Sign In

Communications of the ACM

Blogs


Blogroll


Self Taught Coders and Ugly Code
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

Self Taught Coders and Ugly Code

I love this cartoon from xkcd. Of course some self taught programmers write really nice looking code. And some formally taught programmers write ugly code.  The...

The No-Fly List and Due Process
From Schneier on Security

The No-Fly List and Due Process

The Congressional Research Service has released a report on the no-fly list and current litigation that it violates due process....

Moore's Law is 50
From The Eponymous Pickle

Moore's Law is 50

In Recode.  Been reading about Moore's law for many years.    Now over 50 years old, it maps how  " ...  the number-crunching capacity of our computers and theGood...

Video: Application-optimized Lustre Solutions for Big-Data Workflows
From insideHPC

Video: Application-optimized Lustre Solutions for Big-Data Workflows

In this video from LUG 2015 in Denver, Robert Triendl from DDN presents: Application-optimized Lustre Solutions for Big-Data Workflows.The post Video: Application...

More Robo Hotels, Robo Behavior
From The Eponymous Pickle

More Robo Hotels, Robo Behavior

In the CACM:  Update on the use of robotics in hotels globally.    Have yet to see it personally.    A challenge we discussed:  " ... One of the challenges is building...

Amazon Analytical Web Services
From The Eponymous Pickle

Amazon Analytical Web Services

This was mentioned previously, AWS makes anaytical services available in new and powerful, and scalable ways.  Much more detail at the link:" .... The science of...

Ferrari Augmented Reality POS
From The Eponymous Pickle

Ferrari Augmented Reality POS

Good example via Metaio:  Expanding showroom experience.  " ... Ferrari Australia commissioned developer ZSPACE to create an awesome showroom companion that overlays...

Experience Design
From The Eponymous Pickle

Experience Design

Doing Design effectively, and efficiently:Experience design gives you the competitive edge ...The O'Reilly Radar Podcast: Andy Budd on the rising value of design...

GE and Industrial Internet
From The Eponymous Pickle

GE and Industrial Internet

Based on my own interactions with them. thought GE was aligned with industrial internet standards for some time,  but now more:   " ...  The Industrial Internet...

Cognitive Architecture for Expertise Delivery
From The Eponymous Pickle

Cognitive Architecture for Expertise Delivery

FORR: A Cognitive Architecture for Expertise, by Susan EpsteinCity University of New York (CUNY). Major support by the NSFAttended this presentation today.  Very...

Great Innovative Ideas!
From The Computing Community Consortium Blog

Great Innovative Ideas!

The Computing Community Consortium (CCC) is delighted to announce a new feature on our website! Great Innovative Ideas are a way to showcase the exciting new research...

Appy Now: ISC High Performance Conference Needs Student Volunteers
From insideHPC

Appy Now: ISC High Performance Conference Needs Student Volunteers

The ISC High Performance Conference is seeking Student Volunteers. The event takes place July 12-16 in Frankfurt, Germany.The post Appy Now: ISC High Performance...

NCDS Takes Action on Big Data
From insideHPC

NCDS Takes Action on Big Data

In this special guest feature from Scientific Computing World, Stan Ahalt from the National Consortium for Data Science discusses how and why the organization came...

RSC PetaStream Powers Russian Academy of Sciences
From insideHPC

RSC PetaStream Powers Russian Academy of Sciences

Today RSC Group announced the installation of a MVS-10P MP Petastream supercomputer at the Joint Supercomputer Center of the Russian Academy of Sciences (JSCC RAS)...

Fault Trees
From insideHPC

Fault Trees

As datasets and simulations continue to increase in size and complexity, interactivity with the data should be maintained. It is important to understand how SIMD...

Video: Defending the Planet with Lustre
From insideHPC

Video: Defending the Planet with Lustre

"Pleiades, one of the world's most powerful supercomputers, represents NASA's state-of-the-art technology for meeting the agency's supercomputing requirements,Video...

The Magic Lab
From The Eponymous Pickle

The Magic Lab

Always interested in the concept of innovation spaces.  Here is another, see tags below for more about our use of them.I am the Director of the Innovation and Enterprise...

From Computational Complexity

PH Infinite Under a Random Oracle

Benjamin Rossman, Rocco Servedio and Li-Yang Tan show new circuit lower bounds that imply, among other things, that the polynomial-time hierarchy is infinite relative...

Sometimes It is How You Look At It
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

Sometimes It is How You Look At It

A couple of days ago I saw an interesting program on the Small Basic blog.  The featured program was one that let a beginner write a turtle graphics program. ITouchDevelop...

How Many Vulnerabilities Are there in Software?
From Schneier on Security

How Many Vulnerabilities Are there in Software?

Dan Geer proposes some techniques for answering this question....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Blog at CACM
The Life of a Computer Pioneer
The Life of a Computer Pioneer
04.13.2015

Obituary of F.L. Bauer, German informatics pioneer.

Budget Beowulf Clusters
Budget Beowulf Clusters
04.02.2015

At SIGCSE 2015, five CS educators brought and live-demo'd the low-cost Beowulf clusters they had built for teaching parallel and …

Computer Security and the Risks of Online Voting
Computer Security and the Risks of Online Voting
04.02.2015

An election in Australia is the latest instance of discovering a security flaw in an online voting system, while it …

View More Blog@CACM