Sign In

Communications of the ACM

Blogs


Blogroll


AutoTune – Automated Optimization and Tuning
From insideHPC

AutoTune – Automated Optimization and Tuning

AutoTune is a European Commission (EC) funded FP7 research project comprised of an international consortium of scientific institutions and industrial partners coordinated...

PRACE Celebrates Fifth Anniversary
From insideHPC

PRACE Celebrates Fifth Anniversary

Today the PRACE Partnership for Advanced Computing in Europe celebrated its fifth anniversary. In the past five years, PRACE has come a long way, growing from a...

Univa Rolls Out Universal Resource Broker
From insideHPC

Univa Rolls Out Universal Resource Broker

Today Univa announced the Universal Resource Broker, an enterprise-class workload optimization solution for high performance, containerized and shared data centers...

Dell’s GDAP Delivers an Integrated Genomic Processing Infrastructure
From insideHPC

Dell’s GDAP Delivers an Integrated Genomic Processing Infrastructure

Dell has teamed with Intel to create innovative solutions that can accelerate the research, diagnosis and treatment of diseases through personalized medicine. The...

An Incredibly Insecure Voting Machine
From Schneier on Security

An Incredibly Insecure Voting Machine

Wow: The weak passwords -- which are hard-coded and can't be changed -- were only one item on a long list of critical defects uncovered by the review. The Wi-Fi...

Video: Current Status of ZFS as Backend File System for Lustre
From insideHPC

Video: Current Status of ZFS as Backend File System for Lustre

"Intel supports users, system integrators, and OEMs using ZFS with Intel Lustre. In this presentation, we summarize the results of proof-of-concept (PoC) on a variety...

How To Tell Your 1:1 Program is Going to Fail
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

How To Tell Your 1:1 Program is Going to Fail

I saw this question on Facebook. My schools going to all iPad next year for the students. Can we do the coding that we need to for AP Computer Science on an iPad...

EU Strategy for Tech Market
From The Eponymous Pickle

EU Strategy for Tech Market

In FastCompany:Europe unveils strategy to finally compete with US Tech Titans ....  The EU's proposed "Unified Digital Marketplace"  Would Revise Laws that Discourage...

Benford's Law for Twitter Data
From The Eponymous Pickle

Benford's Law for Twitter Data

Nicely done Tech Review piece on Benford's Law, a practical piece of pattern recognition knowledge every analyst should know.  It is used in fraud and risk analysis...

Wal-Mart Largest Largest IT Investor
From The Eponymous Pickle

Wal-Mart Largest Largest IT Investor

In the world?  Surprising claim, that I find hard to believe.   Still there is a lot there:" ... Walmart topped IDC's "The Big Guns: IDC's Worldwide Top 10 IT Spenders"...

Update: Polinode Visualizes Organizations
From The Eponymous Pickle

Update: Polinode Visualizes Organizations

Continue to follow Polinode as a means to model and analyze organizations.  The Australian company has added some new features that are of interest.  This is a...

Knowing what Part of your Knowledge and Data Matters
From The Eponymous Pickle

Knowing what Part of your Knowledge and Data Matters

K&W:   Talk and transcript.   And you can add to this, data as an asset, both structured and unstructured.   Data can be turned into applicable knowledge with analytics...

Asetek Lands Largest Order Yet for RackCDU with Fujitsu
From insideHPC

Asetek Lands Largest Order Yet for RackCDU with Fujitsu

Asetek has announced its first production order for its RackCDU Direct-to-Chip data center liquid cooling system under the previously announced OEM purchase agreement...

Resist False Big Data Promises
From The Eponymous Pickle

Resist False Big Data Promises

In Forbes via McCain:    Good points to consider before diving in.  In particular I emphasize asking how do the possibilities connect to real business decisions...

Engaging Undergraduates in Research:  Upcoming Workshops at ICRA and FCRC
From The Computing Community Consortium Blog

Engaging Undergraduates in Research:  Upcoming Workshops at ICRA and FCRC

The following is a guest blog post by Ran Libeskind-Hadas, R. Michael Shanahan Professor and Computer Science Department Chair at Harvey Mudd College, Susanne Hambrusch...

Intel’s Diane Bryant on Bringing Diversity to the Tech Sector
From insideHPC

Intel’s Diane Bryant on Bringing Diversity to the Tech Sector

How does a woman break through the glass ceiling? In this video from the Re/Code Conference, Intel's Diane Bryant discusses the pathway to diversity in the tech...

#CSK8 has been nominated for a Bammy Award in Education
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

#CSK8 has been nominated for a Bammy Award in Education

#CSK8 is the Twitter chat community and online discussion that is being run by the CSTA K8 task force. In a short period of time it has built a large communityAbout...

Video: Lustre Network (LNET) Router Configuration and Tuning
From insideHPC

Video: Lustre Network (LNET) Router Configuration and Tuning

"n this session, Seagate covers configuration guidelines and tuning of LNET Routing from InfiniBand to Ethernet using Lustre 2.1 through 2.6 server/clients as well...

Learning to Love Your Robot Colleagues
From The Eponymous Pickle

Learning to Love Your Robot Colleagues

In the WSJ:    A historic view about how workers dealt with classic factory robots.  But this goes beyond history and robotics.  With the emergence of new, smarter...

Knowledge Based Trust
From The Eponymous Pickle

Knowledge Based Trust

Some of Google's work on knowledge-based trust is reviewed.  But it is still unclear what this is.  Are we trusting Google to determine truth?  You could say they...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Blog at CACM
The Life of a Computer Pioneer
The Life of a Computer Pioneer
04.13.2015

Obituary of F.L. Bauer, German informatics pioneer.

Budget Beowulf Clusters
Budget Beowulf Clusters
04.02.2015

At SIGCSE 2015, five CS educators brought and live-demo'd the low-cost Beowulf clusters they had built for teaching parallel and …

Computer Security and the Risks of Online Voting
Computer Security and the Risks of Online Voting
04.02.2015

An election in Australia is the latest instance of discovering a security flaw in an online voting system, while it …

View More Blog@CACM