Sign In

Communications of the ACM

BLOG@CACM



The Fallacy of Rankings
From BLOG@CACM

The Fallacy of Rankings

The list of the world's fastest computers will soon be announced. As always, we can expect the latest announcement to garner interest among the technological community...

HPC: Making a Small Fortune
From BLOG@CACM

HPC: Making a Small Fortune

There is an old joke in the high-performance computing community that begins with a question, “How do you make a small fortune in high-performance computing?” There...

High-Performance Computing: Where
From BLOG@CACM

High-Performance Computing: Where

By definition, the raison d’être for high-performance computing is high performance, but floating point operations per second (FLOPS) need not be the only measure...

When Petascale Is Just Too Slow
From BLOG@CACM

When Petascale Is Just Too Slow

Evolution or revolution, it’s the persistent question. Can we build reliable esascale systems from extrapolations of current technology or will new approaches be...

What To Do With Those Idle Cores?
From BLOG@CACM

What To Do With Those Idle Cores?

So many processors on our desktops.  Four cores, eight cores, soon we will see hundreds of cores.  Almost all of them are going to be idle most of the time.  If...

What Is a Good Recommendation Algorithm?
From BLOG@CACM

What Is a Good Recommendation Algorithm?

Someone may win the one million dollar Netflix Prize soon.  Will the winning algorithm produce movie recommendations that people like?

Connecting the Two Ends: Mobile Clouds
From BLOG@CACM

Connecting the Two Ends: Mobile Clouds

  In 1959, the colorful and brilliant physicist, Richard Feynman, gave a seminal lecture to the American Physical Society entitled, "There's Plenty of Room at...

DBMSs For Science Applications: A Possible Solution
From BLOG@CACM

DBMSs For Science Applications: A Possible Solution

Quite a few scientists who deal with the processing and storage of large amounts of data are unhappy with relational DBMSs. Here are several reasons why—and a possible...

­Usable Privacy and Security
From BLOG@CACM

­Usable Privacy and Security

We are facing an increasing number of security failures, not because of problems with encryption algorithms, network protocols, or system implementations, but rather...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account