here, we offer solutions to all three. How did you do?
Harvey Mudd College president Maria Klawe talks about increasing the number of women who study computer science.