Sign In

Communications of the ACM

Blogroll



Overview of AI and Machine Learning
From The Eponymous Pickle

Overview of AI and Machine Learning

From a customer perspective, what is machine learning or AI?  by Natalie Petouhoff, Ph.D.  Wondering whether you should invest in AI and Machine Learning? That’s...

Ultrasonic Attacks on Voice Devices
From The Eponymous Pickle

Ultrasonic Attacks on Voice Devices

Alexa and Siri are vulnerable to 'silent,' nefarious commands  in Endgadget by S. Dent     Unheard voices could direct your smartphone to malicious websites. .....

Shop Home Depot with Voice Using Google Home
From The Eponymous Pickle

Shop Home Depot with Voice Using Google Home

Another voice based shopping example in place.  I would imagine that DIY interactions could often use visual interaction as well, so assuming the Google Home will...

Ohio Supercomputer Center open-sources HPC Access Portal
From insideHPC

Ohio Supercomputer Center open-sources HPC Access Portal

Open OnDemand is an NSF-funded project to develop a widely shareable web portal that provides HPC centers with advanced web and graphical interface capabilities...

EPFL Building New Particle Detector for Large Hadron Collider
From insideHPC

EPFL Building New Particle Detector for Large Hadron Collider

EPFL’s physicists are moving forward in their efforts to solve the mysteries of the universe. A particle detector made up of 10,000 kilometers of scintillatingEPFL...

Interview: Jeffrey Schwab on Building the World’s Fastest Network at SC17
From insideHPC

Interview: Jeffrey Schwab on Building the World’s Fastest Network at SC17

In this guest feature, Jeffrey Schwab describes his role as SCinet Chair at SC17 and how his team of volunteers is building the fastest and most powerful volunteer...

Announcing the EuroEXA Project for Exascale
From insideHPC

Announcing the EuroEXA Project for Exascale

Today, 16 organizations met at the Barcelona Supercomputer Centre to mark the start of the EuroEXA project and the commencement of the execution in the next stage...

Simulated Annealing for JPEG Quantization
From My Biased Coin

Simulated Annealing for JPEG Quantization

I have a new paper on the arxiv (web page describing results, and full version** available) with two Harvard undergrads, Max Hopkins and Sebastian Wagner-Carrena...

The Intel Scalable System: Kick-Starting the AI Revolution
From insideHPC

The Intel Scalable System: Kick-Starting the AI Revolution

Like many other HPC workloads, deep learning is a tightly coupled application that alternates between compute-intensive number-crunching and high-volume data sharing...

Cisco on Meetings
From The Eponymous Pickle

Cisco on Meetings

From the Cisco Blog, good points made, not very new,  but worth repeating.   Nothing on the possible use of AI attentive methods to gather data about what has happened...

Interpreting Machine Learning
From The Eponymous Pickle

Interpreting Machine Learning

Interesting piece,  somewhat wordy with embedded technical aspect.  But worth the read.Ideas on interpreting machine learningMix-and-match approaches for visualizing...

Security Vulnerabilities in AT&T Routers
From Schneier on Security

Security Vulnerabilities in AT&T Routers

They're actually Arris routers, sold or given away by AT&T. There are several security vulnerabilities, some of them very serious. They can be fixed, but because...

Alexa will be a Concierge
From The Eponymous Pickle

Alexa will be a Concierge

Its the ultimate kind of intelligence.  We called it a concierge skill.  Its not what you know, its who you know, or what you have that knows, and can apply itAlexa...

Will we all be Wearing Cams Soon?
From The Eponymous Pickle

Will we all be Wearing Cams Soon?

Followed this once at the request of a retail research client.  Tested it in the aisle. Will it now be common?Why you'll wear a body cameraAs costs go down, quality...

Google Does Music Remix
From The Eponymous Pickle

Google Does Music Remix

Google’s Inside Music makes anyone a remix artistIt separates a song’s components, allowing you to turn them off and on.By Mallory Locklear, @mallorylocklear  ....

Security Flaw in Estonian National ID Card
From Schneier on Security

Security Flaw in Estonian National ID Card

We have no idea how bad this really is: On 30 August, an international team of researchers informed the Estonian Information System Authority (RIA) of a vulnerability...

Grace Hopper College
From My Biased Coin

Grace Hopper College

I hadn't seen the news about Yale renaming Calhoun College to Hopper College;  it just popped into one of my newslines here in the New York times.  I guess I hadn't...

Curriculum is Hard
From Computer Science Teacher – Thoughts and Information From Alfred Thompson

Curriculum is Hard

Generally speaking I am a roll my own sort of teacher when it comes to curriculum. This year that is a bit overwhelming because I am teaching four different courses...

10 Things Everyone Should Know About Machine Learning
From The Noisy Channel

10 Things Everyone Should Know About Machine Learning

As someone who often finds himself explaining machine learning to non-experts, I offer the following list as a public service announcement. Machine learning means...

CCC and MForesight Launch Event for Cybersecurity for Manufacturers Report
From The Computing Community Consortium Blog

CCC and MForesight Launch Event for Cybersecurity for Manufacturers Report

The organizers from the MForesight and Computing Community Consortium (CCC) workshop on Cyber Security for Manufacturers will be releasing their workshop report...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account