acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

October 2018


From ACM-W supporting, celebrating and advocating for Women in Computing

Ukrainian ACM CWiC

Ukrainian ACM CWiC

Ukrainian ACM CWiC


From ACM-W supporting, celebrating and advocating for Women in Computing

WeEDR2

WeEDR2

ACM-W Celebration: Women Workshop on Educational Robotics, WeEDR2


From ACM-W supporting, celebrating and advocating for Women in Computing

ChileWic

ChileWic

Chilewic, an ACM celebration


From ACM-W supporting, celebrating and advocating for Women in Computing

womENcourage

womENcourage

womENcourage 2018 – “Creating the Future Together” ACM Celebration of Women in Computing


From ACM-W supporting, celebrating and advocating for Women in Computing

RusCWIC

RusCWIC

RusCWIC An ACM-W Celebration


From Daniel Lemire's Blog

Science and Technology links (October 6th, 2018)

Science and Technology links (October 6th, 2018)

Ibuprofen extends lifespan in many species including, maybe, human beings. Donna Strickland is the third women to win a Nobel prize in Physics. It appears that she won the prize for one 1985 article. Her scientific publications…


From The Eponymous Pickle

Manipulating P Values

Manipulating P Values

More from Vincent Granville in DSC on P-Values and their misuse.  I recall the repeating experiments as a trick in an early statistical analysis course.  perhaps this is more common in other areas, but never saw this kind of

Statistical…


From Computational Complexity

John Sidles, Mike Roman, Matt Howell, please email me/hard to get emails of people

John Sidles, Mike Roman, Matt Howell : please email me. at [email protected] (my usual email)



I need to ask you about some comments you left on the blog a while back (or emailed me -- I forget which, but I can't find your emails…


From The Eponymous Pickle

Defining Cyber Battlespace

Defining Cyber Battlespace

Interesting view.    Also to the extent it can be integrated with some measure, and prediction of risk.    Classic approaches for risk analysis calculates likely, statistical views in a context we are operating in.   The notion…


From The Eponymous Pickle

Honda Smart Intersection View

Honda Smart Intersection View

Clever, we are starting to see better collaboration between people and machines.  Here a good example.  Will kind of car augmentation delay complete self-driving?  Note this is now in test, and requires the intersection to become…


From The Eponymous Pickle

Roles Driving AI Projects

Roles Driving AI Projects

In Forbes, this follows on some of my breadth points. Think of any technical roles being able to either be one of ...  these roles or influence them.

Top 3 Roles Driving A Majority Of AI Projects  in Cognitive World
in Forbes: …


From insideHPC

Summit Supercomputer Breaks Exaop Barrier on Neural Net Trained to Recognize Extreme Weather Patterns

Summit Supercomputer Breaks Exaop Barrier on Neural Net Trained to Recognize Extreme Weather Patterns

A team of computational scientists from LBNL, ORNL, and engineers from NVIDIA has demonstrated an exascale-class deep learning application that has broken the exaop barrier for the first time ever. "Using a climate dataset from…


From insideHPC

Job of the Week: HPC System Administrator at AUS

Job of the Week: HPC System Administrator at AUS

The American University of Sharjah (AUS) is seeking an HPC System Administrator in our Job of the Week. "American University of Sharjah (AUS) invites applications for an HPC System Administrator position commencing in the Spring…


From Schneier on Security

Friday Squid Blogging: Watch Squid Change Colors

Friday Squid Blogging: Watch Squid Change Colors

This is an amazing short video of a squid -- I don't know the species -- changing its color instantly. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my…


From The Eponymous Pickle

Rethinking Sales and Marketing

Rethinking Sales and Marketing

Have always been interested in how resources are delivered, and a big part of that is how the resources are organized and classified for useful application. 

Rethinking The Sales And Marketing Organization  By Dave Brock in Customerthink…


From insideHPC

OARnet in Ohio to Help Researchers Accelerate Big Data Sharing

OARnet in Ohio to Help Researchers Accelerate Big Data Sharing

OARnet recently joined several other regional and federal network organizations on a three-year, $3.5 million grant to help scientists more efficiently work with massive datasets that have become essential to modern scientific…


From The Computing Community Consortium Blog

Request for Comments on NIST IoT Draft Reports

Request for Comments on NIST IoT Draft Reports

The National Institute of Standards and Technology (NIST) has released two new requests for comments on draft publications related to the Internet of Things (IoT). The first document addresses trust concerns within IoT, while…


From insideHPC

Why SC18 is a Key Event for Tackling our Planet’s Toughest Challenges

Why SC18 is a Key Event for Tackling our Planet’s Toughest Challenges

In this special guest feature, SC18 Conference Chair Ralph A. McEldowney writes that HPC is now more crucial than ever to empower science for the benefit of humanity. "From hurricane and earthquake predictions to solving global…


From insideHPC

Video: D‑Wave Rolls Out Leap, A Quantum Application Development Environment

Video: D‑Wave Rolls Out Leap, A Quantum Application Development Environment

Today D-Wave Systems announced the immediate availability of free, real-time access to the D‑Wave Leap Quantum Application Environment. Leap is the first cloud-based QAE providing real-time access to a live quantum computer. …


From insideHPC

Big Data over Big Distance: Zettar Moves a Petabyte over 5000 Miles in 29 Hours

Big Data over Big Distance: Zettar Moves a Petabyte over 5000 Miles in 29 Hours

Today AIC announced a world-record in data transfer: one petabyte in 29 hours encrypted data transfer, with data integrity checksum unconditionally enabled, over a distance of 5000 miles. The average transfer rate is 75Gbps, …


From Schneier on Security

Detecting Credit Card Skimmers

Detecting Credit Card Skimmers

Interesting research paper: "Fear the Reaper: Characterization and Fast Detection of Card Skimmers": Abstract: Payment card fraud results in billions of dollars in losses annually. Adversaries increasingly acquire card data using…


From The Eponymous Pickle

Difficulties in Commonsense Reasoning

Difficulties in Commonsense Reasoning

Abstract of good overview survey paper.

Commonsense Reasoning and Commonsense Knowledge in Artificial Intelligence
By Ernest Davis, Gary Marcus

Communications of the ACM, September 2015, Vol. 58 No. 9, Pages 92-103
10.1145/2701413…


From The Eponymous Pickle

GE and BP with Machine Learning

GE and BP with Machine Learning

Deep Machine Learning: GE And BP Will Connect Thousands Of Subsea Oil Wells To The Industrial Internet ... 

That magic is also the idea behind a new partnership between BP and GE’s Intelligent Platforms unit. Next year, BP will…


From The Eponymous Pickle

Free Open Source Training Data

Free Open Source Training Data

Always looking for good open source data, especially for testing models.  William Vorhies of of DSC talks this.  Sources and links.  Good examples:

Lots of Free Open Source Datasets to Make Your AI Better     Posted by William…


From Computational Complexity

Google added years to my life

If you google



gasarch



you used to  get the following:   here



Please go there and notice how old they say I am.



Okay, you are back. You may have noticed that they say I am 68. Gee, I don't feel 68 (I feel younger).



I have…


From The Eponymous Pickle

The Threat Intelligence Handbook

The Threat Intelligence Handbook

Just reading.   Well done.  See recordedfuture.com      Get the free book here.

The Threat Intelligence Handbook   (108 pages)

A Practical Guide for Security Teams to
Unlocking the Power of Intelligence

Edited by Chris Pace
Foreword…


From The Eponymous Pickle

Ford Looks for Common Car Language

Ford Looks for Common Car Language

Makes lots of sense.

Ford asks for a common language for self-driving cars
It wants every car to signal its intentions the same way.

Jon Fingas, @jonfingas in Engadget

Ford has been developing its own means for self-driving cars


From The Eponymous Pickle

Wal-Mart Sets Standards for SC Blockchains

Wal-Mart Sets Standards for SC Blockchains

An indication that big enterprise are serious, a useful example.

Walmart Sets Blockchain Requirement for Greens Suppliers   By CGT Staff  

Walmart will require all suppliers of leafy green vegetables to its Sam’s Club and Walmart…


From Schneier on Security

Conspiracy Theories Around the "Presidential Alert"

Conspiracy Theories Around the "Presidential Alert"

Noted conspiracy theorist John McAfee tweeted: The "Presidential alerts": they are capable of accessing the E911 chip in your phones - giving them full access to your location, microphone, camera and every function of your phone…


From The Computing Community Consortium Blog

CCC Deputy Director Position Open

CCC Deputy Director Position Open

The Computing Research Association seeks a highly motivated individual to serve as a Deputy Director for the Computing Community Consortium. The Deputy Director works with the CCC Director, Council Members, and the CRA staff…