The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.
Interesting example of a novel data visualization. From Microsoft Labs.
Project ideas come from all sorts of places. Textbooks, other teachers I work with, blogs, random conversations, conferences (do you know about Nifty Assignments from SIGCSE?) and more. Some of the best come from students. Not…
Researchers have managed to get two computers to communicate using heat and thermal sensors. It's not really viable communication -- the bit rate is eight per hour over fifteen inches -- but it's neat....
I'm on my way home from a series of Springtime HPC conferences with boatload of new videos and interviews on the latest in high performance computing. Here are some notable items that may have not made it to the front page.The…
"The drive toward exascale computing, a renewed emphasis on data-centric processing, energy efficiency concerns, and the limitations of memory and I/O performance are all working to reshape High Performance Computing platforms…
In this video from the 2015 HPC Advisory Council Switzerland Conference, Oded Paz presents: Special Training Session for HPC Systems Managers and Users: EDR InfiniBand, Multicast Operations (setup flow and diagnostic tools),The…
Two methodological critiques on Big Data that caught our attention: In the Financial Times, economist and journalist Tim Harford points out that sampling bias and statistical errors are, if anything, magnified in Big Data research…
Janet Davis, Jeannie Albrecht, Christine Alvarado, Tzu-Yi Chen, Amy Csizmar Dalal, Sohie Lee
Shashank Agrawal, Billy RathjeThere are unique challenges posed by cryptography research. This interview examines potential threats to modern security techniques and how to overcome them.
David J. WuFor more than 30 years, cryptographers have embarked on a quest to construct an encryption scheme that would enable arbitrary computation on encrypted data. Conceptually simple, yet notoriously difficult to achieve…
Seny KamaraThe need to embed search functionality into every aspect of technology has produced an abundance of information that is difficult to secure. Can advances in cryptography resolve the inherent conflicts of big data?
Mike RosulekModern cryptography provides techniques to perform useful computations on sensitive data.
Jason R. C. NurseCyberspace, a world of great promise, but also, of great peril. Pirates, predators, and hackers galore, are you and your online identity at risk in this wild frontier?
Michael SmithThe lives and times of the British women who operated Colossus, and their all-important role in events leading to D-Day and the close of the Second World War.
First example I had heard of a major software company being involved seriously in gamification. With mention of the key analytcs involved. Available soon. Will be fun to see that the pilots are, You can sign up at the link…
Using mobile technologies to more rapidly and accurately assess and modify behavior, biological states and contextual variables has great potential to transform medical research. Recent advances in mobile technologies and the…
A follow-up session to the ACM webinar Agile Methods: The Good, the Hype and the Ugly will take place on March 27.