Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

July 2015


From The Eponymous Pickle

Sony Drones for Enterprises

Sony Drones for Enterprises

In CIO,   Mobile in three dimensions. Expect a further dimensionalizing of data acquisition. " ... Drones are officially taking over. Not content to cede the market for autonomous vehicles to Amazon and Google, Sony announced


From The Eponymous Pickle

Dispel Fear of Data

Dispel Fear of Data

Dispel the fear of data, in the HBR.  Despite what we may call data, we all use it, every day, all the time.  So fear is not the problem, a cautious respect for its value and proper application would be better put.  It is always


From The Eponymous Pickle

Statistical Significance

Statistical Significance

Kaiser Fung takes a core value principle look at the meaning of statistical significance.  His statement is very true, but is it actually useful in practice, except as a general caution?   What does it tell me to do with the


From insideHPC

Speeding Up CFD Codes with Allinea Performance Reports

Speeding Up CFD Codes with Allinea Performance Reports

In this video from ISC 2015, Mark O'Connor demonstrates how the Allinea Performance Reports tool enables coders to speed up hydro, a real-world CFD code. "Allinea Performance Reports are the most effective way to characterize


From BLOG@CACM

What It's Like to Win the Turing Award

What It's Like to Win the Turing Award

Michael Stonebraker is an adjunct professor in the Massachussetts Institute of Technology's Computer Science and Artificial Intelligence Laboratory, and recipient of the 2014 ACM A.M. Turing Award.


From The Eponymous Pickle

IBM Open Sourcing 50 Projects

IBM Open Sourcing 50 Projects

More movement to Open Source:" ...  IBM has announced a new web portal called developerWorks Open, bringing together various projects they are open sourcing. The projects cover many domains including Analytics, Cloud, IoT, Mobile


From The Eponymous Pickle

Future of the Chief Data Officer

Future of the Chief Data Officer

In SiliconAngle:  Don't in particular like the idea of labeling things with 'Chief', better to have a team of experts, closely connected.  Its the Information - Data - Knowledge progression.  Everyone should understand that.


From The Eponymous Pickle

New Features in Polinode Networks

New Features in Polinode Networks

A number of new features have been added to the evolving Polinode network analysis system.  The home link has an introductory video and application examples.   Has a good freemium model for testing.  Helps cut through the complexity


From The Eponymous Pickle

Mobile Apps and in-store Impulse Buys

Mobile Apps and in-store Impulse Buys

Time in store is the most influential driver for sales.   Well known.  Now can a mobile App keep them in the store longer? And is that extra time also increase buying? Are mobile apps the key to driving in-store impulse sales


From The Eponymous Pickle

Cognitive Analytics

Cognitive Analytics

In AnalyticBridge: Some good fundamental lectures on the foundations of cognitive systems.   "... An introduction to Cognitive Analysis, by Scott Mongeau - Deloitte ... "


From insideHPC

Interview: Hot Interconnects Conference Returns to Santa Clara Aug 26-28

Interview: Hot Interconnects Conference Returns to Santa Clara Aug 26-28

"This year we have a specific focus on the latest advances in different areas of networks, showcasing some of the latest and greatest next generation networking hardware. Our focus on Data Center vs. HPC networks will allow for


From insideHPC

KTH Presents: Building Virtual Product Modeling for Scania

KTH Presents: Building Virtual Product Modeling for Scania

Daniel Ahlin from KTH (Sweden's Royal Institute of Technology) presented this talk at the DDN User Group at ISC 2015. "The PDC Center for High Performance Computing at the KTH Royal Institute of Technology provides leading HPC


From insideHPC

Panasas Moves Forward with ActiveStor 18 Hybrid Scale-out NAS Appliance

Panasas Moves Forward with ActiveStor 18 Hybrid Scale-out NAS Appliance

"By adopting 8 terabyte drive technology, ActiveStor 18 increases scalability to more than 20 petabytes and 200 gigabytes per second. According to Panasas, ActiveStor 18 also offers increased CPU power and twice the storage cache


From U.S. Public Policy Committee of the ACM

USACM Celebrates 25th Anniversary of the Americans with Disabilities Act

USACM Celebrates 25th Anniversary of the Americans with Disabilities Act

On July 26, 2015, we will celebrate the 25th anniversary of the signing of the Americans with Disabilities Act (ADA). The ACM U.S. Public Policy Council joins the country’s celebration of the 25th anniversary of the ADA, a landmark


From insideHPC

Users Accelerate their Own Code at EuroHack

Users Accelerate their Own Code at EuroHack

"Despite what the name “EuroHack” may lead people to believe, no external systems were hacked during the EuroHack workshop in Lugano. In actual fact, the aim of the event was for experts to design computer codes that would exploit


From insideHPC

CoolIT Systems Innovates with Liquid Cooling at ISC 2015

CoolIT Systems Innovates with Liquid Cooling at ISC 2015

"Power savings, increased rack density and high performance are the three key advantages of using liquid cooling. CoolIT Systems offers options for data centers with or without facility water hook up. Any server in any rack can


From insideHPC

Quantum Chemistry at Scale

Quantum Chemistry at Scale

"Applications can be tuned to use both the Intel Xeon and the Intel Xeon Phi simultaneously, without modifying the code to just run on the coprocessor. Using a number of software tools from Intel, performance of a coupled cluster


From The Eponymous Pickle

Vehicle Hacking and Security

Vehicle Hacking and Security

This came to my mind as I had a new OS update put into my one year old car.  What are the dangers here?  I have no control of anti hacking or anti malware capabilities on its systems.  I did get an App with the car, but thatHacker


From The Eponymous Pickle

Unilever Partners with Alibaba

Unilever Partners with Alibaba

The breadth of the interaction as stated is interesting.   China is the big future CPG market.  I attended a meeting yesterday that made much of the China mobile market where this was not mentioned. Unilever Partners with Alibaba


From Computational Complexity

New Proof of the Isolation Lemma

The isolation lemma of Mulmuley, Vazirani and Vazirani says that if we take random weights for elements in a set system, with high probability there will be a unique set of minimum weight. Mulmuley et al. use the isolation lemma


From The Eponymous Pickle

Gamifying Videos

Gamifying Videos

Interesting simple approach, have not tried:  parWinr" ... Gamify your video – in minutes! ... parWinr’s innovative software lets you quickly turn any video asset into an online game,providing enhanced engagement and generating


From Schneier on Security

Remotely Hacking a Car While It's Driving

Remotely Hacking a Car While It's Driving

This is a big deal. Hackers can remotely hack the Uconnect system in cars just by knowing the car's IP address. They can disable the brakes, turn on the AC, blast music, and disable the transmission: The attack tools Miller and


From insideHPC

REX Computing Raises $1.25M to Develop Neo Chip

REX Computing Raises $1.25M to Develop Neo Chip

Today REX Computing announced that it has raised $1.25 million in seed funding led by FF Science, a vehicle of Founders Fund that invests in companies pushing the boundaries of difficult scientific and engineering challenges.


From Schneier on Security

Organizational Doxing of Ashley Madison

Organizational Doxing of Ashley Madison

The -- depending on who is doing the reporting -- cheating, affair, adultery, or infidelity site Ashley Madison has been hacked. The hackers are threatening to expose all of the company's documents, including internal e-mails


From Schneier on Security

Malcolm Gladwell on Competing Security Models

Malcolm Gladwell on Competing Security Models

In this essay/review of a book on UK intelligence officer and Soviet spy Kim Philby, Malcolm Gladwell makes this interesting observation: Here we have two very different security models. The Philby-era model erred on the side


From The Female Perspective of Computer Science

Keynotes and Inspirations at Foundations of Digital Games 2015

Keynotes and Inspirations at Foundations of Digital Games 2015

I had a great time at this year's Foundations of Digital Games, but it was the talks and the hallway track with narrative folks that really left me inspired.  In this post I'll summarize the first three keynotes and some inspiration


From U.S. Public Policy Committee of the ACM

NTIA Invites Participation in a New Cybersecurity Multistakeholder Process on Vulnerability Research Disclosure

NTIA Invites Participation in a New Cybersecurity Multistakeholder Process on Vulnerability Research Disclosure

The National Telecommunications and Information Administration (NTIA) invites businesses, organizations, and individuals to participate in a new cybersecurity multistakeholder process on vulnerability research disclosure. The


From Blog@Ubiquity

Why We Don’t Know Know-How

Why We Don’t Know Know-How

In pursuit of scientific understanding, too often we forget our level of know-how is far more important than our know-what.

The post Why We Don’t Know Know-How appeared first on BLOG@UBIQUITY.


From The Eponymous Pickle

Mastering Brand Building in the Third Decade of Digital

Mastering Brand Building in the Third Decade of Digital

Today at: Mastering Brand Building in the Third Decade of DigitalSee the ongoing Signal PG (Procter & Gamble) conference tweeted at #SignalPGMore to follow.


From The Eponymous Pickle

Globalization and Manufacturing Location Clusters

Globalization and Manufacturing Location Clusters

Not unexpected, Location and proximity can still matter.   Perhaps less with the emergence of 3D printing?Globalization Hasn’t Killed the Manufacturing ClusterIn today's global markets, companies have many choices to procure

Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo