Blog post

Gaming Piracy - Separating Fact from Fiction

I’m sure most of us have all seen and heard the news recently that’s flared up again on Gaming Piracy and DRM issues.   I’d like to address what I feel is one of the most misunderstood, and taken o

Authored by Last updated on 05/28/2018 - 18:28
Blog post

OpenMP* 4.0 may offer important solutions for targeting and vectorization

The upcoming OpenMP 4.0 will be discussed at SC12, and there wil

Authored by James R. (Blackbelt) Last updated on 05/28/2018 - 18:28
Blog post

Doctor Fortran in "Source Form Just Wants to be Free"

In the beginning, there was only one source form for FORTRAN (as it was then known) programs. Each statement was exactly 72 characters long - no more, no less.

Authored by Last updated on 05/28/2018 - 18:28
Blog post

Go Parallel

This is a first post in a series of posts about parallel programming with

Authored by Dmitry Vyukov Last updated on 05/28/2018 - 18:30
Blog post

The Last Line Effect

Authored by Andrey Karpov (Blackbelt) Last updated on 05/30/2018 - 07:00
Blog post

Advanced Computer Concepts for the (Not So) Common Chef: The Multi-core Industrial Kitchen

This is going to be a short blog as there is no new material to discuss, just a simple extension of the earlier blogs (see

Authored by Last updated on 07/06/2019 - 17:10
Blog post

Using Whitelists to Improve Firmware Security

Firmware-based attacks typically attempt to add or modify system firmware modules stored in NVRAM. Tools provided by the open source CHIPSEC project can be used to generate and verify hashes of these modules, so users can detect unauthorized changes.
Authored by Brian Richardson (Intel) Last updated on 05/30/2018 - 07:00