acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

What is the ‘range’ of a number type?
From Daniel Lemire's Blog

What is the ‘range’ of a number type?

In programming, we often represent numbers using types that have specific ranges. For example, 64-bit signed integer types can represent all integers between -9223372036854775808...

From Gödel's Lost Letter and P=NP

Zoom Workshop E-Minder: 4pm ET Today

And a place to look for fallback info in case things go wrong This is a deviation from the “blog invariants” that were maintained for 1,000 posts. We’ll be happy...

Examining Bounties for Security
From The Eponymous Pickle

Examining Bounties for Security

Schneier writes   on the bug/security marketplace, incudes a place for the usual considerable expert comment.    Intriguing to see how and if this will continue...

Robots, Machine Learning for Distribution
From The Eponymous Pickle

Robots, Machine Learning for Distribution

Clever application here.Robotic Arms Use Machine Leanring to Reach Deeper into DistributionBy The Wall Street Journal, January 12, 2022Robots increasingly are being...

Cars Becoming Smartphones
From The Eponymous Pickle

Cars Becoming Smartphones

 As cars become smartphones, Big Auto turns to handset chipmaker to surviveLegacy automakers underestimated the importance of employing the latest technology in...

Metaverse Trials Useful in Retail
From The Eponymous Pickle

Metaverse Trials Useful in Retail

Lots of things we also examined, with different names and contexts.Can the metaverse solve retail’s returns challenges?by Nikki Baird in RetailwireWe’ve seen aWhile...

This Blog
From The Eponymous Pickle

This Blog

 Note:   The automated tagging function  in Google Blogger has been inactive for the last six months or so, which means that some tags I apply may not have been...

Transform a face mask into a monitor?
From The Eponymous Pickle

Transform a face mask into a monitor?

 'Fitbit for the Face' Can Turn Any Face Mask into Smart Monitoring DeviceNorthwestern University Newscenter, Amanda Morris, January 12, 2022Researchers at Northwestern...

Heart Cells with Electronic Warning Sensors
From The Eponymous Pickle

Heart Cells with Electronic Warning Sensors

ACM NEWS'Pop-Up' Electronic Sensors Could Detect When Heart Cells MisbehaveBy University of California San Diego, December 28, 2021Engineers at the University of...

From Gödel's Lost Letter and P=NP

Happy 1,000th Post and 75th Birthday, Dick

Plus an open Zoom mini-workshop Monday 1/17, 4–5:30pm ET From Rich DeMillo Richard Lipton founded this blog 1,000 posts ago. He was not quite as young as in the...

Atos to Install HPC system at Technische Universität Dresden
From insideHPC

Atos to Install HPC system at Technische Universität Dresden

Munich, Paris – January 13 2022 – Atos today announces that it has been awarded a contract to install a new supercomputing cluster at Technische Universität Dresden...

Deep Learning Can’t be Trusted
From The Eponymous Pickle

Deep Learning Can’t be Trusted

Deep Learning Can’t be Trusted,  Brain Modelling Pioneer Says Stephen Grossberg explains why his ART model is better  in Spectrum  IEEEBy  KATHY PRETZ During the...

UASG Welcomes Leading Tech Entrepreneur Vijay Shekhar Sharma as UA Ambassador
From Universal Acceptance Steering Group

UASG Welcomes Leading Tech Entrepreneur Vijay Shekhar Sharma as UA Ambassador

By Dr. Ajay Data, UASG Chair The Universal Acceptance Steering Group (UASG) is proud to welcome Indian tech entrepreneur Vijay Shekhar Sharma as a Universal Acceptance...

An Age of AI-ism?
From The Eponymous Pickle

An Age of AI-ism?

Looks to be a very interesting book, plan to read it.   Authors are interesting, notably I was at a meeting with Kissinger long ago in DC.   Never thought of him...

Reflecting on 30 years
From CERIAS Blog

Reflecting on 30 years

One of my students sent me a weblink (in the story, below). It caused me to reflect a little on the past. Here is some text I shared on a few social media feeds...

JFrog Talks Log4j Vulnerabilies
From The Eponymous Pickle

JFrog Talks Log4j Vulnerabilies

I was pointed to this by the by TWIT site post by Steve Gibson, pass it along for some good info about the Log4j problems. LOG4J LOG4SHELL RESOURCE CENTERJFrogResources...

Learn to Create Voice-Plus-App Experiences, with No Coding Required
From The Eponymous Pickle

Learn to Create Voice-Plus-App Experiences, with No Coding Required

Amazon-Alexa continues to push Voice-App experiences: Learn to Create Voice-Plus-App Experiences, with No Coding RequiredEntice Alexa customers to go deeper with...

Network Models for VR Applications
From The Eponymous Pickle

Network Models for VR Applications

Interesting. thinking how this would be useful.  ....CACMmag (@Communications of the ACM) Tweeted: #Mathematicians at @UniversityRudn have proposed a model forMathematicians...

Human-Robot Teams
From The Eponymous Pickle

Human-Robot Teams

Giving systems  levels of automation, like IT today. Human-Robot Teams: The Next IT Management ChallengeProductivity can skyrocket when people and robots work together...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account