Sign In

Communications of the ACM

Blogroll



Two NSA Algorithms Rejected by the ISO
From Schneier on Security

Two NSA Algorithms Rejected by the ISO

The ISO has rejected two symmetric encryption algorithms: SIMON and SPECK. These algorithms were both designed by the NSA and made public in 2013. They are optimized...

Ambient contextuality, the next big game-changer in technology interface
From Putting People First

Ambient contextuality, the next big game-changer in technology interface

Jim Hunter, chief scientist and technology evangelist at Greenwave Systems, predicts in TechCrunch that the next big game-changer in technology interface is ambient...

Two reports on people’s attitudes and understanding of digital technologies
From Putting People First

Two reports on people’s attitudes and understanding of digital technologies

Doteveryone, a UK think tank that champions responsible technology for the good of everyone in society [similar to Milan’s newly founded Digital Culture Center]...

Baseball Code
From Schneier on Security

Baseball Code

Info on the coded signals used by the Colorado Rockies....

Wal-Mart Mobile Checkout
From The Eponymous Pickle

Wal-Mart Mobile Checkout

This could get lots of people trained in the idea of mobile checkout, beyond just Wal-Mart.  Check out the full articleWalmart’s mobile checkout trial is a major...

ANSYS Software Powers Additive Manufacturing of Metal Components
From insideHPC

ANSYS Software Powers Additive Manufacturing of Metal Components

Ansys is hoping to transform how industries such as aerospace and defense, biotech and automotive can manufacture metal parts thanks to its new solutions for metal...

Wal-Mart new Website Design vs Amazon
From The Eponymous Pickle

Wal-Mart new Website Design vs Amazon

Like the mention of  'Choice and Control'.   And thinking of retail as therapy?   Not really quite a science here, but reasonable design considerations.This Is ...

HPE Deploys “Genius” Supercomputer at KU Leuven
From insideHPC

HPE Deploys “Genius” Supercomputer at KU Leuven

Today HPE announced a new supercomputer installation at KU Leuven, a Flemish research university consistently ranked as one of the five most innovative universities...

Researchers using HPC to help fight Bioterrorism
From insideHPC

Researchers using HPC to help fight Bioterrorism

Researchers are using computational models powered by HPC to develop better strategies for protecting us from bioterrorism. "Recent advances in data analytics and...

RCE Podcast Looks at MEEP Software for Simulating Electromagnetic Systems
From insideHPC

RCE Podcast Looks at MEEP Software for Simulating Electromagnetic Systems

In this RCE podcast, Brock Palen and Jeff Squyres discuss MEEP, a free finite-difference time-domain (FDTD) software for electromagnetic simulations. Their guests...

The Use of HPC to Model the California Wildfires
From insideHPC

The Use of HPC to Model the California Wildfires

Ilkay Altintas from the San Diego Supercomputer Center gave this talk at the HPC User Forum. "WIFIRE is an integrated system for wildfire analysis, with specific...

Sony, CMU looking at Cooking Robots
From The Eponymous Pickle

Sony, CMU looking at Cooking Robots

The idea of further looking at task oriented interaction with recipes, techniques and recipes.  As a long time cook, and having worked in the Food industry.  Also...

Calm Software
From The Eponymous Pickle

Calm Software

We were members of the MIT Media Lab for some time and I got to visit many times.   The most unusual and intriguing part of it was the 'Tangible Media Group', which...

Symantec Detects Threats with AI
From The Eponymous Pickle

Symantec Detects Threats with AI

Had some conversations on threats as specific patterns of behavior, by people or agents.  Seems there is lots of data of this type now being gathered to train systems...

The Machine Learning Potential of a Combined Tech Approach
From insideHPC

The Machine Learning Potential of a Combined Tech Approach

This is the first in a five-part series from a report exploring the potential of unified deep learning with CPU, GPU and FGPA technologies. This post explores the...

Russia is Banning Telegram
From Schneier on Security

Russia is Banning Telegram

Russia has banned the secure messaging app Telegram. It's making an absolute mess of the ban -- blocking 16 million IP addresses, many belonging to the Amazon and...

The Nature of Shopping for Gen Z
From The Eponymous Pickle

The Nature of Shopping for Gen Z

How much are specific 'generations'.  Still have my doubts about how different the generations are. Still worth paying attention to understand measures involved...

From Computational Complexity

Find an 8-digits number such that ....

(June 29th, co-located with STOC, will be a workshop to celebrate  Vijay Vazarani's 60th birthday. As computer scientists shouldn't we use 64 as the milestone?here...

Earth-modeling System steps up to Exascale
From insideHPC

Earth-modeling System steps up to Exascale

A new Earth-modeling system unveiled today will have weather-scale resolution and use advanced computers to simulate aspects of Earth’s variability and anticipate...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account