acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

August 2016


From The Eponymous Pickle

Machine Learning and Data Leakage

Machine Learning and Data Leakage

Admit I knew the concept, but not the term itself.   Data Leakage.   Using data outside a training set to build a model. Well, surprise, this is in practice always the case.    It is usually needed for adjusting models to changes…


From The Eponymous Pickle

What Does it Mean for Everything to be Smart

What Does it Mean for Everything to be Smart

What are the challenges for invention on the Internet of Things?  In the early days of our use the only application was an indicator of what a thing was.  So it could be counted, located, or paid for. Now the possibilities have…


From insideHPC

NCI in Australia Receives $14 Million Investment

NCI in Australia Receives $14 Million Investment

The National Computational Infrastructure (NCI), Australia's high-performance supercomputer, cloud and data repository, has received a $7M boost from the Australian Government, matched by the NCI Collaborating partners. "The …


From The Eponymous Pickle

Increased Functions of Mobile Wallets

Increased Functions of Mobile Wallets

And consider also the integration of virtual assistance?How to increase customer engagement with mobile walletsOne method of connecting with users on mobile, which most brands likely wouldn’t consider, is by using mobile wallets…


From The Eponymous Pickle

Introduction to Graph Databases

Introduction to Graph Databases

My latest blog is An Introduction to Graph Databases.   William McKnightAn Introduction to Graph Databases -- UpsideGraph databases are one of the fastest growing categories in data management, yet they remain an enigma to many…


From insideHPC

Cray’ Steve Scott Presents: Supercomputing Technologies and Trends: Where do we go from here?

Cray’ Steve Scott Presents: Supercomputing Technologies and Trends: Where do we go from here?

Cray's Steve Scott presented this talk at The Digital Future Conference. "Research and development at Cray is guided by our adaptive supercomputing vision. This vision is focused on delivering innovative, next-generation products…


From The Eponymous Pickle

Cutting a Display for Experimental Packaging

Cutting a Display for Experimental Packaging

In Engadget.  An example where you can now cut up a computer display with a pair of scissors. Interesting, once looked at a packaging design project where this could have been useful.   Other applications?


From insideHPC

Panasas Rolls Out ActiveStor 20

Panasas Rolls Out ActiveStor 20

Today Panasas introduced ActiveStor 20, its latest generation hybrid scale-out NAS appliance, featuring a 65 percent increase in flash and a 25 percent increase in hard drive capacity. High-density flash drives and 10 terabyte…


From insideHPC

Raj Hazra Presents: Driving to Exascale

Raj Hazra Presents: Driving to Exascale

Raj Hazra presented this talk at ISC 2016. "As part of the company's launch of the Intel Xeon Phi processor, Hazra describes how how cognitive computing and HPC are going to work together. "Intel will introduce and showcase a…


From The Computing Community Consortium Blog

Sociotechnical Cybersecurity Call for White Papers

Sociotechnical Cybersecurity Call for White Papers

The Computing Community Consortium (CCC) will be hosting two workshops on Sociotechnical Cybersecurity. As a part of this effort, the workshop organizing committee has released a call for white papers in order to both assist…


From insideHPC

IBM TrueNorth Project wins Inaugural Misha Mahowald Prize

IBM TrueNorth Project wins Inaugural Misha Mahowald Prize

The inaugural Misha Mahowald Prize for Neuromorphic Engineering has been awarded to the TrueNorth project, led by Dr. Dharmendra S. Modha at IBM Research. "The Misha Mahowald Prize recognizes outstanding achievement in the field…


From Daniel Lemire's Blog

Combine smart people with crazily hard projects

Combine smart people with crazily hard projects

Back in college, professors assigned crazily hard problems… and I was forced to talk with my peers to figure out how they fared… and eventually teaming up with some of them. The same pattern has repeated itself again and again…


From Schneier on Security

Hacking the Vote

Hacking the Vote

Russia has attacked the U.S. in cyberspace in an attempt to influence our national election, many experts have concluded. We need to take this national security threat seriously and both respond and defend, despite the partisan…


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links 1 August 2016

Interesting Links 1 August 2016

In parts of the US, teachers start returning to school this week. I'm not one of them but the time is approaching. Fewer than three weeks to go for me. It’s been a crazy busy summer for me. Last week was a week long Advanced …

« Prev 1 13 14 15 Next »