acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Apple FaceID Hacked
From Schneier on Security

Apple FaceID Hacked

It only took a week: On Friday, Vietnamese security firm Bkav released a blog post and video showing that -- by all appearances -- they'd cracked FaceID with a...

Catch Today’s ‘Artificial Intelligence and The Virtuous Cycle of Compute’ Presentation by Intel
From insideHPC

Catch Today’s ‘Artificial Intelligence and The Virtuous Cycle of Compute’ Presentation by Intel

At SC17, Intel is reinforcing its ongoing commitment to HPC and AI technologies. If you want to learn more about Intel’s investment in Artificial Intelligence,Catch...

[Book] Designing Better Services: A Strategic Approach from Design to Evaluation
From Putting People First

[Book] Designing Better Services: A Strategic Approach from Design to Evaluation

Designing Better Services: A Strategic Approach from Design to Evaluation by Francesca Foglieni, Beatrice Villari and Stefano Maffei (Polytechnic University of[Book]...

[Book] Designing Better Services: A Strategic Approach from Design to Evaluation
From Putting People First

[Book] Designing Better Services: A Strategic Approach from Design to Evaluation

Designing Better Services: A Strategic Approach from Design to Evaluation by Francesca Foglieni, Beatrice Villari and Stefano Maffei (Polytechnic University of[Book]...

Reading Stories in Computer Science Class
From Computer Science Teachers Association

Reading Stories in Computer Science Class

Stories are an entertaining way to introduce or reinforce computer science concepts and help students to understand abstract concepts in a more concrete way. Do...

ACM-W Connections – November 2017
From ACM-W supporting, celebrating and advocating for Women in Computing

ACM-W Connections – November 2017

Letter from ACM-W chair. News from Celebrations News from Chapters Scholarship awardees of November Welcome from the ACM-W Chair These are exciting and busy times...

Virtual Beauty in Augmented Reality
From The Eponymous Pickle

Virtual Beauty in Augmented Reality

We spend some time looking at Virtual Beauty applications.  Was never successful in our day.   What can make it work here?   Is this an example of AR success? MAC...

Smart and Secure Cities and Communities Challenge Conference on Feb 6-7, 2018 in Washington, DC
From The Computing Community Consortium Blog

Smart and Secure Cities and Communities Challenge Conference on Feb 6-7, 2018 in Washington, DC

The National Institute of Standards and Technology (NIST) and the Department of Homeland Security (DHS) Science and Technology Directorate are co-hosting the 2018...

SC17 Preview: Artificial Intelligence and The Virtuous Cycle of Compute
From insideHPC

SC17 Preview: Artificial Intelligence and The Virtuous Cycle of Compute

In this video, Pradeep Dubey from Intel Labs describes his upcoming SC17 Invited Talk on Artificial Intelligence. "Dubey will discuss how the convergence of AI,...

Fashion AI by Alibaba
From The Eponymous Pickle

Fashion AI by Alibaba

Examined the use of this kind of in store technology to engage. Personalization and privacy were key aspects.   But we also discovered that the environment of such...

Joint Task Force on Cybersecurity Education Draft Report
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Joint Task Force on Cybersecurity Education Draft Report

The Joint Task Force on Cybersecurity Education is working on curriculum recommendations for post secondary schools but I think their work will be of interest to...

Smart Pills Approved
From The Eponymous Pickle

Smart Pills Approved

An old idea we talked in the innovation centers:Smart Pills Are Headed to American PatientsThe FDA has approved America’s first digital pill. The tablets, called...

Google Home Adds Intercom
From The Eponymous Pickle

Google Home Adds Intercom

Been using a similar function in Amazon Alexa for some time, its a popular function in the Smart Home.   Especially if you have a larger space.  Only makes sense...

Top 10 Things to Look Forward to at SC17
From insideHPC

Top 10 Things to Look Forward to at SC17

In this special guest feature, Kim McMahon offers up her annual Top 10 list of things she's looking forward to as SC17 this week. "It’s that time of year we all...

Ellexus Releases I/O Profiling Tool Suites Based for Arm Architecture
From insideHPC

Ellexus Releases I/O Profiling Tool Suites Based for Arm Architecture

Today Ellexus released versions of its flagship I/O profiling products Breeze, Healthcheck and Mistral, all based on the Arm v8-A architecture. The move comes as...

Jülich Supercomputer Adds 5 Petaflop Booster Upgrade from Dell EMC
From insideHPC

Jülich Supercomputer Adds 5 Petaflop Booster Upgrade from Dell EMC

The JURECA supercomputer in Germany just got a major upgrade with help from Dell EMC. "Thanks to the additional 5 petaflops, the Jülich supercomputer now appears...

Livestream: SC17 Keynote Presentation on the SKA Telescope Project
From insideHPC

Livestream: SC17 Keynote Presentation on the SKA Telescope Project

We are very excited to present this live keynote presentation on the SKA Telescope Project live from SC17. It all starts here Tuesday, Nov 14 at 8:30am Mountain...

An Overview of AI in the HPC Landscape
From insideHPC

An Overview of AI in the HPC Landscape

The demand for performant and scalable AI solutions has stimulated a convergence of science, algorithm development, and affordable technologies to create a software...

Long Article on NSA and the Shadow Brokers
From Schneier on Security

Long Article on NSA and the Shadow Brokers

The New York Times just published a long article on the Shadow Brokers and their effects on NSA operations. Summary: it's been an operational disaster, the NSA...

Lows and Macy's Wnt to Help with the Smart Home
From The Eponymous Pickle

Lows and Macy's Wnt to Help with the Smart Home

More retailers join into the outfitting of the smart home.Lowe’s and Macy’s join rivals chasing smart home opportunityby Tom Ryan   and Expert Comments in Retalwire...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account