acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Surveillance State as a Gadget
From The Eponymous Pickle

Surveillance State as a Gadget

Quite an extensive look at how advanced surveillance is now 'affordable':What Happens When the Surveillance State Becomes an Affordable Gadget?Maybe it doesn’t...

Video gamers turn to science for virtual edge
From Phys.org Technology News

Video gamers turn to science for virtual edge

For some people, video gaming is an activity relegated to the weekends and that all too rare spare time.

How computer algorithms shape our experience of the real world
From Phys.org Technology News

How computer algorithms shape our experience of the real world

The use of algorithms to filter and present information online is increasingly shaping our everyday experience of the real world, a study published by Information...

Promoting Scientific Papers to the Public
From The Eponymous Pickle

Promoting Scientific Papers to the Public

Promoting, and often translating scientific papers and ideas to the more general public.  Its a little like what this kind of blog does.  And what I did in various...

New Presidential Directive on Incident Response
From Schneier on Security

New Presidential Directive on Incident Response

Last week, President Obama issued a policy directive (PPD-41) on cyber-incident response coordination. The FBI is in charge, which is no surprise. Actually, there's...

Artificial Intelligence and the Supply Chain
From The Eponymous Pickle

Artificial Intelligence and the Supply Chain

In Financial Experess:   Artificial Intelligence: The next big thing in Supply Chain ManagementImagine the endless possibilities of learning from 2.5 quintillion...

The State of our General Assistants
From The Eponymous Pickle

The State of our General Assistants

Two major general assistance capabilities for computing platforms, Cortana and Siri continue to improve and expand.  It looks like this kind of voice driven intelligence...

Cisco Service Innovation Center
From The Eponymous Pickle

Cisco Service Innovation Center

This week’s presenter for the ISSIP Service Innovation Weekly Speaker Series is Craig Wirkus, Innovation Program Manager, Cisco Services Innovation Excellence Center...

Security Vulnerabilities in Wireless Keyboards
From Schneier on Security

Security Vulnerabilities in Wireless Keyboards

Most of them are unencrypted, which makes them vulnerable to all sorts of attacks: On Tuesday Bastille's research team revealed a new set of wireless keyboard attacks...

Seymour Papert Dies
From The Eponymous Pickle

Seymour Papert Dies

We followed him closely in our AI years.  Also a developer of the Logo language and Lego Mindstorms.  Developed much in the area of technology driven learningSeymour...

Machine Learning and Data Leakage
From The Eponymous Pickle

Machine Learning and Data Leakage

Admit I knew the concept, but not the term itself.   Data Leakage.   Using data outside a training set to build a model. Well, surprise, this is in practice always...

What Does it Mean for Everything to be Smart
From The Eponymous Pickle

What Does it Mean for Everything to be Smart

What are the challenges for invention on the Internet of Things?  In the early days of our use the only application was an indicator of what a thing was.  So it...

NCI in Australia Receives $14 Million Investment
From insideHPC

NCI in Australia Receives $14 Million Investment

The National Computational Infrastructure (NCI), Australia's high-performance supercomputer, cloud and data repository, has received a $7M boost from the Australian...

Increased Functions of Mobile Wallets
From The Eponymous Pickle

Increased Functions of Mobile Wallets

And consider also the integration of virtual assistance?How to increase customer engagement with mobile walletsOne method of connecting with users on mobile, which...

Introduction to Graph Databases
From The Eponymous Pickle

Introduction to Graph Databases

My latest blog is An Introduction to Graph Databases.   William McKnightAn Introduction to Graph Databases -- UpsideGraph databases are one of the fastest growing...

Cray’ Steve Scott Presents: Supercomputing Technologies and Trends: Where do we go from here?
From insideHPC

Cray’ Steve Scott Presents: Supercomputing Technologies and Trends: Where do we go from here?

Cray's Steve Scott presented this talk at The Digital Future Conference. "Research and development at Cray is guided by our adaptive supercomputing vision. This...

Cutting a Display for Experimental Packaging
From The Eponymous Pickle

Cutting a Display for Experimental Packaging

In Engadget.  An example where you can now cut up a computer display with a pair of scissors. Interesting, once looked at a packaging design project where this...

Panasas Rolls Out ActiveStor 20
From insideHPC

Panasas Rolls Out ActiveStor 20

Today Panasas introduced ActiveStor 20, its latest generation hybrid scale-out NAS appliance, featuring a 65 percent increase in flash and a 25 percent increase...

Raj Hazra Presents: Driving to Exascale
From insideHPC

Raj Hazra Presents: Driving to Exascale

Raj Hazra presented this talk at ISC 2016. "As part of the company's launch of the Intel Xeon Phi processor, Hazra describes how how cognitive computing and HPC...

Sociotechnical Cybersecurity Call for White Papers
From The Computing Community Consortium Blog

Sociotechnical Cybersecurity Call for White Papers

The Computing Community Consortium (CCC) will be hosting two workshops on Sociotechnical Cybersecurity. As a part of this effort, the workshop organizing committee...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account