acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Video: SSD – The Transition from 2D to 3D NAND
From insideHPC

Video: SSD – The Transition from 2D to 3D NAND

In this video from the Open Compute Summit, Walter Hinton, Senior Global Director of Enterprise & Client Compute Solutions Marketing at Western Digital presents...

IoT Teddy Bear Leaked Personal Audio Recordings
From Schneier on Security

IoT Teddy Bear Leaked Personal Audio Recordings

CloudPets are an Internet-connected stuffed animals that allow children and parents to send each other voice messages. Last week, we learned that Spiral Toys had...

Data Mining and Advertising Targets
From The Eponymous Pickle

Data Mining and Advertising Targets

How Data Mining Can Help Advertisers Hit Their Targets?Wharton's Shawndra Hill discusses her research on TV ads and online search.Podcast and text: Shawndra Hill...

PBS Works User Group comes to Las Vegas May 22-25
From insideHPC

PBS Works User Group comes to Las Vegas May 22-25

Altair will host the PBS Works User Group May 22-25 in Las Vegas. This four-day event (including 2 days of user presentations, round table discussions and surrounded...

Day-Long Deep Learning Track Comes to ISC 2017
From insideHPC

Day-Long Deep Learning Track Comes to ISC 2017

Today ISC 2017 announced a day-long Deep Learning track on June 21 as part of its technical program. The full conference takes place June 18-21 in Frankfurt, Germany...

Flatiron Institute to Repurpose Gordon Supercomputer
From insideHPC

Flatiron Institute to Repurpose Gordon Supercomputer

The majority of SDSC’s data-intensive Gordon supercomputer will be used by Simons for ongoing research following completion of the system’s tenure as an NSF resource...

Intel Xeon Phi Memory Mode Programming (MCDRAM) in a Nutshell
From insideHPC

Intel Xeon Phi Memory Mode Programming (MCDRAM) in a Nutshell

'In this article, James Reinders discusses one of the “mode” options that Intel Xeon Phi processors have to offer unprecedented configurability: memory modes. For...

Remote Repair Challenges in Orbit
From The Eponymous Pickle

Remote Repair Challenges in Orbit

In IEEE Spectrum, quite a detailed article.    Requires making satellites in standard ways and thus easier to repair.  The ultimate example of this.  Much to learn...

Turn on HTTPS
From The Eponymous Pickle

Turn on HTTPS

Turn on HTTPS encryption.   A worthwhile security step.  This blog is using it.   No negatives to its use anymore.   More at the link.It's time to turn on HTTPS...

France Abandons Plans for Internet Voting
From Schneier on Security

France Abandons Plans for Internet Voting

Some good election security news for a change: France is dropping its plans for remote Internet voting, because it's concerned about hacking....

Lowes Using AR to Show How
From The Eponymous Pickle

Lowes Using AR to Show How

Lowes is always doing interesting tech things. On the surface of it sounds like a good idea.  But does visual understanding and experience equal physical skill?...

Time passes, and we lose friends
From CERIAS Blog

Time passes, and we lose friends

[Note: update added March 15, 2017] 2017 has gotten off to a bad start for the security community…and to me, personally. First, we lost Kevin Ziese. I met Kevin...

Time passes, and we lose friends
From CERIAS Blog

Time passes, and we lose friends

[Note: update added March 15] 2017 has gotten off to a bad start for the security community…and to me, personally. First, we lost Kevin Ziese. I met Kevin overCERIAS...

Time passes, and we lose friends
From CERIAS Blog

Time passes, and we lose friends

[Note: update added March 15] 2017 has gotten off to a bad start for the security community…and to me, personally. First, we lost Kevin Ziese. I met Kevin overCERIAS...

Time passes, and we lose friends
From CERIAS Blog

Time passes, and we lose friends

2017 has gotten off to a bad start for the security community…and to me, personally. First, we lost Kevin Ziese. I met Kevin over two decades ago, when he was involved...

Time passes, and we lose friends
From CERIAS Blog

Time passes, and we lose friends

[Note: update added March 15] 2017 has gotten off to a bad start for the security community…and to me, personally. First, we lost Kevin Ziese. I met Kevin overCERIAS...

Time passes, and we lose friends
From CERIAS Blog

Time passes, and we lose friends

[Note: update added March 15] 2017 has gotten off to a bad start for the security community…and to me, personally. First, we lost Kevin Ziese. I met Kevin overCERIAS...

Why We Need Exascale Computing
From ACM on Huffington Post

Why We Need Exascale Computing

By Paul Messina, Exascale Project Director, Argonne National Laboratory Exascale computing is the label we use for the next

Digital Security Exchange: Security for High-Risk Communities
From Schneier on Security

Digital Security Exchange: Security for High-Risk Communities

I am part of this very interesting project: For many users, blog posts on how to install Signal, massive guides to protecting your digital privacy, and broad statements...

NY Times Article: It’s Possible to Hack a Phone With Sound Waves, Researchers Show
From The Computing Community Consortium Blog

NY Times Article: It’s Possible to Hack a Phone With Sound Waves, Researchers Show

The New York Times recently released an article called It’s Possible to Hack a Phone With Sound Waves, Researchers Show, which highlights CCC Council Member Kevin...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account