acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Simple Graph Plotting
From The Eponymous Pickle

Simple Graph Plotting

Brought to my attention, a simple way to deliver plots.  Not perfect or anywhere near complete, but I like to collect simple means.  I have Tableau, Excel and half...

Realtime Strategic execution
From The Eponymous Pickle

Realtime Strategic execution

Trends in 2015, the need for real time" ... Project teams will deliberate less and plan in real-time more. Companies will recognize a cultural difference as a point...

President and FAA Act On Drone Activity
From U.S. Public Policy Committee of the ACM

President and FAA Act On Drone Activity

On February 15th the President issued an Executive Memorandum on the domestic use of unmanned aerial systems (UAS/drones).  That same day the Federal Aviation Administration...

Friday Squid Blogging: Squid Can Recode Their Genetic Makeup
From Schneier on Security

Friday Squid Blogging: Squid Can Recode Their Genetic Makeup

This is freaky: A new study showcases the first example of an animal editing its own genetic makeup on-the-fly to modify most of its proteins, enabling adjustments...

Man-in-the-Middle Attacks on Lenovo Computers
From Schneier on Security

Man-in-the-Middle Attacks on Lenovo Computers

It's not just national intelligence agencies that break your https security through man-in-the-middle attacks. Corporations do it, too. For the past few months,...

Shopping Through the Lens of IT
From The Eponymous Pickle

Shopping Through the Lens of IT

In the ACM    " ... Pennsylvania State University (PSU) researchers are studying how smart cameras could eventually guide visually impaired shoppers to find the...

Watson Preps the Data
From The Eponymous Pickle

Watson Preps the Data

A prediction that Watson Analytics will also prepare the data.  Often a tedious and error prone activity.  There are many aspects of preparing and scrubbing data...

Simulating Architectures in a Game World
From The Eponymous Pickle

Simulating Architectures in a Game World

From today's CSIG talk. Slides at the link. The use of simulation and game technologies to understand the operation of alternative architectures. Here specifically...

What Does the Term Cognitive Assistant Mean?
From The Eponymous Pickle

What Does the Term Cognitive Assistant Mean?

A Linkedin discussion on the topic, which includes some comments of my own on several systems we built that have been mentioned here.  Assistance can mean to augment...

Today’s BASIC Is Not Your Father’s BASIC
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Today’s BASIC Is Not Your Father’s BASIC

A post at Doug Peterson’s blog (A Different Time) sent me to a site that has a collection of old BASIC programs. And by old I mean the 1970s. I remember many of...

Job of the Week: Principal HPC Architect at Aberdeen Proving Ground
From insideHPC

Job of the Week: Principal HPC Architect at Aberdeen Proving Ground

The Aberdeen Proving Ground in Maryland is seeking a Principal HPC Architect in our Job of the Week. The candidate will performs studies and develops new HPC technology...

Video: HPC Transforms Students with Mentorships at SC15
From insideHPC

Video: HPC Transforms Students with Mentorships at SC15

In this video, Ken Kraft from Intel describes his experiences as a participant in SC Conference Mentor-Protege program. "The SC15 conference is broadening its mission...

OpenPOWER Summit Announces Speaker Lineupfor March Conference
From insideHPC

OpenPOWER Summit Announces Speaker Lineupfor March Conference

This week the OpenPOWER Foundation announced their lineup of speakers for the inaugural OpenPOWER Summit at the GPU Technology Conference in San Jose, March 17-19...

Understanding people’s financial behaviors
From Putting People First

Understanding people’s financial behaviors

Erin Taylor and Gawain Lynch of the Institute for Money, Technology and Financial Inclusion (UCI) lead a research project aimed at understanding people’s financial...

Why I Joined Dove & Twitter to #SpeakBeautiful
From Apophenia

Why I Joined Dove & Twitter to #SpeakBeautiful

I’ve been online long enough to see a lot of negativity. I wear a bracelet that reads “Don’t. Read. The. Comments.” (a gift from Molly Steenson) to remind myself...

NSA/GCHQ Hacks SIM Card Database and Steals Billions of Keys
From Schneier on Security

NSA/GCHQ Hacks SIM Card Database and Steals Billions of Keys

The Intercept has an extraordinary story: the NSA and/or GCHQ hacked into the Dutch SIM card manufacturer Gemalto, stealing the encryption keys for billions of...

Nearly 200 Years after Ada, Women Becoming More Visible in Scientific Computing
From insideHPC

Nearly 200 Years after Ada, Women Becoming More Visible in Scientific Computing

In this special guest perspective from Scientific Computing World, Tom Wilkie considers some initiatives to counter the widespread impression that scientific computing...

[White paper] Digital assurance: Reaching a seamless customer experience
From Putting People First

[White paper] Digital assurance: Reaching a seamless customer experience

Digital Assurance: Reaching a Seamless Customer Experience by Shawndra Hill (Wharton professor of operations and information management) and Kumudha Sridharan (vice...

USACM Congratulates New EAC Commissioners
From U.S. Public Policy Committee of the ACM

USACM Congratulates New EAC Commissioners

USACM has sent letters to each of the three newly sworn-in Commissioners of the Election Assistance Commission (EAC): Thomas Hicks, Matthew Masterson and Christy...

Are Robots Our Friends?
From The Computing Community Consortium Blog

Are Robots Our Friends?

There has been a tremendous amount of press on the astonishing advancement of artificial intelligence (AI) and the negative impacts that it could have on our society...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account