Sign In

Communications of the ACM

Blogroll



IFTTT Pro Announced
From The Eponymous Pickle

IFTTT Pro Announced

Just received today, always liked IFTTT, used it some, the advances look interestingToday we’re launching IFTTT Pro,  https://ifttt.com/pro  a subscription designed...

Videos, Slides from MUG ’20 Now Available
From insideHPC

Videos, Slides from MUG ’20 Now Available

The MVAPICH User Group Meeting (MUG ’20), built around an implementation of the MPI standard developed by Ohio State University, has posted videos and slides from...

Quantum Makes LTO-9 Tape Drives Available for Scalar Tape Libraries
From insideHPC

Quantum Makes LTO-9 Tape Drives Available for Scalar Tape Libraries

SAN JOSE — Sept. 9, 2020 — Quantum Corp. (NASDAQ: QMCO), a global leader in unstructured data and video solutions, today announced that LTO Ultrium format generation...

Woman-led Team to Research Human-AI Collaboration in U.S. Army Intelligence Work
From insideHPC

Woman-led Team to Research Human-AI Collaboration in U.S. Army Intelligence Work

The Army Research Office is funding a $617,000 grant for a multi-institutional, majority-female research team for technology-enhanced intelligence analysis ledWoman...

ACM-W Leadership Vision
From ACM-W supporting, celebrating and advocating for Women in Computing

ACM-W Leadership Vision

Wednesday, August 26 at 3:00 PM ET/12:00 PM PT, featuring Jodi Tims, Reyyan Ayfer, Amelia Cole, and Bushra Anjum [video]

Robotics Roadmap for US Robotics: From Internet to Robotics, 2020 Edition
From The Computing Community Consortium Blog

Robotics Roadmap for US Robotics: From Internet to Robotics, 2020 Edition

In 2009, the Computing Community Consortium (CCC) published A Roadmap for US Robotics, From Internet to Robotics (a.k.a. the Robotics Roadmap), which explored the...

How the FIN7 Cybercrime Gang Operates
From Schneier on Security

How the FIN7 Cybercrime Gang Operates

The Grugq has written an excellent essay on how the Russian cybercriminal gang FIN7 operates. An excerpt: The secret of FIN7’s success is their operational art...

Privacy Analysis of Ambient Light Sensors
From Schneier on Security

Privacy Analysis of Ambient Light Sensors

Interesting privacy analysis of the Ambient Light Sensor API. And a blog post. Especially note the “Lessons Learned” section.

Interesting Attack on the EMV Smartcard Payment Standard
From Schneier on Security

Interesting Attack on the EMV Smartcard Payment Standard

It’s complicated, but it’s basically a man-in-the-middle attack that involves two smartphones. The first phone reads the actual smartcard, and then forwards the...

GPT-3 Generates an Article for the Guardian
From The Eponymous Pickle

GPT-3 Generates an Article for the Guardian

Much broiling about the ability of 'AI' do human kinds of tasks.   OpenAI has made claims for its language generator  GPT-3.   How well does it do?  The Guardian...

New from ACM-W Europe
From ACM-W supporting, celebrating and advocating for Women in Computing

New from ACM-W Europe

Why is diversity seemingly an NP-Hard Problem? Why can we not simplify the issue and just fix it?

ACM-W Scholarship for Attendance of Research Conferences program
From ACM-W supporting, celebrating and advocating for Women in Computing

ACM-W Scholarship for Attendance of Research Conferences program

We also pleased to announce the award granted in the last round of discussions.

Turn Your Echo into a Phone
From The Eponymous Pickle

Turn Your Echo into a Phone

Been placing calls via Alexa for some time, this seems to close the loop.  This seems to open the loop for new kinds of skills that direct, handle, record, manage...

Ranking National Cyber Power
From Schneier on Security

Ranking National Cyber Power

Harvard Kennedy School’s Belfer Center published the “National Cyber Power Index 2020: Methodology and Analytical Considerations.” The rankings: US China UK ...

Considering the use of Falsification in Science
From The Eponymous Pickle

Considering the use of Falsification in Science

Here a link to an Opinion piece in the SciAM.   Worth a read along with responses.  Thinking this and its implications broadly for establishment and testing, and...

The Third Edition of Ross Anderson’s Security Engineering
From Schneier on Security

The Third Edition of Ross Anderson’s Security Engineering

Ross Anderson’s fantastic textbook, Security Engineering, will have a third edition. The book won’t be published until December, but Ross has been making drafts...

NASA Patents a Way to get to the Moon
From The Eponymous Pickle

NASA Patents a Way to get to the Moon

NASA patents a faster, cheaper way to get to the moon.   US10696423B1   Will this speed the move to colonizing the moon.  Details and patent at link below.Method...

Video: GigaIO on Optimizing Compute Resources for ML, HPDA and other Advanced Workloads
From insideHPC

Video: GigaIO on Optimizing Compute Resources for ML, HPDA and other Advanced Workloads

In this interview, GigaIO CEO Alan Benjamin talks about systems performance problems and wasted compute resources when implementing ML, HPDA and other high demand...

New Solar Tech Emergent
From The Eponymous Pickle

New Solar Tech Emergent

How good and how soon is still unclear.  Solar Closing in on "Practical" Hydrogen ProductionResearchers develop a solar tech that splits water into hydrogen and...

Talk:  From a Physics Experiment to a Quantum Network System
From The Eponymous Pickle

Talk: From a Physics Experiment to a Quantum Network System

Access to the below talk is now open:Thank you for attending Quantum Networks: From a Physics Experiment to a Quantum Network System. This webcast is now on-demand...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account