acm - an acm publication
Follow us on social media...

Peter J. Denning, Editor in ChiefThe digitally connected world has become a large, swirling sea of information stripped of context. We help our readers make sense of it, find meaning in it, learn what to trust, and speculate on our future.

Peter J. Denning,
Editor-in-Chief

 

LATEST ARTICLES
Commentary

Computational design

August 2017
by Peter J. Denning

Cyber-attacks and breaches are often detected too late to avoid damage. In this article we examine the ability of redundancy-based anomaly detectors to recognize some high-risk and difficult to detect attacks on web servers. We discuss practical relevance of the approach in the context of providing high-assurance Web-services that may belong to autonomous IoT applications and devices. ...


Communication Corner

Why writing short sentences may be short-changing your reader

August 2017
by Philip Yaffe

Cyber-attacks and breaches are often detected too late to avoid damage. In this article we examine the ability of redundancy-based anomaly detectors to recognize some high-risk and difficult to detect attacks on web servers. We discuss practical relevance of the approach in the context of providing high-assurance Web-services that may belong to autonomous IoT applications and devices. ...



Interview

Is quantum computing for real?: an interview with Catherine McGeoch of D-Wave Systems

July 2017
Interviewed by Walter Tichy

Cyber-attacks and breaches are often detected too late to avoid damage. In this article we examine the ability of redundancy-based anomaly detectors to recognize some high-risk and difficult to detect attacks on web servers. We discuss practical relevance of the approach in the context of providing high-assurance Web-services that may belong to autonomous IoT applications and devices. ...


Interview

Mixing computation with people: an interview with Marianne Winslett

July 2017
Interviewed by Richard T. Snodgrass

Cyber-attacks and breaches are often detected too late to avoid damage. In this article we examine the ability of redundancy-based anomaly detectors to recognize some high-risk and difficult to detect attacks on web servers. We discuss practical relevance of the approach in the context of providing high-assurance Web-services that may belong to autonomous IoT applications and devices. ...