"Thy destroyers and they that made thee waste shall go forth of thee," wrote the prophet Isaiah. This phrase has been popping into my mind as I have been following the recent raging discussions over the topic of MOOCs.
I sometimes think that, of all the disciplines, ours ought to be the most effective at adapting to the varied needs of users. For various physical limitations, we really should be able to configure our software to adapt. But …
DEPARTMENT: Letters to the Editor
In "Don't Feel Bad If You Can't Predict the Future," Peter J. Denning wrote: "Make sure your models are validated and that their assumed recurrences fit the world you are forecasting. Ground your speculations in observable …
Michael Stonebraker expects a substantial increase in the number of New SQL engines using a variety of architectures in the near future.
ACM has completed a major update of its Computing Classification System (CCS), which has served as the de facto standard for classifying the computing literature since 1964.
With the AEGIS system, the Mars Exploration Rovers can autonomously select, capture, and analyze images using onboard logic.
Disney's Touché project could transform every conductive surface into a touch-control surface.
Forensics experts increasingly use data from digital devices to solve crimes, fight lawsuits, and unravel accidents.
COLUMN: Privacy and security
Security research can be improved by more effectively sharing what is learned from attacks on information systems.
COLUMN: Legally speaking
Assessing the first phase of the trial based on claims that Google's Android platform infringes Oracle's Java-related copyrights and patents.
COLUMN: Economic and business dimensions
It's not as simple as you might think.
A multipronged approach to preparing computer science teachers is critical to success.
COLUMN: Computing ethics
Seeking solutions to concerns that go beyond the engineering of the smart grid.
Considering new models for educational technology and methods.
A discussion with Jesse Robbins, Kripa Krishnan, John Allspaw, and Tom Limoncelli.
Failures happen, and resilience drills help organizations prepare for them.
Disks lie. And the controllers that run them are partners in crime.
SECTION: Contributed articles
Decryption keys allow users to learn a specific function of the encrypted data and nothing else.
Open-source chemistry software and molecular databases broaden the research horizons of drug discovery.
SECTION: Review articles
Soft materials may enable the automation of tasks beyond the capacities of current robotic technology.
SECTION: Research highlights
A fundamental impediment to the widespread development and deployment of in-camera algorithms is the lack of a clean open architecture for controlling camera features and writing the corresponding real-time processing and …
Progress in computational photography has been hampered by the lack of a portable, programmable camera with sufficient image quality and computing power. To address this problem, we have designed and implemented the Frankencamera …
Buying residential broadband services seems relatively simple: pick among a small number of plans, and then compare similar plans by price. Unfortunately, reality is somewhat more complicated.
We present the results from the first study of Internet access link performance measured directly from home routers. Our findings provide a snapshot of access network performance across the United States.
COLUMN: Last byte
Many of us have pondered puzzles involving a set of n coins and a balance scale. Here we take a slightly different tack: a set of coins and a balance scale that can tell us which of two sets of coins is heavier or that they are …