Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

August 2016


From insideHPC

Penguin Computing Powers Chinook Cluster at University of Alaska Fairbanks

Penguin Computing Powers Chinook Cluster at University of Alaska Fairbanks

Today Penguin Computing announced that it is delivering an energy-efficient, HPC cluster to the University of Alaska Fairbanks. The new cluster, based on Penguin Computing’s Relion server family was first delivered in April 2016


From insideHPC

One Stop Systems Partners with Liqid on 3U Flash Storage Array

One Stop Systems Partners with Liqid on 3U Flash Storage Array

"We have partnered with Liqid to provide our customers with a leading option for enterprise-class flash storage. OSS is one of the only companies currently producing expansion products as dense as this FSA. By combining our PCIe


From Daniel Lemire's Blog

Let us talk about the Luddite problem…

Let us talk about the Luddite problem…

This morning I woke up to an interview on the radio (yes, I still have a radio somehow) with pharmacists who decided (gulp!) to try to fulfill prescriptions by mail. This is 2016. I can probably get almost all the chemical compounds


From BLOG@CACM

A Presidential Policy Directive With Little Direction

A Presidential Policy Directive With Little Direction

Cybersecurity is integral in nature in a very connected world; the insecurity of some contributes to the vulnerability of all.


From The Eponymous Pickle

Surveillance State as a Gadget

Surveillance State as a Gadget

Quite an extensive look at how advanced surveillance is now 'affordable':What Happens When the Surveillance State Becomes an Affordable Gadget?Maybe it doesn’t faze you that your local police have a $400,000 device that listens


From Phys.org Technology News

Video gamers turn to science for virtual edge

Video gamers turn to science for virtual edge

For some people, video gaming is an activity relegated to the weekends and that all too rare spare time.


From Phys.org Technology News

How computer algorithms shape our experience of the real world

How computer algorithms shape our experience of the real world

The use of algorithms to filter and present information online is increasingly shaping our everyday experience of the real world, a study published by Information, Communication & Society argues.


From The Eponymous Pickle

Promoting Scientific Papers to the Public

Promoting Scientific Papers to the Public

Promoting, and often translating scientific papers and ideas to the more general public.  Its a little like what this kind of blog does.  And what I did in various enterprises.   Help semi-technical management understand theIn


From Schneier on Security

New Presidential Directive on Incident Response

New Presidential Directive on Incident Response

Last week, President Obama issued a policy directive (PPD-41) on cyber-incident response coordination. The FBI is in charge, which is no surprise. Actually, there's not much surprising in the document. I suppose it's important


From The Eponymous Pickle

Artificial Intelligence and the Supply Chain

Artificial Intelligence and the Supply Chain

In Financial Experess:   Artificial Intelligence: The next big thing in Supply Chain ManagementImagine the endless possibilities of learning from 2.5 quintillion bytes of data generated every day. Artificial intelligence (AI)


From The Eponymous Pickle

The State of our General Assistants

The State of our General Assistants

Two major general assistance capabilities for computing platforms, Cortana and Siri continue to improve and expand.  It looks like this kind of voice driven intelligence will become the standard.   Mashable compares the power


From The Eponymous Pickle

Cisco Service Innovation Center

Cisco Service Innovation Center

This week’s presenter for the ISSIP Service Innovation Weekly Speaker Series is Craig Wirkus, Innovation Program Manager, Cisco Services Innovation Excellence Center (SIEC). This is a special 45-60 minutes presentation that will


From Schneier on Security

Security Vulnerabilities in Wireless Keyboards

Security Vulnerabilities in Wireless Keyboards

Most of them are unencrypted, which makes them vulnerable to all sorts of attacks: On Tuesday Bastille's research team revealed a new set of wireless keyboard attacks they're calling Keysniffer. The technique, which they're planning


From The Eponymous Pickle

Seymour Papert Dies

Seymour Papert Dies

We followed him closely in our AI years.  Also a developer of the Logo language and Lego Mindstorms.  Developed much in the area of technology driven learning.Seymour Papert, theorist behind One Laptop Per Child, dies at 88South


From The Eponymous Pickle

Machine Learning and Data Leakage

Machine Learning and Data Leakage

Admit I knew the concept, but not the term itself.   Data Leakage.   Using data outside a training set to build a model. Well, surprise, this is in practice always the case.    It is usually needed for adjusting models to changes


From The Eponymous Pickle

What Does it Mean for Everything to be Smart

What Does it Mean for Everything to be Smart

What are the challenges for invention on the Internet of Things?  In the early days of our use the only application was an indicator of what a thing was.  So it could be counted, located, or paid for. Now the possibilities have


From insideHPC

NCI in Australia Receives $14 Million Investment

NCI in Australia Receives $14 Million Investment

The National Computational Infrastructure (NCI), Australia's high-performance supercomputer, cloud and data repository, has received a $7M boost from the Australian Government, matched by the NCI Collaborating partners. "The


From The Eponymous Pickle

Increased Functions of Mobile Wallets

Increased Functions of Mobile Wallets

And consider also the integration of virtual assistance?How to increase customer engagement with mobile walletsOne method of connecting with users on mobile, which most brands likely wouldn’t consider, is by using mobile wallets


From The Eponymous Pickle

Introduction to Graph Databases

Introduction to Graph Databases

My latest blog is An Introduction to Graph Databases.   William McKnightAn Introduction to Graph Databases -- UpsideGraph databases are one of the fastest growing categories in data management, yet they remain an enigma to many


From insideHPC

Cray’ Steve Scott Presents: Supercomputing Technologies and Trends: Where do we go from here?

Cray’ Steve Scott Presents: Supercomputing Technologies and Trends: Where do we go from here?

Cray's Steve Scott presented this talk at The Digital Future Conference. "Research and development at Cray is guided by our adaptive supercomputing vision. This vision is focused on delivering innovative, next-generation products


From The Eponymous Pickle

Cutting a Display for Experimental Packaging

Cutting a Display for Experimental Packaging

In Engadget.  An example where you can now cut up a computer display with a pair of scissors. Interesting, once looked at a packaging design project where this could have been useful.   Other applications?


From insideHPC

Panasas Rolls Out ActiveStor 20

Panasas Rolls Out ActiveStor 20

Today Panasas introduced ActiveStor 20, its latest generation hybrid scale-out NAS appliance, featuring a 65 percent increase in flash and a 25 percent increase in hard drive capacity. High-density flash drives and 10 terabyte


From insideHPC

Raj Hazra Presents: Driving to Exascale

Raj Hazra Presents: Driving to Exascale

Raj Hazra presented this talk at ISC 2016. "As part of the company's launch of the Intel Xeon Phi processor, Hazra describes how how cognitive computing and HPC are going to work together. "Intel will introduce and showcase a


From The Computing Community Consortium Blog

Sociotechnical Cybersecurity Call for White Papers

Sociotechnical Cybersecurity Call for White Papers

The Computing Community Consortium (CCC) will be hosting two workshops on Sociotechnical Cybersecurity. As a part of this effort, the workshop organizing committee has released a call for white papers in order to both assist


From insideHPC

IBM TrueNorth Project wins Inaugural Misha Mahowald Prize

IBM TrueNorth Project wins Inaugural Misha Mahowald Prize

The inaugural Misha Mahowald Prize for Neuromorphic Engineering has been awarded to the TrueNorth project, led by Dr. Dharmendra S. Modha at IBM Research. "The Misha Mahowald Prize recognizes outstanding achievement in the field


From Daniel Lemire's Blog

Combine smart people with crazily hard projects

Combine smart people with crazily hard projects

Back in college, professors assigned crazily hard problems… and I was forced to talk with my peers to figure out how they fared… and eventually teaming up with some of them. The same pattern has repeated itself again and again


From Schneier on Security

Hacking the Vote

Hacking the Vote

Russia has attacked the U.S. in cyberspace in an attempt to influence our national election, many experts have concluded. We need to take this national security threat seriously and both respond and defend, despite the partisan


From Computer Science Teacher – Thoughts and Information From Alfred Thompson

Interesting Links 1 August 2016

Interesting Links 1 August 2016

In parts of the US, teachers start returning to school this week. I'm not one of them but the time is approaching. Fewer than three weeks to go for me. It’s been a crazy busy summer for me. Last week was a week long Advanced

« Prev 1 9 10 11 Next »
Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo