acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

August 2022


From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Cyber Security and CS Education

Cyber Security and CS Education

Way back in time, cybersecurity was all about controlling access to the computer in the locked room with the raised floor. Well, you had to trust the people you did let in of course. I will not say much about the students I went…


From The Eponymous Pickle

UK Defense Receives first Quantum Computer

UK Defense Receives first Quantum Computer

 UK Moves forward in Defence Quantum Computing

Ministry of Defence acquires government's first quantum computer

In the BBC, By Liv McMahon, Technology team

The Ministry of Defence (MoD) has acquired the government's first quantum…


From The Eponymous Pickle

European Space Agency Seeks Possibility of SpaceX Launching

European Space Agency Seeks Possibility of SpaceX Launching

 In Reuters:

Exclusive: Europe eyes Musk's SpaceX to bridge launch gap left by Russia tensions

By Tim Hepher and Joey Roulette

PARIS, Aug 12 (Reuters) - The European Space Agency (ESA) has begun preliminary technical discussions…


From The Eponymous Pickle

'Retbleed' Speculative Execution Attack

'Retbleed' Speculative Execution Attack

Brought to my attention last week.    Notably Cloud aspects.  

'Retbleed' Speculative Execution Attack Affects AMD, Intel CPUs

By The Hacker News, July 18, 2022

The most serious attack vector for Retbleed is likely through cloud…


From insideHPC

RISC-V Summit China 2022 Announces Agenda

RISC-V Summit China 2022 Announces Agenda

Shanghai, August 12, 2022 – The RISC-V Summit China 2022 (Aug. 24-26) today announced its 2022 agenda, including keynotes, tutorials, and technical presentations in English language and Chinese language editions. This year’s …


From The Eponymous Pickle

Report: Orgs with zero-trust segmentation avoid 5 major cyberattacks annually

Report: Orgs with zero-trust segmentation avoid 5 major cyberattacks annually

Report on Zero Trust Segmentation.

Report: Orgs with zero-trust segmentation avoid 5 major cyberattacks annually  in Venturebeat

 A new report by Illumio found that organizations leveraging zero-trust segmentation avert five major…


From The Noisy Channel

Similarity-Sensitive Diversity

Similarity-Sensitive Diversity

In my work on search engines and recommender systems, I’ve thought a lot about entropy and diversity. I named my first blog, The Noisy Channel, after a seminal idea of Claude Shannon, who introduced entropy to information theory…


From The Eponymous Pickle

MIT Workshop on AI Generated Characters

MIT Workshop on AI Generated Characters

Brought to my attention, interesting look at using Virtual characters.   Positive use cases emphasized. 

 https://www.youtube.com/watch?v=se6eSBT6D1Y

This full-day workshop, organized by the MIT Media Lab with NTT DATA, was dedicated…


From insideHPC

HPE Wins $35M HPC DR Deal with Australia’s Bureau of Meteorology

HPE Wins $35M HPC DR Deal with Australia’s Bureau of Meteorology

Aug. 11, 2022 — Australia’s Bureau of Meteorology has purchased a high performance computing system from HPE in a three-year deal for US$35 million. The new system, intended to improve the resilience of Australia’s weather forecasting…


From The Eponymous Pickle

Quick Look at AI and Banking

Quick Look at AI and Banking

Not too much here, but made me think about the broader problem. 

AI Is Transforming How We Bank

By The Information,  August 11, 2022

Crypto is far from the only technological innovation causing problems for financial regulators.…


From BLOG@CACM

The Continual Re-Creation Of The Key-Value Datastore

The Continual Re-Creation Of The Key-Value Datastore

The evolution of single machine key-value stores.


From The Eponymous Pickle

McKinsey on the Coming Data Driven, Smart Workflow

McKinsey on the Coming Data Driven, Smart Workflow

From McKinsey; 

The data-driven enterprise of 2025

Rapidly accelerating technology advances, the recognized value of data, and increasing data literacy are changing what it means to be “data driven.”

By 2025, smart workflows and…


From The Eponymous Pickle

Privacy and Robots in the Home

Privacy and Robots in the Home

 Implications of Amazon's acquisition of iRobot and more:

iRobot CEO Colin Angle on Data Privacy and Robots in the Home In light of Amazon’s recent acquisition, we revisit our 7 September 2017 Q&A with iRobot’s CEO    BY EVANEditor…


From insideHPC

SDSC’s Peter Rose Wins COVID-19 NIH/NICHD Award

SDSC’s Peter Rose Wins COVID-19 NIH/NICHD Award

Aug. 9, 2022 — Peter Rose, director of the Structural Bioinformatics Laboratory at the San Diego Supercomputer Center at UC San Diego, was recently presented with a team award from the National Institutes of Child Health and …


From insideHPC

You’re Invited! Take the insideHPC Reader Survey

You’re Invited! Take the insideHPC Reader Survey

insideHPC invites you to take our reader survey, your feedback will help us keep publishing relevant content that HPC users and vendors need. In return for your generosity, you’ll be entered into a drawing for a $200 Amazon gift…


From The Eponymous Pickle

Experiment Could Solve Huge Challenge in Quantum Computing

Experiment Could Solve Huge Challenge in Quantum Computing

Considerable advance?

Experiment Could Solve Huge Challenge in Quantum Computing

ScienceAlert

Michelle Starr, August 8, 2022

Scientists at Japan's National Institutes of Natural Sciences built an ultrafast two-quantum bit (qubit)…


From The Eponymous Pickle

Animation Tool for Posing for Videogames

Animation Tool for Posing for Videogames

 Animation and Videogames

Videogames: Posing in 3D

University of Montreal

Salle De Presse, July 27, 2022

An animation tool developed by researchers from Canada's Université de Montréal uses bitmap sketches to control the 3D poses…


From BLOG@CACM

A History of One Brute-Force Attack

A History of One Brute-Force Attack

A classic brute-force attack boils down to guessing credentials. In my scenario, though, the perpetrators acted somewhat differently.


From insideHPC

DOE Picks Los Alamos Lab for $9.25M Nuclear Energy Research HPC Project

DOE Picks Los Alamos Lab for $9.25M Nuclear Energy Research HPC Project

The U.S. Department of Energy (DOE) has announced the selection of Los Alamos National Laboratory (LANL) to lead a $9.25 million, five-year collaborative project in nuclear energy research through the Scientific Discovery through…


From The Eponymous Pickle

Kroger Rolls Out Belt-Driven Self-Checkout Lanes

Kroger Rolls Out Belt-Driven Self-Checkout Lanes

Will go to see this example of autonomy.

Kroger expanding new belted self-checkout to 20 Tri-State stores

Calls test of new high tech lanes a success

Kroger says its test of new self scan checkout lanes was a success…


From The Eponymous Pickle

Update on Autonomous Cars

Update on Autonomous Cars

Still waiting ...

Where Are The Autonomous Cars?

By Semiconductor Engineering, August 9, 2022

Level 5 vehicles, which are self-driving in all road situations, do not yet exist. Moreover, it’s not clear when that will change.

AreWhile…


From The Noisy Channel

Content Quality

Content Quality

Despite its importance, content quality is hard to define without devolving into circularity. What we mean by content quality is a measure or collection of measures that represents the content’s value independent of any searcher…


From insideHPC

TSMC Reports 50% Y0Y Revenue Increase

TSMC Reports 50% Y0Y Revenue Increase

HSINCHU, Taiwan – Aug. 10, 2022 – Taiwan Semiconductor Manufacturing Company (TSMC: NYSE: TSM) today announced its net revenue for July 2022: On a consolidated basis, revenue for July 2022 was approximately NT$186.76 billion,…


From insideHPC

RMACC Names Poster Winner at HPC Symposium

RMACC Names Poster Winner at HPC Symposium

BOULDER, CO – Haniye Kashgarani, a graduate student at the University of Wyoming in Laramie, has been named the winner of the annual student poster competition at the Rocky Mountain Advanced Computing Consortium’s (RMACC) High…


From The Eponymous Pickle

Velocity of Response and Proactivity in Supply Chain Risk Management

Velocity of Response and Proactivity in Supply Chain Risk Management

 Good thoughts here,  make them work. 

Supply Chain Risk Management

August 10, 2022:   By    Russell W. Goodman, in SupplyChainBrain

Velocity of response and proactivity in risk management are key to meeting supply chain challenges…


From The Eponymous Pickle

Found and Displayed from Space

Found and Displayed from Space


Found in Space:    This image of the Cartwheel and its companion galaxies is a composite from the James Webb Space Telescope's Near-Infrared Camera (NIRCam) and Mid-Infrared Instrument (MIRI), which reveals details that are …


From insideHPC

Argonne’s Polaris Supercomputer Deployed for Scientific Research

Argonne’s Polaris Supercomputer Deployed for Scientific Research

Argonne National Laboratory announced that the Polaris supercomputer, a 44-petaflops HPE system powered by AMD CPUs and NVIDIA GPUs, is now open to the research community. Researchers can apply for computing time through the …


From insideHPC

Travis Humble Named Director of Quantum Science Center at ORNL

Travis Humble Named Director of Quantum Science Center at ORNL

Travis Humble has been named director of the Quantum Science Center headquartered at the Department of Energy’s Oak Ridge National Laboratory. The QSC is a multi-institutional partnership spanning industry, academia and government…


From Daniel Lemire's Blog

“Hello world” is slower in C++ than in C (Linux)

“Hello world” is slower in C++ than in C (Linux)

A simple C program might print ‘hello world’ on screen: #include <stdio.h> #include <stdlib.h> int main() { printf("hello world\n"); return EXIT_SUCCESS; } You can write the equivalent in C++: #include <iostream> #include <stdlib…


From The Eponymous Pickle

Intro to Model-Free and Model-Based Reinforcement Learning

Intro to Model-Free and Model-Based Reinforcement Learning

 Intro to Model-Free and Model-Based Reinforcement Learning   By TechTalks, June 21, 2022

Nearly every book on reinforcement learning (RL) contains a chapter that explains the differences between model-free and model-based reinforcement…

« Prev 1 2 3 4 Next »