acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

July 2015


From The Eponymous Pickle

Walmart Robot Picks Groceries

Walmart Robot Picks Groceries

In CityWire: Wal-Mart offers a peek at robot grocery pickers and other innovations ... " 


From The Eponymous Pickle

Changes in Consumer Goods Players

Changes in Consumer Goods Players

In Bain: The rapidly changing order of consumer goods leadersWhile it may seem as though the same familiar players always dominate the consumer goods industry, our interactive graphic shows that the top players by market cap…


From The Eponymous Pickle

Service Innovation for the Interconnected World

Service Innovation for the Interconnected World

Presenter for the ISSIP Service Innovation Weekly Speaker Series is Timothy Chou, Author and Lecturer in Cloud Computing at Stanford University. Title of his presentation is Service Innovation for our Interconnected World.  Slides…


From Schneier on Security

The NSA, Metadata, and the Failure of Stopping 9/11

The NSA, Metadata, and the Failure of Stopping 9/11

It's common wisdom that the NSA was unable to intercept phone calls from Khalid al-Mihdhar in San Diego to Bin Ladin in Yemen because of legal restrictions. This has been used to justify the NSA's massive phone metadata collection…


From insideHPC

Should Users Reset Performance Expectations for Exascale?

Should Users Reset Performance Expectations for Exascale?

"Exascale computers are going to deliver only one or two per cent of their theoretical peak performance when they run real applications; and both the people paying for, and the people using, such machines need to have realistic…


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Musings on Blogging

Musings on Blogging

Attending several conferences this summer I have talked to any number of people about this blog. Several people told me how much they appreciated the blog which made me feel very good. One person told me I blogged faster than…


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Putting Student Programmers To Work

Putting Student Programmers To Work

I love CS Teaching Tips. I follow them on Twitter and Facebook as well as visiting the web site from time to time. Full list of links at the bottom of this post. Anyway, not long ago they retweeted someone’s suggestion of having…


From insideHPC

Obama Establishes National Strategic Computing Initiative

Obama Establishes National Strategic Computing Initiative

Today President Obama issued an Executive Order establishing the National Strategic Computing Initiative (NSCI) to ensure the United States continues leading high performance computing over the coming decades.

The post ObamainsideHPC…


From Computer Science Teachers Association

CSTA Professional Development Committee

CSTA Professional Development Committee

The Professional Development Committee’s purpose is to improve teaching and learning in the computing disciplines by identifying the ongoing professional development needs of members; by developing, facilitating, and overseeing…


From The Eponymous Pickle

The Service Innovation Triangle

The Service Innovation Triangle

This week’s presenters for the ISSIP Service Innovation Weekly Speaker Series is  Drs. Peder Inge Furseth (Norwegian Business School ) and Richard Cuthberts (University of Oxford). Title of their presentation is Innovation in…


From insideHPC

Intel’s Raj Hazra on the Convergence of HPC & Big Data at ISC 2015

Intel’s Raj Hazra on the Convergence of HPC & Big Data at ISC 2015

In this video from ISC 2015, Intel's Raj Hazra explores how new innovations and Intel’s Scalable System Framework approach can maximize the potential in the new HPC era. Raj also shares details of upcoming Intel technologies,…


From insideHPC

Video: CSCS Focuses on Sustainability at ISC 2015

Video: CSCS Focuses on Sustainability at ISC 2015

In this video from ISC 2015, Michele De Lorenzi sits down with Rich Brueckner from insideHPC to discuss the latest updates from the conference and how the CSCS booth is constructed to reflect Switzerland's focus on sustainability…


From Schneier on Security

Fugitive Located by Spotify

Fugitive Located by Spotify

The latest in identification by data: Webber said a tipster had spotted recent activity from Nunn on the Spotify streaming service and alerted law enforcement. He scoured the Internet for other evidence of Nunn and Barr's movements…


From insideHPC

Radio Free HPC Looks at 3D XPoint Non-Volatile Memory

Radio Free HPC Looks at 3D XPoint Non-Volatile Memory

In this video, the Radio Free HPC team looks at the newly announced 3D XPoint technology from Intel and Micron. "3D XPoint ushers in a new class of non-volatile memory that significantly reduces latencies, allowing much more …


From The Eponymous Pickle

SAP Pitches Strongly to C Level execs

SAP Pitches Strongly to C Level execs

In AdAge: Wasn't this always SAP's approach?  The specifics of a digital magazine, with strong content advertising follow up, appears to be new.  " ... SAP Launches Digital Magazine to Reach C-Level Execs  ... Digitalist Is Part…


From The Eponymous Pickle

Sighthound Computer Vision

Sighthound Computer Vision

Powered by Computer VisionSighthound uses computer vision technology to distinguish between people and objects. By using advanced algorithms, Sighthound is able to analyze video streams to detect, track, and recognize peopleComputer…


From insideHPC

SGI UV 300H 20-Socket Appliance Now SAP HANA Certified

SGI UV 300H 20-Socket Appliance Now SAP HANA Certified

Today SGI announced that its SGI UV 300H is now SAP-certified to run the SAP HANA platform in controlled availability at 20-sockets— delivering up to 15 terabytes (TB) of in-memory computing capacity in a single node.

The post…


From The Computing Community Consortium Blog

NIH Big Data to Knowledge (BD2K) Initiative Request for Applications

NIH Big Data to Knowledge (BD2K) Initiative Request for Applications

The National Institutes of Health (NIH) Big Data to Knowledge initiative (BD2K) has announced the release of an Request for Applications (RFA) for software and methods development in biomedical big data science: “Big Data to…


From insideHPC

TACC Puts Chameleon Cloud Testbed into Production

TACC Puts Chameleon Cloud Testbed into Production

Today the Texas Advanced Computing Center (TACC) announced that its new Chameleon testbed is in full production for researchers across the country. Designed to help investigate and develop the promising future of cloud-based …


From insideHPC

HPC Market Update from IDC

HPC Market Update from IDC

In this video from ISC 2015, Earl Joseph and Bob Sorensen from IDC provide an HPC Market Update. Additional topics include: the HPC Market in Europe, HPDA Update: Where Big Data Meets HPC, and and IDC ROI Research Update.

The…


From The Eponymous Pickle

P&G's Next CEO

P&G's Next CEO

In Adage:What You Should Know About P&G's Next CEO, David TaylorDavid Taylor, an electrical engineer by training who spent twice as long in manufacturing as marketing, will take the reins on Nov. 1.  ... He Was Plant Manager…


From The Eponymous Pickle

NTT and Eldercare Robotics in Japan

NTT and Eldercare Robotics in Japan

In Mashable: We examined this for applications in the smart home.  It had already advanced considerably in Japan a decade a ago.  They had done a particularly good job in applying the current level of tech at that time to provide…


From The Eponymous Pickle

Looking for Value in Data

Looking for Value in Data

Data Assets: A long time  exploration of mine, how do I determine data value in context?  In part the value is a;ways understood in term of analytic value, and how it can be combined with other data and public resources.


From The Eponymous Pickle

Citizen Developers

Citizen Developers

First I had heard of the term. In CWorld: " .... For IT, harnessing the talents of business users who  code can be well worth the effort of supporting them. .... " 


From Schneier on Security

Bizarre High-Tech Kidnapping

Bizarre High-Tech Kidnapping

This is a story of a very high-tech kidnapping: FBI court filings unsealed last week showed how Denise Huskins' kidnappers used anonymous remailers, image sharing sites, Tor, and other people's Wi-Fi to communicate with the police…


From Computational Complexity

Explain this Scenario in Jeapardy and some more thoughts

In the last post I had the following scenario: Larry, Moe, and Curly are on Jeopardy. Going into Final Jeopardy: Larry has $50,000, Moe has $10,000, Curly has $10,000 Larry bets $29,999, Moe bets $10,000, Curly bets $10,000…


From The Eponymous Pickle

Amazon Proposes a Flight Plan

Amazon Proposes a Flight Plan

Not as much a joke as has been suggested.   " ... Following the FAA's recent relaxation of commercial drone flight regulations, Amazon is forging ahead with plans to employ the machines for deliveries. But first, the company…


From The Computing Community Consortium Blog

#beautyofcomputing Social Media Campaign

#beautyofcomputing Social Media Campaign

The National Science Foundation is in the middle of a summer-long social media campaign highlighting the #beautyofcomputing. We see beautifully computer-rendered images daily, but we rarely step back to consider the simulation…


From Schneier on Security

New RC4 Attack

New RC4 Attack

New research: "All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP and TLS," by Mathy Vanhoef and Frank Piessens: Abstract: We present new biases in RC4, break the Wi-Fi Protected Access Temporal Key Integrity Protocol (WPA…


From The Eponymous Pickle

Transforming Higher Education

Transforming Higher Education

Correspondent David E Goldberg writes:" ... Transforming higher education is often thought of as simply the introduction and administration of new content, curriculum, and pedagogy, and this approach worked following World War…