acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

What To Do With Those Idle Cores?
From BLOG@CACM

What To Do With Those Idle Cores?

So many processors on our desktops.  Four cores, eight cores, soon we will see hundreds of cores.  Almost all of them are going to be idle most of the time.  If...

What Is a Good Recommendation Algorithm?
From BLOG@CACM

What Is a Good Recommendation Algorithm?

Someone may win the one million dollar Netflix Prize soon.  Will the winning algorithm produce movie recommendations that people like?

Connecting the Two Ends: Mobile Clouds
From BLOG@CACM

Connecting the Two Ends: Mobile Clouds

  In 1959, the colorful and brilliant physicist, Richard Feynman, gave a seminal lecture to the American Physical Society entitled, "There's Plenty of Room at...

DBMSs For Science Applications: A Possible Solution
From BLOG@CACM

DBMSs For Science Applications: A Possible Solution

Quite a few scientists who deal with the processing and storage of large amounts of data are unhappy with relational DBMSs. Here are several reasons why—and a possible...

­Usable Privacy and Security
From BLOG@CACM

­Usable Privacy and Security

We are facing an increasing number of security failures, not because of problems with encryption algorithms, network protocols, or system implementations, but rather...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account