Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

May 2015


From insideHPC

Achieving Near-Native GPU Performance in the Cloud

Achieving Near-Native GPU Performance in the Cloud

In this session we describe how GPUs can be used within virtual environments with near-native performance. We begin by showing GPU performance across four hypervisors: VMWare ESXi, KVM, Xen, and LXC. After showing that performance


From insideHPC

Apply Now for SC15 Doctoral Showcase

Apply Now for SC15 Doctoral Showcase

SC15 is now accepting applications for their Doctoral Showcase. As part of the Technical Program, the Doctoral Showcase provides an important opportunity for students near the end of their Ph.D. to present a summary of their


From The Eponymous Pickle

Bots Now Outnumber Humans on Web

Bots Now Outnumber Humans on Web

In CSO Online:  At least the article mentions that most are still benign.  But who defines that?


From Schneier on Security

Microbe Biometric

Microbe Biometric

Interesting: Franzosa and colleagues used publicly available microbiome data produced through the Human Microbiome Project (HMP), which surveyed microbes in the stool, saliva, skin, and other body sites from up to 242 individuals


From My Biased Coin

New Work on Equitability and MIC

New Work on Equitability and MIC

A few years ago, working with a diverse group of scientists, I was looking at a problem related to big data analysis.  The setting was data exploration, where you are working with a high-dimensional dataset, and you are seeking


From Schneier on Security

Eighth Movie-Plot Threat Contest Semifinalists

Eighth Movie-Plot Threat Contest Semifinalists

On April 1, I announced the Eighth Movie Plot Threat Contest: demonstrate the evils of encryption. Not a whole lot of good submissions this year. Possibly this contest has run its course, and there's not a whole lot of interest


From The Eponymous Pickle

Wal-Mart Prime Undercuts Amazon

Wal-Mart Prime Undercuts Amazon

In Retailwire: Wal-Mart's delivery plan, at $50 yearly, to undercut Amazon Prime.  Good discussion. Is this catch up?   Does this match the style of the Wal-Mart online shopper?


From Schneier on Security

In Which I Collide with Admiral Rogers

In Which I Collide with Admiral Rogers

Universe does not explode. Photo here....


From The Eponymous Pickle

Unilever to Track Online, Offline Retail Gap

Unilever to Track Online, Offline Retail Gap

Unilever is investing $50,000 in startup Glimr as part of an effort to connect consumers' online and in-store shopping experiences. "We are hoping to bring an actual understating of who you are as an individual based on what"


From Schneier on Security

Admiral Rogers Speaking at the Joint Service Academy Cyber Security Summit

Admiral Rogers Speaking at the Joint Service Academy Cyber Security Summit

Admiral Mike Rogers gave the keynote address at the Joint Service Academy Cyber Security Summit today at West Point. He started by explaining the four tenets of security that he thinks about. First: partnerships. This includes


From The Computing Community Consortium Blog

ACM BuildSys 2015 Call for Papers

ACM BuildSys 2015 Call for Papers

The 2nd ACM International Conference on Embedded Systems for Energy-Efficient Built Environments (BuildSys 2015) invites original contributions in the area of intelligent Systems for the Built Environment targeted particularly


From insideHPC

Video: Have Hard Disks Joined the Grateful Dead?

Video: Have Hard Disks Joined the Grateful Dead?

Have spinning disk drives joined the Grateful Dead? That is the contention here in this video, where industry analyst Mark Peters from ESG dons his tie-dyed shirt and declares that flash is the new storage of choice in the datacenter


From insideHPC

Gather Scatter Operations

Gather Scatter Operations

Gather and scatter operations are used in many domains. However, to use these types of functions on an SIMD architecture creates some programming challenges.

The post Gather Scatter Operations appeared first on insideHPC.


From The Eponymous Pickle

SocioPragmatic Models of Text Analysis

SocioPragmatic Models of Text Analysis

Mona Diab of GWU gave the CSI  talk today:Towards Building Effective Computational Sociopragmatics Models of Human CognitionSlides.   (Talk recording to follow)Though technical, the implications can be understood from the slides


From insideHPC

ANSYS Powers Quantum Computing Engineering at D-Wave

ANSYS Powers Quantum Computing Engineering at D-Wave

D-Wave Systems reports that the company is designing and building the world's most advanced quantum computers with help from engineering simulation solutions from ANSYS. This next generation of supercomputers uses quantum mechanics


From insideHPC

Simulating Global Atmosphere with NICAM on TSUBAME2.5 Using OpenACC

Simulating Global Atmosphere with NICAM on TSUBAME2.5 Using OpenACC

"OpenACC was applied to the a global high-resolution atmosphere model named NICAM. We executed the dynamical core test without re-writing any specific kernel subroutines for GPU execution. Only 5% of the lines of source code


From Computational Complexity

Fiftieth Anniversary of the Publication of the seminal paper on Computational Complexity

Juris Hartmanis and Richard Stearns in a photo dated May 1963. The main theorem from their paper is on the board later improved by Hennie and Stearns. Photo courtesy of Richard Stearns.
The seminal paper of Juris Hartmanis…


From The Eponymous Pickle

New Wharton Customer Analytics Initiative Site

New Wharton Customer Analytics Initiative Site

Via Marin Hitch of the Wharton Customer Analytics Initiative:New Website: Get to #KnowWCAI We launched a new site to showcase all the excitement around customer analytics at Wharton! You can keep up on our latest data projects


From Schneier on Security

License Plate Scanners Hidden in Fake Cactus

License Plate Scanners Hidden in Fake Cactus

The city of Paradise Valley, AZ, is hiding license plate scanners in fake cactus plants....


From insideHPC

Podcast: Arden L. Bement on Blue Waters and the Future of HPC

Podcast: Arden L. Bement on Blue Waters and the Future of HPC

In this podcast from the 2015 NCSA Blue Waters Symposium, Arden L. Bement discusses the Blue Waters supercomputer and the future of HPC. Formerly Director of the NSF, Bement keynoted the symposium and is currently the Davis A


From The Eponymous Pickle

New Marketing Machinery at Kimberly Clark

New Marketing Machinery at Kimberly Clark

In Consumer Goods Technology:' ... To become effective marketers in a digital world, organizations must chart a new course using new marketing machinery. Technology lies at the heart of this new machine, and IT is grinding the


From The Eponymous Pickle

Microsoft Power BI Demo

Microsoft Power BI Demo

Yesterday attended the Microsoft Power BI introductory demo.  The presentation given was a bit shaky, but I did like what I saw in the simplicity of the approach for setting up data visualizations on easy to use dashboards.  This


From The Eponymous Pickle

GE as Industrial Powerhouse

GE as Industrial Powerhouse

In K@W:  Good examination of GE after Capital ...   " ... Back to the Future: GE’s Retooling into an Industrial Powerhouse ... " " ... With the shedding of GE Capital, the manufacturing giant is returning to its industrial roots


From The Eponymous Pickle

Agile Systems by Senex

Agile Systems by Senex

Today's  ISSIP SIG Education & Research speaker was Dan Greening, Managing Director, Senex Rex LLC. He discussed his perspectives on service innovation and delivered a mind mapping exercise.  Notable is their work with Skype


From The Eponymous Pickle

Marketing to Millennials with Storytelling

Marketing to Millennials with Storytelling

In Food Navigator:  Not sure I buy the whole premise.  Storytelling is a very old technique for effectively communicating with anyone, millennials  or otherwise.  Nice that some people are discovering the idea.  " .... Millennials


From The Eponymous Pickle

Long Range Iris Scanning

Long Range Iris Scanning

We examined iris scanning for security applications.  You had to place your face on the reader, and it thus created a sanitary issue.  Also, some people could not be scanned because of face-eye structure. Now in the Atlantic:


From Computer Science Teachers Association

CSTA Certification Committee

CSTA Certification Committee

Have you taken at any time a computer science teaching methods course? If so, at what university or college? I hope you answered these questions on the recent survey from CSTA. The answers to these two questions will help the


From The Computing Community Consortium Blog

Global City Teams Challenge Expo

Global City Teams Challenge Expo

Join the National Institute of Standards and Technology (NIST) and US Ignite on June 1 in Washington, DC for the Global City Teams Challenge Expo (GCTC) at the National Building Museum to see the future of Smart City / Internet


From insideHPC

Video: Teaching Machines to Diagnose Cancer

Video: Teaching Machines to Diagnose Cancer

In this PBS video, Hari Sreenivasan reports on how tech firms are investing in the next generation of intelligent computer programs and in what ways the technology still lags behind humans. The report also takes a closer look


From Schneier on Security

German Cryptanalysis of the M-209

German Cryptanalysis of the M-209

This 1947 document describes a German machine to cryptanalyze the American M-209 mechanical encryption machine. I can't figure out anything about how it works....

« Prev 1 3 4 5 6 7 12 Next »