acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Hardware Bit-Flipping Attacks in Practice
From Schneier on Security

Hardware Bit-Flipping Attacks in Practice

A year and a half ago, I wrote about hardware bit-flipping attacks, which were then largely theoretical. Now, they can be used to root Android phones: The breakthrough...

Google Fiber Pauses
From The Eponymous Pickle

Google Fiber Pauses

Many think they have stopped this moonshot, and they say that in their official blog in a rather round about way.  Was harder than they thought.  In the Google...

How Do We Enhance Human Intelligence?
From The Eponymous Pickle

How Do We Enhance Human Intelligence?

Where is Human Intelligence (HI) going with augmentation?   Been trying for a long time, still quite a way to go.   'Starting to identify', is a good embedded phrase...

Supershoppers
From The Eponymous Pickle

Supershoppers

Google takes a look at the characteristics of supershoppers, with interesting statistics.

Madefire Telling Stories
From The Eponymous Pickle

Madefire Telling Stories

Brought to my attention at the recent Microsoft announcements regarding 3D image delivery.MadefireA New Storytelling EraExperience StoriesMadefire is undertaking...

SGI UV Powers Romanian Aerospace Agency
From insideHPC

SGI UV Powers Romanian Aerospace Agency

The National Institute of Aerospace Research in Romania will power its scientific and aeronautical research program with a new SGI UV system. "This is the second...

Will Deep Learning Scale to Supercomputers?
From insideHPC

Will Deep Learning Scale to Supercomputers?

Are supercomputers practical for Deep Learning applications? Over at the Allinea Blog, Mark O'Connor writes that a recent experiment with machine learning optimization...

New AVX-512 Instructions Boost Performance on Intel Xeon Phi
From insideHPC

New AVX-512 Instructions Boost Performance on Intel Xeon Phi

While there have been previous generations of AVX instructions, the AVX-512 instructions can significantly assist the performance of HPC applications. "The newNew...

OpenPOWER Gains Momentum in Europe
From insideHPC

OpenPOWER Gains Momentum in Europe

Growing momentum was the watchword at the inaugural OpenPOWER European Summit this week, where the OpenPOWER Foundation made a series of announcements today detailing...

It’s Here: The Print ‘n Fly Guide to SC16 in Salt Lake City
From insideHPC

It’s Here: The Print ‘n Fly Guide to SC16 in Salt Lake City

At insideHPC, are very pleased to publish the Print ‘n Fly Guide to SC16 in Salt Lake City. We designed this Guide to be an in-flight magazine custom tailored for...

Supply Chain at McCormick
From The Eponymous Pickle

Supply Chain at McCormick

On supply chain and planning at McCormick.   Not an uncommon approach.  More in the article:In Consumergoods: " ... Fast-forward to today, and ensuring McCormick...

From Computational Complexity

Get Ready

My daughters, now in college, never knew a time when they couldn't communicate with anyone instantaneously. Molly, now 18, takes pride having the same birth year...

How Powell's and Podesta's E-mail Accounts Were Hacked
From Schneier on Security

How Powell's and Podesta's E-mail Accounts Were Hacked

It was a phishing attack....

Why is learning Binary hard?
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Why is learning Binary hard?

Why is learning Binary (and various number bases) so hard for students? I don't remember how exactly there were taught to me except that it was in either the 5th...

Smarter Health Devices
From The Eponymous Pickle

Smarter Health Devices

An example of how predictive weather data might be used to make devices smarter.IBM Is Using Weather Data To Help Predict Asthma AttacksIBM is entering into the...

Hidden Treasures of Procurement
From The Eponymous Pickle

Hidden Treasures of Procurement

Was involved in procurement at a number of different levels in the enterprise.  This Bain & Co article on the topic.   It is a gold mine of possibilities.    AUnearthing...

NIH 2 New BRAIN Requests for Applications
From The Computing Community Consortium Blog

NIH 2 New BRAIN Requests for Applications

The National Institute of Health (NIH) just announced 2 new BRAIN Initiative Requests for Applications (RFAs). The applications are not just limited to neuroscientists...

A Conversation with David Bunnell
From The Eponymous Pickle

A Conversation with David Bunnell

A visionary of the personal computer.  I remember reading of his work long ago.David Bunnell (1947-2016): A RemembrancePC MEMORIES, HOW I CREATED THE PCA Conversation...

OPM Attack
From Schneier on Security

OPM Attack

Good long article on the 2015 attack against the US Office of Personnel Management....

Judea Pearl on Engines of Evidence
From The Eponymous Pickle

Judea Pearl on Engines of Evidence

A favorite researcher on the topic.  How do we understand how evidence models results?  In the Edge: Engines of Evidence,  A Conversation With Judea PearlA newThe...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account