Sign In

Communications of the ACM

Blogs


Blogroll


New RC4 Attack
From Schneier on Security

New RC4 Attack

New research: "All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP and TLS," by Mathy Vanhoef and Frank Piessens: Abstract: We present new biases in RC4, break...

Transforming Higher Education
From The Eponymous Pickle

Transforming Higher Education

Correspondent David E Goldberg writes:" ... Transforming higher education is often thought of as simply the introduction and administration of new content, curriculum...

Did You Miss It?
From Computer Science Teachers Association

Did You Miss It?

Miss what you ask? Why the CSTA Webinar presented by Beth Ziesenis, Nerdy Best Friend, on May 12, of course! A special invitation was emailed to you on May 1. I...

Intel and Micron Announce 3D XPoint Non-Volatile Memory
From insideHPC

Intel and Micron Announce 3D XPoint Non-Volatile Memory

Today Intel Corporation and Micron Technology unveiled 3D XPoint technology, a non-volatile memory that has the potential to revolutionize any device, application...

Savage IO Rolls Out High Performance Open Storage
From insideHPC

Savage IO Rolls Out High Performance Open Storage

Today Savage IO announced the SavageStor open storage platform. According to the company, SavageStor is the highest-performing, most-densely populated Open Storage...

Gartner on Digitalization
From The Eponymous Pickle

Gartner on Digitalization

In the Gartner blog, where I was attracted by the word 'digitalization',  Don't like carrying the water for another term.  But OK if it makes a useful distinction...

Ada Lovelace Competition to Inspire Female Programmers
From insideHPC

Ada Lovelace Competition to Inspire Female Programmers

Marking the 200th anniversary of the birth of Ada Lovelace, the woman widely regarded as the first computer programmer, a competition aims to inspire female students...

Video: TotalView Parallelizes Code at ISC 2015
From insideHPC

Video: TotalView Parallelizes Code at ISC 2015

"TotalView breaks down barriers to understanding what's going on with your HPC and supercomputing applications. Purpose-built for multicore and parallel computing...

DDN Sets World Record STAC Performance
From insideHPC

DDN Sets World Record STAC Performance

Today DDN announced record performance on the Securities Technology Analysis Center (STAC) benchmark. Using the company's EXAScaler storage solution, DDN set new...

HP Doubles Down on HPC & Big Data at ISC 2015
From insideHPC

HP Doubles Down on HPC & Big Data at ISC 2015

In this video from ISC 2015, Scott Misage from HP describes the company's new strategy for High Performance Computing. With a new business unit centered aroundHP...

Lustre* For the Enterprise
From insideHPC

Lustre* For the Enterprise

Lustre* is not just for the national labs any longer. It was born out of serving up data extremely fast to the world’s most powerful HPC clusters using parallel...

UK Virtual Reality Lab for Transport
From The Eponymous Pickle

UK Virtual Reality Lab for Transport

In Engadget: Don't quite understand the application, but intriguing.  In general we found that VR applications were most useful when they were closely connected...

Historical Big Data Use Case
From The Eponymous Pickle

Historical Big Data Use Case

I like the fact that this includes considerable historical data.   Consider the opportunities.  From Pete Ianace:" ... This is a great use case that describes the...

Executive Guide to Machine Learning
From The Eponymous Pickle

Executive Guide to Machine Learning

In McKinsey: An executive’s guide to machine learningIt’s no longer the preserve of artificial-intelligence researchers and born-digital companies like Amazon,...

Cities and the Power of Integration
From The Eponymous Pickle

Cities and the Power of Integration

In Cisco: On the Smart City, how things will be connected, architect ed, and analyics leveraged to make cities work efficiently.   At the end of the day it is still...

Stagefright Vulnerability in Android Phones
From Schneier on Security

Stagefright Vulnerability in Android Phones

The Stagefright vulnerability for Android phones is a bad one. It's exploitable via a text message (details depend on auto downloading of the particular phone),...

Programmers Have No Ideas?
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

Programmers Have No Ideas?

I read blogs by smart interesting people so I can be exposed to new or different ideas. Eugene Wallingford is one of those smart interesting people. He recently...

From Gödel's Lost Letter and P=NP

Playing Chess With the Devil

A new kind of ‘liar’ puzzle using Freestyle chess Cropped from source Raymond Smullyan is probably the world’s greatest expert on the logic of lying and the logic...

Microsoft and the Internet of Things
From The Eponymous Pickle

Microsoft and the Internet of Things

How will the IOT effect the operating system of the past?  Simplifyingbecause parts of the OS can be in the cloud?  Or make them much more complex? .How will search...

From Computational Complexity

Explain this Scenario on Jeapardy

Ponder the following: Larry, Moe, and Curly are on Jeapardy. Going into Final Jeapardy: Larry has $50,000, Moe has $10,000, Curly has $10,000 Larry bets $29...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo