| 6 | -- | 7 | Charles Severance. Pooja Sankar: Building the Piazza Collaboration System |
| 8 | -- | 10 | Brian M. Gaff, Peter J. Cuomo. Design Patents |
| 12 | -- | 13 | W. Neville Holmes. 32 & 16 Years Ago |
| 14 | -- | 17 | Neal Leavitt. A Technology that Comes Highly Recommended |
| 18 | -- | 20 | Lee Garber. News Briefs |
| 22 | -- | 23 | Jane Chu Prey, Alfred C. Weaver. Fostering Gender Diversity in Computing |
| 24 | -- | 29 | Wendy M. DuBow. Diversity in Computing: Why It Matters and How Organizations Can Achieve It |
| 30 | -- | 36 | Telle Whitney, Denise Gammal, Barbara Gee, Jody Mahoney, Caroline Simard. Priming the Pipeline: Addressing Gender-Based Barriers in Computing |
| 38 | -- | 41 | Mary Fernandez. A Path Between: Mentoring the Next Generation of Computing Professionals |
| 42 | -- | 46 | Chris Stephenson, Rebecca Dovi. More than Gender: Taking a Systemic Approach to Improving K-12 Computer Science Education |
| 48 | -- | 51 | Crystal Eney, Ed Lazowska, Hélène Martin, Stuart Reges. Broadening Participation: The Why and the How |
| 52 | -- | 55 | James P. Cohoon, Joanne McGrath Cohoon, Mary Lou Soffa. Educating Diverse Computing Students at the University of Virginia |
| 56 | -- | 58 | Maria Klawe. Increasing Female Participation in Computing: The Harvey Mudd College Story |
| 60 | -- | 61 | Deepak Kumar. Serving Women with a Purposeful Vision |
| 62 | -- | 63 | Robert B. Schnabel. Personal Reflections on Gender Diversity in Computing |
| 63 | -- | 65 | Kate Starbird. Returning to My Inner Nerd: Following the "Social" Disruption of Computing |
| 65 | -- | 66 | Annie I. Antón. Facing Challenges and Having Fun |
| 66 | -- | 68 | Alice Bonhomme-Biais, Raquel Romano. Pursuing Professional Changes |
| 69 | -- | 77 | Lwin Khin Shar, Hee Beng Kuan Tan. Defeating SQL Injection |
| 78 | -- | 85 | Chung-Wei Hang, Zhe Zhang, Munindar P. Singh. Shin: Generalized Trust Propagation with Limited Evidence |
| 86 | -- | 89 | Nir Kshetri, San Murugesan. Cloud Computing and EU Data Privacy Regulations |
| 90 | -- | 93 | Kirk W. Cameron. Energy Oddities, Part 2: Why Green Computing Is Odd |
| 94 | -- | 96 | Karl Ricanek Jr., Gayathri Mahalingam. Biometrically, How Identical Are Identical Twins? |
| 97 | -- | 99 | Hal Berghel. The SCDOR Hack: Great Security Theater in Five Stages |
| 100 | -- | 103 | John Riedl. Crowdfunding Technology Innovation |
| 104 | -- | 107 | Brian David Johnson. Jimmy: The Robot That Changed It All |
| 124 | -- | 0 | David Alan Grier. Attention to Context |