Sign In

Communications of the ACM

Blogroll



From Computational Complexity

2020 Fall Jobs Post

My annual fall jobs posts, giving advice to PhDs looking for faculty positions, were getting repetitive. See last year's post for the usual stuff and feel freeTaulbee...

PNNL’S CENATE Taps ML to Guard DOE Supercomputers from Illegitimate Workloads
From insideHPC

PNNL’S CENATE Taps ML to Guard DOE Supercomputers from Illegitimate Workloads

Pacific Northwest National Lab sent along this article today by PNNL’s Allan Brettman, who writes about the advanced techniques used by the lab’s Center for Advanced...

Videos online of the anthropology and technology conference
From Putting People First

Videos online of the anthropology and technology conference

Videos are now available of last month's Anthropology and Technology conference, dedicated to socially-responsible AI.

Estimation Theory at Work
From The Eponymous Pickle

Estimation Theory at Work

Rarely hear about this, we used it for retail analysis, it is useful to understand. Link to it below and a Wikipedia article definition. What makes a good estimator...

Replaying Memory to Retain it
From The Eponymous Pickle

Replaying Memory to Retain it

 Fascinating play.   Remember this similarity being brought up in a talk about short vs long term memories.   Now being brought into play?How a Memory Quirk of ...

Schneider Electric Partners with EdgePresence and Accu-Tech to Deploy Edge Data Centers
From insideHPC

Schneider Electric Partners with EdgePresence and Accu-Tech to Deploy Edge Data Centers

Boston – Oct. 28, 2020 – Schneider Electric, the leader in digital transformation of energy management and automation, today announced its partnership with EdgePresence...

Computing Researchers Respond to COVID-19: Uncertain Times
From The Computing Community Consortium Blog

Computing Researchers Respond to COVID-19: Uncertain Times

This article has been adapted from one that appeared in Aeon, aeon.co. Our society is a complex system, “a system with many interacting agents, whose collective...

What the heck is the value of “-n % n” in programming languages?
From Daniel Lemire's Blog

What the heck is the value of “-n % n” in programming languages?

When coding efficient algorithms having to do with hashing, random number generations or even cryptography, a common construction is the expression “-n%n“. My experience...

The NSA is Refusing to Disclose its Policy on Backdooring Commercial Products
From Schneier on Security

The NSA is Refusing to Disclose its Policy on Backdooring Commercial Products

Senator Ron Wyden asked, and the NSA didn’t answer: The NSA has long sought agreements with technology companies under which they would build special access for...

WekaIO Announces Cloud-Native, Unified Storage Solutions for Data Lifecycle
From insideHPC

WekaIO Announces Cloud-Native, Unified Storage Solutions for Data Lifecycle

CAMPBELL, Calif. – October 27, 2020 –  WekaIO (Weka), the leader in high-performance, scalable file storage for data-intensive applications, today announced a transformative...

Sellafield Nuclear Site Extends Atos Contract
From insideHPC

Sellafield Nuclear Site Extends Atos Contract

London, 28 October 2020 — Sellafield Ltd has signed a contract extension with Atos, a global leader in digital transformation, for a further two years, extending...

IBM Study on the Efficacy of Chatbots
From The Eponymous Pickle

IBM Study on the Efficacy of Chatbots

But AI is still in action, especially in speeding simpler customer interactions:IBM study highlights rapid uptake and satisfaction with AI chatbots  in AINewsAMost...

Five Nonobvious Remote Work Techniques
From The Eponymous Pickle

Five Nonobvious Remote Work Techniques

Very interesting piece in Queue and the Communications of the ACM, Nov 2020,  pp 108-110.  Take the problem beyond the technical and to the collaboratively social...

AMD’s Su on Xilinx Acquisition: ‘We Can Define the Future of High Performance Computing’
From insideHPC

AMD’s Su on Xilinx Acquisition: ‘We Can Define the Future of High Performance Computing’

Marking a new phase in in the re-resurrection AMD in its eternal struggle with Intel, and as reported here October 9, AMD has agreed to buy FPGA chip maker Xilinx...

Deception and Concealment  Technology
From The Eponymous Pickle

Deception and Concealment Technology

Worked with MITRE way back.  Now it is also about active defense.  Not much revealed here, but its interesting. MITRE Shield Matrix Highlights Deception & Concealment...

AI, the Next Generations
From The Eponymous Pickle

AI, the Next Generations

Fairly good, short, non technical piece.    I agree with the first item mentioned:  'unsupervised learning', it is the future, and  it is hard to do generally. ...

MonoEye - Human Motion Capture
From The Eponymous Pickle

MonoEye - Human Motion Capture

 Most interesting approach.  The implications?  Note deep neural approach for selection of poses. Accuracy?  Gathering information for healthcare, sports, training...

Singularity Hub Looks at GPT-3
From The Eponymous Pickle

Singularity Hub Looks at GPT-3

Out of SingularityHub.   A look at the writing AI called GPT-3.  Scopes some of the possibilities and limitations.OpenAI’s GPT-3 Wrote This Short Film—Even the ...

Assured Autonomy Workshop Report Release
From The Computing Community Consortium Blog

Assured Autonomy Workshop Report Release

The Computing Community Consortium (CCC) is pleased to announce the release of the Assured Autonomy report, titled Assured Autonomy: Path Toward Living With Autonomous...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account