acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Best Practices – Large Scale Multiphysics
From insideHPC

Best Practices – Large Scale Multiphysics

Frank Ham from Cascade Technologies presented this talk at the Stanford HPC Conference. "A spin-off of the Center for Turbulence Research at Stanford University...

De-Anonymizing Browser History Using Social-Network Data
From Schneier on Security

De-Anonymizing Browser History Using Social-Network Data

Interesting research: "De-anonymizing Web Browsing Data with Social Networks": Abstract: Can online trackers and network adversaries de-anonymize web browsing data...

CCC White Paper- Advances in Artificial Intelligence Require Progress Across all of Computer Science
From The Computing Community Consortium Blog

CCC White Paper- Advances in Artificial Intelligence Require Progress Across all of Computer Science

The following is a guest blog post by past CCC Chair Greg Hager from Johns Hopkins University.  Artificial intelligence (AI) has emerged into the public view as...

NSF WATCH Talk- Industry Leaders and Academic Privacy Researchers: Adversaries or Partners?
From The Computing Community Consortium Blog

NSF WATCH Talk- Industry Leaders and Academic Privacy Researchers: Adversaries or Partners?

The next WATCH talk, called Industry Leaders and Academic Privacy Researchers: Adversaries or Partners? is Thursday, February 16th, from Noon-1pm EST. The presenter...

War Gaming for Training
From The Eponymous Pickle

War Gaming for Training

Like the idea, we never made it formal, but tested the concept driven by competition.Is your team’s new engineer ready to take on-call? Use wargames for training...

Tutorial: Towards Exascale Computing with Fortran 2015
From insideHPC

Tutorial: Towards Exascale Computing with Fortran 2015

"This tutorial will present several features that the draft Fortran 2015 standard introduces to meet challenges that are expected to dominate massively parallel...

Allinea Updates Code Optimization Tools Across Platforms
From insideHPC

Allinea Updates Code Optimization Tools Across Platforms

Today Allinea Software launched the first update to its well-established toolset for debugging, profiling and optimizing high performance code since being acquired...

New Marketing Models
From The Eponymous Pickle

New Marketing Models

Marketing, Mr Clean and Shifting Models  (Excerpt, read the whole thing)P&G Super Bowl Ads Point to a Shift in the Marketing Model  by Bob GilbreathCo-Founder &...

Podcast: IDC’s Steve Conway on China’s New Plan for Exascale
From insideHPC

Podcast: IDC’s Steve Conway on China’s New Plan for Exascale

“China and the United States have been in the race to develop the most capable supercomputer. China has announced that its exascale computer could be released sooner...

Video: Trish Kamkroger on her New Mission at Intel
From insideHPC

Video: Trish Kamkroger on her New Mission at Intel

In this video from KAUST Live: Patricia Damkroger discusses her new role as Vice President, Data Center Group and General Manager, Technical Computing Initiative...

CoolIT Systems Issued U.S. Patent for Modular Heat-Transfer Solutions
From insideHPC

CoolIT Systems Issued U.S. Patent for Modular Heat-Transfer Solutions

“U.S. Patent 9,496,200 protects the invention of utilizing a modular, building block approach for datacenter cooling with direct contact liquid cooling,” said Geoff...

Intel Releases Optimized Python for HPC
From insideHPC

Intel Releases Optimized Python for HPC

"By implementing popular Python packages such as NumPy, SciPy, scikit-learn, to call the Intel Math Kernel Library (Intel MKL) and the Intel Data Analytics Acceleration...

Security and Privacy Guidelines for the Internet of Things
From Schneier on Security

Security and Privacy Guidelines for the Internet of Things

Lately, I have been collecting IoT security and privacy guidelines. Here's everything I've found: "Internet of Things (IoT) Broadband Internet Technical Advisory...

From Computational Complexity

The Dichotomy Conjecture

Arash Rafiey, Jeff Kinne and Tomás Feder settle the Feder-Vardi dichotomy conjecture in their paper Dichotomy for Digraph Homomorphism Problems. Jeff Kinne is my...

IBM Launches Cognitive Computing Hardware
From The Eponymous Pickle

IBM Launches Cognitive Computing Hardware

Ultimately faster and tailored hardware will be required for machine learning.In ZDNet:IBM launches cognitive computing hardware unit: Enter the Watson, Power 9...

Gaussian Processes for Modeling with Uncertainty
From The Eponymous Pickle

Gaussian Processes for Modeling with Uncertainty

Gaussian Processes, like Bayesian methods introduce natural uncertainty to modeling.   And provide more transparency than deep learning neural nets to the models...

Algorithm vs Data
From The Eponymous Pickle

Algorithm vs Data

On the use of data and algorithms to predict crime in the US data.  Extensive, largely non technical article.It's Not the Algorithm, It's the Data  By Keith Kirkpatrick...

NSF CISE Distinguished Lecture- Emerging Role of Mobile Phones in Health
From The Computing Community Consortium Blog

NSF CISE Distinguished Lecture- Emerging Role of Mobile Phones in Health

The National Science Foundation (NSF) Directorate for Computer and Information Science and Engineering (CISE) is pleased to announce a distinguished lecture on...

Do-It-Yourself Online Privacy/Safety Guide
From Schneier on Security

Do-It-Yourself Online Privacy/Safety Guide

This online safety guide was written for people concerned about being tracked and stalked online. It's a good resource....

Outlier Detection in Time Data
From The Eponymous Pickle

Outlier Detection in Time Data

Outlier detection and analysis is an important topic for any kind of data.  Outliers, depending on their context, can be useful, or dangerous in the development...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account