acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Lenovo Powers Phoenix Supercomputer at University of Adelaide
From insideHPC

Lenovo Powers Phoenix Supercomputer at University of Adelaide

Researchers at the University of Adelaide will soon have access to a new Lenovo supercomputer named "Phoenix" with as much as 30 times more computing power than...

How Intel Worked with the DEEP Consortium to Challenge Amdahl’s Law
From insideHPC

How Intel Worked with the DEEP Consortium to Challenge Amdahl’s Law

Funded by the European Commission in 2011, the DEEP project was the brainchild of scientists and researchers at the Jülich Supercomputing Centre (JSC) in Germany...

Cryptography Is Harder Than It Looks
From Schneier on Security

Cryptography Is Harder Than It Looks

Writing a magazine column is always an exercise in time travel. I'm writing these words in early December. You're reading them in February. This means anything...

Intrinsic Vectorization for Intel Xeon Phi
From insideHPC

Intrinsic Vectorization for Intel Xeon Phi

"It is important to be able to express algorithms and then the coding in an architecture independent manner to gain maximum portability. Vectorization, using the...

A Look at Some New Dimensions of Fintech
From The Eponymous Pickle

A Look at Some New Dimensions of Fintech

Just sent to me by a Fintech contact, made me think:Lots of places for innovation to play out in financial/insurance space.  Consider insurance defined as a means...

Bill Gates on Quantum Computing in Cloud
From The Eponymous Pickle

Bill Gates on Quantum Computing in Cloud

In CACM: Quite an interesting view of this potential next step to computing.  Have followed this for a long time, see the tag below.  Including links to overviews...

Annedroids: A STEM Show with a Positive Impact on Girls
From The Female Perspective of Computer Science

Annedroids: A STEM Show with a Positive Impact on Girls

Some time ago, I shared info about a STEM show that premiered on TVO back in 2014: Annedroids. Recently, the show's PR specialist followed up with me to share some...

Google is Sharing Cloud AI
From The Eponymous Pickle

Google is Sharing Cloud AI

Nice to see this happen, As always like to see demonstrations as to how it can be practically applied in the enterprise.   Will be examining this.   In Wired: Google...

FBI's Cyber Most Wanted List
From Schneier on Security

FBI's Cyber Most Wanted List

The FBI just added two members of the Syrian Electronic Army to its cyber most-wanted list. I had no idea that the FBI had a cyber most-wanted list....

Detecting Funny
From The Eponymous Pickle

Detecting Funny

The emergence of a New Yorker crowdsourcing system that tries to determine, with interaction and algorithm, what is funny.  In CNet.  Seems this could also be linked...

MicroInsurance
From The Eponymous Pickle

MicroInsurance

This and commentary on it made me think.    Recently dealt with a related  insurance problem: "  Explore New Kinds Of Insurance ... Customers and businesses are...

Microsoft and Lowes with Augmented Reality
From The Eponymous Pickle

Microsoft and Lowes with Augmented Reality

In the Forrester Blog:  Augmented retailing, it might be called.  Is it enough of an engagement factor to drive sales?  DIY retail has often been mentioned as a...

Great Innovative Idea- Indefinite Scalability for Living Computation
From The Computing Community Consortium Blog

Great Innovative Idea- Indefinite Scalability for Living Computation

The following Great Innovative Idea is from David H. Ackley from the University of New Mexico. His Indefinite Scalability for Living Computation paper was one of...

Your Smartphone Can Kill You
From Blog@Ubiquity

Your Smartphone Can Kill You

Niall McCarthy of Statista.com uses data from Priceonomics to define a new category of accidental death by smart phone—the “selfie-fatality.” Forty-nine peopleRead...

The Maturing of the Data Lake
From The Eponymous Pickle

The Maturing of the Data Lake

Very good introductory article in CACM:     Lots of players and directions mentioned.  Note the mention of needing 'loosely coupled data' to be better understood...

Co-Design Architecture: Emergence of New Co-Processors
From insideHPC

Co-Design Architecture: Emergence of New Co-Processors

"High performance computing has begun scaling beyond Petaflop performance towards the Exaflop mark. One of the major concerns throughout the development towardCo...

1981 US Document on Encryption Policy
From Schneier on Security

1981 US Document on Encryption Policy

This was newly released under FOIA at my request: Victor C. Williams, Jr., Donn B. Parker, and Charles C. Wood, "Impacts of Federal Policy Options for Nonmilitary...

A Quick Look at the 2016 Ethernet Roadmap
From insideHPC

A Quick Look at the 2016 Ethernet Roadmap

Today the Ethernet Alliance unveiled its 2016 Ethernet Roadmap at OFC 2016. The roadmap highlights Ethernet’s breadth of speeds, current and next-generation modules...

Online Cyber Security Competitions
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Online Cyber Security Competitions

Computer security has been in the news a lot lately with all the talk of the FBI and Apple going at it in court. Students are interested as well. In the last 24...

Supercomputing Extreme Weather Events and Climate Change
From insideHPC

Supercomputing Extreme Weather Events and Climate Change

A recent study conducted by the Barcelona Supercomputer Center suggests that calibrated model ensembles improve the trustworthiness of climate event attribution...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account