While optimists argue that though technology always destroy jobs, it also creates new jobs, pessimists argue that the speed in which information technology is currently destroying jobs is unparalleled.
Moshe Y. Vardi
Page 5
Centuries before George Boole and Charles Babbage, the notion of binary encoding was well known and apparently even used! Julius Caesar was known to use a simple rotational cipher. Francis Bacon devised a binary encoding scheme …
Vinton G. Cerf
Page 7
DEPARTMENT: Letters to the Editor
Though I agree with the opening lines of "A New Software Engineering" (Dec. 2014) outlining the "promise of rigorous, disciplined, professional practices," we must also look at "craft" in software engineering if we hope to raise …
CACM Staff
Pages 8-9
DEPARTMENT: BLOG@CACM
Mark Guzdial questions the practice of teaching programming to new CS students by having them practice programming largely on their own.
Mark Guzdial
Pages 12-13
COLUMN: News
New techniques capture speech by looking for the vibrations it causes.
Neil Savage
Pages 15-17
How do the U.S., Europe, and Japan differ in their approaches to data protection — and what are they doing about it?
Logan Kugler
Pages 18-20
Companies are creating technological solutions for individuals, then generalizing them to broader populations that need similar assistance.
Keith Kirkpatrick
Pages 21-23
COLUMN: Privacy and security
A proposal for a framework for code requirements addressing primary sources of vulnerabilities for building systems.
Carl Landwehr
Pages 24-26
COLUMN: Economic and business dimensions
Insights into creating China's Taobao online marketplace ecosystem.
Ming Zeng
Pages 27-29
COLUMN: Inside risks
Considerably more anticipation is needed for what might seriously go wrong.
Peter G. Neumann
Pages 30-33
COLUMN: Education
Investing in computing education research to transform computer science education.
Diana Franklin
Pages 34-36
COLUMN: Kode vicious
Visibility leads to debuggability.
George V. Neville-Neil
Pages 37-39
COLUMN: Viewpoint
Comparing experiences publishing textbooks using traditional publishers and do-it-yourself methods.
Armando Fox, David Patterson
Pages 40-43
Soundy is the new sound.
Benjamin Livshits, Manu Sridharan, Yannis Smaragdakis, Ondřej Lhoták, J. Nelson Amaral, Bor-Yuh Evan Chang, Samuel Z. Guyer, Uday P. Khedker, Anders Møller, Dimitrios Vardoulakis
Pages 44-46
SECTION: Practice
Crackers discover how to use NTP as a weapon for abuse.
Harlan Stenn
Pages 48-51
MBT has positive effects on efficiency and effectiveness, even if it only partially fulfills high expectations.
Robert V. Binder, Bruno Legeard, Anne Kramer
Pages 52-56
SECTION: Contributed articles
Business leaders may bemoan the burdens of governing IT, but the alternative could be much worse.
Carlos Juiz, Mark Toomey
Pages 58-64
Model checking and logic-based learning together deliver automated support, especially in adaptive and autonomous systems.
Dalal Alrajeh, Jeff Kramer, Alessandra Russo, Sebastian Uchitel
Pages 65-72
SECTION: Review articles
From theoretical possibility to near practicality.
Michael Walfish, Andrew J. Blumberg
Pages 74-84
SECTION: Research highlights
As the equivalence problem is essential in many applications, we need algorithms that avoid the worst-case complexity as often as possible. In "Hacking Nondeterminism with Induction and Coinduction," Filippo Bonchi and Damien …
Thomas A. Henzinger, Jean-François Raskin
Page 86
We introduce bisimulation up to congruence as a technique for proving language equivalence of nondeterministic finite automata.
Filippo Bonchi, Damien Pous
Pages 87-95
COLUMN: Last byte
A popular logic game involves figuring out an arrangement of people sitting around a circular table based on hints about, say, their relationships. Here, we aim to determine the smallest number of hints sufficient to specify …
Dennis Shasha
Page 104