The 2015 Grace Hopper celebration of women in computing is expected to bring together more than 12,000 — mostly female — computer scientists! But this impressive number should not be taken to mean all is well on the gender-diversity …
Moshe Y. Vardi
Page 5
The Third Heidelberg Laureate Forum equaled and perhaps outperformed the previous two. It was also, however, a poignant event because we were reminded of the ephemeral nature of our human lives.
Vinton G. Cerf
Page 7
DEPARTMENT: Letters to the Editor
One afternoon early in 1990, one of the 100 or so 4ESS switches that handled U.S. long-distance traffic at the time hit a glitch and executed some untested recovery code. In the process the switch dragged its neighboring switches …
CACM Staff
Pages 10-11
DEPARTMENT: BLOG@CACM
John Arquilla considers justifications for warfare in the cyber realm, while Daniel Reed looks ahead at big data and exascale computing.
John Arquilla, Daniel A. Reed
Pages 12-13
COLUMN: News
Experiment sheds new light on wave-particle duality.
Gary Anthes
Pages 15-17
Automotive infotainment systems are driving changes to automobiles, and to driver behavior.
Samuel Greengard
Pages 18-20
A growing number of companies are taking out cybersecurity insurance policies to protect themselves from the costs of data breaches.
Keith Kirkpatrick
Pages 21-23
COLUMN: Inside risks
Mandating insecurity by requiring government access to all data and communications.
Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield "Whit" Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner
Pages 24-26
COLUMN: Technology strategy and management
The ability to adjust to various technical and business disruptions has been essential to IBM's success during the past century.
Michael A. Cusumano
Pages 27-28
COLUMN: Kode Vicious
Acquisitive redux.
George V. Neville-Neil
Pages 29-31
COLUMN: The business of software
On brains and bytes.
Phillip G. Armour
Pages 32-34
COLUMN: Historical reflections
Reflections on the past to inform the future.
Thomas J. Misa
Pages 35-37
COLUMN: Viewpoint
Research, leadership, and communication about AI futures.
Thomas G. Dietterich, Eric J. Horvitz
Pages 38-40
Online science education needs a new revolution.
Phillip Compeau, Pavel A. Pevzner
Pages 41-44
SECTION: Practice
Rethinking the fundamental abstractions of the file system.
T. S. Pillai, V. Chidambaram, R. Alagappan, S. Al-Kiswany, A. C. Arpaci-Dusseau, R. H. Arpaci-Dusseau
Pages 46-51
We have to choose to build a Web that is accessible to everyone.
Rich Harris
Pages 52-57
SECTION: Contributed articles
The Dissent system aims for a quantifiably secure, collective approach to anonymous communication online.
Joan Feigenbaum, Bryan Ford
Pages 58-69
This framework addresses the environmental dimension of software performance, as applied here by a paper mill and a car-sharing service.
Patricia Lago, Sedef Akinli Koçak, Ivica Crnkovic, Birgit Penzenstadler
Pages 70-78
SECTION: Review articles
The challenge of missing heritability offers great contribution options for computer scientists.
Eleazar Eskin
Pages 80-87
SECTION: Research highlights
Mathematics is not difficult to find in Chebfun, the subject of "Computing Numerically with Functions Instead of Numbers."
Cleve Moler
Page 90
We present the Chebfun system for numerical computation with functions, which is based on a key idea: an analogy of floating-point arithmetic for functions rather than numbers.
Lloyd N. Trefethen
Pages 91-97
COLUMN: Last byte
Information processing gives spiritual meaning to life, for those who make it their life's work.
William Sims Bainbridge
Pages 104-ff