Sign In

Communications of the ACM

Blogs


Blogroll


Practical Predictive Analytics
From The Eponymous Pickle

Practical Predictive Analytics

Good non technical piece that takes you on a journey of useful thoughts.    Interesting infographics and statistics as well.

You Always Need more Data
From The Eponymous Pickle

You Always Need more Data

All the Data and Still Not Enough!Claudia Perlich discusses tricks to the art of predictive modeling in situations where the right data is scarce.  Video by Claudia...

Every Windows 10 PC can have Hololens
From The Eponymous Pickle

Every Windows 10 PC can have Hololens

Now calling it 'mixed reality', makes some sense, distinguishing the terms augmented versus virtual reality has sometimes been difficult, but trying to push another...

Mood Science and the Internet of Things
From The Eponymous Pickle

Mood Science and the Internet of Things

Anyone who works with advertising and marketing ideas wants to measure and influence aspects of mood in  a number of context.   Much has been made of neuromarketing...

Product Association Rules Using R
From The Eponymous Pickle

Product Association Rules Using R

Nice DSC article by Gregory Choi  that relates directly to retail purchasing. How do I mine for associations in purchasing based on past buying data?  Could be...

Lineages of Creativity in Research
From The Eponymous Pickle

Lineages of Creativity in Research

Nature article looks at the 'Phd-Family' trees of scientists and in particularly mathematicians.  I don't find it too surprising that there are a small number of...

SCinet Preps Worlds Fastest Network Infrastructure at SC16
From insideHPC

SCinet Preps Worlds Fastest Network Infrastructure at SC16

Over at the SC16 Blog, JP Vetters writes that planning for the SCinet high-bandwidth conference network is a multiyear process. The post SCinet Preps World’s Fastest...

Juno Skims Close for More Atmosphere Data
From The Eponymous Pickle

Juno Skims Close for More Atmosphere Data

Today the Juno probe skims close to Jupiter.  With an aim to get a much better understanding of its atmosphere.  Not the topic of this blog, but my earliest analytics...

Extreme-scale Graph Analysis on Blue Waters
From insideHPC

Extreme-scale Graph Analysis on Blue Waters

George Slota presented this talk at the Blue Waters Symposium. "In recent years, many graph processing frameworks have been introduced with the goal to simplify...

Programmed for Procrastination?
From The Eponymous Pickle

Programmed for Procrastination?

We are programmed to delay work.   So what do we do?  See also the tag below on the topic, I have mentioned a number of other good pieces  on this topicHow to Hack...

Following the Euro
From The Eponymous Pickle

Following the Euro

Long have been a follower of the EU and Euro and the implications of the union.  Especially how the regulatory structure influences innovation.  Newly published...

Friday Squid Blogging: Self-Repairing Fabrics Based on Squid Teeth
From Schneier on Security

Friday Squid Blogging: Self-Repairing Fabrics Based on Squid Teeth

Really: As shown in the video below, researchers at Pennsylvania State University recently developed a polyelectrolyte liquid solution made of bacteria and yeast...

Study provides voice for evacuation needs of mobility impaired
From Phys.org Technology News

Study provides voice for evacuation needs of mobility impaired

A fire alarm sounds. An announcement comes over the office public address system: "A fire has been reported in the building. This is not a drill. Please move to...

Beacon System for Push Notification
From The Eponymous Pickle

Beacon System for Push Notification

A very simple idea, a small device that can generate an alert for a push notification based on context and location. .  Note this is unrelated in function to the...

Hacking the Turing Test
From The Eponymous Pickle

Hacking the Turing Test

The Turing test is a measure of 'intelligence'  which came out of the AI era, has a number of flaws.  In the CACM: " ... The test currently can't determine if a...

Collision Attacks Against 64-Bit Block Ciphers
From Schneier on Security

Collision Attacks Against 64-Bit Block Ciphers

We've long known that 64 bits is too small for a block cipher these days. That's why new block ciphers like AES have 128-bit, or larger, block sizes. The insecurity...

Job of the Week: Data Operations Specialist at the Simons Foundation
From insideHPC

Job of the Week: Data Operations Specialist at the Simons Foundation

"The Simons Foundation is beginning a new computational science organization called the Flatiron Institute. Flatiron will seek to explore challenging science problems...

Video: System MethodologyHolistic Performance Analysis on Modern Systems
From insideHPC

Video: System MethodologyHolistic Performance Analysis on Modern Systems

"This talk will discuss various system performance issues, and the methodologies, tools, and processes used to solve them. The focus is on single systems (any operating...

ACM Announces George Michael Memorial HPC Fellowships
From insideHPC

ACM Announces George Michael Memorial HPC Fellowships

Today ACM announced the recipients of the 2016 ACM/IEEE George Michael Memorial HPC Fellowships. The fellowship honors exceptional PhD students throughout the world...

Overview of the MVAPICH Project and Future Roadmap
From insideHPC

Overview of the MVAPICH Project and Future Roadmap

In this video from the 4th Annual MVAPICH User Group, DK Panda from Ohio State University presents: Overview of the MVAPICH Project and Future Roadmap. "This talk...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo