Robert L. Ashenhurst
Pages 13-17
As everyone knows, the computer industry is passing through a period of great change. I was speaking recently to a senior executive in one of the large companies vigorously working to meet the developing situation. The question …
Maurice V. Wilkes
Pages 19-21
Over the past two years, I have written seven “Legally Speaking” columns and one feature article for
Communications about legal issues affecting computing professionals. These writings have covered an array of legal topics including …
Pamela Samuelson
Pages 23-28
Pages 30-33
O. Deux
Pages 34-48
Charles Lamb, Gordon Landis, Jack Orenstein, Dan Weinreb
Pages 50-63
Paul Butterworth, Allen Otis, Jacob Stein
Pages 64-77
Michael Stonebraker, Greg Kemnitz
Pages 78-92
Guy M. Lohman, Bruce Lindsay, Hamid Pirahesh, K. Bernhard Schiefer
Pages 94-109
Pages 110-120
The National Research Council's Computer Science and Telecommunications Board (CSTB) chartered a two-year study on the scope and directions of computer science. As part of this study, ACM was asked to provide input on three important …
Barbara Simons, Dennis J. Frailey, A. Joe Turner, Stuart H. Zweben, Peter J. Denning
Pages 121-131
The column, “Benchmarks for LAN Performance Evaluation,” by Larry Press (Aug. 1988, pp. 1014-1017) presented a technique for quickly benchmarking the performance of LANs in an office environment. Our interest was peaked since …
Pages 133-134
Traditionally, cryptography has been an exclusively military technology controlled by the National Security Agency (NSA). Therefore, U.S. International Traffic in Arms Regulations (ITARS) requires licenses for all export of modern …
Clark Weissman
Page 162