DEPARTMENT: Cerf's up
Frode Hegland has developed three remarkable tools for text generation, viewing, and referencing that illustrate the power of applying computing to text.
Vinton G. Cerf
Andrei Sukhov and Igor Sorokin ponder the potential benefits of DECT to the Internet of Things, while Doug Meil considers how software engineers should reflect on their accomplishments.
Andrei Sukhov, Igor Sorokin, Doug Meil
Two-dimensional materials — graphene and its cousins — could enable better integrated circuits.
Algorithms can have a devastating impact on people's lives, especially if they already are struggling economically.
The introduction of the nanosheet transistor is just one step in the continuing attempt to stick to the spirit of Moore's Law.
COLUMN: Technology strategy and management
The dilemma of social media platforms.
Michael A. Cusumano
COLUMN: Broadening participation
Strategies for incorporating accessibility into computing education.
Kendra Walther, Richard E. Ladner
COLUMN: Global computing
Applying the unique experiences of designing technologies for vulnerable communities.
COLUMN: Kode Vicious
The use and limits of bisection.
George V. Neville-Neil
Seeking to make Big Tech less central to the Internet.
COLUMN: Economic and business dimensions
Three books offer varied perspectives on the ascendancy of artificial intelligence.
Creating a software solution with fast decision capability, agile project management, and extreme low-code technology.
Time to move forward from decades-old design.
SECTION: Contributed articles
Technologies for manipulating and faking online media may outpace people's ability to tell the difference.
Matthew Groh, Ziv Epstein, Nick Obradovich, Manuel Cebrian, Iyad Rahwan
Beyond the pandemic, organizations need to recognize what digital assets, interactions, and communication processes reap the most benefits from virtual reality.
Osku Torro, Henri Jalo, Henri Pirkkalainen
Experienced and aspiring computing professionals need to manage their qualifications according to current market needs. That includes certification achievement as well as formal education, experience, and licenses.
Mark Tannian, Willie Coston
SECTION: Review articles
The pursuit of responsible AI raises the ante on both the trustworthy computing and formal methods communities.
Jeannette M. Wing
SECTION: Research highlights
"Liquid Testing with Your Smartphone," by Shichao Yue and Dina Katabi, proposes a novel technique for determining the surface tension of a liquid by leveraging the optical absorption of waves propagating on the fluid surface. …
We show a simple and accurate approach to measuring surface tension that's available to anyone with a smartphone.
Shichao Yue, Dina Katabi
"Securing the Wireless Emergency Alerts System," by Jihoon Lee et al., investigates real-world attacks on the current implementation of Wireless Emergency Alerts.
We investigate the Wireless Emergency Alert system and develop and demonstrate the first practical spoofing attack on Presidential Alerts, using commercially available hardware and modified open source software.
Jihoon Lee, Gyuhong Lee, Jinsung Lee, Youngbin Im, Max Hollingsworth, Eric Wustrow, Dirk Grunwald, Sangtae Ha
COLUMN: Last byte