Having a conversation about bulk surveillance.
Drumming up support for AP CS principles.
The land sharks are on the squawk box.
Revealing the API ecosystem and enterprise strategy via visual analytics.
Lessons from the tech transfer trenches.
The Beckman report on database research.
The verification of a distributed system.
Privacy research directions.
How a supervillain (or a hacker in his basement) could destroy the internet.
Apps and the web.
Technical Perspective: Program synthesis using stochastic techniques.
Code hoarding.
ACM inducts fellows.
Self-repair techniques point to robots that design themselves.
Pinocchio: nearly practical verifiable computation.
YFCC100M: the new data in multimedia research.
Schema.org: evolution of structured data on the web.
Expect 'ungoverned actors' to use AI-supported weapons, too.
Broadening access to computing education state by state.
Accountability in algorithmic decision making.
In privacy law, it's the U.S. vs. the world.
Stochastic program optimization.
Future Tense: Chatterbox.
Phonetic analytics technology and big data: real-world cases.
Technical Perspective: Catching lies (and mistakes) in offloaded computation.
The moral hazard of complexity-theoretic assumptions.