Sign In

Communications of the ACM

Blogs


Blogroll


Friday Squid Blogging: Self-Repairing Fabrics Based on Squid Teeth
From Schneier on Security

Friday Squid Blogging: Self-Repairing Fabrics Based on Squid Teeth

Really: As shown in the video below, researchers at Pennsylvania State University recently developed a polyelectrolyte liquid solution made of bacteria and yeast...

Study provides voice for evacuation needs of mobility impaired
From Phys.org Technology News

Study provides voice for evacuation needs of mobility impaired

A fire alarm sounds. An announcement comes over the office public address system: "A fire has been reported in the building. This is not a drill. Please move to...

Beacon System for Push Notification
From The Eponymous Pickle

Beacon System for Push Notification

A very simple idea, a small device that can generate an alert for a push notification based on context and location. .  Note this is unrelated in function to the...

Hacking the Turing Test
From The Eponymous Pickle

Hacking the Turing Test

The Turing test is a measure of 'intelligence'  which came out of the AI era, has a number of flaws.  In the CACM: " ... The test currently can't determine if a...

Collision Attacks Against 64-Bit Block Ciphers
From Schneier on Security

Collision Attacks Against 64-Bit Block Ciphers

We've long known that 64 bits is too small for a block cipher these days. That's why new block ciphers like AES have 128-bit, or larger, block sizes. The insecurity...

Job of the Week: Data Operations Specialist at the Simons Foundation
From insideHPC

Job of the Week: Data Operations Specialist at the Simons Foundation

"The Simons Foundation is beginning a new computational science organization called the Flatiron Institute. Flatiron will seek to explore challenging science problems...

Video: System Methodology—Holistic Performance Analysis on Modern Systems
From insideHPC

Video: System Methodology—Holistic Performance Analysis on Modern Systems

"This talk will discuss various system performance issues, and the methodologies, tools, and processes used to solve them. The focus is on single systems (any operating...

ACM Announces George Michael Memorial HPC Fellowships
From insideHPC

ACM Announces George Michael Memorial HPC Fellowships

Today ACM announced the recipients of the 2016 ACM/IEEE George Michael Memorial HPC Fellowships. The fellowship honors exceptional PhD students throughout the world...

Overview of the MVAPICH Project and Future Roadmap
From insideHPC

Overview of the MVAPICH Project and Future Roadmap

In this video from the 4th Annual MVAPICH User Group, DK Panda from Ohio State University presents: Overview of the MVAPICH Project and Future Roadmap. "This talk...

Triggers of Behavior
From The Eponymous Pickle

Triggers of Behavior

BJ Fogg worked with us in a number of projects in the enterprise.Why behavior matters more than thought leadershipTriggering habit-forming behavior Stanford University...

Google Analytics 360 Suite
From The Eponymous Pickle

Google Analytics 360 Suite

Screens and more screens, mobile and stationary.    How does this change the decision space?Marketing analytics for a multi-screen world.Say hi to the Google Analytics...

App Challenge! Enter to Win $20,000 for your School
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

App Challenge! Enter to Win $20,000 for your School

I had an email the other day about the Verizon app challenge. It looks interesting and I may have some students enter this year. The fact that coding IS NOT required...

The NSA is Hoarding Vulnerabilities
From Schneier on Security

The NSA is Hoarding Vulnerabilities

The National Security Agency is lying to us. We know that because of data stolen from an NSA server was dumped on the internet. The agency is hoarding information...

New and Improved Wolfram Alpha
From The Eponymous Pickle

New and Improved Wolfram Alpha

Another of the general virtual assistants.  It has been a while since I have checked it out, but was impressed then.  I have yet to see this applied in a real situation...

Faster dictionary decoding with SIMD instructions
From Daniel Lemire's Blog

Faster dictionary decoding with SIMD instructions

A particularly fast and effective compression technique is dictionary coding. Intuitively, it works as follow. Suppose you are given a long document made of millions...

Talk on Understanding Cognitive Systems
From The Eponymous Pickle

Talk on Understanding Cognitive Systems

Our presenter this week was Jim Spohrer from IBM. who will presented  "Understanding Cognitive Systems.".   Worth taking a look at.   Slides here.  .... Presentation...

Emotion Analysis API
From The Eponymous Pickle

Emotion Analysis API

More companies are looking at text analysis ....AlchemyLanguage Emotion Analysis API is Generally Available, and It’s Getting BetterMany in the field of Cognitive...

Power BI Now Does Twitter Analytics
From The Eponymous Pickle

Power BI Now Does Twitter Analytics

Been looking at the analysis of twitter streams lately, new from MS Power BI.  A campaign management solution template.Microsoft Power BI Bloga

FindFace at Large
From The Eponymous Pickle

FindFace at Large

Was reminded by the Economist: Frankenstein's Paperclips. of the rogue Russian face recognition system called FindFace. Can we expect AI from beyond our regulated...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo