Sign In

Communications of the ACM

Blogs


Blogroll


A profile of Elizabeth F. Churchill, Director of User Experience at Google
From Putting People First

A profile of Elizabeth F. Churchill, Director of User Experience at Google

As part of an on-going series profiling people, institutions and programs in the EPIC People community, Katharina Rochjadi of Swinburne University of Technology...

Why wearables should be free
From Putting People First

Why wearables should be free

Companies shouldn’t just give out wearables for free; they should pay users for data, argues Hans Neubert, frog’s chief creative officer. “Owners of wearable technology...

High Performance Computing in CPG
From The Eponymous Pickle

High Performance Computing in CPG

Video by a former colleague,  Tom Lange, about how High Performance Computing (HPC) is used in consumer packaged goods at Procter & Gamble.   " ... From toothpaste...

Comparing the Social Landscape in 2014
From The Eponymous Pickle

Comparing the Social Landscape in 2014

A one page landscape infographic view of the eight most common types of social media in 2014. Nicely done, but specifics in this space do change quickly.  Includes...

Mail Re-Imagined in Verse
From The Eponymous Pickle

Mail Re-Imagined in Verse

Today from IBM.   Mail that understands you ... Imagine email that works for you instead of email that makes you work. .... Guided by analytics, IBM Verse learns...

Decision Making is Unconscious
From The Eponymous Pickle

Decision Making is Unconscious

Len Stein writes:" ... Marketers are realizing that decision making is largely an unconscious process. While neuro-scientists continue to expand our knowledge of...

A New Free CA
From Schneier on Security

A New Free CA

Announcing Let's Encrypt, a new free certificate authority. This is a joint project of EFF, Mozilla, Cisco, Akamai, and the University of Michigan. This is an absolutely...

Whatsapp Is Now End-to-End Encrypted
From Schneier on Security

Whatsapp Is Now End-to-End Encrypted

Whatapp is now offering end-to-end message encryption: Whatsapp will integrate the open-source software Textsecure, created by privacy-focused non-profit Open Whisper...

MICA Intel Wearable is Fashionable
From The Eponymous Pickle

MICA Intel Wearable is Fashionable

Fashion changes.  Pricey at $495.  Will all jewelry soon have an option for computer augmentation?   Intel is an unexpected participant.  I do like the fact that...

Understanding the Face of Emotion
From The Eponymous Pickle

Understanding the Face of Emotion

Determining emotion from facial images. A long term research and innovation interest.  Here news of a September talk in Edge HeadCon.  The introductory piece also...

Snarky 1992 NSA Report on Academic Cryptography
From Schneier on Security

Snarky 1992 NSA Report on Academic Cryptography

The NSA recently declassified a report on the Eurocrypt '92 conference. Honestly, I share some of the writer's opinions on the more theoretical stuff. I know it's...

Top Secret Rosies
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

Top Secret Rosies

This week I have been showing the movie "Top Secret Rosies" to my freshmen students. It’s a wonderful story about some long unsung heroes of both World War II and...

Google Glass not Taking Off
From The Eponymous Pickle

Google Glass not Taking Off

It was only early this year I was looking at a way to use Glass to aid in some compliance applications. We approached Google, but got no interest. Now Glass appears...

Next 50 Years of Management
From The Eponymous Pickle

Next 50 Years of Management

McKinsey's always interesting contributions, a look forward at the next 50 years:McKinsey Quarterly’s 50th anniversary editionIn this unique anniversary edition...

A Cisco App for Collaboration
From The Eponymous Pickle

A Cisco App for Collaboration

In CWorld: The Cisco App is being positioned as Freemium.  Will also be interesting to see how this is connected to some of its hardware solutions.  See also its...

The NSA's Efforts to Ban Cryptographic Research in the 1970s
From Schneier on Security

The NSA's Efforts to Ban Cryptographic Research in the 1970s

New article on the NSA's efforts to control academic cryptographic research in the 1970s. It includes new interviews with public-key cryptography inventor Martin...

From Computational Complexity

A Fly on the wall for a Harvard Faculty meeting: Not interesting for Gossip but interesting for a more important reason

I was recently in Boston for Mikefest (which Lance talked about  here)  and found time to talk to  my adviser Harry Lewis at Harvard (adviser? Gee, I already finished...

Why competitive people are often dumb and boring
From Daniel Lemire's Blog

Why competitive people are often dumb and boring

People who work hard are typically motivated by either their performance (i.e., they want to look good) or their mastery (i.e., they like being good at their craft)...

Context for Evernote
From The Eponymous Pickle

Context for Evernote

Have now used the Evernote note taking and information management system for years.  I like it, especially since they improved their multiple interfaces.  It also...

Smart Connected Products Killing Industries
From The Eponymous Pickle

Smart Connected Products Killing Industries

Have heard this before, not universally true.  Especially when you have to move atoms vs bits. Or apply scarce resources.   Like in all transportation industries...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Blog at CACM
Doing our part to show why HPC Matters
Doing our part to show why HPC Matters
11.21.2014

As managers and practitioners in the HPC community part of our responsibility is to make sure that everyone we come …

Locality, Locality, Locality: A Note from SC14
Locality, Locality, Locality: A Note from SC14
11.20.2014

Steadily growing chips, systems, and application parallelism are driving the movement of data across larger distances in systems, and data …

HPC for Undergraduates
HPC for Undergraduates
11.20.2014

At SC14, graduate students mentor undergraduates interested in pursuing advanced degrees in fields related to high performance computing.

View More Blog@CACM