67 Ode to Code Stephen B. Jenkins
68 Computing in Pervasive Cyberspace Gul Agha
71 Could Googling Take Down a President? Gregory Conti
74 Toward a Network Architecture That Does Everything
Jon Crowcroft
78 Reflections on Computer-Related Risks Peter G. Neumann
82 Cyber-Commons: Merging Real and Virtual Worlds
Jason Leigh and Maxine D. Brown
Articles
86 Bell’s Law for the Birth and Death of Computer Classes
Gordon Bell
95 The Centrality and Prestige of CACM Greta L. Polites and
Richard T. Watson
Breakthrough Research: A Preview of
Things to Come
104 Introduction
105 Technical Perspective: The Data Center is the Computer
David A. Patterson
107 Map Reduce: Simplified Data Processing on Large Clusters
Jeffrey Dean and Sanjay Ghemawat
115 Technical Perspective: Finding a Good Neighbor, Near and
Fast Bernard Chazelle
117 Near-Optimal Hashing Algorithms for Approximate Nearest
Neighbor in High Dimensions Alexandr Andoni and
Piotr Indyk
13
Columns
13 The Business of Software Digging CACM Phillip G. Armour
17 Staying Connected Happy Anniversary, CACM
Meg McGinity Shannon
21 Viewpoint Back to Experimentation Peter A. Freeman
23 President’s Letter Fifty Years and Still Growing
Stuart I. Feldman
152 Inside Risks The Psychology of Risks Leonard S. Zegans
17