The 2015 Grace Hopper celebration of women in computing is expected to bring together more than 12,000 — mostly female — computer scientists! But this impressive number should not be taken to mean all is well on the gender-diversity …
Moshe Y. Vardi
The Third Heidelberg Laureate Forum equaled and perhaps outperformed the previous two. It was also, however, a poignant event because we were reminded of the ephemeral nature of our human lives.
Vinton G. Cerf
DEPARTMENT: Letters to the Editor
One afternoon early in 1990, one of the 100 or so 4ESS switches that handled U.S. long-distance traffic at the time hit a glitch and executed some untested recovery code. In the process the switch dragged its neighboring switches …
John Arquilla considers justifications for warfare in the cyber realm, while Daniel Reed looks ahead at big data and exascale computing.
John Arquilla, Daniel A. Reed
Experiment sheds new light on wave-particle duality.
Automotive infotainment systems are driving changes to automobiles, and to driver behavior.
A growing number of companies are taking out cybersecurity insurance policies to protect themselves from the costs of data breaches.
COLUMN: Inside risks
Mandating insecurity by requiring government access to all data and communications.
Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield "Whit" Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner
COLUMN: Technology strategy and management
The ability to adjust to various technical and business disruptions has been essential to IBM's success during the past century.
Michael A. Cusumano
COLUMN: Kode Vicious
George V. Neville-Neil
COLUMN: The business of software
On brains and bytes.
Phillip G. Armour
COLUMN: Historical reflections
Reflections on the past to inform the future.
Thomas J. Misa
Research, leadership, and communication about AI futures.
Thomas G. Dietterich, Eric J. Horvitz
Online science education needs a new revolution.
Phillip Compeau, Pavel A. Pevzner
Rethinking the fundamental abstractions of the file system.
T. S. Pillai, V. Chidambaram, R. Alagappan, S. Al-Kiswany, A. C. Arpaci-Dusseau, R. H. Arpaci-Dusseau
We have to choose to build a Web that is accessible to everyone.
SECTION: Contributed articles
The Dissent system aims for a quantifiably secure, collective approach to anonymous communication online.
Joan Feigenbaum, Bryan Ford
This framework addresses the environmental dimension of software performance, as applied here by a paper mill and a car-sharing service.
Patricia Lago, Sedef Akinli Koçak, Ivica Crnkovic, Birgit Penzenstadler
SECTION: Review articles
The challenge of missing heritability offers great contribution options for computer scientists.
SECTION: Research highlights
Mathematics is not difficult to find in Chebfun, the subject of "Computing Numerically with Functions Instead of Numbers."
We present the Chebfun system for numerical computation with functions, which is based on a key idea: an analogy of floating-point arithmetic for functions rather than numbers.
Lloyd N. Trefethen
COLUMN: Last byte
Information processing gives spiritual meaning to life, for those who make it their life's work.
William Sims Bainbridge