Our digital infrastructure, which has become a key component of the economic system in developed countries, is one of the few components that did not buckle under the stress of COVID-19.
"Challenge yourself and reach for the highest bar. If you succeed, keep pushing the boundaries," my friend advised when I started my career at IBM Research. These words have been a guiding force in my career ever since.
DEPARTMENT: Letters to the editor
As a computer scientist, I was embarrassed to read the Viewpoint "Conferences in an Era of Expensive Carbon" (March 2020) from four fellow computer scientists.
John Arquilla considers responses to the Coronavirus pandemic, while Mark Guzdial ponders the impacts of competitive enrollment.
Cryptographers are developing algorithms to ensure security in a world of quantum computing.
Artificial intelligence could automate software coding.
We need to mitigate the environmental impact of disposing of electronics at their end of useful life.
COLUMN: Legally speaking
Considering the role of humans in copyright protection of outputs produced by artificial intelligence.
COLUMN: Economic and business dimensions
Guaranteeing truth in advertising.
COLUMN: Computing ethics
Toward a more equitable distribution of the benefits of technological change.
Attempting to balance the challenging trade-offs between individual rights and our obligations to one another.
Suggesting a Voice Name System (VNS) to talk to any object in the world.
Building projects despite (and because of) existing complex systems.
Cryptography meets monetary policy.
SECTION: Contributed articles
DSAs gain efficiency from specialization and performance from parallelism.
A cycle that traces ways to define the landscape of data science.
Google's TPU supercomputers train deep neural networks 50x faster than general-purpose supercomputers running a high-performance computing benchmark.
SECTION: Review articles
Blockchain technology can shape innovation and competition in digital platforms, but under what conditions?
SECTION: Research highlights
"Spectre Attacks: Exploiting Speculative Execution," by Paul Kocher, et al
., reviews how speculative execution and caches can be exploited, presents specific exploits using speculative branches that are direct and indirect, and …
This paper describes practical attacks that combine methodology from side-channel attacks, fault attacks, and return-oriented programming that can read arbitrary memory from the victim's process.
Can we build purpose-built, warehouse-scale datacenters customized for large-scale arrays of ASIC accelerators or, to use a term coined in the paper by Michael Bedford Taylor, et al., ASIC clouds?
This paper distills lessons from Bitcoin ASIC Clouds and applies them to other large scale workloads, showing superior TCO (total cost of ownership) versus CPU and GPU.
COLUMN: Last byte
Choosing how to best navigate turbulent current events.