| 5 | -- | 7 | Clayton Ferner. Contributions of Quantum Factoring on Quantum Research |
| 11 | -- | 13 | Erich J. Neuhold. 50 & 25 Years Ago |
| 12 | -- | 0 | Ergun Akleman. Computing Through Time |
| 14 | -- | 15 | Jeffrey M. Voas, Elena Loukoianova. Warming Your Chicken |
| 15 | -- | 0 | Jeffrey M. Voas. In This Issue |
| 16 | -- | 18 | Manish Parashar, Michael A. Heroux, Victoria Stodden. Research Reproducibility |
| 20 | -- | 30 | Ian T. Foster, Carl Kesselman. CUF-Links: Continuous and Ubiquitous FAIRness Linkages for Reproducible Research |
| 31 | -- | 39 | Martin D. Halbert. Advancing Reproducibility at the NSF |
| 40 | -- | 48 | Lorena A. Barba. Defining the Role of Open Source Software in Research Reproducibility |
| 49 | -- | 56 | Torsten Hoefler. Benchmarking Data Science: 12 Ways to Lie With Statistics and Performance on Parallel Computers |
| 57 | -- | 69 | Abdul Majeed, Seong Oun Hwang. A Privacy-Assured Data Lifecycle for Epidemic-Handling Systems |
| 70 | -- | 81 | Huber Flores, Agustin Zuniga, Sasu Tarkoma, Leonardo Tonetto, Tristan Braud, Pan Hui 0001, Yong Li 0008, Mostafa H. Ammar, Petteri Nurmi. Collaboration Stability: Quantifying the Success and Failure of Opportunistic Collaboration |
| 82 | -- | 88 | Krassen Stefanov. Software Systems and Frameworks for Competency-Based Learning |
| 89 | -- | 94 | Nir Kshetri, Jeffrey M. Voas. Blockchain's Carbon and Environmental Footprints |
| 95 | -- | 99 | Mark Campbell 0002. Privacy-Preserving Computation: Doomed to Succeed |
| 100 | -- | 102 | Joanna F. DeFranco, Bob Maley. Closing the Security Agility Gap |
| 103 | -- | 105 | James Bret Michael, George W. Dinolt, Frederick B. Cohen, Duminda Wijesekera. Can You Trust Zero Trust? |