Sign In

Communications of the ACM

Blogroll



The ENIAC Turns 75
From The Eponymous Pickle

The ENIAC Turns 75

 I used to walk past the site of the ENIAC lab on the way to class at the U of Pa, and even got a tour of the space once.  Impressive, ENIAC Turns 75  By Samuel...

From Gödel's Lost Letter and P=NP

Computing’s Role In The Pandemic

How can we help? Joe Biden is the 46th president of the USA. Note is called a centered triangular number. These numbers obey the formula: and start with The previous...

Detecting Object Permanence and more
From The Eponymous Pickle

Detecting Object Permanence and more

Reinforcement learning problem. Learning like children do.AI Agents Learned Object Permanence by Playing Hide and SeekBy IEEE Spectrum  February 17, 2021Researchers...

On Chinese-Owned Technology Platforms
From Schneier on Security

On Chinese-Owned Technology Platforms

I am a co-author on a report published by the Hoover Institution: “Chinese Technology Platforms Operating in the United States.” From a blog post: The report suggests...

Twelve-Year-Old Vulnerability Found in Windows Defender
From Schneier on Security

Twelve-Year-Old Vulnerability Found in Windows Defender

Researchers found, and Microsoft has patched, a vulnerability in Windows Defender that has been around for twelve years. There is no evidence that anyone has used...

Dependency Confusion: Another Supply-Chain Vulnerability
From Schneier on Security

Dependency Confusion: Another Supply-Chain Vulnerability

Alex Birsan writes about being able to install malware into proprietary corporate software by naming the code files to be identical to internal corporate code files...

GPS Vulnerabilities
From Schneier on Security

GPS Vulnerabilities

Really good op-ed in the New York Times about how vulnerable the GPS system is to interference, spoofing, and jamming — and potential alternatives. The 2018 National...

Router Security
From Schneier on Security

Router Security

This report is six months old, and I don’t know anything about the organization that produced it, but it has some alarming data about router security. Conclusion...

Roll Over von Neumann? Samsung Claims Progress on the Compute-Memory Divide for HPC, AI Workloads
From insideHPC

Roll Over von Neumann? Samsung Claims Progress on the Compute-Memory Divide for HPC, AI Workloads

Samsung is claiming progress on the ages-old compute-memory bottleneck inherent in the classical von Neumann computing architecture. The company has announced what...

“Valuing Diversity, Equity, and Inclusion in Our Computing Community” Panel on March 3rd
From The Computing Community Consortium Blog

“Valuing Diversity, Equity, and Inclusion in Our Computing Community” Panel on March 3rd

Computing Research Association (CRA) Board Member Timothy M. Pinkston will be moderating a panel on “Valuing Diversity, Equity, and Inclusion in Our Computing Community...

TigerGraph Raises $105 Million to Accelerate Graph Analytics on the Cloud
From insideHPC

TigerGraph Raises $105 Million to Accelerate Graph Analytics on the Cloud

REDWOOD CITY, CA – Feb. 17, 2021 – TigerGraph, graph analytics platform provider, today announced it has raised $105 million in Series C funding, which the company...

AccelerComm Unveils Integrated PUSCH Decoder for 5G NR
From insideHPC

AccelerComm Unveils Integrated PUSCH Decoder for 5G NR

Southampton, UK and MWC Shanghai, China – 18th February 2020: AccelerComm, the channel coding specialist, has announced Physical Layer IP for 5G NG designed toAccelerComm...

FHE for Using Encrypted Data
From The Eponymous Pickle

FHE for Using Encrypted Data

Very nicely done piece on the seeming paradox of FHE:IBM Makes Encryption Paradox Practical  in IEEE Spectrum.“Fully homomorphic” cryptography allows partial access...

Remote Access Cautions
From The Eponymous Pickle

Remote Access Cautions

 Good more balanced view of the recent SCADA threat in infrastructure.  Remote access is a classic potential security weakness.    Have myself been involved inIncreased...

ACM-W Europe Report
From ACM-W supporting, celebrating and advocating for Women in Computing

ACM-W Europe Report

Report from ACM-W Europe.

SAS: How AI Changes the Rules
From The Eponymous Pickle

SAS: How AI Changes the Rules

Looks to be a good paper from SAS, below an overview, link through for more.  Always liked how SAS looked at the broader aspect of 'analytics'.  Reading.How AINew...

Addressing Sheet Metal Design Waste
From The Eponymous Pickle

Addressing Sheet Metal Design Waste

 Note the connection between design and fabrication. in a workflow.  Minimizing waste.   If you have a model of workflow, its easier to look at things like design...

Searchandising
From The Eponymous Pickle

Searchandising

OK, the term is completely new to me, this Algolia advertising piece links to a free ebook/pamphlet that describes it.Searchandising: 9 best practices for better...

Enhancing Data Security
From The Eponymous Pickle

Enhancing Data Security

Its data, getting it and securely putting it to use.  Always highlighted in emergency situations.Microsoft enhances data security in Power BI business intelligence...

HPC Cost Modeling
From insideHPC

HPC Cost Modeling

This ebook from our friends over at Rescale, "HPC Cost Modeling: Defining the Modern HPC Experience," focuses on why the historical methodology for determiningHPC...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account