Computing Community Consortium Blog

The goal of the Computing Community Consortium (CCC) is to catalyze the computing research community to debate longer range, more audacious research challenges; to build consensus around research visions; to evolve the most promising visions toward clearly defined initiatives; and to work with the funding organizations to move challenges and visions toward funding initiatives. The purpose of this blog is to provide a more immediate, online mechanism for dissemination of visioning concepts and community discussion/debate about them.


Archive for January 7th, 2014

 

NSF Vacancy Announcement: Division Director, Division of Advanced Cyberinfrastructure

January 7th, 2014 / in Uncategorized / by Shar Steed

The NSF’s Directorate for Computer and Information Science and Engineering (CISE) is looking to fill a vacancy for Division Director, Division of Advanced Cyberinfrastructure (ACI, formerly the Office of Cyberinfrastructure). DUTIES: Serve as a member of the CISE leadership team and as the Foundation’s principal spokesperson in the area of cyberinfrastructure. The Division of Advanced Cyberinfrastucture coordinates and supports the acquisition, development and provision of state-of-the-art cyberinfrastructure resources, tools and services essential to the conduct of 21st century science and engineering research and education.  ACI supports cyberinfrastructure resources, tools and related services such as supercomputers, high-capacity mass-storage systems, system software suites and programming environments, scalable interactive visualization tools, productivity software libraries […]

Washington Area Trustworthy Computing Hour: Roger Dingledine, Tor Project

January 7th, 2014 / in Uncategorized / by Shar Steed

On January 14, 2014, Roger Dingledine will present at the next Washington Area Trustworthy Computing Hour (WATCH). His talk is will be on “The Tor Project in 2013.” Abstract Tor is a free-software anonymizing network that helps people around the world use the Internet in safety. Tor’s 5500 volunteer relays carry traffic for around a million daily users, including ordinary citizens who want protection from identity theft and prying corporations, corporations who want to look at a competitor’s website in private, people around the world whose Internet connections are censored, and even governments and law enforcement. The last year has included major cryptographic upgrades in the Tor software, dozens of research […]