acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Semantic Data Lakes
From The Eponymous Pickle

Semantic Data Lakes

Via Tim Smith. Hadoop, Triple Stores, and the Semantic Data Lake, by Alex WoodieHadoop-based data lakes are springing up all over the place as organizations seek...

Secretary of Education Hosts Tea with Computer Science Teachers
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Secretary of Education Hosts Tea with Computer Science Teachers

Once a month a small group of teachers is invited to have tea with US Secretary of Education John King. June was the month for computer science teachers and I was...

Latency in Voice Command Response
From The Eponymous Pickle

Latency in Voice Command Response

The inside story of how Amazon created Echo, the next billion-dollar business no one saw coming ... by Eugene Kim, Dave Limp   Creating the Echo.Reaction:  The...

Predicting Crime
From The Eponymous Pickle

Predicting Crime

In Forbes: An update on the use of predictive analytics for crime prediction and prevention.   With a number of suppliers in the space described.   Looks to be...

Hijacking Someone's Facebook Account with a Fake Passport Copy
From Schneier on Security

Hijacking Someone's Facebook Account with a Fake Passport Copy

BBC has the story. The confusion is that a scan of a passport is much easier to forge than an actual passport. This is a truly hard problem: how do you give people...

CloudLightning Project Looks to Self-Managed HPC Services
From insideHPC

CloudLightning Project Looks to Self-Managed HPC Services

In this video, Prof. John Morrison from University College Cork describes the CloudLightning project. CloudLightning’s vision is a European economy that thrives...

Prevention of Systemic Risk
From The Eponymous Pickle

Prevention of Systemic Risk

Here about financial risks.  And in fact what are systemic risks?  Here appears to be defined by risks that are driven by external context and that are not considered...

PBS Pro from Altair Goes Open Source at ISC 2016
From insideHPC

PBS Pro from Altair Goes Open Source at ISC 2016

In this video from ISC 2016, Bill Nitzberg provides an update on Alair's release of source code for PBS Professional Workload Manager. "Altair is making a big investment...

OrionX Reports Position InfiniBand as the Leading HPI Technology and Mellanox the Leading Vendor
From insideHPC

OrionX Reports Position InfiniBand as the Leading HPI Technology and Mellanox the Leading Vendor

"For now, InfiniBand and its vendor community, notably Mellanox appear to have the upper hand from a performance and market presence perspective, but with Intel...

A Device Technologist at the ISCA Architecture 2030 Visioning Workshop
From The Computing Community Consortium Blog

A Device Technologist at the ISCA Architecture 2030 Visioning Workshop

The following is a guest blog post by H.-S. Philip Wong from Stanford University.  I just came back from the exciting Architecture 2030 Visioning Workshop, organized...

Russia’s RSC Group Receives Intel HPC Data Center Specialist Status
From insideHPC

Russia’s RSC Group Receives Intel HPC Data Center Specialist Status

Today Russia's RSC Group announced that the company has received the elite HPC Data Center Specialist partner status from Intel Corporation, confirming the very...

Supermicro Showcases Intel Xeon Phi and Nvidia P100 Solutions at ISC 2016
From insideHPC

Supermicro Showcases Intel Xeon Phi and Nvidia P100 Solutions at ISC 2016

At ISC 2016, Supermicro debuted the latest innovations in HPC architectures and technologies including a 2U 4-Node server supporting new Intel Xeon Phi processors...

Microsoft Betting its Future on AI
From The Eponymous Pickle

Microsoft Betting its Future on AI

Microsoft beyond AI and into how the world is presented in conjunction with data and intelligence.In theVerge: " ... Satya Nadella bounded into the conference room...

Three Legs to a Successful Computer Science Curriculum
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Three Legs to a Successful Computer Science Curriculum

Summer is a great time to think. I’ve bene fortunate enough to have several opportunities to talk to other computer science teachers this summer. And will have...

Electronic voting may be risky, but what about vote counting?
From Phys.org Technology News

Electronic voting may be risky, but what about vote counting?

Several advantages of online voting were identified in a recent post by Conversation columnist and software researcher David Glance who backed the introduction...

The Difficulty of Routing around Internet Surveillance States
From Schneier on Security

The Difficulty of Routing around Internet Surveillance States

Interesting research: "Characterizing and Avoiding Routing Detours Through Surveillance States," by Anne Edmundson, Roya Ensafi, Nick Feamster, and Jennifer Rexford...

Reading People
From The Eponymous Pickle

Reading People

More psych, on reading people.  I like the fact that quoted are less university researchers and more people that need read people as a business.  Good links to...

National Privacy Research Strategy Released
From The Computing Community Consortium Blog

National Privacy Research Strategy Released

The National Privacy Research Strategy by the National Science and Technology Council (NSTC) and Networking and Information Technology Research and Development...

InfiniBand Continues Dominance of TOP500
From insideHPC

InfiniBand Continues Dominance of TOP500

Today the InfiniBand Trade Association (IBTA) and the OpenFabrics Alliance (OFA) today announced that 204 of the world’s most powerful supercomputers accelerate...

Machine Learning Images from Mobile Video
From The Eponymous Pickle

Machine Learning Images from Mobile Video

Continued interest in fast image analysis.  Has implications for the perception of images, and thus space and what exists within it.Google acquires image recognition...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account