acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

May 2017


From The Eponymous Pickle

Training a Final Machine Learning Model

Training a Final Machine Learning Model

Been enjoying some of Jason Brownlee's straightforward instructional material.  Here is an example of perhaps one of the most important steps, how do I predict on new data?  Read at the link:

How to Train a Final Machine Learning…


From insideHPC

Nvidia Unveils GPUs with Volta Architecture

Nvidia Unveils GPUs with Volta Architecture

This week at the GPU Technology Conference, Nvidia CEO Jensen Huang Wednesday launched Volta, a new GPU architecture that delivers 5x the performance of its predecessor. "Over the course of two hours, Huang introduced a lineup…


From The Eponymous Pickle

Value of Alexa Assistants placed Everywhere

Value of Alexa Assistants placed Everywhere

Certainly seems they are.  You can make a good argument that Google and Microsoft have better AI in their labs.   But is it ultimately the quality of intelligence that is most important,  or just that you have a little box in…


From The Eponymous Pickle

GPU Technology Conference

GPU Technology Conference

The keynote of the GPU Tech conference was brought to my attention. Truncated from Engadget, below.  It has long been known that GPUs could be used for analytics, its only most recently that the application has exploded.  There…


From insideHPC

C++ Parallel STL Introduced in Intel Parallel Studio XE 2018 Beta

C++ Parallel STL Introduced in Intel Parallel Studio XE 2018 Beta

Parallel STL now makes it possible to transform existing sequential C++ code to take advantage of the threading and vectorization capabilities of modern hardware architectures. It does this by extending the C++ Standard Template…


From The Eponymous Pickle

Generative Networks

Generative Networks

Its all about learning.  But learning does not just mean saving away information.  Its about constructing an architecture that allows that information to be accessible and and used in context. Ontologies are one such approach…


From The Eponymous Pickle

Computers Predicting Smell

Computers Predicting Smell

An area we worked in for years when in the coffee business.  Were pitched a number of solutions to replace human abilities to taste and smell.  None were ever successful.   Is this finally the solution?  I continue to follow.…


From Computational Complexity

How to Solve It

Today a guest post from Periklis Papakonstantinou, coincidentally not unrelated to Bill's post earlier this week. I'll be back with a special post on Sunday.



I'm teaching in an undergrad program that is half computer science…


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Using Virtual Reality for Teaching Computer Science

Using Virtual Reality for Teaching Computer Science

Maybe you can help me? My gut tells me that virtual reality or even mixed reality can be useful for teaching computer science. How to do that is the question. I don’t want it to be just another device that students program. That…


From Schneier on Security

Interview with Ross Anderson

Interview with Ross Anderson

Cybersecurity researcher Ross Anderson has a good interview on edge.org....


From Mostafa Dehghani

Ridho's Thesis Cover

Ridho's Thesis Cover

I've designed another thesis cover for Ridho Reinanda, one the ILPSers who just defended his thesis on "Entity Associations for Search". He is going to joint Bloomberg in London as a  data scientists. Here is the thesis cover…


From The Eponymous Pickle

Excel 2016 Cheat Sheet

Excel 2016 Cheat Sheet

More like a good description of what is new, and even what is old and interesting.  A cheat sheet should be glanced at, not read. They have done a good job of hiding the complexity.  And there is lots of that.   Finding the right…


From The Eponymous Pickle

Harman-Cardon Announces Invoke Virtual Assistant

Harman-Cardon Announces Invoke Virtual Assistant

HARMAN Reveals the Harman Kardon Invoke™ Intelligent Speaker with Cortana from MicrosoftIn a press release:  Harman-Cardon releases many more details of the Cortana-Powered  assistant Invoke with partner Microsoft speaker .

" ... STAMFORD, CONN. – HARMAN International, a wholly-owned subsidiary of Samsung Electronics…


From The Eponymous Pickle

Google, Linked Data and Ontologies

Google, Linked Data and Ontologies

Very good piec,  have spent a long time thinking about getting the semantics of data arranged for search and analytics.

Via Dean Allemang
Principal Consultant at Working Ontologist, LLC
One of the best short articles on this subject…


From The Eponymous Pickle

Pricing Bots

Pricing Bots

 Saw this experimented with.    With electronic shelf labels.

Are pricing bots a boon or bane for consumers?  by George Anderson   and Discussion.

It’s a common plot twist — a scientist invents a new medicine or technology intended…


From The Eponymous Pickle

AI Strategy

AI Strategy

Useful piece, but not sufficiently practical.

strategy+business: Corporate Strategies and News Articles on Global Business, Management, Competition and Marketing

A Strategist’s Guide to Artificial Intelligence

As the conceptual

by…


From Schneier on Security

Securing Elections

Securing Elections

Technology can do a lot more to make our elections more secure and reliable, and to ensure that participation in the democratic process is available to all. There are three parts to this process. First, the voter registration…


From The Eponymous Pickle

Realtime Powerpoint Translation

Realtime Powerpoint Translation

Saw this live, impressive capability in real-time.  In Engadget:

Microsoft PowerPoint adds real-time presentation translation

The new add-in shows off the company’s Cognitive Services AI tools.
If you were impressed by Skype's real…


From The Eponymous Pickle

Markable Content Placement

Markable Content Placement

Commercializing all Visual Content
Markable.AI
powered by computer vision AI technology.  We help you place Your Products  in popular content across digital platforms, achieving branding and marketing in the most beautiful way.…


From insideHPC

Supercomputing High Energy Cancer Treatments

Supercomputing High Energy Cancer Treatments

Over at TACC, Aaron Dubrow writes that researchers are using TACC supercomputers to improve, plan, and understand the basic science of radiation therapy. "The science of calculating and assessing the radiation dose received by…


From insideHPC

OpenHPC: A Comprehensive System Software Stack

OpenHPC: A Comprehensive System Software Stack

Bob Wisniewski from Intel presents: OpenHPC: A Cohesive and Comprehensive System Software Stack. "OpenHPC is a collaborative, community effort that initiated from a desire to aggregate a number of common ingredients required …


From The Computing Community Consortium Blog

NSF IIS Division Director Position Available

NSF IIS Division Director Position Available

The National Science Foundation (NSF) has just published the job description for the open Division Director position in the Division of Information and Intelligent Systems (IIS) in the CISE Directorate.  IIS supports the study…


From insideHPC

Living Computers Museum Adds Two Iconic Cray Systems

Living Computers Museum Adds Two Iconic Cray Systems

Today the Living Computers: Museum + Labs added a pair of Cray supercomputers to its permanent collection. The Cray-1 supercomputer went on display at Living Computers this week and will be joined by the Cray-2 supercomputer …


From Blog@Ubiquity

How to Deal with Post-truthism

How to Deal with Post-truthism

The very definition of post-truth implies rejecting fact-based logic. Too few possess the skill of distinguishing between self-serving claims, and reliable, well-grounded facts.

The post How to Deal with Post-truthism appeared…


From insideHPC

Bright Cluster Manager 8.0 Release Sets New Standard for Automation

Bright Cluster Manager 8.0 Release Sets New Standard for Automation

Today Bright Computing announced the release of Bright Cluster Manager 8.0 and Bright OpenStack 8.0 with advanced, integrated solutions to improve ease-of use and management of HPC and Big Data clusters as well as private and…


From insideHPC

BSC and NVIDIA Showcase Interactive Simulation of Human Body

BSC and NVIDIA Showcase Interactive Simulation of Human Body

This week at the GPU Technology Conference, Nvidia and Barcelona Supercomputing Center demonstrated an interactive visualization of a cardiac computational model that shows the potential of HPC-based simulation codes and GPU-accelerated…


From The Eponymous Pickle

AI Replacing, Restructuring Professionals

AI Replacing, Restructuring Professionals

Very likely that the basic research and analysis work will be done by systems within a few decades.   How this restructures professional jobs is still unclear.  See some of our work on O*Net regarding this structure.

Gartner Says…


From The Eponymous Pickle

GE on Digital Industrial Transformations

GE on Digital Industrial Transformations

Considerable detail at the link, including a blog.   Looking forward to see their talk relating to this next Friday.   Considerable detail at the link below:

Digital industrial transformation is a process – a road we travel on…


From My Biased Coin

Super-Important Things to Do Right Now for STOC 2017

Super-Important Things to Do Right Now for STOC 2017

STOC 2017 is just around the corner, which means that several deadlines are just around the corner.

The student travel support request deadline is this Thursday, May 11.   Here's the link to the application.

The hotel reservation…


From Schneier on Security

Criminals are Now Exploiting SS7 Flaws to Hack Smartphone Two-Factor Authentication Systems

Criminals are Now Exploiting SS7 Flaws to Hack Smartphone Two-Factor Authentication Systems

I've previously written about the serious vulnerabilities in the SS7 phone routing system. Basically, the system doesn't authenticate messages. Now, criminals are using it to hack smartphone-based two-factor authentication systems…

« Prev 1 8 9 10 11 12 14 Next »