Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

July 2015


From insideHPC

Interview: Hot Interconnects Conference Returns to Santa Clara Aug 26-28

Interview: Hot Interconnects Conference Returns to Santa Clara Aug 26-28

"This year we have a specific focus on the latest advances in different areas of networks, showcasing some of the latest and greatest next generation networking hardware. Our focus on Data Center vs. HPC networks will allow for


From insideHPC

KTH Presents: Building Virtual Product Modeling for Scania

KTH Presents: Building Virtual Product Modeling for Scania

Daniel Ahlin from KTH (Sweden's Royal Institute of Technology) presented this talk at the DDN User Group at ISC 2015. "The PDC Center for High Performance Computing at the KTH Royal Institute of Technology provides leading HPC


From insideHPC

Panasas Moves Forward with ActiveStor 18 Hybrid Scale-out NAS Appliance

Panasas Moves Forward with ActiveStor 18 Hybrid Scale-out NAS Appliance

"By adopting 8 terabyte drive technology, ActiveStor 18 increases scalability to more than 20 petabytes and 200 gigabytes per second. According to Panasas, ActiveStor 18 also offers increased CPU power and twice the storage cache


From U.S. Public Policy Committee of the ACM

USACM Celebrates 25th Anniversary of the Americans with Disabilities Act

USACM Celebrates 25th Anniversary of the Americans with Disabilities Act

On July 26, 2015, we will celebrate the 25th anniversary of the signing of the Americans with Disabilities Act (ADA). The ACM U.S. Public Policy Council joins the country’s celebration of the 25th anniversary of the ADA, a landmark


From insideHPC

Users Accelerate their Own Code at EuroHack

Users Accelerate their Own Code at EuroHack

"Despite what the name “EuroHack” may lead people to believe, no external systems were hacked during the EuroHack workshop in Lugano. In actual fact, the aim of the event was for experts to design computer codes that would exploit


From insideHPC

CoolIT Systems Innovates with Liquid Cooling at ISC 2015

CoolIT Systems Innovates with Liquid Cooling at ISC 2015

"Power savings, increased rack density and high performance are the three key advantages of using liquid cooling. CoolIT Systems offers options for data centers with or without facility water hook up. Any server in any rack can


From insideHPC

Quantum Chemistry at Scale

Quantum Chemistry at Scale

"Applications can be tuned to use both the Intel Xeon and the Intel Xeon Phi simultaneously, without modifying the code to just run on the coprocessor. Using a number of software tools from Intel, performance of a coupled cluster


From The Eponymous Pickle

Vehicle Hacking and Security

Vehicle Hacking and Security

This came to my mind as I had a new OS update put into my one year old car.  What are the dangers here?  I have no control of anti hacking or anti malware capabilities on its systems.  I did get an App with the car, but thatHacker


From The Eponymous Pickle

Unilever Partners with Alibaba

Unilever Partners with Alibaba

The breadth of the interaction as stated is interesting.   China is the big future CPG market.  I attended a meeting yesterday that made much of the China mobile market where this was not mentioned. Unilever Partners with Alibaba


From Computational Complexity

New Proof of the Isolation Lemma

The isolation lemma of Mulmuley, Vazirani and Vazirani says that if we take random weights for elements in a set system, with high probability there will be a unique set of minimum weight. Mulmuley et al. use the isolation lemma


From The Eponymous Pickle

Gamifying Videos

Gamifying Videos

Interesting simple approach, have not tried:  parWinr" ... Gamify your video – in minutes! ... parWinr’s innovative software lets you quickly turn any video asset into an online game,providing enhanced engagement and generating


From Schneier on Security

Remotely Hacking a Car While It's Driving

Remotely Hacking a Car While It's Driving

This is a big deal. Hackers can remotely hack the Uconnect system in cars just by knowing the car's IP address. They can disable the brakes, turn on the AC, blast music, and disable the transmission: The attack tools Miller and


From insideHPC

REX Computing Raises $1.25M to Develop Neo Chip

REX Computing Raises $1.25M to Develop Neo Chip

Today REX Computing announced that it has raised $1.25 million in seed funding led by FF Science, a vehicle of Founders Fund that invests in companies pushing the boundaries of difficult scientific and engineering challenges.


From Schneier on Security

Organizational Doxing of Ashley Madison

Organizational Doxing of Ashley Madison

The -- depending on who is doing the reporting -- cheating, affair, adultery, or infidelity site Ashley Madison has been hacked. The hackers are threatening to expose all of the company's documents, including internal e-mails


From Schneier on Security

Malcolm Gladwell on Competing Security Models

Malcolm Gladwell on Competing Security Models

In this essay/review of a book on UK intelligence officer and Soviet spy Kim Philby, Malcolm Gladwell makes this interesting observation: Here we have two very different security models. The Philby-era model erred on the side


From The Female Perspective of Computer Science

Keynotes and Inspirations at Foundations of Digital Games 2015

Keynotes and Inspirations at Foundations of Digital Games 2015

I had a great time at this year's Foundations of Digital Games, but it was the talks and the hallway track with narrative folks that really left me inspired.  In this post I'll summarize the first three keynotes and some inspiration


From U.S. Public Policy Committee of the ACM

NTIA Invites Participation in a New Cybersecurity Multistakeholder Process on Vulnerability Research Disclosure

NTIA Invites Participation in a New Cybersecurity Multistakeholder Process on Vulnerability Research Disclosure

The National Telecommunications and Information Administration (NTIA) invites businesses, organizations, and individuals to participate in a new cybersecurity multistakeholder process on vulnerability research disclosure. The


From Blog@Ubiquity

Why We Don’t Know Know-How

Why We Don’t Know Know-How

In pursuit of scientific understanding, too often we forget our level of know-how is far more important than our know-what.

The post Why We Don’t Know Know-How appeared first on BLOG@UBIQUITY.


From The Eponymous Pickle

Mastering Brand Building in the Third Decade of Digital

Mastering Brand Building in the Third Decade of Digital

Today at: Mastering Brand Building in the Third Decade of DigitalSee the ongoing Signal PG (Procter & Gamble) conference tweeted at #SignalPGMore to follow.


From The Eponymous Pickle

Globalization and Manufacturing Location Clusters

Globalization and Manufacturing Location Clusters

Not unexpected, Location and proximity can still matter.   Perhaps less with the emergence of 3D printing?Globalization Hasn’t Killed the Manufacturing ClusterIn today's global markets, companies have many choices to procure


From insideHPC

MVAPICH User Group Returns to Ohio Aug. 19-21

MVAPICH User Group Returns to Ohio Aug. 19-21

The MVAPICH team has posted their agenda for the 3rd annual MVAPICH User Group (MUG) meeting. Sponsored by Mellanox and the Ohio Supercomputer Center, MUG will take place August 19-21 in Columbus, Ohio, USA.

The post MVAPICHinsideHPC


From insideHPC

Why Purdue Has Been with Student Cluster Competitions from the Start

Why Purdue Has Been with Student Cluster Competitions from the Start

In this video, Purdue's Dr. Gerry McCartney talks with Dan Olds about the University's participation in the Student Cluster Competitions. "We want to make this commitment to our students. They enjoy it. We enjoy having them represent


From The Eponymous Pickle

AI and Human Sketch Recognition

AI and Human Sketch Recognition

Also an application we considered, could you get an AI to recognize human created sketches, say in notes about a meeting, or from consumers giving impressions of your new products in use contexts?   Here a system excelling in


From insideHPC

ISC 2015 Breaks Attendance Record

ISC 2015 Breaks Attendance Record

ISC 2015 concluded its 30th meeting last week in Germany, drawing a record 2,846 attendees from 56 countries. In total 153 organizations took part in the conference exhibition.

The post ISC 2015 Breaks Attendance Record appeared


From The Eponymous Pickle

Strategies for Reaching the Chinese Consumer

Strategies for Reaching the Chinese Consumer

In the HBR:" ... Slowing Chinese economic growth coupled with confidence-sapping tumult on the stock market have set alarm bells ringing at companies about their future growth prospects in China. But they should not simply sit


From insideHPC

Fujitsu Teams with Asetek for Cool-Central Primergy Systems

Fujitsu Teams with Asetek for Cool-Central Primergy Systems

Last week at ISC 2015, Fujitsu rolled out new Primergy systems using the company's Cool-Central Liquid Cooling Solution. Based on Asetek technology, Cool-Central reduces cooling costs by up to 50 percent.

The post Fujitsu Teams


From The Eponymous Pickle

Connecting Employees and Customer Experience

Connecting Employees and Customer Experience

In CWorld: " ... Improve outcomes by connecting the employee and customer experience ... " Absolutely, but what if your employees are several steps away from the customer?  A classic situation in CPG products and retail.  Mobile


From insideHPC

Video: Pathscale Compilers Power Cavium ThunderX Processor

Video: Pathscale Compilers Power Cavium ThunderX Processor

The EKOPath compiler for High Performance Computing supports advanced loop optimizations, SIMD vectorization and many-core support. This release of EKOPath includes optimizations specifically for the ThunderX microarchitecture


From The Eponymous Pickle

Tracking your Location Over Time

Tracking your Location Over Time

We could have used this for a plant maintenance application that required documenting location, issues and changes.  Thinking of other related applications.Tracking location and images on a map."  .... Have you ever wanted aWhich


From Gödel's Lost Letter and P=NP

Alberto Apostolico, 1948–2015

Our condolences on the loss of a colleague Cropped from TCS journal source Alberto Apostolico was a Professor in the Georgia Tech College of Computing. He passed away on Monday after a long battle with cancer. Today Ken and I

Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo