Sign In

Communications of the ACM

Blogs


Blogroll


A Struggle with Data Quality
From The Eponymous Pickle

A Struggle with Data Quality

Organizational struggle with data quality.   I will add,  the worst form of quality is the complete lack of required data and metadata needed for high leverage...

CIOs and Digital Strategy
From The Eponymous Pickle

CIOs and Digital Strategy

From Forrester:   " ... In fact, CIOs with experience in marketing and/or business-unit leadership — especially eBusiness — are well equipped to lead the future...

Removing Bottlenecks in Next Generation Sequencing
From insideHPC

Removing Bottlenecks in Next Generation Sequencing

This is the 4th installment of a 6 article series on the trends and technologies impacting the application of HPC in Life Sciences. Here we explore how companies...

Registration Opens for ISC High Performance
From insideHPC

Registration Opens for ISC High Performance

Registration is now open for the ISC High Performance Conference. Formerly known as ISC'15, the conference takes place July 12-16 in Frankfurt, Germany.The post...

SiYB is a Supercomputer in your Browser
From insideHPC

SiYB is a Supercomputer in your Browser

Jeff Squyres writes that the new “Supercomputer in your browser” (SiYB) project is designed to bring the rich High Performance Computing ecosystem to the world’s...

From Computational Complexity

Which of these stories is false

I would rather challenge you than fool you on April fools day. Below I have some news items. All but one are true. I challenge you to determine which one is false...

The Eighth Movie-Plot Threat Contest
From Schneier on Security

The Eighth Movie-Plot Threat Contest

It's April 1, and time for another Movie-Plot Threat Contest. This year, the theme is Crypto Wars II. Strong encryption is evil, because it prevents the police...

April 1 Video: Si Tortoise Data Security Appliance
From insideHPC

April 1 Video: Si Tortoise Data Security Appliance

In this April 1 video, Scalable Informatics announces the Si Tortoise Data Security Appliance.The post April 1 Video: Si Tortoise Data Security Appliance appeared...

Reproducibility of CAE-computations through Immutable Application Containers
From insideHPC

Reproducibility of CAE-computations through Immutable Application Containers

In this video from the 2015 HPC Advisory Council Switzerland Conference, Christian Kniep from QNIB Solutions presents: Reproducibility of CAE-computations through...

CSTA 2015 Board of Directors Elections and Proposed Bylaws Changes
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

CSTA 2015 Board of Directors Elections and Proposed Bylaws Changes

The 2015 CSTA Board of Directors Elections will run from April 2, 2015 to May 4, 2015. In addition to three open positions on the Board, this year's ballot will...

Micron Swallows up Convey Computer
From insideHPC

Micron Swallows up Convey Computer

The Convey Computer site reports that the company has been acquired by Micron. This is not an April Fools, guys. There just may be a hybrid-core server with anMicron...

Job of the Week: Research Storage Lead at University of Michigan
From insideHPC

Job of the Week: Research Storage Lead at University of Michigan

The University of Michigan is seeking a Research Storage Lead in our Job of the Week.The post Job of the Week: Research Storage Lead at University of Michigan appeared...

Survey of Americans' Privacy Habits Post-Snowden
From Schneier on Security

Survey of Americans' Privacy Habits Post-Snowden

Pew Research has a new survey on Americans' privacy habits in a post-Snowden world. The 87% of those who had heard at least something about the programs were asked...

Amazon Dash Button
From The Eponymous Pickle

Amazon Dash Button

Amazon Dash.  Automating Resupply. A Buy button.    Connects to a smartphone App.  Invitation for Prime Members.  Clever idea. What will the uptake be  " .... Place...

Chromebit to Turn Display into Chomebook
From The Eponymous Pickle

Chromebit to Turn Display into Chomebook

Have experimented with the Chromecast idea, has somewhat limited usefulness, turning TVs into somewhat smarter devices.   Now Engadget reports on the Chromebit,...

Chinese CA Issuing Fraudulent Certificates
From Schneier on Security

Chinese CA Issuing Fraudulent Certificates

There's a Chinese CA that's issuing fraudulent Google certificates. Yet another example of why the CA model is so broken....

RFID at Item Level Reaching Tipping Point
From The Eponymous Pickle

RFID at Item Level Reaching Tipping Point

For years starting in 2000, we predicted the near approach of common item level RFID use  in retail.    It eventually became much more common at the pallet andIn...

Video: The InfiniBand Subnet Manager from Fabriscale
From insideHPC

Video: The InfiniBand Subnet Manager from Fabriscale

In this video from the 2015 HPC Advisory Council Switzerland Conference, Tor Skeie from Simula Laboratory presents: The InfiniBand Subnet Manager from Fabriscale...

Watson Cognitive is Part of Cloud Service
From The Eponymous Pickle

Watson Cognitive is Part of Cloud Service

Some of the functionality of IBM's Watson is available on their cloud.    More on this in Computerworld.  Have worked with this for a while now.  The services are...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Blog at CACM
Providing On-Line CS Teacher Education, Designed for Teachers
Providing On-Line CS Teacher Education, Designed for Teachers
04.01.2015

Announcing a research-based resource for helping high school teachers to learn Python and CS Principles

The Three Faces of Cyberwar
The Three Faces of Cyberwar
03.26.2015

The different aspects of cyberwar, and what can be done about them.

Battling Bias
Battling Bias
03.20.2015

A regional Grace Hopper Celebration event this week focused on "advancing a gender diverse technology workforce in New York."

View More Blog@CACM