acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Examining the Bots Landscape
From The Eponymous Pickle

Examining the Bots Landscape

A visual look at the Bots Landscape, In LinkedinDiscussion Group in Wharton Customer Analytics InitiativeBy Vladimer BotsvadzeThe bots landscape will transformExisting...

Kinetic Jewelry
From The Eponymous Pickle

Kinetic Jewelry

MIT's new 'living' jewelry are creepy robot beetles for your clothesNot fashion meets function yet    by Dani Deahl    @danideahl Last year, MIT and Stanford debuted...

Research on What Motivates ISIS -- and Other -- Fighters
From Schneier on Security

Research on What Motivates ISIS -- and Other -- Fighters

Interesting research from Nature Human Behaviour: "The devoted actor's will to fight and the spiritual dimension of human conflict": Abstract: Frontline investigations...

China's Digital Economy
From The Eponymous Pickle

China's Digital Economy

A discussion and PDF paper with considerable data and statistics.  China’s digital economy: A leading global force  by McKinseyBy Jonathan Woetzel, Jeongmin Seong...

Center Store Resets (Again).
From The Eponymous Pickle

Center Store Resets (Again).

We were old hands at trying to better understand the center store.  It was one thing we worked on in our innovation centers.  So this article struck me.  What tech...

What can a Drone Carry Today?
From The Eponymous Pickle

What can a Drone Carry Today?

A related question came up in the retail space,  what can we reasonably deliver via a Drone today?   What do we need to measure to calculate this as Drones improve...

Overview of AI and Machine Learning
From The Eponymous Pickle

Overview of AI and Machine Learning

From a customer perspective, what is machine learning or AI?  by Natalie Petouhoff, Ph.D.  Wondering whether you should invest in AI and Machine Learning? That’s...

Ultrasonic Attacks on Voice Devices
From The Eponymous Pickle

Ultrasonic Attacks on Voice Devices

Alexa and Siri are vulnerable to 'silent,' nefarious commands  in Endgadget by S. Dent     Unheard voices could direct your smartphone to malicious websites. .....

Shop Home Depot with Voice Using Google Home
From The Eponymous Pickle

Shop Home Depot with Voice Using Google Home

Another voice based shopping example in place.  I would imagine that DIY interactions could often use visual interaction as well, so assuming the Google Home will...

Ohio Supercomputer Center open-sources HPC Access Portal
From insideHPC

Ohio Supercomputer Center open-sources HPC Access Portal

Open OnDemand is an NSF-funded project to develop a widely shareable web portal that provides HPC centers with advanced web and graphical interface capabilities...

EPFL Building New Particle Detector for Large Hadron Collider
From insideHPC

EPFL Building New Particle Detector for Large Hadron Collider

EPFL’s physicists are moving forward in their efforts to solve the mysteries of the universe. A particle detector made up of 10,000 kilometers of scintillatingEPFL...

Interview: Jeffrey Schwab on Building the World’s Fastest Network at SC17
From insideHPC

Interview: Jeffrey Schwab on Building the World’s Fastest Network at SC17

In this guest feature, Jeffrey Schwab describes his role as SCinet Chair at SC17 and how his team of volunteers is building the fastest and most powerful volunteer...

Announcing the EuroEXA Project for Exascale
From insideHPC

Announcing the EuroEXA Project for Exascale

Today, 16 organizations met at the Barcelona Supercomputer Centre to mark the start of the EuroEXA project and the commencement of the execution in the next stage...

Simulated Annealing for JPEG Quantization
From My Biased Coin

Simulated Annealing for JPEG Quantization

I have a new paper on the arxiv (web page describing results, and full version** available) with two Harvard undergrads, Max Hopkins and Sebastian Wagner-Carrena...

The Intel Scalable System: Kick-Starting the AI Revolution
From insideHPC

The Intel Scalable System: Kick-Starting the AI Revolution

Like many other HPC workloads, deep learning is a tightly coupled application that alternates between compute-intensive number-crunching and high-volume data sharing...

Cisco on Meetings
From The Eponymous Pickle

Cisco on Meetings

From the Cisco Blog, good points made, not very new,  but worth repeating.   Nothing on the possible use of AI attentive methods to gather data about what has happened...

Interpreting Machine Learning
From The Eponymous Pickle

Interpreting Machine Learning

Interesting piece,  somewhat wordy with embedded technical aspect.  But worth the read.Ideas on interpreting machine learningMix-and-match approaches for visualizing...

Security Vulnerabilities in AT&T Routers
From Schneier on Security

Security Vulnerabilities in AT&T Routers

They're actually Arris routers, sold or given away by AT&T. There are several security vulnerabilities, some of them very serious. They can be fixed, but because...

Alexa will be a Concierge
From The Eponymous Pickle

Alexa will be a Concierge

Its the ultimate kind of intelligence.  We called it a concierge skill.  Its not what you know, its who you know, or what you have that knows, and can apply itAlexa...

Will we all be Wearing Cams Soon?
From The Eponymous Pickle

Will we all be Wearing Cams Soon?

Followed this once at the request of a retail research client.  Tested it in the aisle. Will it now be common?Why you'll wear a body cameraAs costs go down, quality...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account