acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

August 2017


From The Eponymous Pickle

Sansar is a Virtual World using VR

Sansar is a Virtual World using VR

We explored SL, built locations, thought of advertising there, swam through our data, had group meetings.  Click the tags below for more on all that.

The VR successor to 'Second Life' is now in public beta

Explore Sansar with a…


From The Eponymous Pickle

Information, Decision Making, Asset value

Information, Decision Making, Asset value

The Question Every Executive Should Ask
Magazine: Summer 2017
Bernard J. Tyson, interviewed by Paul Michelman

Gone are the days of centralized control of information and decision-making within organizations. With information now…


From insideHPC

DOE Labs Adopt Asetek Liquid Cooling

DOE Labs Adopt Asetek Liquid Cooling

Today Asetek announced two incremental orders from Penguin Computing, an established data center OEM. The orders are for Asetek’s RackCDU D2C™ (Direct-to-Chip) liquid cooling solution and will enable increased computing power…


From insideHPC

Advancing AI Capabilities with Next-Generation HPC Solutions

Advancing AI Capabilities with Next-Generation HPC Solutions

Vineeth Ram, Hewlett Packard EnterpriseHPE and NVIDIA are delivering IT solutions with superhuman intelligence to harness the full power of AI and pioneer the next generation of HPC systems. In this special guest feature, HPE's Vineeth Ram explores the possibilities…


From Schneier on Security

NSA Collects MS Windows Error Information

NSA Collects MS Windows Error Information

Back in 2013, Der Spiegel reported that the NSA intercepts and collects Windows bug reports: One example of the sheer creativity with which the TAO spies approach their work can be seen in a hacking method they use that exploits…


From Schneier on Security

Vulnerabilities in Car Washes

Vulnerabilities in Car Washes

Articles about serious vulnerabilities in IoT devices and embedded systems are now dime-a-dozen. This one concerns Internet-connected car washes: A group of security researchers have found vulnerabilities in internet-connected…


From Mostafa Dehghani

NN4IR's logo

NN4IR's logo

We're going to organize the "Neural Networks for Information Retrieval" tutorial at SIGIR2017, Tokyo, Japan. You can read about our tutorial at http://nn4ir.com/. I've tried to design (kind of) a logo  for our tutorial:


From The Eponymous Pickle

Amazon Echo and SAP HANA

Amazon Echo and SAP HANA

A rare business oriented use of otherwise consumer oriented virtual assistants.   Examining.

Amazon Echo and the SAP HANA Cloud Platform     by Craig Cmehil

" ...For awhile now I’ve explored possibilities with the Amazon Echo and…


From The Eponymous Pickle

Neuroscience Inspired AI

Neuroscience Inspired AI

Quite a good and detailed look at the past and potential future of this inspiration.    But it remains just inspiration,  and is not a detailed road map.  Even the successful neural nets used for deep learning  are very crude…

« Prev 1 12 13 14 Next »