acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Watson Analytics for Superbowl Front Office Data Analysis
From The Eponymous Pickle

Watson Analytics for Superbowl Front Office Data Analysis

Good, fairly simple example of the automation of analytics.  Here using Watson analytics.  With commonly used exploratory goals.   Explore it for freeIn Business...

K Nearest Neighbor Using Python
From The Eponymous Pickle

K Nearest Neighbor Using Python

Good instructional piece for a common kind of machine learning. Clustering.  Easier to do in R, but the comparison is also very useful. In DSC:   K-nearest neighbor...

Beyond Automation
From The Eponymous Pickle

Beyond Automation

Talk today by Tom Davenport:  In particular how can we look at the current influence of fognitive/AI in the workplace? ... “Beyond Automation: Smart Machines +,...

Model Discovery, Process Mining with Fluxicon
From The Eponymous Pickle

Model Discovery, Process Mining with Fluxicon

This software, Fluxicon Disco, was new to me.  Described in KDNuggets.   I recall doing something similar in R, but this appears to cover the whole realm of process...

NSF Fiscal Year 2017 Budget Request
From The Computing Community Consortium Blog

NSF Fiscal Year 2017 Budget Request

The National Science Foundation (NSF) Director France A. Córdova outlined President Obama’s fiscal year (FY) 2017 budget request to Congress for NSF. The FY17 request...

Crowdoscope from Unilever
From The Eponymous Pickle

Crowdoscope from Unilever

Of interest is the involvement of the CPG giant Unilever.  A data source, likely linked to real time analytics.Crowdoscope – a breakthrough survey and discussion...

Beyond the PC toward virtual and augmented reality
From Daniel Lemire's Blog

Beyond the PC toward virtual and augmented reality

PC sales have entered a slow decline. Today, you can literally work on your Microsoft Office documents no matter where you are, no matter what computing deviceContinue...

Call for Papers: International Workshop on Performance-Portable Programming Models for Accelerators
From insideHPC

Call for Papers: International Workshop on Performance-Portable Programming Models for Accelerators

The first annual International Workshop on Performance Portable Programming Models for Accelerators has issued its Call for Papers. Known as P^3MA, the workshop...

Worldwide Encryption Products Survey
From Schneier on Security

Worldwide Encryption Products Survey

Today I released my worldwide survey of encryption products. The findings of this survey identified 619 entities that sell encryption products. Of those 412, or...

Creating an Exascale Ecosystem Under the NSCI Banner
From insideHPC

Creating an Exascale Ecosystem Under the NSCI Banner

“We expect NCSI to run for the next two decades. It’s a bit audacious to start a 20 year project in the last 18 months of an administration, but one of the things...

UW Projects Awarded 42 Million Core Hours on Yellowstone Supercomputer
From insideHPC

UW Projects Awarded 42 Million Core Hours on Yellowstone Supercomputer

"A new supercomputer, dubbed Cheyenne, is expected to be operational at the beginning of 2017. The new high-performance computer will be a 5.34-petaflop system,...

Podcast: Molly Rector from DDN on the Changing Face of HPC Storage
From insideHPC

Podcast: Molly Rector from DDN on the Changing Face of HPC Storage

In this Graybeards Podcast, Molly Rector from DDN describes how HPC storage technologies are mainstreaming into the enterprise space. "In HPC there are 1000s of...

MultiLevel Parallelism with Intel Xeon Phi
From insideHPC

MultiLevel Parallelism with Intel Xeon Phi

"The combination of using both MPI and OpenMP is a topic that has been explored by many developers in order to determine the most optimum solution. Whether to use...

Stories can be Dangerous
From The Eponymous Pickle

Stories can be Dangerous

Have been always intrigued by storytelling, establishing a narrative, as a powerful way to convince, to advertise, to market.  It also a way to convert your analytics...

Kognit for Mixed Reality
From The Eponymous Pickle

Kognit for Mixed Reality

Brought to my attention, understanding the limits of cognition and how it can be augmented with accessory augmentation.  Note the use of the term: 'Mixed Reality'...

From Computational Complexity

Test of Time Award- a good idea but...

The ESA Conference (European Symposium on Algorithms) has a test-of-time award which recognizes outstanding papers in algorithms research that were published in...

Make Privacy a 2016 Election Issue
From Schneier on Security

Make Privacy a 2016 Election Issue

EPIC has just launched "Data Protection 2016" to try to make privacy an issue in this year's elections. You can buy swag....

First Canadian Celebration of Women in Computing (CAN-CWIC)
From The Female Perspective of Computer Science

First Canadian Celebration of Women in Computing (CAN-CWIC)

For the first time ever, I attended a women-in-computing conference with absolutely no student affiliation whatsoever (I recently de-registered from my PhD forCanadian...

AT&T Does Not Care about Your Privacy
From Schneier on Security

AT&T Does Not Care about Your Privacy

AT&T's CEO believes that the company should not offer robust security to its customers: But tech company leaders aren't all joining the fight against the deliberate...

Lift Ticket Project
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Lift Ticket Project

Have you bought lift tickets at a ski resort lately? There are a lot of options. Different age groups, different days (week days, weekends, holidays) and different...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account