acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

March 2015


From insideHPC

OpenPOWER Showcases Real Hardware including Prototype HPC Server

OpenPOWER Showcases Real Hardware including Prototype HPC Server

The OpenPOWER Foundation showed off real hardware for the first time today with 13 systems including a a prototype HPC server from IBM and new microprocessor customized for China.


From My Biased Coin

Double Hashing (Lueker and Molodowitch)

Double Hashing (Lueker and Molodowitch)

A subject I've grown interested in, related to multiple-choice hashing schemes, is when (and why) double hashing can be used in place of "random hashing" with an asymptotically negligible difference in performance.One early,More…


From Putting People First

The considerations and limitations of feedback as a strategy for behaviour change

The considerations and limitations of feedback as a strategy for behaviour change

The considerations and limitations of feedback as a strategy for behaviour change Garrath T. Wilsona, Tracy Bhamraa & Debra Lilleya, Loughborough Design School, Loughborough, UK Published online: 12 Mar 2015 – Taylor & Francis…


From The Eponymous Pickle

GSMA Telecom MarketPlace

GSMA Telecom MarketPlace

Brought to my attention by Vinimaya, a long time provider of online marketplaces for efficient procurement. Now they are announcing a new service that effectively connects buyers and sellers in Telecom.Much more here, with some…


From insideHPC

Why HPC is Too Important to be Left to Men

Why HPC is Too Important to be Left to Men

"Does it matter if women in HPC are clustered in certain areas of work? I think that it does. It is vital in an industry where multi-skilled, interdisciplinary teams are seen as the model of the future that women are not there…


From insideHPC

Video: A Taste of OFI OpenFabrics Interfaces

Video: A Taste of OFI OpenFabrics Interfaces

In this video from the 2015 OFS Developer’s Workshop, Sean Hefty from Intel presents: A Taste of OFI OpenFabrics Interfaces.


From insideHPC

Genomics and Big Data

Genomics and Big Data

Advances in computational biology as applied to NGS workflows have led to an explosion of sequencing data. All that data has to be sequenced, transformed, analyzed, and stored. The machines capable of performing these computations…


From insideHPC

Livestream: GTC Keynote on Deep Learning at Google at 11:00am PT

Livestream: GTC Keynote on Deep Learning at Google at 11:00am PT

This week insideHPC will be streaming live keynotes from the GPU Technology Conference in San Jose. Today's keynote will feature Google Senior Fellow Jeff Dean. "Google has built large-scale computer systems for training neural…


From The Eponymous Pickle

Behavioral Analysis and Motivation

Behavioral Analysis and Motivation

I was reminded of the work of Professor BJ Fogg at Stanford, which we used in a number of projects His site describing his work on human behavioral Analysis and motivation.  Worth a look.  More at his tag below, even hints at…


From The Eponymous Pickle

Classification Example Using Deep learning

Classification Example Using Deep learning

Want to understand the use of artificial neural networks for analytics?" ... The National Data Science Bowl, a data science competition where the goal was to classify images of plankton, ... participated with six other members…


From insideHPC

Dr. Jürgen Kohler from Daimler AG to Keynote ISC High Performance in July

Dr. Jürgen Kohler from Daimler AG to Keynote ISC High Performance in July

In his Monday address at ISC High Performance on July 13, Dr. Kohler, who is also the Chair of the PRACE Industrial Advisory Committee, will introduce the integration of digital prototyping at the business unit, Mercedes-Benz…


From The Eponymous Pickle

Looking for Hard to Find Data

Looking for Hard to Find Data

Classic problem.  You have internal data to support an analytic decision.  But you don't have the data required to support the results of the analysis to maximize its value.  Here a service that addresses the problem." ... DaaS…


From Schneier on Security

How We Become Habituated to Security Warnings on Computers

How We Become Habituated to Security Warnings on Computers

New research: "How Polymorphic Warnings Reduce Habituation in the Brain ­- Insights from an fMRI Study." Abstract: Research on security warnings consistently points to habituation as a key reason why users ignore security warnings…


From Schneier on Security

Friday Squid Blogging: Squid Stir-Fry

Friday Squid Blogging: Squid Stir-Fry

Spicy squid masala stir-fry. Easy and delicious. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....


From Schneier on Security

How the CIA Might Target Apple's XCode

How the CIA Might Target Apple's XCode

The Intercept recently posted a story on the CIA's attempts to hack the iOS operating system. Most interesting was the speculation that it hacked XCode, which would mean that any apps developed using that tool would be compromised…


From insideHPC

Allinea Extends Performance Tools to CUDA

Allinea Extends Performance Tools to CUDA

Today Allinea announced CUDA 7 support for its DDT debugger. The news will be welcomed by HPC developers using the company's Allinea Forge unified programming environment, which includes DDT and the Allinea MAP profiler.


From Putting People First

The smartphone society

The smartphone society

Just as the automobile defined the twentieth century, the smartphone is reshaping how we live and work today. Boston University sociology lecturer Nicole Aschoff explores it aLL. Half way down her leftist criticism of how the…


From Schneier on Security

Threats to Information Integrity

Threats to Information Integrity

Every year, the Director of National Intelligence publishes an unclassified "Worldwide Threat Assessment." This year's report was published two weeks ago. "Cyber" is the first threat listed, and includes most of what you'd expect…


From Schneier on Security

Details on Hacking Team Software Used by Ethiopian Government

Details on Hacking Team Software Used by Ethiopian Government

The Citizen Lab at the University of Toronto published a new report on the use of spyware from the Italian cyberweapons arms manufacturer Hacking Team by the Ethiopian intelligence service. We previously learned that the government…


From Schneier on Security

Fall Seminar on Catastrophic Risk

Fall Seminar on Catastrophic Risk

I am planning a study group at Harvard University (in Boston) for the Fall semester, on catastrophic risk. Berkman Study Group -- Catastrophic Risk: Technologies and Policy Technology empowers, for both good and bad. A broad…


From The Eponymous Pickle

P&G Builds New Beauty Innovation Center

P&G Builds New Beauty Innovation Center

A continuation of the construction of specialized and global innovation centers that started in 2000.  See this innovation center link for many more examples. " .... Procter & Gamble Co. revealed today it will spend at leastConstruction…


From The Eponymous Pickle

Data Visualization Playbook

Data Visualization Playbook

Revisiting the basics.   Nicely done.   I add, always consider visualization as a form of analytics, and the one that should always be used first.  Your eye is the best anomaly detector.  Keep what you use as understandable and…


From The Eponymous Pickle

Intel's Curie Wearable Component

Intel's Curie Wearable Component

The Curie Wearable.  It won't be a fashion statement.    But an  interesting component for future IOT applications.   Most interesting, its very small size and its low power consumption," ... Intel wants wearable device technology…


From The Eponymous Pickle

Sammy Haroon in The BusinessMakers

Sammy Haroon in The BusinessMakers

My longtime colleague at Procter & Gamble is featured on an interview in The BusinessMakers. He gives P&G good credit in molding him.   Nicely done Sammy!   He now works in a Baker Hughes innovation group in Palo Alto, CA   I…


From insideHPC

Cavium Adds GPU Support to 64-bit ARMv8-A ThunderX Processor Family

Cavium Adds GPU Support to 64-bit ARMv8-A ThunderX Processor Family

Today Cavium announced support for Nvidia Teslas GPUs in its ThunderX ARM processor family.


From The Computing Community Consortium Blog

It Just Got Harder to Hide

It Just Got Harder to Hide

Back in 2001, two computer scientists named Paul Viola and Michael Jones came up with a face detection algorithm called Detector Cascade. The algorithm was so simple and fast that it was built into many commercial products such…


From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of March 16

Hill Tech Happenings, Week of March 16

March 17 Hearing: The House Oversight and Government Reform Committee will hold a hearing on “FCC: Process and Transparency.” 10 a.m., 2154 Rayburn Building The Senate Health, Education, Labor and Pensions Committee will hold…


From The Eponymous Pickle

Watson, the VA and PTSD

Watson, the VA and PTSD

An interesting example for Watson, in Mashable: "  ... IBM and the U.S. Dept. of Veterans Affairs (VA) announced they'll be using IBM's Watson to develop a clinical reasoning system to help primary care physicians treat veterans…


From insideHPC

E4 Rolls Out ARM-based ARKA Servers for HPC and Big Data

E4 Rolls Out ARM-based ARKA Servers for HPC and Big Data

Today E4 Computer Engineering from Italy announced a new series of ThunderX ARMv8-A enabled ARKA dense computing sever product line.


From The Eponymous Pickle

Big Data and AI

Big Data and AI

It makes sense to connect the two more strongly.The tech industry is placing new bets on artificial intelligence, using massive data sets and powerful computers trying to revive the long sought technology. Thanks to Big Data.

« Prev 1 6 7 8 9 10 16 Next »