"Another reason to ditch ACM," thundered an ACM member in a social-media posting during recent debate over the Research Works Act, introduced by Congress in 2011. While deep concerns with the bill were widespread, the nasty tone …
Moshe Y. Vardi
Page 5
DEPARTMENT: Letters to the editor
While I largely agree with Sarah Spiekermann's "The Challenges of Privacy by Design" (July 2012), I want to make it clear that many organizations do understand the need to embed privacy in their systems and technologies and …
CACM Staff
Page 7
DEPARTMENT: BLOG@CACM
Bertrand Meyer asks why too many research agencies seem obsessed with funding only groundbreaking projects.
Bertrand Meyer
Pages 8-9
COLUMN: News
Thanks to the University of New South Wales and IBM Research, scientists are moving closer to the junction of quantum and digital computing.
Gregory Goth
Pages 11-13
After decades in Flatland, the end of Moore's Law is pushing semiconductors into the third dimension.
Gary Anthes
Pages 14-16
Security researchers used malware to investigate large-scale Internet censorship in Egypt and Libya.
Marina Krakovsky
Pages 17-19
Thirty-two of the 39 living A.M. Turing Award laureates gathered in San Francisco to pay tribute to "the father of CS" and discuss the past, present, and future of computing.
Paul Hyman
Pages 20-23
COLUMN: Historical reflections
Journalists, historians, and the invention of email.
Thomas Haigh
Pages 26-29
COLUMN: The profession of IT
Wise experts and powerful machines are no match for chaotic events and human declarations. Beware of their predictions and be humble in your own.
Peter J. Denning
Pages 30-32
COLUMN: Law and technology
A few predictions about predictions.
Tal Z. Zarsky
Pages 33-35
COLUMN: Broadening participation
Seeking to improve the process for writing and reviewing proposals for new educational programs.
Richard E. Ladner, Elizabeth Litzler
Pages 36-38
COLUMN: Viewpoint
Some thoughts about author order in research papers.
Esperanza Marcos, Juan Manuel Vara, Valeria de Castro
Pages 39-41
A personal account of Alan Turing's life and impact.
Christos H. Papadimitriou
Pages 42-43
SECTION: Practice
Backward compatibility always trumps new features.
David Chisnall
Pages 44-47
Finding and fixing bugs in deployed software is difficult and time-consuming. Here are some alternatives.
Emery D. Berger
Pages 48-53
In the big open world of the cloud, highly available distributed objects will rule.
Erik Meijer
Pages 54-60
SECTION: Contributed articles
Trust between client organization and cloud provider is a strong predictor of successful cloud deployment.
Gary Garrison, Sanghyun Kim, Robin L. Wakefield
Pages 62-68
Continually verify self-adaptation decisions taken by critical software in response to changes in the operating environment.
Radu Calinescu, Carlo Ghezzi, Marta Kwiatkowska, Raffaela Mirandola
Pages 69-77
SECTION: Review articles
Three-dimensional user interfaces are uniquely able to achieve superior interaction fidelity, and this naturalism can be a huge advantage.
Doug A. Bowman, Ryan P. McMahan, Eric D. Ragan
Pages 78-88
SECTION: Research highlights
The history of the relationship between writing systems and technology is as long as it is varied. Likewise, the challenge of entering text using portable gadgets has a long history.
William A. Buxton
Page 90
As computing technologies expanded beyond the confines of the desktop, the need for effective text entry methods alternative to the ubiquitous desktop keyboards has inspired both academic researchers and the information technology …
Shumin Zhai, Per Ola Kristensson
Pages 91-101
There is some risk in trusting the cloud providers with sensitive data. Why not encrypt the data stored in cloud services?
Dan Suciu
Page 102
An ideal solution to satisfying the dual goals of protecting data confidentiality and running computations is to enable a server to compute over encrypted data, without the server ever decrypting the data to plaintext.
Raluca Ada Popa, Catherine M. S. Redfield, Nickolai Zeldovich, Hari Balakrishnan
Pages 103-111
COLUMN: Last byte
Last month (August 2012) we posted a
trio of brainteasers
concerning "magic sets." Here, we offer solutions to all three. How did you do?
Peter Winkler
Page 117
Harvey Mudd College president Maria Klawe talks about increasing the number of women who study computer science.
Leah Hoffmann
Pages 120-ff