Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

September 2018


From The Eponymous Pickle

Guide to Digital Transformation

Guide to Digital Transformation

Thoughtful presentation. 

Six Questions That Can Help Guide Digital Transformation
Podcast and Text from [email protected]

 How-CEOs-Stymie-Their-Own-Digital-Transformation

MIT researcher Stephanie Woerner discusses a field-tested…


From Computational Complexity

Are Conferences Discriminatory?

Glencora Borradaile wrote a blog post in June about how conferences discriminate.


Let me spell it out. In order to really succeed in most areas of computer science, you need to publish conference papers and this, for the most…


From Schneier on Security

Five-Eyes Intelligence Services Choose Surveillance Over Security

Five-Eyes Intelligence Services Choose Surveillance Over Security

The Five Eyes -- the intelligence consortium of the rich English-speaking countries (the US, Canada, the UK, Australia, and New Zealand) -- have issued a "Statement of Principles on Access to Evidence and Encryption" where they…


From Universal Acceptance Steering Group

Progress with Email Address Internationalisation

Progress with Email Address Internationalisation

By Don Hollander The Universal Acceptance Steering Group is focused on getting all applications to accept all domain names and all email addresses. We’re doing that through raising awareness, encouraging developers to fix their…


From [email protected]

How Did People Write Machine Learning Code in the Past?

How Did People Write Machine Learning Code in the Past?

Summarizes popular programming languages and libraries that have been used for machine learning throughout the past two decades.


From The Computing Community Consortium Blog

NSF DCL- Announcing a Core Program within the Division of Computing and Communication Foundations

NSF DCL- Announcing a Core Program within the Division of Computing and Communication Foundations

The following is a letter to the community from Erwin Gianchandani, Acting Assistant Director, of the National Science Foundation (NSF) Directorate of Computer & Information Science & Engineering (CISE).   August 9, 2018 Dear…


From [email protected]

Computer Science Encyclopedia Can Fill a Gap

Computer Science Encyclopedia Can Fill a Gap

Our profession has the credibility and resources to create an Encyclopedia that will serve as the professional standard.


From The Eponymous Pickle

Google Announces Dataset Search

Google Announces Dataset Search

Looks useful, would have been useful in a number of cases.  Will be interesting to see how well the search works, note the mention that it is similar to Google Scholar.   Also an invitation to publish your own data indexed in…


From The Eponymous Pickle

Amazon's Ad Supported Video Service

Amazon's Ad Supported Video Service

Should be quite interesting.   Will this also be available via Prime and video enabled assistants?  Makes sense if ads are included.  Another link to individual interests and preferences.   A replacement for the removal of Youtube…


From The Eponymous Pickle

Cincinnati as an Alt-Silicon Valley?

Cincinnati as an Alt-Silicon Valley?

More, now from a retail group. 

Can Kroger turn Cincinnati into an alt-Silicon Valley?  by Tom Ryan in RetailWire

The Kroger Co., based in Cincinnati, announced plans to open an innovation lab as part of the University of Cincinnati…


From insideHPC

Radio Free HPC Looks at the Frightening Notpetya Cyber Attack

Radio Free HPC Looks at the Frightening Notpetya Cyber Attack

In this podcast, the Radio Free HPC team looks at one of the most massive hacks ever, the Notpetya cyber attack on shipping company Maersk and their partners. "This story, featured in Wired magazine, should send chills down the…


From insideHPC

Exascale Update from Hyperion Research

Exascale Update from Hyperion Research

Bob Sorensen from Hyperion Research gave this talk at the HPC User Forum in Detroit. "The four geographies actively developing Exascale machines are: USA, China, Europe, and Japan. While it is important to emphasize that this…


From The Eponymous Pickle

Talk on Advances in Image Recognition

Talk on Advances in Image Recognition

I note this is an advanced technical talk on elements of image recognition ...

Invitation to the ISSIP Cognitive Systems Institute Group Webinar

Full series list, past and present  recordings are here:  http://cognitive-science…


From The Eponymous Pickle

Intel and Baidu Collaborate for China AI

Intel and Baidu Collaborate for China AI

Also mention of Duer OS Assistant, whose use is being extended. Breadth of application areas is interesting.

Baidu and Intel team up to deliver new AI services in China   By Mike Wheatley in SiliconAngle.

Chinese internet giant…


From insideHPC

DDN Powers Breakthroughs in Autonomous Cars at the University of Michigan

DDN Powers Breakthroughs in Autonomous Cars at the University of Michigan

Today DDN announced a new data management solution at the University of Michigan that will help support research projects spanning machine learning, transportation, precision health, chemistry, computational flow dynamics, life…


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

NCWIT Award for Aspirations in Computing–Recognize Girls in Tech

NCWIT Award for Aspirations in Computing–Recognize Girls in Tech

Recipients of the NCWIT Award for Aspirations in Computing receive engraved awards, scholarship and internship opportunities, entry to a peer-network of technical women in the NCWIT AiC Community, various prizes, and more. //…


From Schneier on Security

Using a Smartphone's Microphone and Speakers to Eavesdrop on Passwords

Using a Smartphone's Microphone and Speakers to Eavesdrop on Passwords

It's amazing that this is even possible: "SonarSnoop: Active Acoustic Side-Channel Attacks": Abstract: We report the first active acoustic side-channel attack. Speakers are used to emit human inaudible acoustic signals and the…


From The Eponymous Pickle

Tibco Announces new AI Experiece

Tibco Announces new AI Experiece

Have used Spotfire in several environments,  this would seem to be an enabling direction for better decision making.

TIBCO announces the AI-powered A(X) experience for Spotfire

Augmented Analytics, New Interface, and Native Data…


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Why Teach Binary in Computer Science Classes

Why Teach Binary in Computer Science Classes

Sometime when I was around age 11 or 12 I learned about different number systems. I was fascinated with the concepts involved. I literally spent hours experimenting with them. This stood me well when I started studying computer…


From Daniel Lemire's Blog

Per-core frequency scaling and AVX-512: an experiment

Per-core frequency scaling and AVX-512: an experiment

Intel has fancy new instructions (AVX-512) that are powerful, in part for heavy numerical work. When a core uses these heaviest of these new instructions, the core’s frequency comes down to maintain the power usage within bounds…


From The Eponymous Pickle

My Review: The Fourth Age

My Review:  The Fourth Age

The Fourth Age: Smart Robots, Conscious Computers, and the Future of Humanity: by Byron Reese

My review via my read, just submitted:

Very well done.  Have been following author Byron Reese's GigaOm podcast interviews with experts…


From The Eponymous Pickle

Match Retail Search via Card Transactions

Match Retail Search via Card Transactions

Remember discussing how such a thing could be done, and how the approach could bring along lots of additional information.  Probably a privacy violation, we concluded it was not possible.  But then again Amazon now has a Prime…


From The Eponymous Pickle

Competing with Amazon

Competing with Amazon

Brings up  'Less is More 'book  'Paradox of Choice'  but is that actually true?  Certainly Amazon has shown more assortment is better, much better.   Have they perfected curation?

Less is more’ when competing with Amazon   by

Through…


From The Computing Community Consortium Blog

Thermodynamic Computing Workshop – Call for White Papers

Thermodynamic Computing Workshop – Call for White Papers

The Computing Community Consortium (CCC) will hold a workshop from January 3rd to 5th, 2019 in Hawaii to create a vision for thermodynamic computing, a statement of research needs, and a summary of the current state of understanding…


From The Noisy Channel

Thanks Vibhu.

Thanks Vibhu.

Thanks Vibhu. There are a lot of published case studies about A/B testing in general, but I’m not sure what’s published specifically about A/B testing for search. But I’d recommend reading what Ronny Kohavi and his team havehttps…


From The Eponymous Pickle

Again Considering Space Elevators

Again Considering Space Elevators

Been following this for some time.   Not much mention lately.  But always thought the strength of the cable needed was beyond any material known.   Good overview in the WP.

And now Japan is planning a serious test:

Japan to conduct…


From The Eponymous Pickle

AI Winter?

AI Winter?

Some of us are afraid to ask, but O'Reilly brings it up and points to evidence.  My team wintered the last one, and it was not pretty.  Its not that we didn't achieve much, we produced millions for the enterprise.  But it just…


From insideHPC

Computational Biophysics in the Petascale Computing Era

Computational Biophysics in the Petascale Computing Era

Dr. Rommie E. Amaro from UC San Diego gave this talk at the Blue Waters Symposium. "In this talk I will discuss how the BlueWaters Petascale computing architecture forever altered the landscape and potential of computational …


From insideHPC

NAG Awarded Chapter status by Women-in-HPC

NAG Awarded Chapter status by Women-in-HPC

Today the Numerical Algorithms Group (NAG) announced that it has been recognized as one of the first Chapters in the new Women in High Performance Computing (WHPC) Pilot Program. "The WHPC Chapter Pilot will enable us to reach…


From Schneier on Security

New Book Announcement: Click Here to Kill Everybody

New Book Announcement: Click Here to Kill Everybody

I am pleased to announce the publication of my latest book: Click Here to Kill Everybody: Security and Survival in a Hyper-connected World. In it, I examine how our new immersive world of physically capable computers affects…