acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

ISC 2015 Breaks Attendance Record
From insideHPC

ISC 2015 Breaks Attendance Record

ISC 2015 concluded its 30th meeting last week in Germany, drawing a record 2,846 attendees from 56 countries. In total 153 organizations took part in the conference...

Strategies for Reaching the Chinese Consumer
From The Eponymous Pickle

Strategies for Reaching the Chinese Consumer

In the HBR:" ... Slowing Chinese economic growth coupled with confidence-sapping tumult on the stock market have set alarm bells ringing at companies about their...

Fujitsu Teams with Asetek for Cool-Central Primergy Systems
From insideHPC

Fujitsu Teams with Asetek for Cool-Central Primergy Systems

Last week at ISC 2015, Fujitsu rolled out new Primergy systems using the company's Cool-Central Liquid Cooling Solution. Based on Asetek technology, Cool-Central...

Connecting Employees and Customer Experience
From The Eponymous Pickle

Connecting Employees and Customer Experience

In CWorld: " ... Improve outcomes by connecting the employee and customer experience ... " Absolutely, but what if your employees are several steps away from the...

Video: Pathscale Compilers Power Cavium ThunderX Processor
From insideHPC

Video: Pathscale Compilers Power Cavium ThunderX Processor

The EKOPath compiler for High Performance Computing supports advanced loop optimizations, SIMD vectorization and many-core support. This release of EKOPath includes...

Tracking your Location Over Time
From The Eponymous Pickle

Tracking your Location Over Time

We could have used this for a plant maintenance application that required documenting location, issues and changes.  Thinking of other related applicationsTracking...

From Gödel's Lost Letter and P=NP

Alberto Apostolico, 1948–2015

Our condolences on the loss of a colleague Cropped from TCS journal source Alberto Apostolico was a Professor in the Georgia Tech College of Computing. He passed...

Preventing Book Theft in the Middle Ages
From Schneier on Security

Preventing Book Theft in the Middle Ages

Interesting article....

NTIA Invites Participation in a New Multistakeholder Process on Drones
From U.S. Public Policy Committee of the ACM

NTIA Invites Participation in a New Multistakeholder Process on Drones

The National Telecommunications and Information Administration (NTIA) invites businesses, organizations, and individuals to participate in a new multistakeholder...

Eurotech QPACE2 Supercomputer Ranks 379 on TOP500
From insideHPC

Eurotech QPACE2 Supercomputer Ranks 379 on TOP500

Last week at ISC 2015, Eurotech announced that the company has completed the installation of a new supercomputer prototype at the University of Regensburg. With...

A&P is Gone
From The Eponymous Pickle

A&P is Gone

One of the oldest and once largest US grocery store chains, with origins as far back as 1859, founded in NYC,  is in the final parts of  bankruptcy. ApparentlyThe...

How ethnographic research helped transform a US paint company
From Putting People First

How ethnographic research helped transform a US paint company

Almost all business leaders now acknowledge that they would love to engage in the deep learning that long-term customer observation can foster, but in practiceHow...

The student experience and the future of the library
From Putting People First

The student experience and the future of the library

Libraries have moved from being the location for search, access and advice to playing a much smaller role within a much larger information landscape, writes a researcher...

Teradata Aster Videos on Advanced Analytics
From The Eponymous Pickle

Teradata Aster Videos on Advanced Analytics

Links to all videos  by John Thurma to document Teradata Aster analytics,.   Useful for training in this space.  He writes:  " ... Please see the following list...

Integrating Supply and Demand
From The Eponymous Pickle

Integrating Supply and Demand

In the summer issue of SloanMIT:  This requires membership or sign up registration for the full article.Integrating Supply and Demand" ... At many companies, sales...

Stolen Data Phones Home
From The Eponymous Pickle

Stolen Data Phones Home

In CSOonline:  " ... Digital ‘watermarking’ won’t prevent your data from being stolen, but it can let you find out about it much more quickly than the average of...

Charleston Teach Meet Day Two
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Charleston Teach Meet Day Two

Today was the second day of a creative mini conference of educators. You can read about Charleston Teach Meet Day One here. We started off today a little differently...

U.S. Department of Commerce Seeks Public Comments on Proposed Export Definitions Relevant to Cloud and Other Digital Services
From U.S. Public Policy Committee of the ACM

U.S. Department of Commerce Seeks Public Comments on Proposed Export Definitions Relevant to Cloud and Other Digital Services

The U.S. Department of Commerce’s Bureau of Industry and Security is accepting public comments on proposed revisions to definitions in the Export Administration...

From Computational Complexity

Hartley Rogers, Author of the first Textbook on Recursion Theory, passes away

Hartley Rogers Jr passed away on July 17, 2015 (last week Friday as I write this).He was 89 and passed peacefully.For our community Rogers is probably best known...

Cycle Computing Joins Cloud Native Computing Foundation
From insideHPC

Cycle Computing Joins Cloud Native Computing Foundation

Today Cycle Computing announced its participation in the Cloud Native Computing Foundation. Through its membership, Cycle Computing will enable enterprise users...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account