The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.
The ACM U.S. Public Policy Council and the ACM Europe Council Policy Committee jointly released a Statement on Internet of Things Privacy and Security addressing existing and expected privacy and security concerns in the Internet…
ACM PUBLIC POLICY HIGHLIGHTS ACM provides independent, nonpartisan, and technology-neutral research and resources to policy leaders, stakeholders, and the public about public policy issues, as drawn from the deep technical expertise…
We call the problem of mediocre sofware "neglect," and we pitch it in ethical terms by noting that it illustrates a failure of the ethics of care.
From the Edge Foundation. A Conversation with Chris Anderson. I have worked with process control systems that are closed loop, and designed to be ... We have many in our lives, but many are hidden, from the lowly thermostat…
Business anthropologist Martha Bird’s specialty is designing technologies that work for people, creating conversational user interfaces and chatbots that can serve different professional audiences across different geographies…
Quite an interesting and detailed article. You wonder if the tracking efforts will change their systems to get around this. I recall reading about the number of 'flashlight' apps on smartphones, and it was long known that these…
National Institute of Standards and Technology (NIST) announced the release of a draft Special Publication (SP) on Securing Wireless Infusion Pumps in Healthcare Delivery Organizations, which is now available for public comment…
In this special guest post, Professor Jack Dongarra sits down with Mike Bernhardt from ECP to discuss the role of Dongarra’s team as they tackle several ECP-funded software development projects. "What we’re planning with ECP …
In Futurism: " ... artificial intelligence non-profit OpenAI just announced it has created an AI system that can learn to complete a task in reality after watching just one demonstration of that task in a simulated environment…
The importance of supercomputing on local and national economic prosperity has been highlighted by a recent study which reported that its Blue Waters project to be worth more than $1.08 billion for the Illinois’ economy. The …
Prithiviraj, thanks for the kind words. As for NER systems for English text only recognizing named entities in title case, that’s usually a function of how they are trained. If they’re trained on sentences from grammatical long…
Murray Goulden writes in The Conversation that smart homes, wearables and the Internet of Things are indicative of the development of an entire class of technologies seeking to remake the fundamentals of our everyday lives. These…
An example of a simple rule for a much more complex task. How many of these rules are there, and how many sub tasks exist?
Teaching a Driverless Car to Turn Left
The Boston Globe, Hiawatha Bray
Getting driverless cars to make…
ISC 2017 may be just around the corner, but the conference team is already busy planning the show for next year. Today they announced that Prof Horst Simon will be the ISC 2018 program chair. "ISC 2018 topics will embrace a range…
Interesting example in the HBR. How can it be translated to other goals in other industries?
How U.S. Health Care Got Safer by Focusing on the Patient Experience
Thomas H. Lee, MD ... "
Jim Glidewell from Boeing presented this talk at the PBS Works User Group. "There are multiple elements to providing an effective and efficient HPC service. This presentation will share some of our strategies for extracting maximal…
Computer Science cheating has been a discussion lately. Not just in the NY Times article I referenced the other day (Cheating In Computer Science Class) but on Facebook, on Twitter, and other social media. One sort of rebuttal…
In the past 5 years, GPUs have gotten even more powerful so rendering tasks can be completed even faster than before. Katie (Garrison) Rivera, of One Stop Systems, explains how HPC can act as a service for high performance video…
In January of this year, Sakari Tamminen and Elisabet Holmgren of the Finnish/USA innovation agency Gemic, published a paper on EPIC entitled “The Anthropology of Wearables: The Self, The Social, and the Autobiographical“. A …
Il mondo del fashion sta diventando sempre di più digitale — e non si tratta solo di dispositivi da indossare, ma anche e soprattutto di abbigliamento, realizzato con tessuti in cui sono effettivamente integrati dei sensori in…
Interesting research on a version of RSA that is secure against a quantum computer: Post-quantum RSA Daniel J. Bernstein, Nadia Heninger, Paul Lou, and Luke Valenta Abstract: This paper proposes RSA parameters for which (1) key…
Andy Ko, Associate Professor at the University of Washington iSchool and Chief Scientist & Co-Founder @answerdash has posted a blog and slide presentation from a talk he gave called How to be a great (CS) teacher. It’s the best…
Dear Professors, Students, IBMers and others,
This a reminder about our Cognitive Systems Institute Speaker Series, on Thursday, June 1, 2016 at 10:30 am ET US (7:30 am PT). Our speaker is Rama Akkiraju, IBM Research”, who will…
Proposals for Drone delivery are not new. But Wal-Mart adds lock-box delivery and blockchains for tracking and identification. Showing their moves in combining advanced technologies.
Walmart submits patent for blockchain-based…
The rule of three Wikimedia Commons source Robert Southey was the Poet Laureate of Britain from 1813 until his death in 1843. He published, anonymously, “The Story of the Three Bears” in 1837. Today Ken and I want to talk about…
All the indications are there, the data, especially dynamic data, is broad and deep. What should business reactions be?
Just Leaked: Google Preps to Invest Boldly in Artificial Intelligence
As Google goes AI-first, here's the…
Bottom line, its all about the data. And its Apple, Amazon, Google, Microsoft and Facebook that have the data. Lots of data. And all of these companies are expanding their machine learning to leverage the data. Looks like…
This is kind of amazing: Inmates at a medium-security Ohio prison secretly assembled two functioning computers, hid them in the ceiling, and connected them to the Marion Correctional Institution's network. The hard drives were…
I like the term Ambient Computing or Ambient OS. It listens, answers, performs, adapts. A virtual assistant too. A more private, more home oriented device? Centralizing smart home actions. IFTTT like? Display too. Not…
Some of our earliest analytics were to understand how products and services should be priced. Not to set prices, but to understand the overall pricing effect. Fixed, Dynamic, Demand-based? So the data science of this
Uber…