acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

June 2019


From The Eponymous Pickle

Global Cryptocurrency Regulaltion Slated to Begin

Global Cryptocurrency Regulaltion Slated to Begin

Had a conversation with a US  Inspector General recently and he expressed how his colleagues were concerned about the use of cryptocurrencies to launder money and related uses, I mentioned that there was work underway to regulate…


From The Eponymous Pickle

Useful View of one year Old GDPR

Useful  View of one year Old GDPR

Useful piece about what they believe GDPR regulations has resulted in.

What the Evidence Shows About the Impact of the GDPR After One Year
by Eline Chivot and Daniel Castro in DataInnovaion

The General Data Protection Regulation…


From Computational Complexity

FCRC 2019

Georgia Tech FCRC Participants
I'm heading home from the 2019 ACM Federated Computing Research Conference in Phoenix, a collection of computer science meetings including STOC, COLT and EC.

Geoff Hinton and Yann LeCun gave…


From The Eponymous Pickle

Drumbeat of Digital Development

Drumbeat of Digital Development

Considerable paper by McKinsey:

The Drumbeat of Digital: How Winning Teams Play
By Jacques Bughin, Tanguy Catlin, and Laura LaBerge in McKinsey
  
Most executives we know have a powerful, intuitive feel for the rhythm of their businesses…


From The Eponymous Pickle

Microsoft Applies AI to Developer Lifecycle

Microsoft Applies AI to Developer Lifecycle

Technical view with useful examples of how this fits together.   A step towards autonomous coding and integration?  Linking to the overall process of development and delivery.

Microsoft wants to apply AI ‘to the entire application…


From The Eponymous Pickle

AI Storytelling EBook

AI Storytelling EBook

Data Robot provides an eBook on AI Storytelling.  Such an approach is useful not only to the clients, but even to the creators of any AI or analytics projects.   To make sure the results make sense to all.    As the article makes…


From Daniel Lemire's Blog

Bounding the cost of the intersection between a small array and a large array

Bounding the cost of the intersection between a small array and a large array

Consider the scenario where you are given a small sorted array of integers (e.g., [1,10,100]) and a large sorted array ([1,2,13,51,…]). You want to compute the intersection between these two arrays. A simple approach would be…


From insideHPC

Supermicro steps up with EDSFF All-Flash NVMe Optimized Storage

Supermicro steps up with EDSFF All-Flash NVMe Optimized Storage

Today Supermicro launched the industry’s first family of server and storage systems that support EDSFF (Enterprise and Datacenter Storage Form Factor) NVMe drives. The latest industry standard NVMe storage is a game changer for…


From The Computing Community Consortium Blog

NYT: Stanford Team Aims at Alexa and Siri With a Privacy-Minded Alternative

NYT: Stanford Team Aims at Alexa and Siri With a Privacy-Minded Alternative

Contributions to this post were provided by Monica Lam and Jen King from Stanford University.  The New York Times recently published an article titled Stanford Team Aims at Alexa and Siri With a Privacy-Minded Alternative. Professor…


From insideHPC

ISC19 Student Cluster Configurations: Less is More, GPUs Rule

ISC19 Student Cluster Configurations: Less is More, GPUs Rule

In this special guest feature, Dan Olds from OrionX shares first-hand coverage of the Student Cluster Competition at the recent ISC 2019 conference. "I’m constantly amazed by the how many different system configurations we see…


From insideHPC

D-Wave Releases of D-Wave Hybrid Workflow Platform to Open Source

D-Wave Releases of D-Wave Hybrid Workflow Platform to Open Source

Today D-Wave Systems announced the general availability of D-Wave Hybrid, a simple open-source hybrid workflow platform for building and running quantum-classical hybrid applications. "Most quantum computing projects we’ve worked…


From The Eponymous Pickle

Priming Learning Networks

Priming Learning Networks

I wrote a paper on just this and related concepts that primed learning networks during the first wave of neural nets,  which we tested internally,  reviewing. 

Randomly wired neural networks and state-of-the-art accuracy? Yes…


From insideHPC

Intel Optimized Libraries Accelerate Deep Learning Applications on Intel Platforms

Intel Optimized Libraries Accelerate Deep Learning Applications on Intel Platforms

deep learningWhatever the platform, getting the best possible performance out of an application always presents big challenges. This is especially true when developing AI and machine learning applications on CPUs. This sponsored post from…


From The Eponymous Pickle

Amazon Clones a Neigborhood

Amazon Clones a Neigborhood

Look at how Amazon tests difficult scenarios real-life scenarios for delivery.  Have a real space you can manipulate and easily include behaviorally difficult elements, like humans, to understand  design issues.

How Amazon Cloned…


From Schneier on Security

Spanish Soccer League App Spies on Fans

Spanish Soccer League App Spies on Fans

The Spanish Soccer League's smartphone app spies on fans in order to find bars that are illegally streaming its games. The app listens with the microphone for the broadcasts, and then uses geolocation to figure out where the…


From BLOG@CACM

Hazardous Enthusiasm and How Eagerness Can Kill A Project

Hazardous Enthusiasm and How Eagerness Can Kill A Project

Many otherwise competent software developers and potential contributors end up being overwhelmed by "hazardous enthusiasm." They end up overwhelmed by their excitement and instead of implementing gradual change, they try to redo…


From insideHPC

Video: AMD Powers Next-Gen Supercomputing at ISC 2019

Video: AMD Powers Next-Gen Supercomputing at ISC 2019

In this video from ISC 2019, Dan Bounds from AMD describes how the company is powering a new generation of supercomputers with their EPYC processors and Radeon Instinct GPUs. "Large system designers today also need efficient …


From The Eponymous Pickle

Plants as Sensors and Cyborgs

Plants as Sensors and Cyborgs

Have been a long time amateur botanist.    So much like the direction suggested here. Designing alerting and circuits inside plants.   Could a field of corn alert the farmer when it is ready to harvest?  Or was being attacked…


From The Eponymous Pickle

HR Management via AI

HR Management via AI

This is already happening.  We used classic optimization systems for human resource use.  What will be interesting is the degree of autonomy such systems will have to assign work, measure results, plan resource needs and use

A…


From Schneier on Security

MongoDB Offers Field Level Encryption

MongoDB Offers Field Level Encryption

MongoDB now has the ability to encrypt data by field: MongoDB calls the new feature Field Level Encryption. It works kind of like end-to-end encrypted messaging, which scrambles data as it moves across the internet, revealing…


From The Computing Community Consortium Blog

CCC Past Chair Beth Mynatt is featured in National Geographic for her work on health informatics and assistive technology!

CCC Past Chair Beth Mynatt is featured in National Geographic for her work on health informatics and assistive technology!

The population in this country is getting older, and yet, these aging individuals expect their homes to keep up with their changing needs. This so called “Aging in Place” is becoming more and more common. Researchers, like Computing…


From The Eponymous Pickle

Spatial Thought

Spatial Thought

Reasoning with the body, in context space.   Fascinating, How do we use this among machines?

The Geometry of Thought in The Edge    A Conversation with Barbara Tversky

Slowly, the significance of spatial thinking is being recognized…


From The Eponymous Pickle

Flat Cryptography in Chrome

Flat Cryptography in Chrome

Concept new to me, but interesting for making security more common.

Automated Cryptocode Generator Helps Secure the Web
MIT News
By Rob Matheson

Researchers at the Massachusetts Institute of Technology (MIT) have developed a system…


From Schneier on Security

Person in Latex Mask Impersonated French Minister

Person in Latex Mask Impersonated French Minister

Forget deep fakes. Someone wearing a latex mask fooled people on video calls for a period of two years, successfully scamming 80 million euros from rich French citizens....


From insideHPC

Hyperion Research HPC Market Update from ISC 2019

Hyperion Research HPC Market Update from ISC 2019

In this video from ISC 2019, Hyperion Research hosts their annual HPC Market Update briefing. The company helps IT professionals, business executives, and the investment community make fact-based decisions on technology purchases…


From insideHPC

MeteoSwiss to Improve Weather Forecasting with Cray CS-Storm Supercomputer

MeteoSwiss to Improve Weather Forecasting with Cray CS-Storm Supercomputer

At ISC 2019, Cray announced that CSCS in Switzerland is adding a third Cray CS-Storm supercomputer to support the development of cutting-edge weather service products at MeteoSwiss. "MeteoSwiss found success with its existing…


From insideHPC

One Stop Systems Showcases ‘AI on the Fly’ at ISC 2019

One Stop Systems Showcases ‘AI on the Fly’ at ISC 2019

In this video from ISC 2019, Jan Mannik from One Stop Systems describes how the company delivers "AI on the Fly." "The next killer application for High Performance Computing technology with the range and skill set required to…


From The Eponymous Pickle

Robotic Process Automation (RPA) Expands Rapidly

Robotic Process Automation (RPA) Expands Rapidly

Often mentioned here.  I am a supporter because it more transparently moves towards real-life process improvement.  It also give you a better understanding of curent and potential business process by modeling it.  Leads to places…


From Schneier on Security

Florida City Pays Ransomware

Florida City Pays Ransomware

Learning from the huge expenses Atlanta and Baltimore incurred by refusing to pay ransomware, the Florida City of Riveria Beach decided to pay up. The ransom amount of almost $600,000 is a lot, but much cheaper than the alternative…


From The Computing Community Consortium Blog

CS for Social Good White Paper Competition

CS for Social Good White Paper Competition

The Computing Community Consortium (CCC), in conjunction with Schmidt Futures, will sponsor and administer a white paper competition on the future of “CS for Social Good,” in order to harness CS to address societal challenges…