DEPARTMENT: Cerf's up
Frode Hegland has developed three remarkable tools for text generation, viewing, and referencing that illustrate the power of applying computing to text.
Vinton G. Cerf
Page 5
DEPARTMENT: BLOG@CACM
Andrei Sukhov and Igor Sorokin ponder the potential benefits of DECT to the Internet of Things, while Doug Meil considers how software engineers should reflect on their accomplishments.
Andrei Sukhov, Igor Sorokin, Doug Meil
Pages 6-7
COLUMN: News
Two-dimensional materials — graphene and its cousins — could enable better integrated circuits.
Don Monroe
Pages 8-10
Algorithms can have a devastating impact on people's lives, especially if they already are struggling economically.
Keith Kirkpatrick
Pages 11-12
The introduction of the nanosheet transistor is just one step in the continuing attempt to stick to the spirit of Moore's Law.
Chris Edwards
Pages 13-15
COLUMN: Technology strategy and management
The dilemma of social media platforms.
Michael A. Cusumano
Pages 16-18
COLUMN: Broadening participation
Strategies for incorporating accessibility into computing education.
Kendra Walther, Richard E. Ladner
Pages 19-21
COLUMN: Global computing
Applying the unique experiences of designing technologies for vulnerable communities.
Hannah Thinyane
Pages 22-24
COLUMN: Kode Vicious
The use and limits of bisection.
George V. Neville-Neil
Page 25
COLUMN: Viewpoint
Seeking to make Big Tech less central to the Internet.
Cory Doctorow
Pages 26-29
COLUMN: Economic and business dimensions
Three books offer varied perspectives on the ascendancy of artificial intelligence.
Devdatt Dubhashi
Pages 30-31
SECTION: Practice
Creating a software solution with fast decision capability, agile project management, and extreme low-code technology.
João Varajão
Pages 32-35
Time to move forward from decades-old design.
Jessie Frazelle
Pages 36-39
SECTION: Contributed articles
Technologies for manipulating and faking online media may outpace people's ability to tell the difference.
Matthew Groh, Ziv Epstein, Nick Obradovich, Manuel Cebrian, Iyad Rahwan
Pages 40-47
Beyond the pandemic, organizations need to recognize what digital assets, interactions, and communication processes reap the most benefits from virtual reality.
Osku Torro, Henri Jalo, Henri Pirkkalainen
Pages 48-55
Experienced and aspiring computing professionals need to manage their qualifications according to current market needs. That includes certification achievement as well as formal education, experience, and licenses.
Mark Tannian, Willie Coston
Pages 56-63
SECTION: Review articles
The pursuit of responsible AI raises the ante on both the trustworthy computing and formal methods communities.
Jeannette M. Wing
Pages 64-71
SECTION: Research highlights
"Liquid Testing with Your Smartphone," by Shichao Yue and Dina Katabi, proposes a novel technique for determining the surface tension of a liquid by leveraging the optical absorption of waves propagating on the fluid surface. …
Tam Vu
Page 74
We show a simple and accurate approach to measuring surface tension that's available to anyone with a smartphone.
Shichao Yue, Dina Katabi
Pages 75-83
"Securing the Wireless Emergency Alerts System," by Jihoon Lee et al., investigates real-world attacks on the current implementation of Wireless Emergency Alerts.
Ahmad-Reza Sadeghi
Page 84
We investigate the Wireless Emergency Alert system and develop and demonstrate the first practical spoofing attack on Presidential Alerts, using commercially available hardware and modified open source software.
Jihoon Lee, Gyuhong Lee, Jinsung Lee, Youngbin Im, Max Hollingsworth, Eric Wustrow, Dirk Grunwald, Sangtae Ha
Pages 85-93
COLUMN: Last byte
End-of-the-rope machinations.
Dennis Shasha
Pages 96-ff