In the two years since we launched the revitalized
Communications of the ACM, I have received hundreds of email messages from readers. The feedback has been mostly, but …
Moshe Y. Vardi
Page 5
DEPARTMENT: Letters to the editor
Moshe Y. Vardi's Editor's Letter "
Globalization and Offshoring of Software Revisited" and Dave Durkee's "Why Cloud Computing Will Never Be Free" (both May 2010) failed to …
CACM Staff
Pages 6-7
Communications' Virtual Extension brings more quality articles to ACM members. These seven articles are now available in the ACM Digital Library.
CACM Staff
Page 9
DEPARTMENT: BLOG@CACM
For software developers, crunch time is a period prior to a major product milestone when team members are asked to put in extra effort to get a product finished by a specific …
Ruben Ortega, Mark Guzdial, Daniel Reed
Pages 10-11
DEPARTMENT: CACM online
The most popular content on Communications' site is something many readers know nothing about.
David Roman
Page 12
COLUMN: News
Computer scientists are now making intellectual contributions to a wide range of other disciplines, including evolutionary theory, physics, and economics.
David Lindley
Pages 13-15
Countries use Internet censorship to dominate the political dialogue, but also to create favorable conditions for government-controlled businesses.
Samuel Greengard
Pages 16-18
Advancements in computer vision, object recognition, and related technologies are leading to new levels of sophistication in augmented-reality applications and presenting new ways for humans to relate to the natural world.
Kirk L. Kroeker
Pages 19-21
Charles P. Thacker talks about the importance of simplicity, reusable tools, thinking broadly, and his practice of Tom Sawyering.
Gary Anthes
Pages 22-23
Eric Brewer's latest project involves designing and deploying low-cost wireless infrastructure in developing regions.
Gregory Goth
Page 24
ACM joined forces with the British Computer Society to deliver its first academic research conference in Europe.
Sarah Underwood
Page 25
COLUMN: Technology strategy and management
Choosing between outsourcing and shared services has significant implications for long-term corporate strategy.
Mari Sako
Pages 27-29
COLUMN: Computing ethics
Technological change results in changes in expectations, in this case affecting the workplace.
Jason Borenstein
Pages 30-31
COLUMN: Legally speaking
Considering the precedent that could be established by approval of the controversial Google book settlement.
Pamela Samuelson
Pages 32-34
COLUMN: Broadening participation
Introducing CMD-IT, a new center focused on synergistic activities related to ethnic minorities and people with disabilities.
Valerie E. Taylor
Pages 35-36
COLUMN: Viewpoint
Reflections on the (experimental) scientific method in computer science.
Gonzalo Génova
Pages 37-39
COLUMN: Distinguished members
ACM's Distinguished Member Recognition Program recognizes members in three categories: Educator, Engineer, and Scientist. Each category comes with a unique set of criteria.
Marc Snir, Telle Whitney
Pages 40-41
SECTION: Practice
Maybe it's Fortran. Or maybe it just doesn't matter.
Eugene Loh
Pages 42-47
Heat maps are a unique and powerful way to visualize latency data. Explaining the results, however, is an ongoing challenge.
Brendan Gregg
Pages 48-54
Think you've mastered the art of server performance? Think again.
Poul-Henning Kamp
Pages 55-59
SECTION: Contributed articles
Innate understanding of concurrency helps beginners solve CS problems with multiple processes executing at the same time.
Gary Lewandowski, Dennis J. Bouvier, Tzu-Yi Chen, Robert McCartney, Kate Sanders, Beth Simon, Tammy VanDeGrift
Pages 60-70
Interactive computer graphics would rival word-processing and presentation programs for everyday communications.
Takeo Igarashi
Pages 71-77
SECTION: Review articles
A new era of theoretical computer science addresses fundamental problems about auctions, networks, and human behavior.
Tim Roughgarden
Pages 78-86
SECTION: Research highlights
Multithreaded programs that communicate through shared memory are pervasive. Today they are the most obvious route to using multiple available processor cores …
Hans-J. Boehm
Page 88
Exploiting the multiprocessors that have recently become ubiquitous requires high-performance and reliable concurrent systems code. However, concurrent programming, which is always challenging, is made much more so by two problems …
Peter Sewell, Susmit Sarkar, Scott Owens, Francesco Zappa Nardelli, Magnus O. Myreen
Pages 89-97
As predicted by Intel's Gordon Moore in 1965, the number of transistors that can be integrated on one die continues to double approximately every two years. Amazing to some …
Mary Jane Irwin
Page 98
Memory scaling is in jeopardy as charge storage and sensing mechanisms become less reliable for prevalent memory technologies. In contrast, phase change memory relies on programmable resistances, as well as scalable current and …
Benjamin C. Lee, Engin Ipek, Onur Mutlu, Doug Burger
Pages 99-106
COLUMN: Last byte
Charles P. Thacker discusses the legendary Alto personal computer, the invention of the Ethernet, and his current research on multicore architectures.
Leah Hoffmann
Pages 112-ff
SECTION: Virtual extension
A relatively new form of IS outsourcing, Application Services Provision (ASP), provides applications to multiple entities from its data center across a wide area network.
Yurong Yao, Edward Watson, Beverly K. Kahn
Pages 113-117
Most large companies have adopted some form of enterprise resource planning (ERP) system. While the potential benefits of ERP have been extolled frequently, only limited evidence states that implementation of ERP does, on average …
Jorge A. Romero, Nirup Menon, Rajiv D. Banker, Mark Anderson
Pages 118-121
The growing commoditisation of services has transformed the competition for market share from focusing on the quality of services to the creation of memorable experiences. The economic value of the experience economy lies in …
Wei-Lun Chang, Soe-Tsyr Yuan, Carol W. Hsu
Pages 122-127
Tagging is gaining much popularity in recent years. Studies have suggested several factors that motivate user tagging. However, to date no quantitative study has assessed the strength of the effects of each motivation on levels …
Oded Nov, Chen Ye
Pages 128-131
Computer science applications are becoming more network centric, ubiquitous, knowledge intensive, and computing demanding. This will result in an ecosystem of pervasive applications and services that professionals and end-users …
Domenico Talia, Paolo Trunfio
Pages 132-137
Student enrollment in college computer science and information technology programs are in a downward trend in most developed countries. This article examines the Cisco Networking Academy to understand what lessons we can draw …
Alan R. Dennis, Thomas M. Duffy, Hasan Cakir
Pages 138-141
The importance of electronically stored information (ESI) in litigation has increased greatly over the past decade. Managing discovery of electronic information requires close coordination among managers with widely diverse technical …
John C. Ruhnka, John W. Bagby
Pages 142-144