DEPARTMENT:
Editor's letter
2021: Computing's Divided Future
China and the West's fundamental systemic differences and growing geopolitical competition are increasingly open. The new reality is pulling the computing community apart, and spilling over into the academic and research communities …
Andrew A. Chien
Page 5
DEPARTMENT:
Departments
Reboot the Computing-Research Publication Systems
The virtualization of conferences due to COVID-19 has sharpened my conviction that the computing-research publication system is badly broken and in need of a serious reboot.
Moshe Y. Vardi
Page 7
DEPARTMENT:
Career paths in computing
A Career Fueled by HPC
In a world of nuance and interpretation, the objectivity of math spoke to me (and still does). To be able to use applied math to do science through the use of very large-scale computers was magic.
Dona Crawford
Page 9
DEPARTMENT:
[email protected]
Talking about Race in CS Education
Mark Guzdial suggests computer science education needs to change, to better serve the needs of students and society.
Mark Guzdial
Pages 10-11
COLUMN:
News
Geometric Deep Learning Advances Data Science
Researchers are pushing beyond the limitations of convolutional neural networks using geometric deep learning techniques.
Samuel Greengard
Pages 13-15
Fugaku Takes the Lead
Japan tops the Top500 supercomputer rankings, for the moment.
Don Monroe
Pages 16-18
Coalition of the Willing Takes Aim at COVID-19
Data science can only do so much in the face of a pandemic.
Chris Edwards
Pages 19-21
COLUMN:
Technology strategy and management
Boeing's 737 MAX: A Failure of Management, Not Just Technology
Tracing the trajectory of management and engineering decisions resulting in systemic catastrophe.
Michael A. Cusumano
Pages 22-25
COLUMN:
Security
Cybersecurity Research for the Future
Considering the wide range of technological and societal trade-offs associated with cybersecurity.
Terry Benzel
Pages 26-28
COLUMN:
Law and technology
Content Moderation Modulation
Deliberating on how to regulate—or not regulate—online speech in the era of evolving social media.
Kate Klonick
Pages 29-31
COLUMN:
Historical reflections
The Immortal Soul of an Old Machine
Taking apart a book to figure out how it works.
Thomas Haigh
Pages 32-37
COLUMN:
Viewpoint
Insights for AI from the Human Mind
How the cognitive sciences can inform the quest to build systems with the flexibility of the human mind.
Gary Marcus, Ernest Davis
Pages 38-41
Excessive Use of Technology: Can Tech Providers be the Culprits?
Seeking to assess the possible responsibility of tech providers for excessive use patterns.
Ofir Turel, Christopher Ferguson
Pages 42-44
SECTION:
Practice
The Identity in Everyone's Pocket
Keeping users secure through their smartphones.
Phil Vachon
Pages 46-55
The Die is Cast
Hardware security is not assured.
Edlyn V. Levine
Pages 56-60
SECTION:
Contributed articles
Does Facebook Use Sensitive Data for Advertising Purposes?
Facebook labels 67% of its users with potential sensitive interests, sometimes at great risk to the user.
José González Cabañas, Àngel Cuevas, Aritz Arrate, Rubén Cuevas
Pages 62-69
Digital Instruments as Invention Machines
An analysis of patenting history from 1850 to 2010 to detect long-term patterns of knowledge spillovers via prior-art citations of patented inventions.
Pantelis Koutroumpis, Aija Leiponen, Llewellyn D. W. Thomas
Pages 70-78
How to Transition Incrementally to Microservice Architecture
A field study examines technological advances that have created versatile software ecosystems to develop and deploy microservices.
Karoly Bozan, Kalle Lyytinen, Gregory M. Rose
Pages 79-85
SECTION:
Review articles
Secure Multiparty Computation
MPC has moved from theoretical study to real-world usage. How is it doing?
Yehuda Lindell
Pages 86-96
The Ethics of Zero-Day Exploits: The NSA Meets the Trolley Car
Are U.S. government employees behaving ethically when they stockpile software vulnerabilities?
Stephen B. Wicker
Pages 97-103
SECTION:
Research highlights
Technical Perspective: Deciphering Errors to Reduce the Cost of Quantum Computation
In "Constant Overhead Quantum Fault Tolerance with Quantum Expander Codes," by Omar Fawzi, et al., the authors produce an algorithm that can rapidly deduce the error in a quantum expander code, even when the syndrome is partially …
Daniel Gottesman
Page 105
Constant Overhead Quantum Fault Tolerance with Quantum Expander Codes
In this paper, we study the asymptotic scaling of the space overhead needed for fault-tolerant quantum computation.
Omar Fawzi, Antoine Grospellier, Anthony Leverrier
Pages 106-114
Technical Perspective: SkyCore's Architecture Takes It to the 'Edge'
"SkyCore," by Mehrdad Moradi, et al., addresses an exciting use case for Unmanned Aerial Vehicles in which UAVs can act as mobile base stations for the cellular network, flying to areas in the network in order to improve wireless …
Richard Han
Page 115
SkyCore: Moving Core to the Edge for Untethered and Reliable UAV-Based LTE Networks
We argue for and propose an alternate, radical edge evolved packet core design, called SkyCore, that pushes the EPC functionality to the extreme edge of the core network.
Mehrdad Moradi, Karthikeyan Sundaresan, Eugene Chai, Sampath Rangarajan, Z. Morley Mao
Pages 116-124
COLUMN:
Last byte
Stay in Balance
No tipping.
Dennis Shasha
Page 128