acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

August 2015


From BLOG@CACM

Deterrence After Stuxnet

Deterrence After Stuxnet

In the cyber context, "Mutual Assured Destruction" becomes "Mutual Assured Disruption." 


From The Eponymous Pickle

Communicating Robots

Communicating Robots

Note has some similarity to swarm robotics    But here the individuals are likely to be more specialized.    Collaborating,  But need for central management?   Here some examples from CMU.In TechologyReview:Making Robots Talk…


From The Computing Community Consortium Blog

Summer School on Theoretical Neuroscience

Summer School on Theoretical Neuroscience

The following is guest post from Christos Papadimitriou, the C. Lester Hogan Professor of EECS Computer Science Division at the University of California at Berkeley. Every summer, Berkeley’s Redwood Institute for Theoretical…


From insideHPC

XSEDE Powers Polymer Research at MIT

XSEDE Powers Polymer Research at MIT

Researchers at MIT are using XSEDE resources to study polymers, the chemical compounds used to make plastic, rubber, and more.

The post XSEDE Powers Polymer Research at MIT appeared first on insideHPC.


From insideHPC

Seagate & Micron Develop Enterprise SSD

Seagate & Micron Develop Enterprise SSD

"The framework established between Seagate and Micron has led to the development and production of this next-generation, high-capacity SAS SSD platform. It is the first 12 gigabits-per-second (Gb/s) SAS device to optimize dual…


From insideHPC

DDN Solid State Storage Cache Speeds Research at Purdue

DDN Solid State Storage Cache Speeds Research at Purdue

Today DDN announced that Purdue University has deployed DDN’s SFA high-performance storage to accelerate the delivery of research results for up to 1,000 researchers working on several hundred concurrent projects.

The post DDN…


From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of August 3

Hill Tech Happenings, Week of August 3

Senate Floor: Cybersecurity Information Sharing Act, S. 754 Legislation pertaining to the sharing of cybersecurity threat and vulnerability information between the public and private sectors. Monday, August 3, 2015 Briefing:…


From The Eponymous Pickle

Tour Style VR at British Museum

Tour Style VR at British Museum

From the BBC: " ... British Museum offers virtual reality tour of Bronze Age  ...   The British Museum is running a trial of virtual reality technology with a view to offering it as a permanent tool to explore its collection.…


From Daniel Lemire's Blog

My predictions for 2040

My predictions for 2040

In second “Back to the future” movie (1989), the protagonists are sent 25 years in the future… October 2015. I watched this movie as a young adult and I was in awe at this version of the future. What did the authors get wrong…


From insideHPC

Amber – The How, What, and Why on Intel Xeon Phi

Amber – The How, What, and Why on Intel Xeon Phi

In this video from ISC 2015, Ross C. Walker from SDSC presents: Amber - The How, What, and Why on Intel Xeon Phi.

AMBER is a key application in molecular dynamics used to simulate biocatalysis and the interaction between drug…


From Blog@Ubiquity

Why Can’t Programmers Be More Like Ants? Or a Lesson in Stigmergy

Why Can’t Programmers Be More Like Ants? Or a Lesson in Stigmergy

If we want to advance the art and science of software development, we should direct our attention to the insect world of stigmergy.

The post Why Can’t Programmers Be More Like Ants? Or a Lesson in Stigmergy appeared first on…


From Schneier on Security

Shooting Down Drones

Shooting Down Drones

A Kentucky man shot down a drone that was hovering in his backyard: "It was just right there," he told Ars. "It was hovering, I would never have shot it if it was flying. When he came down with a video camera right over my back…


From The Eponymous Pickle

Need for Industrialized Analytics

Need for Industrialized Analytics

Good thoughts by Tom Davenport.  We did this to a degree at Procter & Gamble since the 70s,  by creating a strong industrial competency, but we also had a long way to go.    I see this slipping in many places today  by the expectations…


From insideHPC

Video: Penguin Computing Brings ThunderX to OCP Servers

Video: Penguin Computing Brings ThunderX to OCP Servers

"By introducing Cavium’s 64-bit ARMv8 CPUs in our Penguin Tundra family of Open Compute servers we again step up our leadership position. Our customers get outstanding value from the efficiency and flexibility enabled by OCP …


From The Eponymous Pickle

SmartBlog on Food Data

SmartBlog on Food Data

All data has contextual messiness.  How do we combine multiple kinds of data to produce understandable domain knowledge?    Here multiple data in CPG retail among different categories.Solving the messiness of food data By Jason…


From The Eponymous Pickle

A Peer to Peer Bonus Reward System

A Peer to Peer Bonus Reward System

Intriguing bonus system architecture, or a crowd sourcing of rewards?Implementing Peer-to-Peer Bonus System by Savita Pahuja on Aug 03, 2015  Jurgen Appelo, CEO at Happy Melly and author of the book Management 3.0 explained peer…


From The Eponymous Pickle

Echo now also sold at Staples

Echo now also sold at Staples

In Engadget: Amazon's voice-controlled Echo speaker is now available at Staples.   Also sold directly through Amazon.   Have been testing for a number of home control and entertainment purposes for months.  Also comparing to…


From BLOG@CACM

Things That Men Can Do To Be Real Allies For Women In Computing

Things That Men Can Do To Be Real Allies For Women In Computing

  


From The Eponymous Pickle

Pepsico Innovation Paying Off

Pepsico Innovation Paying Off

CPG and Beverage companies pushing innovation.PepsiCo R&D chief: ‘Over $6bn in net revenue is coming from innovation’By Kacey Culliney+, 03-Aug-2015PepsiCo’s research and development used to be focused on brand refreshes but…


From CERIAS Blog

Why I Don’t Attend Cons

Why I Don’t Attend Cons

I recently had a couple of students (and former students, and colleagues) ask me if I was attending any of a set of upcoming cons (non-academic/organizational conferences) in the general area of cyber security. That includes …


From CERIAS Blog

Why I Don’t Attend Cons

Why I Don’t Attend Cons

I recently had a couple of students (and former students, and colleagues) ask me if I was attending any of a set of upcoming cons (non-academic/organizational conferences) in the general area of cyber security. That includes …


From CERIAS Blog

Why I Don’t Attend Cons

Why I Don’t Attend Cons

I recently had a couple of students (and former students, and colleagues) ask me if I was attending any of a set of upcoming cons (non-academic/organizational conferences) in the general area of cyber security. That includes …


From Daniel Lemire's Blog

Coping with accelerating progress: no more five-year plan

Coping with accelerating progress: no more five-year plan

Today, the life expectancy of a corporation is about 15 years. Though corporations die for many reasons, technology and innovation are often the driving force underneath the death of a previously powerful company. Amazon.com,…


From Schneier on Security

Vulnerabilities in Brink's Smart Safe

Vulnerabilities in Brink's Smart Safe

Brink's sells an Internet-enabled smart safe called the CompuSafe Galileo. Despite being sold as a more secure safe, it's wildly insecure: Vulnerabilities found in CompuSafe Galileo safes, smart safes made by the ever-reliable…


From Computer Science Teachers Association

We’d love to see more student-developed apps like NeverLost

We’d love to see more student-developed apps like NeverLost

A child goes for a walk in the nearby forest… all of a sudden she realizes that she has lost her way. How can she alert her guardian that she may be in danger, especially when she has a mental … Continue reading


From The Computing Community Consortium Blog

Blue Sky Ideas- AAAI-RSS Special Workshop on the 50th Anniversary of Shakey

Blue Sky Ideas- AAAI-RSS Special Workshop on the 50th Anniversary of Shakey

The Computing Community Consortium (CCC) sponsored a Blue Sky Ideas Track Competition at the AAAI-RSS Special Workshop on the 50th Anniversary of Shakey: The Role of AI to Harmonize Robots and Humans in Rome, Italy. It was a…


From The Eponymous Pickle

App may Require FDA Approval

App may Require FDA Approval

This is not unexpected as the article in CW implies.   Just because it is an App does not mean that the public does not need protection against medical scams. NeuroMetrix's forthcoming app may require FDA approvalThe Food and…


From insideHPC

Compute Canada Joins Women in HPC Network

Compute Canada Joins Women in HPC Network

Compute Canada has become the first international partner to join the Women in High Performance Computing (WHPC) network. "Achieving gender balance in advanced research computing is an important goal for Compute Canada," said…


From The Eponymous Pickle

Marketing Automation

Marketing Automation

In Silicon Angle by Maria Deutscher: " ... What you missed in Big Data; A new era for marketing automation ... Marketing made a comeback into the analytics discussion last week after Radius Intelligence Inc. raised a hefty $50…


From The Eponymous Pickle

How to Moments on YouTube

How to Moments on YouTube

This came to mind this past week as I searched for several very different how-to needs online.  I some cases I really needed a visual explanation of the technique, rather than a textual description.  An example of tacit knowledge…