Happy anniversary, CACM.
Inspiration and trust.
From academia to the editorship.
Toward a network architecture that does everything.
The battle of the covers.
Information security: 50 years behind, 50 years ahead.
Forum.
CACM: past, present, and future.
Hacking intellectual property law.
Fifty years and still growing.
Reflections on computer-related risks.
Bell's law for the birth and death of computer classes.
Could googling take down a president?
Ode to code.
Technical perspective: finding a good neighbor, near and fast.
Cyber-commons: merging real and virtual worlds.
Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions.
Introduction.
MapReduce: simplified data processing on large clusters.
Five deep questions in computing.
The psychology of risks.
Editorial pointers.
Introduction.
The next 50 years.
Digging CACM.
Introduction.
A time to retrospect and prospect.
Computing in pervasive cyberspace.
Technical perspective: the data center is the computer.
The centrality and prestige of CACM.
The battle behind the scenes.
Back to experimentation.
Déjà vu all over again.
In the realm of insight and creativity.