acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

April 2016


From Schneier on Security

2016 Protocols Workshop

2016 Protocols Workshop

Ross Anderson has liveblogged the 24th International Workshop on Security Protocols in Brno, Czech Republic....


From The Eponymous Pickle

A Building Sends a Friend Request

A Building Sends a Friend Request

Way back when, during my early days of innovation, I worked at the Pentagon, a remarkable place.     So this article seemed so striking I had to copy the link and send it to several old colleagues.  Newsweek & Science:  Dear Buildings…


From The Eponymous Pickle

Asking the Right Questions of Big Data

Asking the Right Questions of Big Data

Good thoughts here.  Though having observed enterprise examples, it can be as little as asking any relevant questions of big data.  Align questions with key decision processes. You can learn a lot about process it self by working…


From The Eponymous Pickle

On Linear Regression

On Linear Regression

Good, non technical discussion.   Probably the most important method to really understand well.  Since it is most used.


From U.S. Public Policy Committee of the ACM

Hill Tech Happenings – Week of April 11

Hill Tech Happenings – Week of April 11

Tuesday, April 12, 2016 Hearing: To examine the status of innovative technologies in advanced manufacturing Senate Energy and Natural Resources Committee 10 am | 366 Dirksen Senate Office Building Wednesday, April 13, 2016 Hearings…


From The Computing Community Consortium Blog

CCC Announces Industry-Academic Program with the Big Data Regional Hubs

CCC Announces Industry-Academic Program with the Big Data Regional Hubs

As a follow-up to the CCC/CRA Industry Academic Survey, conducted in spring of 2015 and the CCC Industry Roundtable Discussion held on July 24, 2015, the CCC is sponsoring a program on Industry-Academic Collaboration. The goal…


From insideHPC

Live Report from LUG 2016 Day 3

Live Report from LUG 2016 Day 3

In this special guest feature, Ken Strandberg offers this live report from Day 3 of the Lustre User Group meeting in Portland. "Rick Wagner from San Diego Supercomputing Center presented progress on his team’s replication tool…


From insideHPC

InsideHPC Guide to Technical Computing

InsideHPC Guide to Technical Computing

Today's High Performance Computing (HPC) systems offer the ability to model everything from proteins to galaxies. The insights and discoveries offered by these systems are nothing short of astounding. Indeed, the ability to process…


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 9 April 2016

Interesting Links 9 April 2016

This past weekend (and today) have been spent working with some amazing and knowledgeable people on the K12 Computer Science Curriculum Framework. We’ve been making updates and improvements based on a lot of great feedback from…


From Schneier on Security

Scams from the 1800s

Scams from the 1800s

They feel quaint today: But in the spring of 1859, folks were concerned about another kind of hustle: A man who went by the name of A.V. Lamartine drifted from town to town in the Midwest ­ pretending to attempt suicide. He would…


From Computational Complexity

What Rock Band Name would you choose?

I looked up my colleague Dave Mount on Wikipedia and found  that he was a drummer for the glam rock band Mud. He informed me that (a) on Wikipedia he is David Mount and (b) if he had a rock band it would be named Fried Purple…


From Gödel's Lost Letter and P=NP

ARC Day At Georgia Tech

A preview of the talks for this coming ARC Day ARC is our Algorithms & Randomness Center at Tech. It was created by Santosh Vempala, and this Monday ARC is holding a special theory day. The organizers are Santosh with Richard…


From The Eponymous Pickle

Light Show Driven by Pattern Recognition AI

Light Show Driven by Pattern Recognition AI

An example of using sensors to drive performance light position.  In the BBC.  Ultimately a good example.  The sensors gather data.  Patterns can be matched to scripts (goals).   Adaptations to performance are made to achieve…


From insideHPC

Video: Software-Defined Networking on InfiniBand Fabrics

Video: Software-Defined Networking on InfiniBand Fabrics

A design for virtual Ethernet networks over IB is described. The virtual Ethernet networks are implemented as overlays on the IB network. They are managed in a flexible manner using software. Virtual networks can be created, …


From insideHPC

Molex Acquires Interconnect Systems, Inc.

Molex Acquires Interconnect Systems, Inc.

This week, Molex announced the acquisition of Interconnect Systems, Inc. (ISI) which specializes in the design and manufacture of high density silicon packaging with advanced interconnect technologies. "We are thrilled to join…


From Phys.org Technology News

How stealthy is Navy's new destroyer? It needs reflectors

How stealthy is Navy's new destroyer? It needs reflectors

The future USS Zumwalt is so stealthy that it'll go to sea with reflective material that can be hoisted to make it more visible to other ships.


From The Eponymous Pickle

New Data in Multimedia Research

New Data in Multimedia Research

In CACM:Bart Thomee of Yahoo Labs discusses "YFCC100M: The New Data in Multimedia Research" (cacm.acm.org/magazines/2016/2/197425), Contributed Article in the February 2016 CACM. ... See also, on Yahoo! Labs.  Here we note:  …


From The Eponymous Pickle

What Problem are you Solving?

What Problem are you Solving?

Good thoughts in Inc.   I add:  Most of us have a list of things that we know are problems for our industry ingrained in our head.  So it becomes a matter of prioritizing potential value.  But there are so many solutions, or…


From The Eponymous Pickle

Existing Technology to Assist Disabled.

Existing Technology to Assist Disabled.

In CACM:  A good overview of the topic.  We exist in a world where common, but still remarkable technologies are being broadly applied.    I was reminded too, that everyone has some form of disability, current or in the future…


From Gödel's Lost Letter and P=NP

Missing Mate in Ten

Can we have overlooked short solutions to major problems? src Efim Geller was a Soviet chess grandmaster, author, and teacher. Between 1953 and 1973 he reached the late stages of contention for the world championship many times…


From The Eponymous Pickle

Posing the Warrant Canary

Posing the Warrant Canary

 The BBC poses the concept of a 'warrant canary'A legal statement that something is not true, by its mere existence?" .. A warrant canary is a statement saying a company has not received secret requests for user data by government…


From insideHPC

Video: NVMe Over Fabrics

Video: NVMe Over Fabrics

NVMe over Fabrics is an enhancement / expansion of the NVMe specification to support remote access to NVMe storage resources via RDMA. This presentation will review the major components of the NVMe over Fabrics specification,…


From insideHPC

Job of the Week: Postdoctoral Appointee on FPGAs for Supercomputing

Job of the Week: Postdoctoral Appointee on FPGAs for Supercomputing

Argonne National Laboratory is seeking a Postdoctoral Appointee on FPGAs for Supercomputing in our Job of the Week. "This is an exciting opportunity for you to contribute to a new way of thinking in high-performance computing…


From The Eponymous Pickle

Blockchain Explained

Blockchain Explained

In O'Reilly.  Good, but still technical, utilizes code to make the comparisons." ... Defining blockchains by analogies and applicationsBlockchain is a buzzword, and though it's thrown around often, it's rarely explained. Here's…


From The Eponymous Pickle

Watching and Learning for AI

Watching and Learning for AI

The ideal AI would be akin to a small child.  It could observe, learn and reapply that which they have learned.  Build its knowledge and skills.  To this end we experimented with neural nets in their early days, but only in a…


From Schneier on Security

Friday Squid Blogging: Cooking with Squid Ink

Friday Squid Blogging: Cooking with Squid Ink

Risotto nero and more. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....


From BLOG@CACM

Qualify Your Quantifiers...or, Exactly Who All Is CS4?

Qualify Your Quantifiers...or, Exactly Who All Is CS4?

Unfortunately, there is a critical vagueness to "Computer Science for All."


From Schneier on Security

Security Lessons from the Game of Werewolf

Security Lessons from the Game of Werewolf

I can't believe I haven't posted this before....


From insideHPC

SC16 Adds State-of-the-Practice Track

SC16 Adds State-of-the-Practice Track

Over at the SC16 Blog, Dan Stanzione from TACC writes that the conference is starting a multi-year emphasis designed to advance the state of the practice in the HPC community by providing a track for the professionals driving…


From insideHPC

Now on Azure: Intel Cloud Edition for Lustre* Software

Now on Azure: Intel Cloud Edition for Lustre* Software

The Intel Cloud Edition for Lustre* Software is now available on Microsoft’s Azure platform. Intel Cloud Edition for Lustre Software on Azure is a scalable, parallel file system designed as the working file system for HPC or …

« Prev 1 8 9 10 11 12 15 Next »