Home
Videos uploaded by user “Association for Computing Machinery (ACM)”
CACM Mar. 2018 - A Programmable Programming Language
 
03:22
In the ideal world, software developers would analyze each problem in the language of its domain and then articulate solutions in matching terms. In the real world, however, programmers use a mainstream programming language someone else picked for them. The Racket project seeks to address this problem by utilizing the emerging idea of language-oriented programming. In this video, Matthias Felleisen discusses "A Programmable Programming Language" (cacm.acm.org/magazines/2018/3/225475), a Contributed Article in the March 2018 issue of Communications of the ACM. (Racket is available at http://racket-lang.org/).
ACM Turing Award 2012
 
01:18
Shafi Goldwasser, Silvio Micali Receive 2012 ACM Turing Award For Advances In Cryptography Shafi Goldwasser and Silvio Micali laid the foundations of modern theoretical cryptography, taking it from a field of heuristics and hopes to a mathematical science with careful definitions and security models, precise specifications of adversarial capabilities, and rigorous reductions from formally defined computational problems. Their results, jointly and with others, established the now-standard definitions of security for the fundamental primitives of encryption and digital signatures, and provided exemplary implementations meeting the stated security objectives. Even more importantly, their work helped to establish the tone and character of modern cryptographic research. Jointly and in collaboration with others, they provided stunning innovations in the form of random functions, interactive proofs, and zero-knowledge protocols, with implications beyond cryptography to theoretical computer science in general. http://amturing.acm.org
Why I Belong to ACM
 
02:26
Bryan Cantrill, Vice President of Engineering at Joyent, Ben Fried, Chief Information Officer at Google, and Theo Schlossnagle, Chief Executive Officer at OmniTI, discuss motivations and benefits of joining the Association for Computing Machinery (ACM). To join ACM: http://www.acm.org/join/professional/PWEBVID More information about ACM: http://www.acm.org
CACM June 2014 - Leslie Lamport, recipient of the 2013 ACM A.M. Turing Award
 
05:59
ACM's 2013 A.M. Turing Award recipient Leslie Lamport was cited for discovering the field of distributed computing systems that work as intended, making it possible for computers to cooperate, avoid error, and reach consensus. The June 2014 issue of Communications of the ACM details Lamport's innovative advances in an article (cacm.acm.org/news/175166), a Q&A, and an original video highlighting some of his renowned colleagues. In his own voice, he asserts that the best logic for stating things clearly is mathematics, a concept, he notes, that some find controversial. Assessing his body of work, he concludes that he created a path that others have followed to places well beyond his imagination. cacm.acm.org
Celebrating 50 Years of the ACM A.M. Turing Award and Computing's Greatest Achievements
 
04:59
Since its inauguration in 1966, the ACM A. M. Turing Award has recognized major contributions of lasting importance in computing. Through the years, it has become the most prestigious technical award in the field, often referred to as the “Nobel Prize of computing.” During the next several months, ACM will celebrate 50 years of the Turing Award and the visionaries who have received it. Our aim is to highlight the significant impact of the contributions of the Turing Laureates on computing and society, to look ahead to the future of technology and innovation, and to help inspire the next generation of computer scientists to invent and dream. Our celebration will culminate with a conference on June 23 - 24, 2017 at the Westin St. Francis in San Francisco with lively moderated discussions exploring how computing has evolved and where the field is headed. We hope you can join us there, or via the web—we will be streaming the sessions in real time. For more information please visit, http://www.acm.org/turing-award-50
Bryan Cantrill on why he belongs to ACM
 
02:47
Bryan Cantrill, Vice President of Engineering at Joyent, on ability of the Association for Computing Machinery (ACM) to inspire professional excellence, broaden personal horizons, and bridge the academic/practitioner divide. To join ACM: http://www.acm.org/join/professional/PWEBVID More information about ACM: http://www.acm.org
ACM A.M. Turing Award - Whitfield Diffie and Martin E. Hellman
 
04:03
Whitfield Diffe and Martin Hellman received the 2015 ACM A.M. Turing Award for critical contributions to modern cryptography. The ability for two parties to use encryption to communicate privately over an otherwise insecure channel is fundamental for billions of people around the world. On a daily basis, individuals establish secure online connections with banks, e-commerce sites, email servers and the cloud. Diffie and Hellman's groundbreaking 1976 paper, "New Directions in Cryptography," introduced the ideas of public-key cryptography and digital signatures, which are the foundation for most regularly-used security protocols on the Internet today. The Diffie-Hellman Protocol protects daily Internet communications and trillions of dollars in financial transactions.
ACM Author Rights
 
04:07
ACM's expanded Authors' Rights policy offers flexible options that fit computing researchers' individual needs. Authors who publish with ACM can manage their scholarly work through open access pathways to reach the widest possible audience via the ACM Digital Library. Find out how to choose the options that help you take advantage of ACM's reputation as the preferred publisher in the global computing community. Learn more at: http://authors.acm.org/
CACM Feb. 2018 - The Next Phase in the Digital Revolution
 
05:04
Digital Platforms in the computing "cloud" are fundamental features of the digital revolution, entangled with what we term "intelligent tools." An abundance of computing power enabling generation and analysis of data on a scale never before imagined permits the reorganization/transformation of services and manufacturing. How will the increased movement of work to digital platforms provide real and rising incomes with reasonable levels of equality? In this video, John Zysman and Martin Kenney discuss "The Next Phase in the Digital Revolution: Intelligent Tools, Platforms, Growth, Employment," a Contributed Article in the February 2018 issue of Communications of the ACM. Read the full article here: https://cacm.acm.org/magazines/2018/2/224635-the-next-phase-in-the-digital-revolution
CACM Mar 2015 - Local Laplacian Filters  Edge aware Image Processing with a Laplacian Pyramid HD
 
04:40
Co-author Sylvain Paris discusses "Local Laplacian Filters: Edge-aware Image Processing with a Laplacian Pyramid," the Research Highlights article published in the March 2015 Communications of the ACM (cacm.acm.org/magazines/2015/3/183587).
CACM Mar. 2016 - Lessons Learned from 30 Years of MINX
 
04:20
Andrew S. Tanenbaum, the author of the MINX operating system, discusses "Lessons Learned from 30 Years of MINIX" (cacm.acm.org/magazines/2016/3/198874), his Contributed Article in the March 2016 CACM.
Program your next server in Go
 
01:02:06
Author: Sameer Ajmani Abstract: Go is a new general-purpose programming language for professionals who build and maintain production systems. Hundreds of companies and thousands of open-source projects are using Go, including Google, DropBox, Docker, Apcera, and SoundCloud. This talk will present Go to the experienced service developer and show how its radically simple approach to software construction can make teams more productive. ACM DL: http://dl.acm.org/citation.cfm?id=2960078 DOI: http://dx.doi.org/10.1145/2959689.2960078
CACM July 2016 - The Rise of Social Bots
 
03:48
A social bot is a computer algorithm that automatically produces content and interacts with humans on social media, trying to emulate and possibly alter their behavior. These bots have become more prevalent on social networking sites in the past few years. In this video, Emilio Ferrara discusses "The Rise of Social Bots" (cacm.acm.org/magazines/2016/7/204021), a Review Article in the July 2016 Communications of the ACM.
CACM August 2016 - Computational Biology in the 21st Century
 
04:01
In the past two decades, biological data sets have become so massive that it has become difficult to analyze them to discover patterns that illuminate underlying biological processes. In this video, Bonnie Berger discusses "Computational Biology in the 21st Century,” a Review Article in the August 2016 Communications of the ACM.(http://cacm.acm.org/magazines/2016/8/205052-computational-biology-in-the-21st-century/fulltext)
Carver Mead - Semiconductors
 
27:33
ACM97 Speaker: Carver Mead Position: Gordon and Betty Moore Professor of Engineering and Applied Science, California Institute of Technology Talk: Semiconductors Running time: 26 minutes
From L3 to seL4 what have we learnt in 20 years of L4 microkernels?
 
33:45
The L4 microkernel has undergone 20 years of use and evolution. It has an active user and developer community, and there are commercial versions which are deployed on a large scale and in safety-critical systems. In this paper we examine the lessons learnt in those 20 years about microkernel design and implementation. We revisit the L4 design papers, and examine the evolution of design and implementation from the original L4 to the latest generation of L4 kernels, especially seL4, which has pushed the L4 model furthest and was the first OS kernel to undergo a complete formal verification of its implementation as well as a sound analysis of worst-case execution times. We demonstrate that while much has changed, the fundamental principles of minimality and high IPC performance remain the main drivers of design and implementation decisions. In the ACM Digital Library: http://dl.acm.org/citation.cfm?id=2522720
Celebrating 50 Years of Computing's Greatest Achievements
 
02:15
Since its inauguration in 1966, the ACM A. M. Turing Award has recognized major contributions of lasting importance in computing. Through the years, it has become the most prestigious technical award in the field, often referred to as the “Nobel Prize of computing.” During the next several months, ACM will celebrate 50 years of the Turing Award and the visionaries who have received it. Our aim is to highlight the significant impact of the contributions of the Turing Laureates on computing and society, to look ahead to the future of technology and innovation, and to help inspire the next generation of computer scientists to invent and dream. Our celebration will culminate with a conference on June 23 - 24, 2017 at the Westin St. Francis in San Francisco with lively moderated discussions exploring how computing has evolved and where the field is headed. We hope you can join us there, or via the web—we will be streaming the sessions in real time. For more information please visit, http://www.acm.org/turing-award-50
There is more consensus in Egalitarian parliaments
 
25:50
This paper describes the design and implementation of Egalitarian Paxos (EPaxos), a new distributed consensus algorithm based on Paxos. EPaxos achieves three goals: (1) optimal commit latency in the wide-area when tolerating one and two failures, under realistic conditions; (2) uniform load balancing across all replicas (thus achieving high throughput); and (3) graceful performance degradation when replicas are slow or crash. Egalitarian Paxos is to our knowledge the first protocol to achieve the previously stated goals efficiently---that is, requiring only a simple majority of replicas to be non-faulty, using a number of messages linear in the number of replicas to choose a command, and committing commands after just one communication round (one round trip) in the common case or after at most two rounds in any case. We prove Egalitarian Paxos's properties theoretically and demonstrate its advantages empirically through an implementation running on Amazon EC2. In the ACM Digital Library: http://dl.acm.org/citation.cfm?id=2517350
Inside Websockets
 
39:12
Author: Leah Hanson Abstract: This talk will focus on how WebSockets work -- the details of the protocol and why they are the way they are. Protocol design is about tradeoffs, and if you pick the wrong tradeoff, you may regret it for a very long time. Were going to take a look at the tradeoffs that the WebSockets protocol made and talk about how you can apply the same principles to your own protocols. ACM DL: http://dl.acm.org/citation.cfm?id=2960084 DOI: http://dx.doi.org/10.1145/2959689.2960084
The ACM A.M. Turing Award
 
01:53
The A.M. Turing Award, the ACM's most prestigious technical award, is given for major contributions of lasting importance to computing. Recipients are invited to give the annual A.M. Turing Award Lecture. The award is also accompanied by a cash prize of $1,000,000, which in recent years has been underwritten by Google, Inc. This video provides an overview of the origins of the award.
Computer Science, Zuckerberg and Video Games
 
02:33
From his February 14, 2013 Google+ Hangout, President Obama discusses the importance of computer science in preparing the nation's future workforce.
John Hennessy and David Patterson 2017 ACM A.M. Turing Award Lecture
 
01:19:38
2017 ACM A.M. Turing Award recipients John Hennessy and David Patterson delivered their Turing Lecture on June 4 at ISCA 2018 in Los Angeles. The lecture took place from 5 - 6 p.m. PDT and was open to the public. Titled “A New Golden Age for Computer Architecture: Domain-Specific Hardware/Software Co-Design, Enhanced Security, Open Instruction Sets, and Agile Chip Development,” the talk will cover recent developments and future directions in computer architecture. Hennessy and Patterson were recognized with the Turing Award for “pioneering a systematic, quantitative approach to the design and evaluation of computer architectures with enduring impact on the microprocessor industry.”
UIST 2015 Technical Program Preview
 
05:12
A glimpse at the exciting technical program coming up at UIST 2015 in Charlotte, 8-11 November 2015. www.uist.org ----------------------------- Music is Big Car Theft by Jason Shaw http://freemusicarchive.org/music/Jason_Shaw/Audionautix_Tech_Urban_Dance/TU-BigCarTheft
CACM Sept. 2015 - Commonsense Reasoning and Commonsense Knowledge in Artificial Intelligence
 
04:52
Ernest Davis and Gary Marcus discuss the shortcomings of AI systems and "Commonsense Reasoning and Commonsense Knowledge in Artificial Intelligence," their Review Article in the September 2015 Communications of the ACM. http://cacm.acm.org/magazines/2015/9/191169
The Challenges of Writing a Massive and Complex Go Application
 
01:01:46
Author: Ben Darnell Abstract: We opted for Go when building CockroachDB, a scale-out, relational database, because of its support for libraries, interfaces, and tooling. However, it has come with its own frustrations, often related to performance and synchronization. And as for Cgo, RocksDB, and other critical external libraries, we've had to hunt down or develop creative workarounds to ensure they work well the rest of the toolchain. In this talk, we'll share how we've optimized our memory usage to mitigate issues related to garbage collection and improved our use of channels to avoid deadlocks. We will also share creative techniques to integrate non-Go dependencies into the Go build process. ACM DL: http://dl.acm.org/citation.cfm?id=2960085 DOI: http://dx.doi.org/10.1145/2959689.2960085
The scalable commutativity rule: designing scalable software for multicore processors
 
30:20
What fundamental opportunities for scalability are latent in interfaces, such as system call APIs? Can scalability opportunities be identified even before any implementation exists, simply by considering interface specifications? To answer these questions this paper introduces the following rule: Whenever interface operations commute, they can be implemented in a way that scales. This rule aids developers in building more scalable software starting from interface design and carrying on through implementation, testing, and evaluation. To help developers apply the rule, a new tool named Commuter accepts high-level interface models and generates tests of operations that commute and hence could scale. Using these tests, Commuter can evaluate the scalability of an implementation. We apply Commuter to 18 POSIX calls and use the results to guide the implementation of a new research operating system kernel called sv6. Linux scales for 68% of the 13,664 tests generated by Commuter for these calls, and Commuter finds many problems that have been observed to limit application scalability. sv6 scales for 99% of the tests. In the ACM Digital Library: http://dl.acm.org/citation.cfm?id=2522712
CACM July 2015 - Unifying Logic and Probability
 
05:28
Stuart Russell discusses the BLOG (Bayesian logic) language and open-universe probability models, the subject of "Unifying Logic and Probability," his Review Article in the July 2015 Communications of the ACM. Perhaps the most enduring idea from the early days of AI is that of a declarative system reasoning over explicitly represented knowledge with a general inference engine. Such systems require a formal language to describe the real world; and the real world has things in it. For this reason, classical AI adopted first-order logic—the mathematics of objects and relations—as its foundation. http://cacm.acm.org/magazines/2015/7/188745
CACM July 2016 - Inverse Privacy
 
03:25
Institutions are now much better than you at recording data. As a result, shared data decays into inversely private. More inversely private information is produced when institutions analyze your private data. In this video, Jeannette Wing discusses "Inverse Privacy," (cacm.acm.org/magazines/2016/7/204020), a Viewpoint column in the July 2016 Communications of the ACM.
On Methodology: Turing Laureates Discuss their Approach to Work
 
09:48
In this video from ACM's Celebration of 50 Years of the A.M. Turing Award, Turing Laureates Andrew Yao, Marvin Minsky, Herbert Simon, Shafi Goldwasser, James Gray, Edmund Clarke and Richard Karp discuss their approach to work and share advice for those who aspire to follow in their footsteps.
The History of Rust
 
58:42
Author: Steve Klabnik Abstract: The Rust programming language recently celebrated its one year anniversary since 1.0. While that's not a long time, there were eight years of development before that, which saw radical changes in the language. In this talk, Steve will show off some of Rust's history, with all of the decisions and changes that were made along the way. ACM DL: http://dl.acm.org/citation.cfm?id=2960081 DOI: http://dx.doi.org/10.1145/2959689.2960081
Past and future of hardware and architecture
 
30:50
Author: David Patterson Abstract: We start by looking back at 50 years of computer architecture, where philosophical debates on instruction sets (RISC vs. CISC, VLIW vs. RISC) and parallel architectures (NUMA vs clusters) were settled with billion dollar investments on both sides. In the second half, we look forward. First, Moore's Law is ending, so the free ride is over software-oblivious increasing performance. Since we've already played the multicore card, the most-likely/only path left is domain-specific processors. The memory system is radically changing too. First, Jim Gray's decade-old prediction is finally true: "Tape is dead; flash is disk; disk is tape." New ways to connect to DRAM and new non-volatile memory technologies promise to make the memory hierarchy even deeper. Finally, and surprisingly, there is now widespread agreement on instruction set architecture, namely Reduced Instruction Set Computers. However, unlike most other fields, despite this harmony has been no open alternative to proprietary offerings from ARM and Intel. RISC-V ("RISC Five") is the proposed free and open champion. It has a small base of classic RISC instructions that run a full open-source software stack; opcodes reserved for tailoring an System-On-a-Chip (SOC) to applications; standard instruction extensions optionally included in an SoC; and it is unrestricted: there is no cost, no paperwork, and anyone can use it. The ability to prototype using ever-more-powerful FPGAs and astonishingly inexpensive custom chips combined with collaboration on open-source software and hardware offers hope of a new golden era for hardware/software systems. ACM DL: http://dl.acm.org/citation.cfm?id=2830903.2830910 DOI: http://dx.doi.org/10.1145/2830903.2830910
Large-scale cluster management at Google with Borg
 
27:55
Authors: Abhishek Verma, Luis Pedrosa, Madhukar Korupolu, David Oppenheimer, Eric Tune, John Wilkes Abstract: Google's Borg system is a cluster manager that runs hundreds of thousands of jobs, from many thousands of different applications, across a number of clusters each with up to tens of thousands of machines. It achieves high utilization by combining admission control, efficient task-packing, over-commitment, and machine sharing with process-level performance isolation. It supports high-availability applications with runtime features that minimize fault-recovery time, and scheduling policies that reduce the probability of correlated failures. Borg simplifies life for its users by offering a declarative job specification language, name service integration, real-time job monitoring, and tools to analyze and simulate system behavior. We present a summary of the Borg system architecture and features, important design decisions, a quantitative analysis of some of its policy decisions, and a qualitative examination of lessons learned from a decade of operational experience with it. ACM DL: http://dl.acm.org/citation.cfm?id=2741964 DOI: http://dx.doi.org/10.1145/2741948.2741964
Pivot tracing: dynamic causal monitoring for distributed systems
 
34:34
Authors: Jonathan Mace, Ryan Roelke, Rodrigo Fonseca Abstracts: Monitoring and troubleshooting distributed systems is notoriously difficult; potential problems are complex, varied, and unpredictable. The monitoring and diagnosis tools commonly used today -- logs, counters, and metrics -- have two important limitations: what gets recorded is defined a priori, and the information is recorded in a component- or machine-centric way, making it extremely hard to correlate events that cross these boundaries. This paper presents Pivot Tracing, a monitoring framework for distributed systems that addresses both limitations by combining dynamic instrumentation with a novel relational operator: the happened-before join. Pivot Tracing gives users, at runtime, the ability to define arbitrary metrics at one point of the system, while being able to select, filter, and group by events meaningful at other parts of the system, even when crossing component or machine boundaries. We have implemented a prototype of Pivot Tracing for Java-based systems and evaluate it on a heterogeneous Hadoop cluster comprising HDFS, HBase, MapReduce, and YARN. We show that Pivot Tracing can effectively identify a diverse range of root causes such as software bugs, misconfiguration, and limping hardware. We show that Pivot Tracing is dynamic, extensible, and enables cross-tier analysis between inter-operating applications, with low execution overhead. ACM DL: http://dl.acm.org/citation.cfm?id=2815400.2815415 DOI: http://dx.doi.org/10.1145/2815400.2815415
CACM Oct. 2018 - Human-Level Intelligence or Animal-Like Abilities?
 
04:30
The recent successes of neural networks in applications like speech recognition, vision, and autonomous navigation has led to great excitement by members of the artificial intelligence (AI) community, as well as by the general public. Over a relatively short time, by the science clock, we managed to automate some tasks that have defied us for decades, using one of the more classical techniques due to AI research. The triumph of these achievements has led some to describe the automation of these tasks as having reached human-level intelligence. This perception, originally hinted at in academic circles, has gained momentum more broadly and is leading to some implications. In this video, Adnan Darwiche discusses "Human-Level Intelligence or Animal-Like Abilities?" (https://cacm.acm.org/magazines/2018/10/231373), a Contributed Article in the October 2018 Communications of the ACM.
CACM June 2018 David Patterson and John Hennessy, 2017 ACM A.M.  Turing Award
 
08:13
At a time when "making an impact" can feel like a vague or even overwhelming prospect, it's worth reviewing the accomplishments of two scientists who have done just that: ACM A.M. Turing Award recipients John Hennessy and David Patterson. What began as a simple-sounding insight—that you could improve microprocessor performance by including only instructions that are actually used—blossomed into a paradigm shift as the two honed their ideas in the MIPS (Microprocessor without Interlocked Pipeline Stages) and RISC (Reduced Instruction Set Computer) processors, respectively. A subsequent textbook, Computer Architecture: A Quantitative Approach, introduced generations of students not just to that particular architecture, but to critical principles that continue to guide designers as they balance constraints and strive for maximum efficiency. In this video, Hennessy and Patterson discuss their pioneering work, their partnership, and the future of computer architecture.
Extracting Energy from the Turing Tarpit
 
32:55
Talk by ACM A.M. Turing Laureate Alan C. Kay during the ACM A.M. Turing Centenary Celebration, June, 2012. Abstract: Part of Turing's fame and inspiration came from showing how a simple computer can simulate every other computer, and so "anything is possible". The "Turing Tarpit" is getting caught by "anything is possible but nothing is easy". One way to get caught is to stay close to the underlying machine with our languages so that things seem comprehensible in the small but the code blows up into intractable millions of lines. What if we used "anything is possible" to make very different kinds of computers which require new learning but the code compactly fits the problem and stays small?
"Advances in Deep Neural Networks," at ACM Turing 50 Celebration
 
01:15:46
Deep neural networks can be trained with relatively modest amounts of information and then successfully be applied to large quantities of unstructured data. Deep learning techniques have been applied with great success to areas such as speech recognition, image recognition, natural language processing, drug discovery and toxicology, customer relationship management, recommendation systems, and biomedical informatics. The capabilities of deep neural networks, in some domains, have proven to rival those of human beings. Panelists will explore how deep neural networks are changing our world and our jobs. They will also discuss how things may further change going forward. Moderator: Judea Pearl (2011 Turing Laureate), University of California, Los Angeles Panelists: Michael I. Jordan, University of California, Berkeley Fei-Fei Li, Stanford University Stuart Russell, University of California, Berkeley Ilya Sutskever, OpenAI Raquel Urtasun, University of Toronto
ACM Queue Inspirations with Jim Waldo HD
 
04:15
Jim Waldo, Chief Technology Officer at Harvard University, discusses his work on data de-identification, and the question of how to protect user privacy while aggregating accurate models. Download the Queue app here: https://queue.acm.org/app/landing.cfm
Naiad: a timely dataflow system
 
27:37
Naiad is a distributed system for executing data parallel, cyclic dataflow programs. It offers the high throughput of batch processors, the low latency of stream processors, and the ability to perform iterative and incremental computations. Although existing systems offer some of these features, applications that require all three have relied on multiple platforms, at the expense of efficiency, maintainability, and simplicity. Naiad resolves the complexities of combining these features in one framework. A new computational model, timely dataflow, underlies Naiad and captures opportunities for parallelism across a wide class of algorithms. This model enriches dataflow computation with timestamps that represent logical points in the computation and provide the basis for an efficient, lightweight coordination mechanism. We show that many powerful high-level programming models can be built on Naiad's low-level primitives, enabling such diverse tasks as streaming data analysis, iterative machine learning, and interactive graph mining. Naiad outperforms specialized systems in their target application domains, and its unique features enable the development of new high-performance applications. In the ACM Digital Library: http://dl.acm.org/citation.cfm?id=2522738
CACM September 2018 - A Domain Specific Architecture for Deep Neural Networks
 
05:18
The ending of Moore's Law leaves domain-specific architectures as the future of computing. A trailblazing example is the Google's tensor processing unit (TPU), first deployed in 2015, and that provides services today for more than one billion people. It runs deep neural networks (DNNs) 15 to 30 times faster with 30 to 80 times better energy efficiency than contemporary CPUs and GPUs in similar technologies. In this video, Cliff Young and David Patterson discuss "A Domain-Specific Architecture for Deep Neural Networks," a Contributed Article in the September 2018 issue of Communications of the ACM.
Utilizing the other 80% of your system's performance: Starting with Vectorization
 
01:14:59
Vectorization, as opposed to parallelization, is less utilized as a means of exploiting the full capabilities of a processor. This is a problem since even today this means only ¼ to ½ of the performance of the CPU is used. This is only getting worse in future, especially as accelerators are becoming more prevalent. After an introduction to the basics and history of vectorization the talk will introduce various techniques available for vectorization of compiled code. This talk will focus on gcc and for some details on Linux but the knowledge should be transferable if the features are fully implemented elsewhere. Ulrich Drepper http://dx.doi.org/10.1145/2742580.2742805
CACM June 2015 - Michael Stonebraker 2014 ACM A M Turing Award Recipient
 
04:40
Michael Stonebraker, recipient of the 2014 ACM A.M. Turing Award, bridges the worlds of academia and industry and advocates others do the same. He emphasizes the importance of using academic ideas to build practical applications. Stonebraker discusses his work on INGRES, Edgar Codd's influence, and the state of today's relational database systems in the June 2015 issue of CACM, http://cacm.acm.org/magazines/2015/6.
CACM May 2018 - Speech Emotion Recognition
 
04:36
In the 22 years since what is arguably first research paper on the topic of Speech Emotion Recognition was published, the field has come a long way -- SRE technologies by the names of Alexa, Cortana, Siri, and many others are now on the consumer market on a broader basis than ever. But do any of them truly notice our emotions and react to them like a human conversational partner would? In this video, Björn Schuller discusses "Speech Emotion Recognition: Two Decades in a Nutshell, Benchmarks, and Ongoing Trends," (cacm.acm.org/magazines/2018/5/227191), a Review Article in the May 2018 Communications of the ACM.
CACM May 2016 - Parallel Graph Analytics
 
03:37
Co-authors Andrew Lenharth and Keshav Pingali discuss "Parallel Graph Analytics" (cacm.acm.org/magazines/2016/5/201591), a Contributed Article in the May 2016 CACM.
“Computer Science as a Major Body of Accumulated Knowledge,” at ACM Turing 50 Celebration
 
29:13
1974 Turing Award recipient Donald Knuth and author of “The Art of Computer Programming” discusses the nature of computer science as a discipline and its relationship to other scientific fields.
Tick Tock, malloc Needs a Clock
 
36:49
The jemalloc memory allocator is well known for low fragmentation and high concurrency, yet those two strengths sabotage each other. Eager free memory coalescence facilitates fragmentation avoidance, but concurrency scalability benefits from large and loosely coupled caches. Historically jemalloc has cached conservatively, with especially deleterious effects during rapid, large memory usage fluctuations. This is because jemalloc's only sense of time has been in terms of allocation events, thus precluding work postponement. This talk will provide an overview of jemalloc internals, critically analyze several past approaches to cache management, and describe multiple opportunities enabled by wall clock awareness. Jason Evans http://dx.doi.org/10.1145/2742580.2742807
Bruce Sterling -  The dark side impacts of IT on society
 
34:06
ACM97 Speaker: Bruce Sterling Position: Author, journalist, editor, and critic of science fiction and non-fiction Talk: The dark side impacts of IT on society Running time: 33 minutes
Keynote - Systems at Facebook Scale
 
43:37
Behind it's infrastructure serving 1 billion users, the systems abstractions that Facebook uses provide performance and stability for it's services. Ben Maurer will discuss some of the techniques that have made Facebook efficient and reliable ranging from preventing outages with smart queuing to optimizing memory usage for modern processors Ben Maurer http://dx.doi.org/10.1145/2742580.2742644
CACM August 2016 - Ur/Web: A Simple Model for Programming the Web
 
02:56
Ur/Web, is a domain-specific, statically typed functional programming language with a much simpler model for programming modern Web applications. In this video, Adam Chlipala discusses "Ur/Web: A Simple Model for Programming the Web" (cacm.acm.org/magazines/2016/8/205041), his Research Highlights article in the August 2016 Communications of the ACM.
Systems Architecture, Design, Engineering, and Verification
 
01:08:09
Chair: Dahlia Malkhi Panel: Fernando J. Corbato, E. Allen Emerson, Joseph Sifakis, Ken Thompson Abstract More than any other area in computer science, the interaction and boundary between science and engineering is blurred in the systems area, with cross fertilization from both directions. The systems panel will explore the past, present and future relationship between systems research and engineering practice. Panel members will review their past award-winning research in perspective, and describe its impact on the computing world. They will discuss the relationship between systems research and engineering practices: when does systems innovation emanating from industry become an invention and when does academic research stop being science and become engineering? How does practice-driven research impact the real world and how does the real world reflect back on foundations? In what forms does technology create research challenges, and in what manner does applied research give solid base for development? They will surmise about the future of systems research: What are the fundamental challenges posed by the scale of today's cloud computing systems and mega-size data centers? How to organize software of large-scale distributed executions or mega-ton lines of code? What new opportunities are enabled by novel technologies like flash memory and transactional memory? How to integrate hand-in-hand design of software and architecture?

Sample cover letter for any vacant position application
Country club cover letters
Graphic design cover letter examples aiga chicago
Unemployment application las vegas nv
Cover letter for debt collector resume sample