acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

July 2015


From Schneier on Security

Malcolm Gladwell on Competing Security Models

Malcolm Gladwell on Competing Security Models

In this essay/review of a book on UK intelligence officer and Soviet spy Kim Philby, Malcolm Gladwell makes this interesting observation: Here we have two very different security models. The Philby-era model erred on the side…


From The Female Perspective of Computer Science

Keynotes and Inspirations at Foundations of Digital Games 2015

Keynotes and Inspirations at Foundations of Digital Games 2015

I had a great time at this year's Foundations of Digital Games, but it was the talks and the hallway track with narrative folks that really left me inspired.  In this post I'll summarize the first three keynotes and some inspiration…


From U.S. Public Policy Committee of the ACM

NTIA Invites Participation in a New Cybersecurity Multistakeholder Process on Vulnerability Research Disclosure

NTIA Invites Participation in a New Cybersecurity Multistakeholder Process on Vulnerability Research Disclosure

The National Telecommunications and Information Administration (NTIA) invites businesses, organizations, and individuals to participate in a new cybersecurity multistakeholder process on vulnerability research disclosure. The…


From Blog@Ubiquity

Why We Don’t Know Know-How

Why We Don’t Know Know-How

In pursuit of scientific understanding, too often we forget our level of know-how is far more important than our know-what.

The post Why We Don’t Know Know-How appeared first on BLOG@UBIQUITY.


From The Eponymous Pickle

Mastering Brand Building in the Third Decade of Digital

Mastering Brand Building in the Third Decade of Digital

Today at: Mastering Brand Building in the Third Decade of DigitalSee the ongoing Signal PG (Procter & Gamble) conference tweeted at #SignalPGMore to follow.


From The Eponymous Pickle

Globalization and Manufacturing Location Clusters

Globalization and Manufacturing Location Clusters

Not unexpected, Location and proximity can still matter.   Perhaps less with the emergence of 3D printing?Globalization Hasn’t Killed the Manufacturing ClusterIn today's global markets, companies have many choices to procure…


From insideHPC

MVAPICH User Group Returns to Ohio Aug. 19-21

MVAPICH User Group Returns to Ohio Aug. 19-21

The MVAPICH team has posted their agenda for the 3rd annual MVAPICH User Group (MUG) meeting. Sponsored by Mellanox and the Ohio Supercomputer Center, MUG will take place August 19-21 in Columbus, Ohio, USA.

The post MVAPICHinsideHPC…


From insideHPC

Why Purdue Has Been with Student Cluster Competitions from the Start

Why Purdue Has Been with Student Cluster Competitions from the Start

In this video, Purdue's Dr. Gerry McCartney talks with Dan Olds about the University's participation in the Student Cluster Competitions. "We want to make this commitment to our students. They enjoy it. We enjoy having them represent…


From The Eponymous Pickle

AI and Human Sketch Recognition

AI and Human Sketch Recognition

Also an application we considered, could you get an AI to recognize human created sketches, say in notes about a meeting, or from consumers giving impressions of your new products in use contexts?   Here a system excelling in…


From insideHPC

ISC 2015 Breaks Attendance Record

ISC 2015 Breaks Attendance Record

ISC 2015 concluded its 30th meeting last week in Germany, drawing a record 2,846 attendees from 56 countries. In total 153 organizations took part in the conference exhibition.

The post ISC 2015 Breaks Attendance Record appeared…


From The Eponymous Pickle

Strategies for Reaching the Chinese Consumer

Strategies for Reaching the Chinese Consumer

In the HBR:" ... Slowing Chinese economic growth coupled with confidence-sapping tumult on the stock market have set alarm bells ringing at companies about their future growth prospects in China. But they should not simply sit…


From insideHPC

Fujitsu Teams with Asetek for Cool-Central Primergy Systems

Fujitsu Teams with Asetek for Cool-Central Primergy Systems

Last week at ISC 2015, Fujitsu rolled out new Primergy systems using the company's Cool-Central Liquid Cooling Solution. Based on Asetek technology, Cool-Central reduces cooling costs by up to 50 percent.

The post Fujitsu Teams…


From The Eponymous Pickle

Connecting Employees and Customer Experience

Connecting Employees and Customer Experience

In CWorld: " ... Improve outcomes by connecting the employee and customer experience ... " Absolutely, but what if your employees are several steps away from the customer?  A classic situation in CPG products and retail.  Mobile…


From insideHPC

Video: Pathscale Compilers Power Cavium ThunderX Processor

Video: Pathscale Compilers Power Cavium ThunderX Processor

The EKOPath compiler for High Performance Computing supports advanced loop optimizations, SIMD vectorization and many-core support. This release of EKOPath includes optimizations specifically for the ThunderX microarchitecture…


From The Eponymous Pickle

Tracking your Location Over Time

Tracking your Location Over Time

We could have used this for a plant maintenance application that required documenting location, issues and changes.  Thinking of other related applications.Tracking location and images on a map."  .... Have you ever wanted aWhich…


From Gödel's Lost Letter and P=NP

Alberto Apostolico, 1948–2015

Our condolences on the loss of a colleague Cropped from TCS journal source Alberto Apostolico was a Professor in the Georgia Tech College of Computing. He passed away on Monday after a long battle with cancer. Today Ken and I…


From Schneier on Security

Preventing Book Theft in the Middle Ages

Preventing Book Theft in the Middle Ages

Interesting article....


From U.S. Public Policy Committee of the ACM

NTIA Invites Participation in a New Multistakeholder Process on Drones

NTIA Invites Participation in a New Multistakeholder Process on Drones

The National Telecommunications and Information Administration (NTIA) invites businesses, organizations, and individuals to participate in a new multistakeholder process on drone privacy, transparency, and accountability. The…


From insideHPC

Eurotech QPACE2 Supercomputer Ranks 379 on TOP500

Eurotech QPACE2 Supercomputer Ranks 379 on TOP500

Last week at ISC 2015, Eurotech announced that the company has completed the installation of a new supercomputer prototype at the University of Regensburg. With 15,872 compute cores, the QPACE2 supercomputer is ranked #370 on…


From The Eponymous Pickle

A&P is Gone

A&P is Gone

One of the oldest and once largest US grocery store chains, with origins as far back as 1859, founded in NYC,  is in the final parts of  bankruptcy. Apparently the grand name of A&P: The Great Atlantic & Pacific Tea Company,"…


From Putting People First

How ethnographic research helped transform a US paint company

How ethnographic research helped transform a US paint company

Almost all business leaders now acknowledge that they would love to engage in the deep learning that long-term customer observation can foster, but in practice such endeavors are methodically undermined in the fast paced corporate…


From Putting People First

The student experience and the future of the library

The student experience and the future of the library

Libraries have moved from being the location for search, access and advice to playing a much smaller role within a much larger information landscape, writes a researcher of JISC, the UK charity that champion the use of digital…


From The Eponymous Pickle

Teradata Aster Videos on Advanced Analytics

Teradata Aster Videos on Advanced Analytics

Links to all videos  by John Thurma to document Teradata Aster analytics,.   Useful for training in this space.  He writes:  " ... Please see the following list of videos that I have created to document some of Asters 120+ Analytic…


From The Eponymous Pickle

Integrating Supply and Demand

Integrating Supply and Demand

In the summer issue of SloanMIT:  This requires membership or sign up registration for the full article.Integrating Supply and Demand" ... At many companies, sales generation activities have become disconnected from the operational…


From The Eponymous Pickle

Stolen Data Phones Home

Stolen Data Phones Home

In CSOonline:  " ... Digital ‘watermarking’ won’t prevent your data from being stolen, but it can let you find out about it much more quickly than the average of seven months it takes organizations to discover a breach  ... " …


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Charleston Teach Meet Day Two

Charleston Teach Meet Day Two

Today was the second day of a creative mini conference of educators. You can read about Charleston Teach Meet Day One here. We started off today a little differently. Doug Bergman showed off one of the Kinect games that one of…


From U.S. Public Policy Committee of the ACM

U.S. Department of Commerce Seeks Public Comments on Proposed Export Definitions Relevant to Cloud and Other Digital Services

U.S. Department of Commerce Seeks Public Comments on Proposed Export Definitions Relevant to Cloud and Other Digital Services

The U.S. Department of Commerce’s Bureau of Industry and Security is accepting public comments on proposed revisions to definitions in the Export Administration Regulations (EAR). The proposed rules contain a new provision relevant…


From Computational Complexity

Hartley Rogers, Author of the first Textbook on Recursion Theory, passes away

Hartley Rogers Jr passed away on July 17, 2015 (last week Friday as I write this).He was 89 and passed peacefully.For our community Rogers is probably best known for his textbook on Recursion Theory which I discuss below. Hehere…


From insideHPC

Cycle Computing Joins Cloud Native Computing Foundation

Cycle Computing Joins Cloud Native Computing Foundation

Today Cycle Computing announced its participation in the Cloud Native Computing Foundation. Through its membership, Cycle Computing will enable enterprise users with big compute problems to fully leverage the advantages of cloud…


From insideHPC

EXTOLL Rolls Out TOURMALETT Network Chip at ISC 2015

EXTOLL Rolls Out TOURMALETT Network Chip at ISC 2015

Last week at ISC 2015, EXTOLL from Germany introduced its TOURMALET 100G network chip and PCIe Board.

The post EXTOLL Rolls Out TOURMALETT Network Chip at ISC 2015 appeared first on insideHPC.

« Prev 1 4 5 6 7 8 17 Next »