The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.
Admit I knew the concept, but not the term itself. Data Leakage. Using data outside a training set to build a model. Well, surprise, this is in practice always the case. It is usually needed for adjusting models to changes…
What are the challenges for invention on the Internet of Things? In the early days of our use the only application was an indicator of what a thing was. So it could be counted, located, or paid for. Now the possibilities have…
The National Computational Infrastructure (NCI), Australia's high-performance supercomputer, cloud and data repository, has received a $7M boost from the Australian Government, matched by the NCI Collaborating partners. "The …
And consider also the integration of virtual assistance?How to increase customer engagement with mobile walletsOne method of connecting with users on mobile, which most brands likely wouldn’t consider, is by using mobile wallets…
My latest blog is An Introduction to Graph Databases. William McKnightAn Introduction to Graph Databases -- UpsideGraph databases are one of the fastest growing categories in data management, yet they remain an enigma to many…
Cray's Steve Scott presented this talk at The Digital Future Conference. "Research and development at Cray is guided by our adaptive supercomputing vision. This vision is focused on delivering innovative, next-generation products…
In Engadget. An example where you can now cut up a computer display with a pair of scissors. Interesting, once looked at a packaging design project where this could have been useful. Other applications?
Today Panasas introduced ActiveStor 20, its latest generation hybrid scale-out NAS appliance, featuring a 65 percent increase in flash and a 25 percent increase in hard drive capacity. High-density flash drives and 10 terabyte…
Raj Hazra presented this talk at ISC 2016. "As part of the company's launch of the Intel Xeon Phi processor, Hazra describes how how cognitive computing and HPC are going to work together. "Intel will introduce and showcase a…
The Computing Community Consortium (CCC) will be hosting two workshops on Sociotechnical Cybersecurity. As a part of this effort, the workshop organizing committee has released a call for white papers in order to both assist…
The inaugural Misha Mahowald Prize for Neuromorphic Engineering has been awarded to the TrueNorth project, led by Dr. Dharmendra S. Modha at IBM Research. "The Misha Mahowald Prize recognizes outstanding achievement in the field…
Back in college, professors assigned crazily hard problems… and I was forced to talk with my peers to figure out how they fared… and eventually teaming up with some of them. The same pattern has repeated itself again and again…
Russia has attacked the U.S. in cyberspace in an attempt to influence our national election, many experts have concluded. We need to take this national security threat seriously and both respond and defend, despite the partisan…
In parts of the US, teachers start returning to school this week. I'm not one of them but the time is approaching. Fewer than three weeks to go for me. It’s been a crazy busy summer for me. Last week was a week long Advanced …