acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

The Future of Electronic Design Automation, According to IBM
From BLOG@CACM

The Future of Electronic Design Automation, According to IBM

To paraphrase Mr. Meyerson: A truly talented engineer is someone who, when his hand gets slammed in a doorway and is badly hurt, inserts his other hand in the doorway...

SC09 Reflections: The Need For Speed
From BLOG@CACM

SC09 Reflections: The Need For Speed

SC09 (aka the “Supercomputing Conference”) was held during the week of November 16.  The conference set an attendance record this year – roughly 10,000 attendees...

Who Needs Massively Multi-Core?
From BLOG@CACM

Who Needs Massively Multi-Core?

Do consumers want massively multi-core?  Or would they rather have lower power consumption and better memory bandwidth?  Are we building what people want?

The 'No SQL' Discussion Has Nothing to Do With SQL
From BLOG@CACM

The 'No SQL' Discussion Has Nothing to Do With SQL

Recently, there has been a lot of buzz about "No SQL" databases. This blog post considers the performance argument about No SQL databases; a subsequent posting...

Innovation = Good Idea + Implementation + Measurement
From BLOG@CACM

Innovation = Good Idea + Implementation + Measurement

We aspire to be innovative, but unless we are wiling to implement it and measure it its just another good idea.

The Rise of Empirical Software Engineering (II): What We Are Still Missing
From BLOG@CACM

The Rise of Empirical Software Engineering (II): What We Are Still Missing

One obstacle is hampering the progress of empirical software engineering: we are still missing a culture of reproducibility

Cray and Fernbach Award Winners
From BLOG@CACM

Cray and Fernbach Award Winners

This year, I have the honor and privilege to chair the selection committee for the Seymour Cray and Sidney Fernbach awards, which recognize outstanding contributions...

Student Research Competition at Grace Hopper
From BLOG@CACM

Student Research Competition at Grace Hopper

Highlights of the top six posters/presentations at the Student Research Competition

The Fallacy of Rankings
From BLOG@CACM

The Fallacy of Rankings

The list of the world's fastest computers will soon be announced. As always, we can expect the latest announcement to garner interest among the technological community...

HPC: Making a Small Fortune
From BLOG@CACM

HPC: Making a Small Fortune

There is an old joke in the high-performance computing community that begins with a question, “How do you make a small fortune in high-performance computing?” There...

High-Performance Computing: Where
From BLOG@CACM

High-Performance Computing: Where

By definition, the raison d’être for high-performance computing is high performance, but floating point operations per second (FLOPS) need not be the only measure...

When Petascale Is Just Too Slow
From BLOG@CACM

When Petascale Is Just Too Slow

Evolution or revolution, it’s the persistent question. Can we build reliable esascale systems from extrapolations of current technology or will new approaches be...

What To Do With Those Idle Cores?
From BLOG@CACM

What To Do With Those Idle Cores?

So many processors on our desktops.  Four cores, eight cores, soon we will see hundreds of cores.  Almost all of them are going to be idle most of the time.  If...

What Is a Good Recommendation Algorithm?
From BLOG@CACM

What Is a Good Recommendation Algorithm?

Someone may win the one million dollar Netflix Prize soon.  Will the winning algorithm produce movie recommendations that people like?

Connecting the Two Ends: Mobile Clouds
From BLOG@CACM

Connecting the Two Ends: Mobile Clouds

  In 1959, the colorful and brilliant physicist, Richard Feynman, gave a seminal lecture to the American Physical Society entitled, "There's Plenty of Room at...

DBMSs For Science Applications: A Possible Solution
From BLOG@CACM

DBMSs For Science Applications: A Possible Solution

Quite a few scientists who deal with the processing and storage of large amounts of data are unhappy with relational DBMSs. Here are several reasons why—and a possible...

­Usable Privacy and Security
From BLOG@CACM

­Usable Privacy and Security

We are facing an increasing number of security failures, not because of problems with encryption algorithms, network protocols, or system implementations, but rather...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account