acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

March 2017


From BLOG@CACM

Ethical Theories Spotted in Silicon Valley

Ethical Theories Spotted in Silicon Valley

Some of the prevailing theories of ethics surface in modern high tech.  We take a quick and rather superficial look at their tracks on the ground, noting especially the prominence of virtue ethics in predictions and mission statements…


From insideHPC

Creating Applications with the Intel Computer Vision SDK

Creating Applications with the Intel Computer Vision SDK

"In order for developers to be able to focus on their application, a Vision Algorithm Designer application is included in the Intel Computer Vision SDK. This gives users a drag and drop interface that allows them to create new…


From Schneier on Security

Using Intel's SGX to Attack Itself

Using Intel's SGX to Attack Itself

Researchers have demonstrated using Intel's Software Guard Extensions to hide malware and steal cryptographic keys from inside SGX's protected enclave: Malware Guard Extension: Using SGX to Conceal Cache Attacks Abstract:In modern…


From The Eponymous Pickle

Folding Clothes

Folding Clothes

In a long while ago meeting about how easy it was to do various household tasks,  it was brought up that while washing clothes was relatively easy, folding them from an arbitrary pile was hard.    Well now the problem is solved…


From The Eponymous Pickle

Doing Machine Learning in Excel

Doing Machine Learning in Excel

Although we never recommended using Excel for things like this in the enterprise, it might be useful for someone who is already an Excel expert to get started in machine learning methods.  From DSC, nicely done.

Doing real machine…


From insideHPC

Video: SSD – The Transition from 2D to 3D NAND

Video: SSD – The Transition from 2D to 3D NAND

In this video from the Open Compute Summit, Walter Hinton, Senior Global Director of Enterprise & Client Compute Solutions Marketing at Western Digital presents: The State of the Solid State Drive SSD. "In 2013, Western Digital…


From Schneier on Security

IoT Teddy Bear Leaked Personal Audio Recordings

IoT Teddy Bear Leaked Personal Audio Recordings

CloudPets are an Internet-connected stuffed animals that allow children and parents to send each other voice messages. Last week, we learned that Spiral Toys had such poor security that it exposed 800,000 customer credentials…


From The Eponymous Pickle

Data Mining and Advertising Targets

Data Mining and Advertising Targets

How Data Mining Can Help Advertisers Hit Their Targets?

Wharton's Shawndra Hill discusses her research on TV ads and online search.

Podcast and text: 

Shawndra Hill, a senior fellow at the Wharton Customer Analytics Initiative,…


From insideHPC

PBS Works User Group comes to Las Vegas May 22-25

PBS Works User Group comes to Las Vegas May 22-25

Altair will host the PBS Works User Group May 22-25 in Las Vegas. This four-day event (including 2 days of user presentations, round table discussions and surrounded by hands-on workshops) is the global user event of the year…


From insideHPC

Day-Long Deep Learning Track Comes to ISC 2017

Day-Long Deep Learning Track Comes to ISC 2017

Today ISC 2017 announced a day-long Deep Learning track on June 21 as part of its technical program. The full conference takes place June 18-21 in Frankfurt, Germany. "The overwhelming success of deep learning has triggered a…


From insideHPC

Flatiron Institute to Repurpose Gordon Supercomputer

Flatiron Institute to Repurpose Gordon Supercomputer

The majority of SDSC’s data-intensive Gordon supercomputer will be used by Simons for ongoing research following completion of the system’s tenure as an NSF resource on March 31."We are delighted that the Simons Foundation has…


From insideHPC

Intel Xeon Phi Memory Mode Programming (MCDRAM) in a Nutshell

Intel Xeon Phi Memory Mode Programming (MCDRAM) in a Nutshell

'In this article, James Reinders discusses one of the “mode” options that Intel Xeon Phi processors have to offer unprecedented configurability: memory modes. For programmers, this is the key option to really study because it…


From The Eponymous Pickle

Remote Repair Challenges in Orbit

Remote Repair Challenges in Orbit

In IEEE Spectrum, quite a detailed article.    Requires making satellites in standard ways and thus easier to repair.  The ultimate example of this.  Much to learn too about robotic challenges under constraints and gathering

Inside…


From The Eponymous Pickle

Turn on HTTPS

Turn on HTTPS

Turn on HTTPS encryption.   A worthwhile security step.  This blog is using it.   No negatives to its use anymore.   More at the link.

It's time to turn on HTTPS: The benefits are well worth the effort
HTTPS websites get a speed…


From Schneier on Security

France Abandons Plans for Internet Voting

France Abandons Plans for Internet Voting

Some good election security news for a change: France is dropping its plans for remote Internet voting, because it's concerned about hacking....


From The Eponymous Pickle

Lowes Using AR to Show How

Lowes Using AR to Show How

Lowes is always doing interesting tech things. On the surface of it sounds like a good idea.  But does visual understanding and experience equal physical skill?   Also see their tests of robots in store.

Lowe's is using AR and…


From CERIAS Blog

Time passes, and we lose friends

Time passes, and we lose friends

[Note: update added March 15, 2017]

2017 has gotten off to a bad start for the security community…and to me, personally.

First, we lost Kevin Ziese. I met Kevin over two decades ago, when he was involved in computer investigations…


From CERIAS Blog

Time passes, and we lose friends

Time passes, and we lose friends

[Note: update added March 15]

2017 has gotten off to a bad start for the security community…and to me, personally.

First, we lost Kevin Ziese. I met Kevin over two decades ago, when he was involved in computer investigations …


From CERIAS Blog

Time passes, and we lose friends

Time passes, and we lose friends

[Note: update added March 15]

2017 has gotten off to a bad start for the security community…and to me, personally.

First, we lost Kevin Ziese. I met Kevin over two decades ago, when he was involved in computer investigations …


From CERIAS Blog

Time passes, and we lose friends

Time passes, and we lose friends

2017 has gotten off to a bad start for the security community…and to me, personally.

First, we lost Kevin Ziese. I met Kevin over two decades ago, when he was involved in computer investigations with the Air Force. I got involved…


From CERIAS Blog

Time passes, and we lose friends

Time passes, and we lose friends

[Note: update added March 15]

2017 has gotten off to a bad start for the security community…and to me, personally.

First, we lost Kevin Ziese. I met Kevin over two decades ago, when he was involved in computer investigations …


From CERIAS Blog

Time passes, and we lose friends

Time passes, and we lose friends

[Note: update added March 15]

2017 has gotten off to a bad start for the security community…and to me, personally.

First, we lost Kevin Ziese. I met Kevin over two decades ago, when he was involved in computer investigations …


From ACM on Huffington Post

Why We Need Exascale Computing

Why We Need Exascale Computing

By Paul Messina, Exascale Project Director, Argonne National Laboratory Exascale computing is the label we use for the next


From Schneier on Security

Digital Security Exchange: Security for High-Risk Communities

Digital Security Exchange: Security for High-Risk Communities

I am part of this very interesting project: For many users, blog posts on how to install Signal, massive guides to protecting your digital privacy, and broad statements like "use Tor" -- all offered in good faith and with the…


From The Computing Community Consortium Blog

NY Times Article: It’s Possible to Hack a Phone With Sound Waves, Researchers Show

NY Times Article: It’s Possible to Hack a Phone With Sound Waves, Researchers Show

The New York Times recently released an article called It’s Possible to Hack a Phone With Sound Waves, Researchers Show, which highlights CCC Council Member Kevin Fu’s work on embedded computer systems. Kevin and his team at…


From The Eponymous Pickle

Robots for Commercial Spaces

Robots for Commercial Spaces

Good overview look at applications and demand in IEEE Spectrum. Have had conversations with several players in the space.

 Why Indoor Robots for Commercial Spaces Are the Next Big Thing in Robotics By Travis Deyle
Companies developing…


From The Eponymous Pickle

Cognitive Assistance for the Aging

Cognitive Assistance for the Aging

Dear Professors, Students, IBMers and others, 

This a reminder about our Cognitive Systems Institute Speaker Series on Thursday, March 16, 2016 at 10:30 am ET US (7:30 am PT).  Our speaker is Hironobu Takagi, Senior Technical,…


From insideHPC

vScaler to Showcase OpenHPC & Deep Learning at Cloud Expo Europe 2017

vScaler to Showcase OpenHPC & Deep Learning at Cloud Expo Europe 2017

Today vScaler announced plans to showcase their HPC cloud platform March 15-16 at the upcoming Cloud Expo Europe Conference in London. Supported by two of its strategic technology partners - Aegis Data and Global Cloud Xchange…


From The Eponymous Pickle

Random Numbers

Random Numbers

A long time technical interest.  Used many random number generators, and in some cases tested them to determine their limitations.  Here a brief history.


From The Eponymous Pickle

Microsoft Teams is off Running

Microsoft Teams is off Running

Seen it in Beta,  a group collaboration tool,  better than Slack, especially for users of other MS tools.    And who isn't?   Free for 365 users as I understand.   But it needs critical mass in groups to make it fly.   Continue…

« Prev 1 6 7 8 9 10 14 Next »