acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

July 2016


From The Eponymous Pickle

Targeting Physical Out of Stocks

Targeting Physical Out of Stocks

Seen a number of related methods,  this PG article looks at methods that combine image recognition and robotic methods.    We also looked at a method that could use streams from security cameras to count shelf items to address…


From Schneier on Security

Friday Squid Blogging: Sperm Whale Eats Squid

Friday Squid Blogging: Sperm Whale Eats Squid

A post-mortem of a stranded sperm whale shows that he had recently eaten squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....


From The Eponymous Pickle

Importance of Data Management

Importance of Data Management

Some good thoughts here.  Recently have seen the particular importance of how data is changing over time.    Metadata is important and may differ in quality and nature over time as well.  Good to consider when understanding the…


From The Eponymous Pickle

AI, Deep Learning, and Machine Learning: A Primer

AI, Deep Learning, and Machine Learning: A Primer

AI, Deep Learning, and Machine Learning: A Primer by Frank Chen“One person, in a literal garage, building a self-driving car.” That happened in 2015. Now to put that fact in context, compare this to 2004, when DARPA sponsored…


From The Eponymous Pickle

Micro Moments During Mobile Shopping

Micro Moments During Mobile Shopping

Via Think with Google.  A Guide with statistics.Shopping Micro-Moments Guide: How to Be There and Be Useful for ShoppersMobile has forever changed the way people shop. A shopper's smartphone is there for them anytime, anywhere…


From The Eponymous Pickle

Bringing Intelligence to Data Handling

Bringing Intelligence to Data Handling

Linking AI and data, in an efficient and semantic (meaning linked)  manner, then utilizing integrated machine learning, is a huge leveraging point.In Medium: " ... “Why has AI so dramatically changed in the last few years compared…


From insideHPC

Cray Teams With Deloitte to Combat Cybercrime

Cray Teams With Deloitte to Combat Cybercrime

Today Deloitte Advisory and Cray introduced the first commercially available high-speed, supercomputing threat analytics service. Called Cyber Reconnaissance and Analytics, the subscription-based offering is designed to help …


From insideHPC

Dassault to Acquire Computer Simulation Technology (CST) in Germany

Dassault to Acquire Computer Simulation Technology (CST) in Germany

Dassault Systèmes, a provider of product lifecycle management (PLM) solutions, has announced that it will acquire Computer Simulation Technology (CST), a specialist in electromagnetic (EM) and electronics simulation, for approximately…


From insideHPC

Simulating Sea Ice Leads at DKRZ

Simulating Sea Ice Leads at DKRZ

Researchers at DKRZ are using supercomputers to better understand the movement of sea ice. "Sea ice is an important component of the Earth System, which is often being discussed in terms of integrated quantities such as Arctic…


From insideHPC

Video: Mellanox Powers Open Science Grid on Comet Supercomputer

Video: Mellanox Powers Open Science Grid on Comet Supercomputer

"We are pioneering the area of virtualized clusters, specifically with SR-IOV,” said Philip Papadopoulos, SDSC’s chief technical officer. “This will allow virtual sub-clusters to run applications over InfiniBand at near-native…


From Schneier on Security

Cyber Weapons vs Nuclear Weapons

Cyber Weapons vs Nuclear Weapons

Good essay pointing out the absurdity of comparing cyber weapons with nuclear weapons. On the surface, the analogy is compelling. Like nuclear weapons, the most powerful cyberweapons -- malware capable of permanently damaging…


From insideHPC

Interview: PDSW-DISCS’16 Workshop to Focus on Data-Intensive Computing at SC16

Interview: PDSW-DISCS’16 Workshop to Focus on Data-Intensive Computing at SC16

The first Joint International Workshop on Parallel Data Storage and Data Intensive Scalable Computing Systems (PDSW-DISCS’16) has issued its Call for Papers. As a one day event held in conjunction with SC16, the workshop will…


From The Eponymous Pickle

InsightETE Seeks Root Cause in Process

InsightETE Seeks Root Cause in Process

Just brought to my attention, and applicable to all kinds of process measuring and management.  Whats more important than determining root cause in a process?    Digging deeper, join me.Welcome To InsightETE Founded in 1999,InsightETE…


From Phys.org Technology News

MH370 mystery spurred efforts to improve aircraft tracking

MH370 mystery spurred efforts to improve aircraft tracking

As investigators prepare to wind down the Malaysia Airlines Flight MH370 search after more than two fruitless years, the airline industry is still working to raise safety standards to prevent another plane from going missing.


From Putting People First

[Book] Overcomplicated (or when systems go feral)

[Book] Overcomplicated (or when systems go feral)

Overcomplicated: Technology at the Limits of Comprehension by Samuel Arbesman Current (Penguin Randomhouse), July 2016 256 pages Abstract Why did the New York Stock Exchange suspend trading without warning on July 8, 2015? Why…


From Putting People First

A nudge toward participation: Improving clinical trial enrollment with behavioral economics

A nudge toward participation: Improving clinical trial enrollment with behavioral economics

A nudge toward participation: Improving clinical trial enrollment with behavioral economics Eric M. VanEpps, Kevin G. Volpp and Scott D. Halpern (University of Pennsylvania) Science Translational Medicine – 20 Jul 2016 Vol. 8…


From The Eponymous Pickle

Analytics Magazine

Analytics Magazine

Long before data science and machine learning, there was Analytics.  Here is their most recent e-newsletter.    Subscribe.  Always some useful information.


From The Eponymous Pickle

Exploring Databases: The Indiana Project

Exploring Databases: The Indiana Project

Much like the premise here, often we find ourselves exploring, and even just finding databases.Letizia Tanca - Exploring Databases: The Indiana ProjectLatizia Tanca, Professor at Politecnico di Milano, gave a wonderful presentation…


From The Eponymous Pickle

Facebook's AI Chatbots Now Serve a Billion Users

Facebook's AI Chatbots Now Serve a Billion Users

Its claimed that Facebook Messenger now has a billion users,  and those billion users can be served by a swarm of AI chatbots,   Will those billion users be served well enough, to some sort of useful and profitable end, so that…


From insideHPC

Preliminary Agenda Posted for HPC User Forum in Austin, Sept. 6-8

Preliminary Agenda Posted for HPC User Forum in Austin, Sept. 6-8

IDC has published the preliminary agenda for their next HPC User Forum. The event will take place Sept. 6-8 in Austin, Texas.

The post Preliminary Agenda Posted for HPC User Forum in Austin, Sept. 6-8 appeared first on insideHPC…


From Daniel Lemire's Blog

Accelerating PHP hashing by “unoptimizing” it

Accelerating PHP hashing by “unoptimizing” it

Hashing is a software trick that can map strings to fixed-length integers, such as 32-bit integers. It is ubiquitous in modern software. Languages like Java and PHP have the ability to store strings with their corresponding hash…


From insideHPC

Podcast: Steve Scott on How Intel Xeon Phi is Fueling HPC Innovation at Cray

Podcast: Steve Scott on How Intel Xeon Phi is Fueling HPC Innovation at Cray

In this Intel Chip Chat podcast with Allyson Klein, Cray CTO Steve Scott describes the collaboration between Cray and Intel on the Intel Xeon Phi Processor for supercomputer integration. Steve highlights that Cray chose to implement…


From insideHPC

ARM to Power New RIKEN supercomputer

ARM to Power New RIKEN supercomputer

ARM processors will provide the computational muscle behind one of the most powerful supercomputers in the world, replacing the current K computer at the RIKEN Advanced Institute for Computational Science (AICS) in Japan. During…


From Schneier on Security

DARPA Document: "On Countering Strategic Deception"

DARPA Document: "On Countering Strategic Deception"

Old, but interesting. The document was published by DARPA in 1973, and approved for release in 2007. It examines the role of deception on strategic warning systems, and possible actions to protect from strategic foreign deception…


From The Eponymous Pickle

Machines Replacing Humans

Machines Replacing Humans

Good thoughts from the McKinsey Quarterly.  Agree there will be dramatic differences by sector, but do also expect some dramatic speedups. Where machines could replace humans—and where they can’t (yet)By Michael Chui, James Manyika…


From insideHPC

University of Tokyo Selects Mellanox EDR InfiniBand

University of Tokyo Selects Mellanox EDR InfiniBand

Today Mellanox announced that the University of Tokyo has selected the company's Switch-IB 2 EDR 100Gb/s InfiniBand Switches and ConnectX-4 adapters to accelerate its new supercomputer for computational science.

The post University…


From The Computing Community Consortium Blog

CCC Computing Research Symposium- Computing in the Physical World

CCC Computing Research Symposium- Computing in the Physical World

The following is a guest blog post by CCC council member Klara Nahrstedt from the University of Illinois at Urbana – Champaign and past CCC council member Ross Whitaker from University of Utah.  ‘Computing in the physical world…


From XRDS

Who Owns Your Device?

Who Owns Your Device?

We live in an amazing era of technology. The Internet has opened doors that have been dreamed of for years. By adding computing technology to everyday devices, like televisions, thermostats, appliances, and others, we’ve been…


From insideHPC

Offloading Application Segments to Intel Xeon Phi Coprocessors

Offloading Application Segments to Intel Xeon Phi Coprocessors

Offloading to a coprocessor does need to be considered carefully, due to the memory transfer requirements. When the data that is to be worked on resides in the memory of the main system, that data must be transferred to the coprocessor…


From insideHPC

Scripps Leverages DDN Storage to Research New Medical Treatments

Scripps Leverages DDN Storage to Research New Medical Treatments

Today DDN announced that The Scripps Research Institute (TSRI), one of the world’s largest independent organizations focusing on biomedical research, has deployed DDN’s end-to-end data management solutions, including high performance…

« Prev 1 3 4 5 6 7 14 Next »