In NATO Cyber Wargame, Berlya Fends Off Arch-Enemy Crimsonia
Somewhere near Iceland, a new NATO member, Berlya is under …
Building an Earth-Size Telescope, 1 Station at a Time
Imagine a trio of aerobatic aircraft. Over the years they've …
Biometrics May Ditch the Password, But Not the Hackers
Passwords get hacked—a lot.
The Life of a Computer Pioneer
Obituary of F.L. Bauer, German informatics pioneer.
Budget Beowulf Clusters
Joel C. Adams
At SIGCSE 2015, five CS educators brought and live-demo'd the low-cost Beowulf clusters they had built for teaching parallel...
Computer Security and the Risks of Online Voting
Duncan A. Buell
An election in Australia is the latest instance of discovering a security flaw in an online voting system, while it is being...
Why the Entire Premise of Tor-Enabled Routers Is Ridiculous
Ars recently reviewed two "Tor routers," devices that are supposed to improve your privacy by routing all traffic through the Tor anonymity network. Although the initial release of Anonabox proved woefully insecure, the basic premise itself is flawed.
The FBI's Stance on Encrypted Communications
The Wall Street Journal
Imagine an America where federal, state, and municipal law enforcement agencies cannot access critical communications, even when legally authorized to do so.
Should Law Enforcement Have the Ability to Access Encrypted Communications?
The Wall Street Journal
People's distress over the privacy of their communications has never been more acute. Whether the fear is over U.S. surveillance or breaches by hackers of unknown origins, many consumers fear that there is no such thing as privacy online.
There Is No Now
Problems with simultaneity in distributed systems.
Parallel Processing with <code>Promises</code>
A simple method of writing a collaborative system.
Hadoop Superlinear Scalability
Neil J. Gunther, Paul Puglia, Kristofer Tomasette
The perpetual motion of parallel performance.
Technical Perspective: Programming Multicore Computers
"Can Traditional Programming Bridge the Ninja Performance Gap for Parallel Computing Applications" advocates an appealing division...
Can Traditional Programming Bridge the Ninja Performance Gap for Parallel Computing Applications?
Nadathur Satish, Changkyu Kim, Jatin Chhugani, Hideki Saito, Rakesh Krishnaiyer, Mikhail Smelyanskiy, Milind Girkar, Pradeep Dubey
Current processor trends of integrating more cores with SIMD units have made it more to extract performance from applications...
Technical Perspective: The Specialization Trend in Computer Hardware
Specialization improves energy-efficiency in computing but only makes economic sense if there is significant demand. A balance...
Privacy Behaviors After Snowden
Despite continuing media coverage, the public's privacy behaviors have hardly changed.
Decoding Femininity in Computer Science in India
Roli Varma, Deepak Kapur
The benefits in school and the job market so far outweigh any potential gender bias that few women are deterred.
Sketch-Thru-Plan: A Multimodal Interface for Command and Control
Philip R. Cohen, Edward C. Kaiser, M. Cecelia Buchanan, Scott Lind, Michael J. Corrigan, R. Matthews Wesson
Speaking military jargon, users can create labels and draw symbols to position objects on digitized maps.
Optimization as Motion Selection Principle in Robot Action
Jean-Paul Laumond, Nicolas Mansard, Jean Bernard Lasserre
Robots move to act. While actions operate in a physical space, motions begin in a motor control space. So how do robots express...
Security Challenges for Medical Devices
Johannes Sametinger, Jerzy Rozenblit, Roman Lysecky, Peter Ott
Implantable devices, often dependent on software, save countless lives. But how secure are they?
Privacy Implications of Health Information Seeking on the Web
A revealing picture of how personal health information searches become the property of private corporations.