acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

May 2015


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Code, Compile, Test, Repeat

Code, Compile, Test, Repeat

I came across this image on Facebook recently and it got me thinking. My first old guy “get off my lawn” thought was that when I started coding one was lucky if they had a chance to compile more than once a day. But of course…


From The Eponymous Pickle

Fujitsu Laser Smart Glasses

Fujitsu Laser Smart Glasses

Have always been impressed by Fujitsu's technology, since we tested their work in retail.  Now their concept smart glasses shine laser images right into the retina.  Does not require focusing, as a result, they say.  Sounds scary…


From insideHPC

HPC Wales to Foster High Performance Computing Competency Network for SMEs

HPC Wales to Foster High Performance Computing Competency Network for SMEs

Today HPC Wales and Bangor University announced joint funding to lead Europe’s Network of HPC Competency Centers for SME’s.

The post HPC Wales to Foster High Performance Computing Competency Network for SMEs appeared first on…


From The Female Perspective of Computer Science

Mini-Course 2015: Survey Results

Mini-Course 2015: Survey Results

Another May, another "Computer Science and Games: Just for Girls!" mini-course on the books.  I'm very pleased with how this year went. The course material and games made by the girls are all online, and below I share the results…


From The Computing Community Consortium Blog

NSF CISE Distinguished Lecture Series – Kathy Yelick

NSF CISE Distinguished Lecture Series – Kathy Yelick

The National Science Foundation (NSF) Directorate for Computer and Information Science and Engineering (CISE) is pleased to announce a distinguished lecture on Wednesday, May 20, 2015 at 2:00 pm EST by Dr. Kathy Yelick titled…


From The Eponymous Pickle

Measuring the Ability to Learn

Measuring the Ability to Learn

In Future of CIO:" ... Metacognition assessment is all about measuring learning effect (acquisition, skills, behavior, understanding). We can measure the results - the 'things' that have been learned. Meta-cognitive processes…


From The Eponymous Pickle

Winning People Over

Winning People Over

In many ways, an ultimate goal: In the HBR:  Emotional Intellligence  ... To Win People Over, Speak to Their Wants and Needsby Nancy Duarte


From insideHPC

How HPC is increasing speed and accuracy

How HPC is increasing speed and accuracy

The overwhelming task of high performance computing today is the processing of huge amounts of data quickly and accurately. Just adding greater numbers of more intensive, sophisticated servers only partially solves the problem…


From insideHPC

Women in HPC Workshop at ISC High Performance 2015

Women in HPC Workshop at ISC High Performance 2015

"Our workshop at ISC will bring together female early career researchers with a focus on European participation, providing them with the opportunity to showcase their work and network with role-models and peers in an environment…


From insideHPC

E4-ARKA: ARM64+GPU+IB is Now Here

E4-ARKA: ARM64+GPU+IB is Now Here

"E4 Computer Engineering has introduced ARKA, the first server solution based on ARM 64 bit SoC dedicated to HPC. The compute node is boosted by discrete GPU NVIDIA cards K20 with 10Gb ethernet and FDR InfiniBand networks implemented…


From Schneier on Security

Amateurs Produce Amateur Cryptography

Amateurs Produce Amateur Cryptography

Anyone can design a cipher that he himself cannot break. This is why you should uniformly distrust amateur cryptography, and why you should only use published algorithms that have withstood broad cryptanalysis. All cryptographers…


From U.S. Public Policy Committee of the ACM

Washington News – Alerts and Updates

Washington News – Alerts and Updates

General Announcements * USACM submitted comments on the NIST roadmap for usability and accessibility of future elections. USACM’s comments highlight the importance of usable and accessible voting technologies and systems and…


From Computer Science Teachers Association

Welcome to our treehouse

Welcome to our treehouse

This is a guest blog post by Kim Douglas, a student at UMass Lowell. Kim has a BA degree from Emerson College in Animation & Motion Media. When people ask me what I’m studying, and I tell them that I’m pursuing … Continue reading…


From The Eponymous Pickle

Models of Narrative

Models of Narrative

Upcoming on May 28, 2015 at Atlanta,  GaTech Cogsys,Org conferenceSession on narrative:" ... Narrative provides a framing structure for understanding, communicating, influencing, and organizing human experience. Systems for its…


From U.S. Public Policy Committee of the ACM

NIST Seeks Comments on Electronic Authentication Guideline

NIST Seeks Comments on Electronic Authentication Guideline

NIST seeks public input on which sections of its Electronic Authentication Guideline need updating. Given the evolving landscape of cybersecurity technological innovations and threats targeting remote authentication, NIST is…


From insideHPC

Video: HPC Solution Stack on OpenPOWER

Video: HPC Solution Stack on OpenPOWER

"This demo will show the capability of IBM OpenPOWER that can be the foundation of the complicated High Performance Computing complete solution. From the HPC cluster deployment, job scheduling, system management, application …


From U.S. Public Policy Committee of the ACM

U.S. Copyright Office to Hold Public Hearings on DMCA Exemptions

U.S. Copyright Office to Hold Public Hearings on DMCA Exemptions

The U.S. Copyright Office will hold public hearings in May on the proposed exemptions to the prohibitions against circumvention of copyrighted works given in the Digital Millennium Copyright Act (DMCA). The public hearings will…


From U.S. Public Policy Committee of the ACM

FCC Seeks Comments on Cybersecurity Risk Management and Best Practices Report

FCC Seeks Comments on Cybersecurity Risk Management and Best Practices Report

The FCC seeks public comments on the report on “Cybersecurity Risk Management and Best Practices” submitted by the FCC Communications Security, Reliability and Interoperability Council. The 415-page report involved 100+ cybersecurity…


From The Eponymous Pickle

Faster, More Accurate Drones

Faster, More Accurate Drones

Have done a little playing around with simple drones.   My impression was that they were hard to control and slow.  Not any more.  Take a look at the videos in this CW article.   Swarms of high speed precision flying drones.…


From The Eponymous Pickle

Bezos Business Models

Bezos Business Models

Amazon's efforts and financial directions are always interesting.   Have followed several of their most recent technical efforts.  Here from Oracle's Anywhere blog, A look at Amazon's most recent shareholder letter.  Always worth…


From The Computing Community Consortium Blog

CCC Community Report for a National Privacy Research Strategy

CCC Community Report for a National Privacy Research Strategy

In April, the Computing Community Consortium (CCC) commissioned members of the privacy research community to generate a short report to help guide strategic thinking in this space. The effort aimed to complement and synthesize…


From U.S. Public Policy Committee of the ACM

Federal Agencies Seek Comments on Federal Cybersecurity Research and Development Strategic Plan

Federal Agencies Seek Comments on Federal Cybersecurity Research and Development Strategic Plan

Federal agencies involved in the National Science and Technology Council (NSTC) and the Networking and Information Technology Research and Development (NITRD) Program seek public input on the priorities and objectives to be included…


From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of May 11

Hill Tech Happenings, Week of May 11

Tuesday, May 12, 2015 Hearing: Fiscal Year 2016 Funding Request and Budget Justification for the Federal Communications Commission Senate Appropriations Subcommittee on Financial Services and General Government 10:30 am | 138…


From insideHPC

SERC Installs India’s First Petaflop Supercomputer

SERC Installs India’s First Petaflop Supercomputer

Today Cray announced that the SERC Research Center in Bangalore has installed India's first Petaflop supercomputer. Called "SahasraT," the 1.4 Petaflop Cray XC40 supercomputer is a hybrid system with Intel Xeon processors, Intel…


From insideHPC

Supermicro Rolls Out X10 3U MicroCloud

Supermicro Rolls Out X10 3U MicroCloud

Today Super Micro Computer announced a new 3U 8-node MicroCloud solution supporting Intel Xeon E5-2600 v3 optimized for data intensive analytics applications in Oil and Gas exploration and HPC environments.

The post Supermicro…


From The Eponymous Pickle

Frontier's of Computer Vision

Frontier's of Computer Vision

Pushing the Frontiers of Computer Vision.  A Q&A with Google's Christian Szegedy   Deep Learning pushes the possibilities further. 'Solved' is a big claim." ... Due to the inroads of deep learning, computer vision appears to…


From insideHPC

JSC and IBM Win the Inaugural Hans Meuer Award

JSC and IBM Win the Inaugural Hans Meuer Award

Today ISC announced that a research paper in the area of in-memory architecture, jointly submitted by a team of seven researchers representing the Jülich Supercomputing Centre (JSC), IBM Germany, and the IBM Watson Research Center…


From The Eponymous Pickle

IBM and SAP Team for Talent Management

IBM and SAP Team for Talent Management

Seeking smarter HR: " ... So today’s successful HR organizations are looking more and more to advanced HR-specific technologies, and the reason is simple: HR professionals know they can drive business results and the CEO agenda…


From Computational Complexity

The law of the excluded middle of the road republicans

In the book Hail to the Chiefs about the presidents, when pointing to a race between two people who had no business being president (I think it was Franklin Pierce vs Winfield Scott) wrote something like That's the thing about…


From Schneier on Security

More on the NSA's Capabilities

More on the NSA's Capabilities

Ross Anderson summarizes a meeting in Princeton where Edward Snowden was "present." Third, the leaks give us a clear view of an intelligence analyst's workflow. She will mainly look in Xkeyscore which is the Google of 5eyes comint…

« Prev 1 8 9 10 11 12 15 Next »