In a sensible world—at least as defined by computer scientists who, as we all know, are eminently sensible people—there would be no need for the ACM Education Policy …
Robert B. Schnabel
Page 5
Here are synopses of four Virtual Extension articles that are now available in their entirety to ACM members via the Digital Library.
CACM Staff
Page 8
DEPARTMENT: Letters to the editor
I found much to agree with in Stephen Davies's article "Still Building the Memex" (Feb. 2011) but also feel one of his suggestions went off in the wrong direction.
CACM Staff
Page 9
DEPARTMENT: BLOG@CACM
Jason Hong discusses how Apple creates well-designed products and what the human-computer interaction community can learn from its methods.
Jason Hong
Pages 10-11
DEPARTMENT: CACM online
Over the coming weeks, ACM will be diving headfirst into the world of mobility. Our strategy is essentially two-pronged. The first is the development of a mobile version of …
Scott E. Delman
Page 12
COLUMN: News
It's not easy to generate a string of numbers that lack any pattern or rule, or even to define exactly what randomness means.
Gary Anthes
Pages 13-15
Advancements in mobile electronics have led to several prosthetics innovations in recent years, but providing reliable touch sensations to users remains an elusive goal.
Kirk L. Kroeker
Pages 16-18
The popularity of virtual goods and currencies in online gaming is changing how people think and act about money.
Samuel Greengard
Pages 19-22
After a year of turmoil, computer scientists at King's College London have retained their jobs, but substantial challenges lie ahead.
Sarah Underwood
Page 23
COLUMN: Emerging markets
Successful global IT team managers combine general distributed team management skills enhanced with cultural sensitivity.
Fred Niederman, Felix B. Tan
Pages 24-27
COLUMN: Historical reflections
Reflections on recruiting and training programmers during the early period of computing.
Nathan Ensmenger
Pages 28-30
COLUMN: Technology strategy and management
The world can absorb more social media sites, but how many?
Michael A. Cusumano
Pages 31-33
COLUMN: Kode Vicious
Programming is a creative endeavor, and therefore there is such a thing as coder's block. What does it take to clear the blockage?
George V. Neville-Neil
Pages 34-35
COLUMN: Viewpoint
Since the beginning of the debate on network neutrality, and perhaps as an inheritance of that beginning, the controversy has been restricted to fixed broadband networks.
José Luis Gómez-Barroso, Claudio Feijóo
Pages 36-37
SECTION: Practice
Exposing SIMD units within interpreted languages could simplify programs and unleash floods of untapped processor power.
Jonathan Parri, Daniel Shapiro, Miodrag Bolic, Voicu Groza
Pages 38-43
Knowing where to begin is half the battle.
Thomas A. Limoncelli, Vinton G. Cerf
Pages 44-48
Contrary to popular belief, SQL and noSQL are really just two sides of the same coin.
Erik Meijer, Gavin Bierman
Pages 49-58
SECTION: Contributed articles
How to identify, instantiate, and evaluate domain-specific design principles for creating more effective visualizations.
Maneesh Agrawala, Wilmot Li, Floraine Berthouzoz
Pages 60-69
Despite earlier claims, Software Transactional Memory outperforms sequential code.
Aleksandar Dragojević, Pascal Felber, Vincent Gramoli, Rachid Guerraoui
Pages 70-77
Finding 10 balloons across the U.S. illustrates how the Internet has changed the way we solve highly distributed problems.
John C. Tang, Manuel Cebrian, Nicklaus A. Giacobe, Hyun-Woo Kim, Taemie Kim, Douglas "Beaker" Wickert
Pages 78-85
SECTION: Review articles
The practice of crowdsourcing is transforming the Web and giving rise to a new field.
Anhai Doan, Raghu Ramakrishnan, Alon Y. Halevy
Pages 86-96
SECTION: Research highlights
The paper by LeMétayer et al. addresses one technical issue in a large and serious problem in the production of mass-market software (MMSW), that of the lack of liability …
Daniel M. Berry
Page 98
This paper reports on the results of a multidisciplinary project involving lawyers and computer scientists with the aim to put forward a set of methods and tools to (1) define software liability in a precise and unambiguous way …
Daniel Le Métayer, Manuel Maarek, Eduardo Mazza, Marie-Laure Potet, Stéphane Frénot, Valérie Viet Triem Tong, Nicolas Craipeau, Ronan Hardouin
Pages 99-106
Is the number 9021960864034418159813 random? To my limited mind, the string appears random. Is there a way to use some formal mathematics to justify my naïveté?
Madhu Sudan
Page 107
The question of determining which (weak) forms of randomness "fool" (or seem totally random to) a given algorithm is a basic and fundamental question in the modern theory …
Mark Braverman
Pages 108-115
COLUMN: Last byte
Kelly Gotlieb recalls the early days of computer science in Canada.
Leah Hoffmann
Pages 120-ff
COLUMN: Viewpoints: Virtual extension
The decline in undergraduate enrollment at the university level is well documented and it begins in high school. We advocate university faculty reaching out to high school …
Patricia Morreale, David Joiner
Pages 121-124
SECTION: Contributed articles: Virtual extension
Emergent serendipity fosters volunteerism driven by creative problem solving, not simply following directions.
Ann Majchrzak, Philip H. B. More
Pages 125-132
Looking back on the first decade of the Doctor of Professional Studies in Computing---an ambitious doctoral track for people who want to do research in an industrial setting.
Fred Grossman, Charles Tappert, Joe Bergin, Susan M. Merritt
Pages 133-141
SECTION: Review articles: Virtual extension
Deeply understanding the intricacies of software must always come before any considerations for modifying it.
Gerardo Canfora, Massimiliano Di Penta, Luigi Cerulo
Pages 142-151