DEPARTMENT: Editor's letter
China and the West's fundamental systemic differences and growing geopolitical competition are increasingly open. The new reality is pulling the computing community apart, and spilling over into the academic and research communities …
Andrew A. Chien
Page 5
DEPARTMENT: Departments
The virtualization of conferences due to COVID-19 has sharpened my conviction that the computing-research publication system is badly broken and in need of a serious reboot.
Moshe Y. Vardi
Page 7
DEPARTMENT: Career paths in computing
In a world of nuance and interpretation, the objectivity of math spoke to me (and still does). To be able to use applied math to do science through the use of very large-scale computers was magic.
Dona Crawford
Page 9
DEPARTMENT: BLOG@CACM
Mark Guzdial suggests computer science education needs to change, to better serve the needs of students and society.
Mark Guzdial
Pages 10-11
COLUMN: News
Researchers are pushing beyond the limitations of convolutional neural networks using geometric deep learning techniques.
Samuel Greengard
Pages 13-15
Japan tops the Top500 supercomputer rankings, for the moment.
Don Monroe
Pages 16-18
Data science can only do so much in the face of a pandemic.
Chris Edwards
Pages 19-21
COLUMN: Technology strategy and management
Tracing the trajectory of management and engineering decisions resulting in systemic catastrophe.
Michael A. Cusumano
Pages 22-25
COLUMN: Security
Considering the wide range of technological and societal trade-offs associated with cybersecurity.
Terry Benzel
Pages 26-28
COLUMN: Law and technology
Deliberating on how to regulate—or not regulate—online speech in the era of evolving social media.
Kate Klonick
Pages 29-31
COLUMN: Historical reflections
Taking apart a book to figure out how it works.
Thomas Haigh
Pages 32-37
COLUMN: Viewpoint
How the cognitive sciences can inform the quest to build systems with the flexibility of the human mind.
Gary Marcus, Ernest Davis
Pages 38-41
Seeking to assess the possible responsibility of tech providers for excessive use patterns.
Ofir Turel, Christopher Ferguson
Pages 42-44
SECTION: Practice
Keeping users secure through their smartphones.
Phil Vachon
Pages 46-55
Hardware security is not assured.
Edlyn V. Levine
Pages 56-60
SECTION: Contributed articles
Facebook labels 67% of its users with potential sensitive interests, sometimes at great risk to the user.
José González Cabañas, Àngel Cuevas, Aritz Arrate, Rubén Cuevas
Pages 62-69
An analysis of patenting history from 1850 to 2010 to detect long-term patterns of knowledge spillovers via prior-art citations of patented inventions.
Pantelis Koutroumpis, Aija Leiponen, Llewellyn D. W. Thomas
Pages 70-78
A field study examines technological advances that have created versatile software ecosystems to develop and deploy microservices.
Karoly Bozan, Kalle Lyytinen, Gregory M. Rose
Pages 79-85
SECTION: Review articles
MPC has moved from theoretical study to real-world usage. How is it doing?
Yehuda Lindell
Pages 86-96
Are U.S. government employees behaving ethically when they stockpile software vulnerabilities?
Stephen B. Wicker
Pages 97-103
SECTION: Research highlights
In "Constant Overhead Quantum Fault Tolerance with Quantum Expander Codes," by Omar Fawzi,
et al., the authors produce an algorithm that can rapidly deduce the error in a quantum expander code, even when the syndrome is partially …
Daniel Gottesman
Page 105
In this paper, we study the asymptotic scaling of the space overhead needed for fault-tolerant quantum computation.
Omar Fawzi, Antoine Grospellier, Anthony Leverrier
Pages 106-114
"SkyCore," by Mehrdad Moradi,
et al., addresses an exciting use case for Unmanned Aerial Vehicles in which UAVs can act as mobile base stations for the cellular network, flying to areas in the network in order to improve wireless …
Richard Han
Page 115
We argue for and propose an alternate, radical edge evolved packet core design, called SkyCore, that pushes the EPC functionality to the extreme edge of the core network.
Mehrdad Moradi, Karthikeyan Sundaresan, Eugene Chai, Sampath Rangarajan, Z. Morley Mao
Pages 116-124
COLUMN: Last byte
No tipping.
Dennis Shasha
Page 128