acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

DebateGraph: Collective, Collaborative Wisdom in Action
From The Eponymous Pickle

DebateGraph: Collective, Collaborative Wisdom in Action

This week’s presenter for the ISSIP SIG Education & Research Service Evangelist Series was David Price, Ph.D. Organizational Learning (Cambridge University), Judge...

Video: Teachers Shoot a Visual Tour of SC14 in New Orleans
From insideHPC

Video: Teachers Shoot a Visual Tour of SC14 in New Orleans

In this video from SC14, Arni Mittal and Ethan Oayne from the John Monash Science School in Melbourne embark on a journey to New Orleans to uncover the world of...

Supercomputing Frontiers to Explore Exascale in Singapore, March 17-20
From insideHPC

Supercomputing Frontiers to Explore Exascale in Singapore, March 17-20

The inaugural Supercomputing Frontiers conference has announced its agenda and keynote speakers. The event will take place March 17 – 20, 2015 in Singapore.

Cray XC40 Hornet Supercomputer Scales to 96K Cores on Scientific Applications
From insideHPC

Cray XC40 Hornet Supercomputer Scales to 96K Cores on Scientific Applications

Today GCS in Germany announced that their new Hornet supercomputer at HLRS is ready for extreme-scale computing challenges. "To test its mettle, Hornet successfully...

NICE DCV 2014 Does Remote 3D Applications in the Cloud
From insideHPC

NICE DCV 2014 Does Remote 3D Applications in the Cloud

Today NICE in Italy released the latest version of their DCV remote visualization technology.

Wallet is Marketing Platform of the Future
From The Eponymous Pickle

Wallet is Marketing Platform of the Future

In Adage:  Wallet as marketing platform.    And as more interaction occurs in the aisle, it is likely the power of this will expand.  " ....  Last year, just 14...

Tom Ridge Can Find Terrorists Anywhere
From Schneier on Security

Tom Ridge Can Find Terrorists Anywhere

One of the problems with our current discourse about terrorism and terrorist policies is that the people entrusted with counterterrorism -- those whose job it is...

Can I Give You A Hint?
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Can I Give You A Hint?

Last month I attended a workshop on CodeHunt at Microsoft Research. A talk there by Daniel Perelman on Hint generation in Code Hunt (you can watch a video of his...

UX for technology used by an ageing population
From Putting People First

UX for technology used by an ageing population

The trend of an ageing population is reflected across Europe. It is estimated that by 2035 nearly a quarter of the population in the United Kingdom will be over...

EU draft privacy law is useless, say digital rights orgs
From Putting People First

EU draft privacy law is useless, say digital rights orgs

Activists have leaked the latest draft of Europe’s planned data protection law – which is supposed to safeguard Europeans’ personal information when in the hands...

Analytics Magazine features Internet of Things
From The Eponymous Pickle

Analytics Magazine features Internet of Things

The March/April issue of Analytics Magazine features articles on a wide range of topics, including: intuitive analytics, the Internet of things, healthcare analytics...

Hate EasyChair
From My Biased Coin

Hate EasyChair

I just typed in a nice long review on EasyChair.  Yes, I prefer doing this with the online form when I'm just sitting around and have time to do a review. Apparently...

Data and Goliath: Reviews and Excerpts
From Schneier on Security

Data and Goliath: Reviews and Excerpts

On the net right now, there are excerpts from the Introduction on Scientific American, Chapter 5 on the Atlantic, Chapter 6 on the Blaze, Chapter 8 on Ars Technica...

Your Phone as an IoT Hub
From The Eponymous Pickle

Your Phone as an IoT Hub

In GigaOM:   The implications?    " ... Broadcom’s new Wi-Fi chip turns your phone into an IoT hub ...  While our phones can use Wi-Fi to connect directly to other...

Google Backs Away from Default Lollipop Encryption
From Schneier on Security

Google Backs Away from Default Lollipop Encryption

Lillipop encryption by default is still in the future. No conspiracy here; it seems like they don't have the appropriate drivers yet. But while relaxing the requirement...

Video: HPC to Transform Grad Student Careers at SC15
From insideHPC

Video: HPC to Transform Grad Student Careers at SC15

In this video, Tanzima Islam from Lawrence Livermore National Laboratory discusses how her experiences as a graduate student at the SC conference propelled her...

Delivering Bayesian Network Simulation Models
From The Eponymous Pickle

Delivering Bayesian Network Simulation Models

Bayesian network simulation was a favorite analytical method at our enterprise, they still maintain an active presence.   Now in a new release BayesiaLab has aNew...

Big Data and New Product Development
From The Eponymous Pickle

Big Data and New Product Development

Here is an update on this talk, given on 1/29." ... What does it mean to embed the intelligence from Big Data into new product development?How will Big Data power...

More on Automating Data Scientists
From The Eponymous Pickle

More on Automating Data Scientists

Good piece in the Technology Review.    A continued interest in the enterprise.    How automated can this be?   At minimum a means to extract potential patterns...

Data Driven Business Innovation Models
From The Eponymous Pickle

Data Driven Business Innovation Models

Thinking of what it means to drive innovation from data." ... Latest Paper on Data-driven business models from the Cambridge Service AllianceNews - Cambridge Service...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account