DEPARTMENT: From the President
I see ACM as a continual 'work in progress' as computing and our community evolves. In the future, I believe ACM will need to constantly reassess priorities and activities to ensure we remain vital to the global computing community …
Vicki L. Hanson
DEPARTMENT: Cerf's up
Many applications are surfacing for neural network systems, including reliable identification of diseases (for example, diabetic retinopathy, cancerous cells), situational awareness for self-driving cars, and a raft of other …
Vinton G. Cerf
DEPARTMENT: Vardi's insights
Communism is the most famous 20th-century attempt to build market-free economies. It required coercion on a colossal scale. The Internet is the second major attempt to build a market-free economy, limited to information.
Moshe Y. Vardi
DEPARTMENT: Letters to the editor
AI is a sort of idiot savant that can be unpredictably, and potentially, dangerously literal.
Today's programmers offer more valuable skills than simply being able to hack algorithms and make data structures, says Yegor Bugayenko.
The electricity consumption of mining for cryptocurrencies is becoming a real concern. Here's what to do about it.
And that's not all. Email is not what it used to be.
A growing number of low-cost (and free!) solutions aim to open the Internet to developing regions.
COLUMN: Legally speaking
An evolving technological landscape has made application of copyright law increasingly difficult.
COLUMN: Economic and business dimensions
Session details: Economic and business dimensions
Most of the suggested benefits of blockchain technologies do not come from elements unique to the blockchain.
COLUMN: Broadening participation
Session details: Broadening participation
Considering the confluence of research questions and sociopolitical dynamics.
Addressing its cognitive essence, universal value, and curricular practices.
A proposal for keeping cyber security both out of sight and out of mind for end users.
Josiah Dykstra, Eugene H. Spafford
Your computer is not a fast PDP-11.
Think like an entrepreneur.
Expert-curated guides to the best of CS research.
Deepak Vasisht, Peter Bailis
SECTION: Contributed articles
Such inputs distort how machine-learning-based systems are able to function in the world as it is.
Ian Goodfellow, Patrick McDaniel, Nicolas Papernot
Designers can create designs that nudge users toward the most desirable option.
Christoph Schneider, Markus Weinmann, Jan vom Brocke
Performance measurements often go wrong, reporting surface-level results that are more marketing than science.
SECTION: Review articles
Digital effectiveness is not the same as mastering the ICTs, rather it is the art of using them in a purposeful, healthy way.
Carlo Gabriel Porto Bellini
SECTION: Research highlights
"Majority Is Not Enough: Bitcoin Mining Is Vulnerable," by Eyal and Sirer, questions the 2009 Bitcoin white paper's implicit assumption of perfect information—that all miners have the same view of the blockchain.
Sharon Goldberg, Ethan Heilman
We propose a practical modification to the Bitcoin protocol that protects Bitcoin in the general case.
Ittay Eyal, Emin GÜn Sirer
COLUMN: Last byte
Suppose someone gives you two strings: X and Y. Your goal is . . .