acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Interview: Hot Interconnects Conference Returns to Santa Clara Aug 26-28
From insideHPC

Interview: Hot Interconnects Conference Returns to Santa Clara Aug 26-28

"This year we have a specific focus on the latest advances in different areas of networks, showcasing some of the latest and greatest next generation networking...

KTH Presents: Building Virtual Product Modeling for Scania
From insideHPC

KTH Presents: Building Virtual Product Modeling for Scania

Daniel Ahlin from KTH (Sweden's Royal Institute of Technology) presented this talk at the DDN User Group at ISC 2015. "The PDC Center for High Performance Computing...

Panasas Moves Forward with ActiveStor 18 Hybrid Scale-out NAS Appliance
From insideHPC

Panasas Moves Forward with ActiveStor 18 Hybrid Scale-out NAS Appliance

"By adopting 8 terabyte drive technology, ActiveStor 18 increases scalability to more than 20 petabytes and 200 gigabytes per second. According to Panasas, ActiveStor...

USACM Celebrates 25th Anniversary of the Americans with Disabilities Act
From U.S. Public Policy Committee of the ACM

USACM Celebrates 25th Anniversary of the Americans with Disabilities Act

On July 26, 2015, we will celebrate the 25th anniversary of the signing of the Americans with Disabilities Act (ADA). The ACM U.S. Public Policy Council joins the...

Users Accelerate their Own Code at EuroHack
From insideHPC

Users Accelerate their Own Code at EuroHack

"Despite what the name “EuroHack” may lead people to believe, no external systems were hacked during the EuroHack workshop in Lugano. In actual fact, the aim of...

CoolIT Systems Innovates with Liquid Cooling at ISC 2015
From insideHPC

CoolIT Systems Innovates with Liquid Cooling at ISC 2015

"Power savings, increased rack density and high performance are the three key advantages of using liquid cooling. CoolIT Systems offers options for data centers...

Quantum Chemistry at Scale
From insideHPC

Quantum Chemistry at Scale

"Applications can be tuned to use both the Intel Xeon and the Intel Xeon Phi simultaneously, without modifying the code to just run on the coprocessor. Using aQuantum...

Vehicle Hacking and Security
From The Eponymous Pickle

Vehicle Hacking and Security

This came to my mind as I had a new OS update put into my one year old car.  What are the dangers here?  I have no control of anti hacking or anti malware capabilities...

Unilever Partners with Alibaba
From The Eponymous Pickle

Unilever Partners with Alibaba

The breadth of the interaction as stated is interesting.   China is the big future CPG market.  I attended a meeting yesterday that made much of the China mobile...

From Computational Complexity

New Proof of the Isolation Lemma

The isolation lemma of Mulmuley, Vazirani and Vazirani says that if we take random weights for elements in a set system, with high probability there will be a unique...

Gamifying Videos
From The Eponymous Pickle

Gamifying Videos

Interesting simple approach, have not tried:  parWinr" ... Gamify your video – in minutes! ... parWinr’s innovative software lets you quickly turn any video asset...

Remotely Hacking a Car While It's Driving
From Schneier on Security

Remotely Hacking a Car While It's Driving

This is a big deal. Hackers can remotely hack the Uconnect system in cars just by knowing the car's IP address. They can disable the brakes, turn on the AC, blast...

REX Computing Raises $1.25M to Develop Neo Chip
From insideHPC

REX Computing Raises $1.25M to Develop Neo Chip

Today REX Computing announced that it has raised $1.25 million in seed funding led by FF Science, a vehicle of Founders Fund that invests in companies pushing the...

Organizational Doxing of Ashley Madison
From Schneier on Security

Organizational Doxing of Ashley Madison

The -- depending on who is doing the reporting -- cheating, affair, adultery, or infidelity site Ashley Madison has been hacked. The hackers are threatening to...

Malcolm Gladwell on Competing Security Models
From Schneier on Security

Malcolm Gladwell on Competing Security Models

In this essay/review of a book on UK intelligence officer and Soviet spy Kim Philby, Malcolm Gladwell makes this interesting observation: Here we have two very...

Keynotes and Inspirations at Foundations of Digital Games 2015
From The Female Perspective of Computer Science

Keynotes and Inspirations at Foundations of Digital Games 2015

I had a great time at this year's Foundations of Digital Games, but it was the talks and the hallway track with narrative folks that really left me inspired.  In...

NTIA Invites Participation in a New Cybersecurity Multistakeholder Process on Vulnerability Research Disclosure
From U.S. Public Policy Committee of the ACM

NTIA Invites Participation in a New Cybersecurity Multistakeholder Process on Vulnerability Research Disclosure

The National Telecommunications and Information Administration (NTIA) invites businesses, organizations, and individuals to participate in a new cybersecurity multistakeholder...

Why We Don’t Know Know-How
From Blog@Ubiquity

Why We Don’t Know Know-How

In pursuit of scientific understanding, too often we forget our level of know-how is far more important than our know-what. The post Why We Don’t Know Know-HowBLOG...

Mastering Brand Building in the Third Decade of Digital
From The Eponymous Pickle

Mastering Brand Building in the Third Decade of Digital

Today at: Mastering Brand Building in the Third Decade of DigitalSee the ongoing Signal PG (Procter & Gamble) conference tweeted at #SignalPGMore to follow.

Globalization and Manufacturing Location Clusters
From The Eponymous Pickle

Globalization and Manufacturing Location Clusters

Not unexpected, Location and proximity can still matter.   Perhaps less with the emergence of 3D printing?Globalization Hasn’t Killed the Manufacturing ClusterIn...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account