The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.
Looking at how companies analyse server and security logs to tackle cyber crime and internal fraud, and optimize the user experience. In Computerweekly.
A basic question about cryptography that we pretend is not there. Victor Shoup is one of the top experts in cryptography. He is well known for many things including a soon to be released book that is joint with Dan Boneh on,…
In this video from PyData Seattle 2015, Van Lindberg from Rackspace presents: Computation at the Edges.
The post Computation at the Edges from PyData Seattle appeared first on insideHPC.
Part of my long term and broader look at the interaction of design thinking and engineering. I come from the engineering side. A piece and link to work by Jon Kolko. " .... How should companies think about design centricity…
I posted some recent items about touch systems, and I was sent a pointer to some work and comments online by Unilever. " .... The science of touch Why do we choose one product over another? You'd be surprised to learn how…
In this video from the Docker Workshop at ISC 2015, Nishant Agrawal from TCS Innovation Labs presents: Docker for Software Development. Agrawal provides insight in his experience using Docker as a containment of different libraries…
How should companies think about design centricity? For Jon Kolko, vice president of design at Blackboard, an education software company, design thinking can define the way an organization functions at the most basic levels—how…
The big memory "Blacklight" system at the Pittsburgh Supercomputer Center will be retired on Aug 15 to make way for the new "Bridges" supercomputer. "Built by HP, Bridges will feature multiple nodes with as much as 12 terabytes…
It is popular to fear that climate change will turn the Earth into a water world or that genetically-modified food is going to kill all of us. These fears are probably unwarranted. Instead, I view the future as follows: You will…
"What we’re seeing in President Obama’s Executive Order is a major proof point of the importance of high-end computer technology in bolstering and redefining national competitiveness. In the past, a country’s competitiveness …
In EE Times. GE is clearly a pioneer in this area, having huge needs in gathering, analyzing and delivering huge amounts of data.
Let's encourage active learning by requiring it in teaching statements.
Good Q&A with Cynthia Dwork on algorithmic bias....
In the HBR: " ... The Google brand is one of the most valuable brands in the world. In 2014, Interbrand placed a valuation of the brand at $107.43 billion, only trailing the Apple brand in value.A reasonable person might ask…
In this Intel Chip Chat podcast, Bill Mannel from HP stops by to discuss the growing demand for high performance computing solutions and the innovative use of HPC to manage big data. He highlights an alliance between Intel and…
I haven’t been at the ICER Conference but a lot of my friends are there and between their tweets and other tweets using the #icer2015 hash tag I almost feel like I’m there. In any case a lot of interesting things have come through…
Book, bookstore and E-Book. A fight between literature and the internet. In the BBC. It is interesting that the form of the book, despite predictions, has not changed, just plugged into the net.
In Fast Company: Seeking to figure out how things should communicate. Good Goal. Keep industry involved. Integrate cognitive intelligence." ... For the "Internet of Things" to thrive, all it needs is for all devices to get…
In ReadWrite: A very broad classification of these kinds of data. Good as a starting point. Also relates to data as an asset value. Which relates to analytics that it can be analyzed with, and how it can be combined with…
The British Museum wants help breaking a code on a 13th-century sword....
Google Puts Exec Behind ‘Buy Button’ in Charge of Express Delivery Service. Making it as easy as possible to complete the transaction. See also what Pinterest is doing to add buttons to make buying easier. Also, see Amazon's…
A warehouse explosion in the city of Tianjin has killed 17 people, resulting in a shutdown of the nearby Tianhe-1A supercomputer. Not to be confused with the Tianhe-2 system (currently ranked at #1), the 2.57 Petaflop Tianhe…
From Bernard Marr," ... In a meeting with Airbus last week I found out that their forthcoming A380-1000 – the supersized airliner capable of carrying up to 1,000 passengers – will be equipped with 10,000 sensors in each wing.…
Today Fraunhofer ITWM and ThinkParQ announced a new major release of the BeeGFS parallel file system. Now available as a free download, BeeGFS version 2015.03-r1 comes with enterprise features including built-in storage server…
Today Colfax International announced free online workshops on parallel programming and optimization for Intel architecture, including Intel Xeon processors and Intel Xeon Phi coprocessors. "The Hands-on Workshop (HOW) series …
This video summarizes the recent Summer of HPC training week in Barcelona. Summer of HPC is a PRACE program that offers summer placements at HPC centers across Europe to late stage undergraduates and early stage postgraduate …
The Embree kernel approach, using the Intel Xeon Phi coprocessor is applicable to many situations. The implementation can be tuned to the hardware available, using different vector widths and workloads per ray. With a flexible…
Moshe Vardi asks a provocative question in Windows on Theory and CACM: "Why doesn't ACM have a SIG for Theoretical Computer Science?" The reaction of myself and many of my fellow Americans is the question has a false premise. …
Good operational security is hard, and often uses manual technologies: Investigators described how Messina Denaro, 53, disdains telecommunications and relies on handwritten notes, or "pizzini,'" to relay orders. The notes were…