acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

IBM Speed Record for Big Data
From The Eponymous Pickle

IBM Speed Record for Big Data

Of Interest:   Press release, more implications at the link:" ... IBM today announced that it has achieved a new technological advancement that will help improve...

Friday Squid Blogging: Giant Squid TED Talk
From Schneier on Security

Friday Squid Blogging: Giant Squid TED Talk

Interesting. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

MONKEYCALENDAR: NSA Exploit of the Day
From Schneier on Security

MONKEYCALENDAR: NSA Exploit of the Day

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: MONKEYCALENDAR (TS//SI//REL) MONKEYCALENDAR is a software implant for GSMhere...

Better Data on Online Education
From The Eponymous Pickle

Better Data on Online Education

In GigaOM:  " .... Collecting student data digitally isn’t solely something for massive open online courses. Even university professors and their students can benefit...

My Talk on the NSA
From Schneier on Security

My Talk on the NSA

Earlier this month, I gave a talk about the NSA at MIT. The video is available. ETA: The video doesn't display on some Firefox browsers. If you have trouble,...

P&G Winning with Olympics Social Media Strategy
From The Eponymous Pickle

P&G Winning with Olympics Social Media Strategy

A look at how P&G succeeded in using social media at the Sochi Olympics.   In USA Today.  Mostly through preparing the field for competition: " ... . P&G is leaps...

Searching for Code Snippets–Good or Bad for Students?
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Searching for Code Snippets–Good or Bad for Students?

This morning Rob Miles posted a link (C# Code Snippets on Demand) to a new site from Microsoft Research called Bing Code Search: C# code snippets on-demand. basically...

Call for Submissions – 8th Extreme Scaling Workshop: The Intersection of Big Data and Large-Scale Computing
From The Computing Community Consortium Blog

Call for Submissions – 8th Extreme Scaling Workshop: The Intersection of Big Data and Large-Scale Computing

The National Science Foundation (NSF)-funded Blue Waters and eXtreme Science and Engineering Discovery Environment (XSEDE) projects are hosting the 8th Extreme...

Intel as Operating System for Big Data
From The Eponymous Pickle

Intel as Operating System for Big Data

Intel wants to be the operating system for Big Data.  Interesting thought.  They had better understand the analytics of it.  It is not just about the hardware. "...

Loyalty Optimization with Bayesian Networks
From The Eponymous Pickle

Loyalty Optimization with Bayesian Networks

Another interesting example of the use of Bayesian networks for data mining. via Stefan Conrady of Bayesia.   Nice understandable draft tutorial.  " ... Identifying...

More Head Mounted Displays in Works
From The Eponymous Pickle

More Head Mounted Displays in Works

In CWorld:  Based on supplier comments, this seems to be in the works.  Is the future now wearables and head mounted, augmented reality style displays?   And notably...

Getting good performance in Go by rewriting parts in C?
From Daniel Lemire's Blog

Getting good performance in Go by rewriting parts in C?

Go is a new programming language invented by Google engineers. Apparently, it came about because they were tired to wait for their C++ code to compile. To run Go...

IT Hiring Slowing
From The Eponymous Pickle

IT Hiring Slowing

In ComputerWorld:  By my own unscientific view as well, talking to several big hiring companies. Caused by continuing uncertainty about the economy, and thus unwillingness...

anthropology + design: nicolas nova
From Putting People First

anthropology + design: nicolas nova

Rachel Carmen Ceasar (@rceasara) is a doctoral candidate in the Joint Medical Anthropology Program at UC Berkeley and UC San Francisco (California, USA). She writes...

The Insecurity of Secret IT Systems
From Schneier on Security

The Insecurity of Secret IT Systems

We now know a lot about the security of the Rapiscan 522 B x-ray system used to scan carry-on baggage in airports worldwide. Billy Rios, director of threat intelligence...

An ethnography of the Brixton Pound
From Putting People First

An ethnography of the Brixton Pound

Mario Campana (@mariocampana), a PhD student at City University London’s Cass Business School, researches the growing trend of local currencies – of which there...

Interview with man at the heart of Facebook ethnography kerfuffle
From Putting People First

Interview with man at the heart of Facebook ethnography kerfuffle

Tricia Wang interviewed Daniel Miller, the anthropologist at the heart of the Facebook ethnography kerfuffle, and published the transcript on EthnographyMatters...

From Gödel's Lost Letter and P=NP

Seeing Atoms

How can we possibly see atoms? John Sidles is a medical researcher and a quantum systems engineer. His major focus is on quantum spin microscopy for regenerative...

Deep Learning in Neural Nets
From The Eponymous Pickle

Deep Learning in Neural Nets

General outline and technical detailed article in the WP about deep learning in neural nets.   And further about deep learning in general:  " ... Deep learningDeep...

Netflix Using Distributed Neural Nets
From The Eponymous Pickle

Netflix Using Distributed Neural Nets

In the enterprise we actively used artificial neural nets to perform various scoring functions for analytical learning methods.  They were particularly useful for...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account