DEPARTMENT: ACM-W letter
Computer science is no longer the hot, high-enrollment field it once was. While many suggestions have been made for increasing enrollments, it is unlikely that computer science will ever be as vibrant as it could be — and should …
Elaine Weyuker
Page 5
DEPARTMENT: Letters to the editor
Othman El Moulat's comment (Apr. 2009) concerning the article "The Topology of Dark Networks"(Oct. 2008) that the views and articles in
Communications should have no bearing on or bias toward any agenda, political or religious …
CACM Staff
Page 9
DEPARTMENT: blog@CACM
The
Communications Web site,
cacm.acm.org, features 13 bloggers in the BLOG@CACM community. In each issue of
Communications, we'll publish excerpts from selected posts, plus readers' comments. Tessa Lau discusses why she doesn't …
Tessa Lau, Daniel Reed
Pages 10-11
DEPARTMENT: CACM online
The goal of holding readers' attention has made provocation a timeworn editorial strategy.
Communications doesn't resort to screaming headlines like most storefront fare, but …
David Roman
Page 12
COLUMN: News
Medical researchers have long dreamed of "magic bullets" that go directly where they are needed. Now micromedicine and nanotechnology are making a range of molecules formerly inaccessible as drugs available to be delivered at …
Don Monroe
Pages 13-15
Entertainment businesses say digital rights management prevents the theft of their products, but access control technologies have been a uniform failure when it comes to preventing piracy. Fortunately, change is on the way.
Leah Hoffmann
Pages 16-17
Researchers are improving unmanned helicopters' capabilities to address regulatory requirements and commercial uses.
Gregory Goth
Pages 18-20
CRA's Computing Community Consortium hosted a day-long symposium to discuss the important computing advances of the last several decades and how to sustain that track record of innovation.
Bob Violino
Page 21
COLUMN: Viewpoints
Asking the wrong questions when building and deploying systems results in systems that cannot be sufficiently protected against the threats they face.
Eugene H. Spafford
Pages 22-24
The convergence of medicine with radio communication and Internet connectivity exposes implantable medical devices (IMDs) not only to safety and effectiveness risks, but also to security and privacy risks. Legislation, regulation …
Kevin Fu
Pages 25-27
If we are not careful, our fascination with "computational thinking" may lead us back into the trap we are trying to escape.
Peter J. Denning
Pages 28-30
Decoding the important differences in terminology, underlying philosophy, and value systems between two similar categories of software.
Richard Stallman
Pages 31-33
How to determine when to put the brakes on late-running projects and untested software patches.
George V. Neville-Neil
Pages 34-35
SECTION: Practice
New drive technologies and increased capacities create new categories of failure modes that will influence system designs.
Jon Elerath
Pages 38-45
The history of NFE processors sheds light on the trade-offs involved in designing network stack software.
Mike O'Dell
Pages 46-50
The pervasive and long-lasting sockets API has remained largely unchanged since 1982. How have developers worked around its inherent limitations and what is the future of sockets in a changing networked world?
George V. Neville-Neil
Pages 51-55
SECTION: Contributed articles
Database research is expanding, with major efforts in system architecture, new languages, cloud services, mobile and virtual worlds, and interplay between structure and text.
Rakesh Agrawal, Anastasia Ailamaki, Philip A. Bernstein, Eric A. Brewer, Michael J. Carey, Surajit Chaudhuri, Anhai Doan, Daniela Florescu, Michael J. Franklin, Hector Garcia-Molina, Johannes Gehrke, Le Gruenwald, Laura M. Haas, Alon Y. Halevy, Joseph M. Hellerstein, Yannis E. Ioannidis, Hank F. Korth, Donald Kossmann, Samuel Madden, Roger Magoulas, Beng Chin Ooi, Tim O'Reilly, Raghu Ramakrishnan, Sunita Sarawagi, Michael Stonebraker, Alexander S. Szalay, Gerhard Weikum
Pages 56-65
The vision is being overwhelmed by the reality of business, politics, logistics, and competing interests worldwide.
Kenneth L. Kraemer, Jason Dedrick, Prakul Sharma
Pages 66-73
SECTION: Review articles
Information and communication technology for development can greatly improve quality of life for the world's neediest people.
M. Bernardine Dias, Eric Brewer
Pages 74-80
SECTION: Research highlights
The web has brought exciting new functionality while simultaneously requiring new mechanisms to make it secure. We've repeatedly discovered that these mechanisms are not good …
Andrew Myers
Page 82
Many Web sites embed third-party content in frames, relying on the browser's security policy to protect against malicious content. However, frames provide insufficient isolation in browsers that let framed content navigate other …
Adam Barth, Collin Jackson, John C. Mitchell
Pages 83-91
Norman P. Jouppi
Page 92
Modern computer systems are inherently nondeterministic due to a variety of events that occur during an execution. The lack of repeatability that arises from this nondeterminism can make it difficult to develop and maintain correct …
Derek R. Hower, Pablo Montesinos, Luis Ceze, Mark D. Hill, Josep Torrellas
Pages 93-100
COLUMN: Last byte
Last month (May 2009, p. 112) we posed a trio of brain teasers, including one as yet unsolved, concerning relationships among numbers.
Peter Winkler
Page 103
Future Tense, one of the revolving features on this page, presents stories and essays from the intersection of computational science and technological speculation, their boundaries limited only by our ability to imagine what …
Robert J. Sawyer
Page 104
SECTION: Virtual extension
Jonghun Park, Kwanho Kim
Pages 113-117
Steven M. Thompson, Matthew D. Dean
Pages 118-121
Amar Gupta
Pages 122-126
Mark Lycett, Chris Partridge
Pages 127-131
Nena Lim, Anne Khoo
Pages 132-135
Sudip Bhattacharjee, Ram D. Gopal, James R. Marsden, Ramesh Sankaranarayanan
Pages 136-140
Dursun Delen, Suliman Al-Hawamdeh
Pages 141-145
T. P. Liang, Andrew J. Czaplewski, Gary Klein, James J. Jiang
Pages 146-148