CS educational needs in K–12 are greater today than ever before. A lack of access to CS among a range of demographics continues to persist. Enter the Computer Science Teachers Association (CSTA).
Mark R. Nelson
Page 5
For the past month, I have been on the road in Latin America. Everywhere, I came away with a sense there is strong interest in Internet use in business, education, government services, and applications for the general public.
Vinton G. Cerf
Page 7
DEPARTMENT: Letters to the Editor
In his letter to the editor (Nov. 2015) on Keith Kirkpatrick's news story "The Moral Challenges of Driverless Cars" (Aug. 2015), Hans Grünberger attacked my proposal for ethics review boards. The letter mischaracterizes my beliefs …
CACM Staff
Pages 8-9
In accordance with the Constitution and Bylaws of the ACM, the Nominating Committee hereby submits the following slate of nominees for ACM's officers.
Vinton G. Cerf
Page 10
In the following pages you will find a year filled with determined initiatives, new services, and "firsts" designed to increase the value of your ACM membership. But accomplishments are only half the story.
Alexander L. Wolf
Pages 11-16
DEPARTMENT: BLOG@CACM
John Arquilla identifies flaws in a potential U.S.-China cyber arms control pact, while Joel C. Adams suggests an unusual way of preserving computer science history.
John Arquilla, Joel C. Adams
Pages 18-19
COLUMN: News
Computer understanding of images has improved rapidly, but true visual intelligence is still a long way off.
Neil Savage
Pages 20-22
Advances in non-volatile memory are changing the face of computing and ushering in a new era of efficiencies.
Samuel Greengard
Pages 23-25
Is the Internet ephemeral by its nature, or can it be archived?
Esther Shein
Pages 26-28
Gene Amdahl, who formulated Amdahl's Law and worked with IBM and others on developments related to mainframe computing, died recently from complications of pneumonia.
CACM Staff
Page 29
COLUMN: Law and technology
Assessing the promises and dangers of biometric identity plans.
Jonathan T. Weinberg
Pages 30-32
COLUMN: Technology strategy and management
Behind and beyond Microsoft, Intel, and Apple.
Michael A. Cusumano, David B. Yoffie
Pages 33-35
COLUMN: The business of software
Complexity, predictability, and modern projects.
Phillip G. Armour
Pages 36-38
COLUMN: Historical reflections
Considering the evolving concept of programming.
Thomas Haigh, Mark Priestley
Pages 39-44
COLUMN: Viewpoint
Few computer scientists and technological workers worry about their role in the economies of their industries and their countries. Background supplementary material available.
Gio Wiederhold
Pages 45-46
A personal story: From philosophy to software.
Yoav Shoham
Pages 47-49
SECTION: Practice
Ford Prefect to Arthur Dent in The Hitchhiker's Guide to the Galaxy
George V. Neville-Neil
Pages 50-55
Implications of the datacenter's shifting center.
Mihir Nanavati, Malte Schwarzkopf, Jake Wires, Andrew Warfield
Pages 56-63
We need it, we can afford it, and the time is now.
Pat Helland
Pages 64-70
SECTION: Contributed articles
Knowing where you are in space and time promises a deeper understanding of neighbors, ecosystems, and the environment.
Shashi Shekhar, Steven K. Feiner, Walid G. Aref
Pages 72-81
Developers first need compelling incentives and committed management.
Melissa Lee, Esteve Almirall, Jonathan Wareham
Pages 82-89
Before looking to enter a cloud-based market, weigh industry characteristics and one's own stock of design capital.
Lazaros Goutas, Juliana Sutanto, Hassan Aldarbesti
Pages 90-97
SECTION: Review articles
Algorithmic solutions to tough computational problems are making an impressive comeback.
Ioannis Koutis, Ryan Williams
Pages 98-105
SECTION: Research highlights
"Bare-Metal Performance for Virtual Machines with Exitless Interrupts" shows how to enable a virtual machine to attain "bare metal" performance from high-speed network interface cards.
Steve Hand
Page 107
We present ExitLess Interrupts (ELI), a software-only approach for handling interrupts within guest virtual machines directly and securely.
Nadav Amit, Abel Gordon, Nadav Har'El, Muli Ben-Yehuda, Alex Landau, Assaf Schuster, Dan Tsafrir
Pages 108-116
An important contribution of "Answering Enumeration Queries with the Crowd" is the observation that by using the crowd for the collection of new data, we are departing from the classical closed word assumption, which underlies …
Tova Milo
Page 117
Hybrid human/computer database systems promise to greatly expand the usefulness of query processing by incorporating the crowd. Such systems raise many implementation questions. To address the issues, we develop statistical tools …
Beth Trushkowsky, Tim Kraska, Michael J. Franklin, Purnamrita Sarkar
Pages 118-127
COLUMN: Last byte
Imagine a 500-square-by-500-square red/black ice checkerboard with walls along all four edges.
Dennis Shasha
Page 136