acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Virtualitics
From The Eponymous Pickle

Virtualitics

Newly brought to my attention:  Virtualitics.  Bringing VR to Analytics. In Beta:" ... We have built the first platform to merge Artificial Intelligence, Big Data...

Getting Better Wisdom from Crowds
From The Eponymous Pickle

Getting Better Wisdom from Crowds

Like the quantifying aspect of this.  We experimented with WOC choices and how they linked with actual commercial decisions.   Would like to see it tested withBetter...

UberCloud Obtains $1.7 Million in Pre-A Funding Round
From insideHPC

UberCloud Obtains $1.7 Million in Pre-A Funding Round

“UberCloud has created an entire cloud computing ecosystem for complex technical simulations, leveraging cloud infrastructure providers, developing and utilizing...

Nominations Sought for New CCC Council Members
From The Computing Community Consortium Blog

Nominations Sought for New CCC Council Members

Nominations Due in 1 Week! Computing Community Consortium (CCC) is charged with catalyzing and empowering the U.S. computing research community to articulate and...

The Information War Has Begun
From Apophenia

The Information War Has Begun

Yesterday, Steve Bannon clearly articulated what many people have felt and known for quite some time when he told journalists, “You’re the opposition party. Not...

RCE Podcast Looks at iRODS Data Management Software
From insideHPC

RCE Podcast Looks at iRODS Data Management Software

In this RCE Podcast, Brock Palen and Jeff Squyres speak with the creators of iRODS: Jason Coposky and Terrell Russell. Also known as the Integrated Rule-Oriented...

Allowing End Users to Build Models
From The Eponymous Pickle

Allowing End Users to Build Models

Very good general question that we have been discussing for years, well, really decades.   Started way back in the spreadsheet era, when you empowered users toIs...

PASC17 to Feature Talk by Gordon Bell Prize Winner Haohuan Fu
From insideHPC

PASC17 to Feature Talk by Gordon Bell Prize Winner Haohuan Fu

"This talk reports efforts on refactoring and optimizing the climate and weather forecasting programs – CAM and WRF – on Sunway TaihuLight. To map the large code...

Beyond Exascale: Emerging Devices and Architectures for Computing
From insideHPC

Beyond Exascale: Emerging Devices and Architectures for Computing

"Nanomagnetic devices may allow memory and logic functions to be combined in novel ways. And newer, perhaps more promising device concepts continue to emerge. At...

Deep learning: the silver bullet?
From Daniel Lemire's Blog

Deep learning: the silver bullet?

In 2016, we saw a wide range of breakthroughs having to do with artificial intelligence and deep learning in particular. Google, Facebook, and Baidu announced several...

Intel Xeon Phi Processor Programming in a Nutshell
From insideHPC

Intel Xeon Phi Processor Programming in a Nutshell

In this special guest feature, James Reinders looks at Intel Xeon Phi processors from a programmer's perspective. "How does a programmer think of Intel Xeon Phi...

Adding AI to Raspberry Pi
From The Eponymous Pickle

Adding AI to Raspberry Pi

Could be quite  a way to add AI experience for students.  In CWorld: Google wants to add A.I. to Raspberry Pi gadgetsGoogle plans to bring open source machine-learning...

Research into Twitter Bots
From Schneier on Security

Research into Twitter Bots

There are a lot of them. In a world where the number of fans, friends, followers, and likers are social currency -- and where the number of reposts is a measure...

From Computational Complexity

60 years of Eric and Mike

As I checked in at the Holiday Inn in New Brunswick Wednesday night, they asked me if I had stayed there before. I said it has been a while and they lookedWorkshop...

Q&A on PowerAI
From The Eponymous Pickle

Q&A on PowerAI

For research I took a look at the PowerAI offering.  See the complete article:Putting the “AI” in PowerAIA Q&A with IBM Research’s Hillery HunterIBM’s latest Power...

Duress Codes for Fingerprint Access Control
From Schneier on Security

Duress Codes for Fingerprint Access Control

Mike Specter has an interesting idea on how to make biometric access-control systems more secure: add a duress code. For example, you might configure your iPhone...

IBM Adds TensorFlow Support for PowerAI Deep Learning
From insideHPC

IBM Adds TensorFlow Support for PowerAI Deep Learning

Today IBM announced that its PowerAI distribution for popular open source Machine Learning and Deep Learning frameworks on the POWER8 architecture now supportsIBM...

Tensorflow and PowerAI
From The Eponymous Pickle

Tensorflow and PowerAI

Great to see integration of key AI software, lets also start to see excellent examples of their use with supporting data architecture.IBM brings Google's AI tools...

Talk on Technology Trends
From The Eponymous Pickle

Talk on Technology Trends

William Chamberlin from IBM Market Development and Insights, presented "IT Technology Trends in 2017... and Beyond."     Slides.   Talk. Use the discussion group...

Video: Introduction to the Cheyenne Supercomputer
From insideHPC

Video: Introduction to the Cheyenne Supercomputer

Cheyenne is a new 5.34-petaflops, high-performance computer built for NCAR by SGI. Cheyenne be a critical tool for researchers across the country studying climate...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account