Sign In

Communications of the ACM

Blogs


Blogroll


Fully homomorphic encryption: cryptography's holy grail
From XRDS

Fully homomorphic encryption: cryptography's holy grail

David J. WuFor more than 30 years, cryptographers have embarked on a quest to construct an encryption scheme that would enable arbitrary computation on encrypted...

Encrypted search
From XRDS

Encrypted search

Seny KamaraThe need to embed search functionality into every aspect of technology has produced an abundance of information that is difficult to secure. Can advances...

Secure your data and compute on it, too
From XRDS

Secure your data and compute on it, too

Mike RosulekModern cryptography provides techniques to perform useful computations on sensitive data.

Exploring the risks to identity security and privacy in cyberspace
From XRDS

Exploring the risks to identity security and privacy in cyberspace

Jason R. C. NurseCyberspace, a world of great promise, but also, of great peril. Pirates, predators, and hackers galore, are you and your online identity at risk...

The Wrens of Bletchley Park
From XRDS

The Wrens of Bletchley Park

Michael SmithThe lives and times of the British women who operated Colossus, and their all-important role in events leading to D-Day and the close of the Second...

Profile Ian Pratt: pioneering security through virtualization
From XRDS

Profile Ian Pratt: pioneering security through virtualization

Adrian Scoică

Cyber security centre: University of Oxford, United Kingdom
From XRDS

Cyber security centre: University of Oxford, United Kingdom

Luke Garratt

Ancient and modern cryptography
From XRDS

Ancient and modern cryptography

Finn Kuusisto

Counting stars: pattern counting in networks
From XRDS

Counting stars: pattern counting in networks

Tomaz Hočevar

Gamification at SAP in May 2015
From The Eponymous Pickle

Gamification at SAP in May 2015

First example I had heard of a major software company being involved seriously in gamification.   With mention of the key analytcs involved. Available soon.    Will...

2015 UCLA Summer Institute on Mobile Health Technology Research
From The Computing Community Consortium Blog

2015 UCLA Summer Institute on Mobile Health Technology Research

Using mobile technologies to more rapidly and accurately assess and modify behavior, biological states and contextual variables has great potential to transform...

Tackling  Wicked Problems
From The Eponymous Pickle

Tackling Wicked Problems

This week’s presenter for the ISSIP SIG Education & Research Service Evangelist Series is Professor Gerald Midgley, Associate Dean for Research and Enterprise,Introduction...

TIBCO BPM Systems
From The Eponymous Pickle

TIBCO BPM Systems

TIBCO BPM Offerings: Brought to my attention and attended an introductory seminar:   Nimbus and ActiveMatrix.

Digital Colleagues for Smarter Aging
From The Eponymous Pickle

Digital Colleagues for Smarter Aging

Presentation today from Cognitive Systems Institute on the idea of a 'Digital Colleague', by Polly Tremoulet, Drexel of University - "Digital Colleagues for Smart...

Optimizing Navier-Stokes Equations
From insideHPC

Optimizing Navier-Stokes Equations

Solving Navier-Sokes equations are popular because they describe the physics of in a number of areas of interest to scientists and engineers. By solving these equations...

Video: Application Experiences on DDN’s IME Burst Buffer
From insideHPC

Video: Application Experiences on DDN’s IME Burst Buffer

"The DDN Infinite Memory Engine (IME) unleashes a new I/O provisioning paradigm. This breakthrough, software defined storage application introduces a whole newVideo...

Fujitsu Thin Solar Powered IOT Beacon
From The Eponymous Pickle

Fujitsu Thin Solar Powered IOT Beacon

Solar powering in particular is interesting. We will continue to see developments of this type.Fujitsu develops thin, solar-powered IoT beaconIn a move that could...

Social Graphs for Business
From The Eponymous Pickle

Social Graphs for Business

Starting to think more rigorously about the definition and delivery of occupations.   It is natural to think about work that has already been done to understand...

Video: Increasing Cluster Throughput while Reducing Energy Consumption for GPU Workloads
From insideHPC

Video: Increasing Cluster Throughput while Reducing Energy Consumption for GPU Workloads

"The use of GPUs to accelerate applications is mainstream nowadays, but their adoption in cur- rent clusters presents several drawbacks. In this talk we present...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Blog at CACM
The Three Faces of Cyberwar
The Three Faces of Cyberwar
03.26.2015

The different aspects of cyberwar, and what can be done about them.

Agile Methods: A Follow-up ACM Webinar
Agile Methods: A Follow-up ACM Webinar
03.26.2015

A follow-up session to the ACM webinar Agile Methods: The Good, the Hype and the Ugly will take place on March …

Battling Bias
Battling Bias
03.20.2015

A regional Grace Hopper Celebration event this week focused on "advancing a gender diverse technology workforce in New York."

View More Blog@CACM