June 13, 2013:
"IBM Watson: Beyond Jeopardy!,"
Join Adam Lally, member of the DeepQA project that built the Watson question answering system; and moderator Will Tracz, Lockheed Martin Fellow Emeritus and Chair of ACM SIGSOFT.
Realtime GPU Audio
Finite difference-based sound synthesis using graphics processors
FPGA Programming for the Masses
The programmability of FPGAs must improve if they are to be part of mainstream computing.
Related: GPUs: A Closer Look | Computing without Processors | Realtime Computer Vision with OpenCV
Related: Abstraction in Hardware System Design | Computing without Processors | Of Processors and Processing
There's Just No Getting around It:
You're Building a Distributed SystemBuilding a distributed system requires a methodical approach to requirements.
Related: Distributed Computing Economics | Condos and Clouds | Monitoring and Control of Large Systems with MonALISA
Resolved: the Internet Is No Place for Critical Infrastructure
Risk is a necessary consequence of dependence.
Cherry-picking and the Scientific Method
Software is supposed be a part of computer science, and science demands proof.
A File System All Its Own
Flash memory has come a long way. Now it's time for software to catch up.
Related: Anatomy of a Solid-state Drive | Enterprise SSDs | Flash Disk Opportunity for Server Applications
Eventual Consistency Today:
Limitations, Extensions, and BeyondHow can applications be built on eventually consistent infrastructure given no guarantee of safety?
Hazy: Making it Easier to Build and Maintain Big-data Analytics
Racing to unleash the full potential of big data with the latest statistical and machine-learning techniques
Related: Eventually Consistent | BASE: An Acid Alternative | Scalable SQL
Related: The Pathologies of Big Data | Condos and Clouds
| How Will Astronomy Archives Survive the Data Tsunami?
Discrimination in Online Ad Delivery
Google ads, black names and white names, racial discrimination, and click advertising
Related: Interactive Dynamics for Visual Analysis | Social Perception | Modeling People and Places with Internet Photo Collections
Queue Portrait #2: Ang Cui
Ang Cui is a Ph.D. student at Columbia University in New York City. His research focuses on embedded devices such as routers, printers and VOIP phones.
He is the inventor of a novel, host-based defense mechanism known as Symbiotes. Symbiotes are designed specifically to retrofit black-box, vulnerable, legacy embedded systems with sophisticated anti-exploitation mechanisms.
In this video portrait, Ang describes how the extent of the embedded threat in real-world environments, discusses novel exploitation techniques for embedded systems—like enterprise networking equipment—and develops practical defenses for embedded systems that constitute our global communication substrate.
Queue Portrait #1: Robert Watson
George Neville-Neil, Queue's Kode Vicious, interviews Robert to learn about an exciting computer science research project at Cambridge.
How Fast is Your Web Site?
Web site performance data has never been more readily available.
The Evolution of Web Development for Mobile Devices
Building Web sites that perform well on mobile devices remains a challenge.
Making the Mobile Web Faster
Mobile performance issues? Fix the back end, not just the client.
Related: High Performance Web Sites | Building Scalable Web Services | Improving Performance on the Internet
Related: Mobile Media: Making It a Reality | Mobile Devices in the Enterprise: CTO Roundtable Overview
Related: Usablity Testing for the Web | Mobile Application Development: Web vs. Native | Streams and Standards: Delivering Mobile Video
A Decade of OS Access-control Extensibility
Open source security foundations for mobile and embedded devices
Our authentication system is lacking. Is improvement possible?
Splinternet Behind the Great Firewall of China
Once China opened its door to the world, it could not close it again.
Related: Building Systems to Be Shared, Securely | ACM CTO Roundtable on Mobile Devices in the Enterprise | Extensible Programming for the 21st Century
Related: Security - Problem Solved? | Building Secure Web Applications | LinkedIn Password Leak: Salt Their Hide
Browser Security Case Study: Appearances Can Be Deceiving
A discussion with Jeremiah Grossman, Ben Livshits, Rebecca Bace, and George Neville-Neil
The Web Won't Be Safe or Secure until We Break It
Unless you've taken very particular precautions, assume every Web site you visit knows exactly who you are.
Related: Java Security Architecture Revisited
| CTO Roundtable: Malware Defense Overview | Building Secure Web Applications
Related: Browser Security | Security In The Browser | Cybercrime 2.0: When The Cloud Turns Dark
- A Generation Lost in the Bazaar
Quality happens only when someone is responsible for it.
Related: Open vs. Closed: Which Source is More Secure? |
The Hyperdimensional Tar Pit | Broken Builds