acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Enabling Voice Control in Simple IoT
From The Eponymous Pickle

Enabling Voice Control in Simple IoT

From MIT News  in CACM" ... In anticipation of the age of voice-controlled electronics, MIT researchers have built a low-power chip specialized for automatic speech...

CCC White Paper- Safety, Security, and Privacy Threats Posed by Accelerating Trends in the Internet of Things
From The Computing Community Consortium Blog

CCC White Paper- Safety, Security, and Privacy Threats Posed by Accelerating Trends in the Internet of Things

CCC Executive Council Member Ben Zorn from Microsoft Research contributed to this post.  The Internet of Things (IoT) is already transforming industries, cities...

Addressing the Flaws of Innovation
From The Eponymous Pickle

Addressing the Flaws of Innovation

Thoughtful piece in the Cisco blog,  on how do we define and address the flaws in innovation.   Have attended many, many brainstorming sessions.  It was never hard...

Whats Next for Home Assistants?
From The Eponymous Pickle

Whats Next for Home Assistants?

Good thoughts, especially linking to email and phone calls. I would add also better ways to support ongoing learning and tracking of conversations.   Also the ability...

Exxon Mobil Joins NCSA Private Sector Program
From insideHPC

Exxon Mobil Joins NCSA Private Sector Program

The National Center for Supercomputing Applications (NCSA) announced today that Exxon Mobil has signed on as the center's newest Private Sector Partner. "We'reExxon...

Call for Panels: SC17 in Denver
From insideHPC

Call for Panels: SC17 in Denver

SC17 has issued its Call for Panel Sessions. The conference takes place Nov. 12-17 in Denver. "As in past years, panels at SC17 will be some of the most heavily...

Duqu Malware Techniques Used by Cybercriminals
From Schneier on Security

Duqu Malware Techniques Used by Cybercriminals

Duqu 2.0 is a really impressive piece of malware, related to Stuxnet and probably written by the NSA. One of its security features is that it stays resident in...

Deep Learning & HPC: New Challenges for Large Scale Computing
From insideHPC

Deep Learning & HPC: New Challenges for Large Scale Computing

"In recent years, major breakthroughs were achieved in different fields using deep learning. From image segmentation, speech recognition or self-driving cars, deep...

ISC 2017 Distinguished Talks to Focus on Data Analytics in Manufacturing & Science
From insideHPC

ISC 2017 Distinguished Talks to Focus on Data Analytics in Manufacturing & Science

Today ISC 2017 announced that it's Distinguished Talk series will focus on Data Analytics in manufacturing and scientific applications. One of the Distinguished...

Query Rewriting: An Overview
From The Noisy Channel

Query Rewriting: An Overview

Thus far, we’ve focused on query understanding at the character and token level. It’s time move up the stack, on to entities and the query… Continue reading on...

Six Steps Towards Better Performance on Intel Xeon Phi
From insideHPC

Six Steps Towards Better Performance on Intel Xeon Phi

"As with all new technology, developers will have to create processes in order to modernize applications to take advantage of any new feature. Rather than randomly...

Data Strategy and Value
From The Eponymous Pickle

Data Strategy and Value

Includes a mapping method I had not specifically heard of.   Gets back to measures for valuing your data when applied to specific strategic needs.Why you need a...

From Computational Complexity

Liberatus Wins at Poker

Tuomas Sandholm (center) and Ph.D. student Noam Brown (via CMU) Congratulations to Liberatus the new poker champ. Liberatus, an AI program, beat several top-ranked...

The Origami Revolution
From The Eponymous Pickle

The Origami Revolution

An informative video on PBS today regarding the use of Origami as a design methodology, how research on origami based models is progressing and a number of good...

IBM Machine Learning Platform Comes to the Private Cloud
From insideHPC

IBM Machine Learning Platform Comes to the Private Cloud

"Machine Learning and deep learning represent new frontiers in analytics. These technologies will be foundational to automating insight at the scale of the world...

Summit on Advances in Programming Languages 2017 Opportunity for Junior Researchers
From The Computing Community Consortium Blog

Summit on Advances in Programming Languages 2017 Opportunity for Junior Researchers

Rastislav Bodik (University of Washington) and Shriram Krishnamurthi (Brown University) have announced an exciting, new opportunity for junior researchers – either...

TensorFlow 1.0 Announced
From The Eponymous Pickle

TensorFlow 1.0 Announced

Google announces what appears to be a considerable upgrade of TensorFlow.Announcing TensorFlow 1.0  by Amy McDonald Sandjideh, Technical Program Manager, TensorFlow...

Pew Internet Research Looks at Algorithms
From The Eponymous Pickle

Pew Internet Research Looks at Algorithms

I like their broad definition of algorithms.  Sometimes the implication is falsely given that algorithms are some magical and very complex thing.    But they are...

When Good Intentions Backfire
From Apophenia

When Good Intentions Backfire

… And Why We Need a Hacker Mindset I am surrounded by people who are driven by good intentions. Educators who want to inform students, who passionately believe...

Defining AI, Machine Learning, and Deep Learning
From insideHPC

Defining AI, Machine Learning, and Deep Learning

"In this guide, we take a high-level view of AI and deep learning in terms of how it’s being used and what technological advances have made it possible. We also...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account