Focusing on Teacher Needs in K-12 CS Education
CS educational needs in K–12 are greater today than ever before. A lack of access to CS among a range of demographics continues to persist. Enter the Computer Science Teachers Association (CSTA).
Mark R. Nelson
Page 5
On the Road in Latin America
For the past month, I have been on the road in Latin America. Everywhere, I came away with a sense there is strong interest in Internet use in business, education, government services, and applications for the general public.
Vinton G. Cerf
Page 7
DEPARTMENT:
Letters to the Editor
Let the Liable Pay
In his letter to the editor (Nov. 2015) on Keith Kirkpatrick's news story "The Moral Challenges of Driverless Cars" (Aug. 2015), Hans Grünberger attacked my proposal for ethics review boards. The letter mischaracterizes my beliefs …
CACM Staff
Pages 8-9
ACM's 2016 General Election
In accordance with the Constitution and Bylaws of the ACM, the Nominating Committee hereby submits the following slate of nominees for ACM's officers.
Vinton G. Cerf
Page 10
ACM's Annual Report For FY15
In the following pages you will find a year filled with determined initiatives, new services, and "firsts" designed to increase the value of your ACM membership. But accomplishments are only half the story.
Alexander L. Wolf
Pages 11-16
DEPARTMENT:
[email protected]
Controlling Cyber Arms, and Creating New Legos
John Arquilla identifies flaws in a potential U.S.-China cyber arms control pact, while Joel C. Adams suggests an unusual way of preserving computer science history.
John Arquilla, Joel C. Adams
Pages 18-19
COLUMN:
News
Seeing More Clearly
Computer understanding of images has improved rapidly, but true visual intelligence is still a long way off.
Neil Savage
Pages 20-22
Better Memory
Advances in non-volatile memory are changing the face of computing and ushering in a new era of efficiencies.
Samuel Greengard
Pages 23-25
Preserving the Internet
Is the Internet ephemeral by its nature, or can it be archived?
Esther Shein
Pages 26-28
Gene Amdahl, 1922-2015
Gene Amdahl, who formulated Amdahl's Law and worked with IBM and others on developments related to mainframe computing, died recently from complications of pneumonia.
CACM Staff
Page 29
COLUMN:
Law and technology
Biometric Identity
Assessing the promises and dangers of biometric identity plans.
Jonathan T. Weinberg
Pages 30-32
COLUMN:
Technology strategy and management
Extrapolating from Moore's Law
Behind and beyond Microsoft, Intel, and Apple.
Michael A. Cusumano, David B. Yoffie
Pages 33-35
COLUMN:
The business of software
The Chaos Machine
Complexity, predictability, and modern projects.
Phillip G. Armour
Pages 36-38
COLUMN:
Historical reflections
Where Code Comes From: Architectures of Automatic Control from Babbage to Algol
Considering the evolving concept of programming.
Thomas Haigh, Mark Priestley
Pages 39-44
COLUMN:
Viewpoint
Unbalanced Data Leads to Obsolete Economic Advice
Few computer scientists and technological workers worry about their role in the economies of their industries and their countries. Background supplementary material available.
Gio Wiederhold
Pages 45-46
Why Knowledge Representation Matters
A personal story: From philosophy to software.
Yoav Shoham
Pages 47-49
SECTION:
Practice
Time Is an Illusion Lunchtime Doubly So
Ford Prefect to Arthur Dent in The Hitchhiker's Guide to the Galaxy
George V. Neville-Neil
Pages 50-55
Non-Volatile Storage
Implications of the datacenter's shifting center.
Mihir Nanavati, Malte Schwarzkopf, Jake Wires, Andrew Warfield
Pages 56-63
Immutability Changes Everything
We need it, we can afford it, and the time is now.
Pat Helland
Pages 64-70
SECTION:
Contributed articles
Spatial Computing
Knowing where you are in space and time promises a deeper understanding of neighbors, ecosystems, and the environment.
Shashi Shekhar, Steven K. Feiner, Walid G. Aref
Pages 72-81
Open Data and Civic Apps: First-Generation Failures, Second-Generation Improvements
Developers first need compelling incentives and committed management.
Melissa Lee, Esteve Almirall, Jonathan Wareham
Pages 82-89
The Building Blocks of a Cloud Strategy: Evidence from Three SaaS Providers
Before looking to enter a cloud-based market, weigh industry characteristics and one's own stock of design capital.
Lazaros Goutas, Juliana Sutanto, Hassan Aldarbesti
Pages 90-97
SECTION:
Review articles
Algebraic Fingerprints For Faster Algorithms
Algorithmic solutions to tough computational problems are making an impressive comeback.
Ioannis Koutis, Ryan Williams
Pages 98-105
SECTION:
Research highlights
Technical Perspective: High-Performance Virtualization: Are We Done?
"Bare-Metal Performance for Virtual Machines with Exitless Interrupts" shows how to enable a virtual machine to attain "bare metal" performance from high-speed network interface cards.
Steve Hand
Page 107
Bare-Metal Performance For Virtual Machines with Exitless Interrupts
We present ExitLess Interrupts (ELI), a software-only approach for handling interrupts within guest virtual machines directly and securely.
Nadav Amit, Abel Gordon, Nadav Har'El, Muli Ben-Yehuda, Alex Landau, Assaf Schuster, Dan Tsafrir
Pages 108-116
Technical Perspective: Enlisting the Power of the Crowd
An important contribution of "Answering Enumeration Queries with the Crowd" is the observation that by using the crowd for the collection of new data, we are departing from the classical closed word assumption, which underlies …
Tova Milo
Page 117
Answering Enumeration Queries with the Crowd
Hybrid human/computer database systems promise to greatly expand the usefulness of query processing by incorporating the crowd. Such systems raise many implementation questions. To address the issues, we develop statistical tools …
Beth Trushkowsky, Tim Kraska, Michael J. Franklin, Purnamrita Sarkar
Pages 118-127
COLUMN:
Last byte
Upstart Puzzles: Ice Trap
Imagine a 500-square-by-500-square red/black ice checkerboard with walls along all four edges.
Dennis Shasha
Page 136