Sign In

Communications of the ACM

Blogroll



CCC Transition 2020 & Accomplishments 2017-2020
From The Computing Community Consortium Blog

CCC Transition 2020 & Accomplishments 2017-2020

The following is a letter from CCC Chair Mark D. Hill from the University of Wisconsin-Madison. Hello: Tonight the Computing Community Consortium transitions leadership...

CCC Computational Support for Substance Use Disorder Prevention, Detection, Treatment, and Recovery Workshop Report Released
From The Computing Community Consortium Blog

CCC Computational Support for Substance Use Disorder Prevention, Detection, Treatment, and Recovery Workshop Report Released

The Computing Community Consortium (CCC) is pleased to announce the release of the Computational Support for Substance Use Disorder Prevention, Detection, Treatment...

A2I POWER Processor Core Contributed to OpenPOWER Community
From insideHPC

A2I POWER Processor Core Contributed to OpenPOWER Community

The IBM-led OpenPOWER Foundation announced the contribution of the IBM A2I POWER processor core design and associated FPGA environment to the open source ecosystem...

Seeing Around the Corner
From The Eponymous Pickle

Seeing Around the Corner

The general idea has been brought up a number of times.  Bouncing radar and cooperative systems can get more data, and if we interpret it to detect dangers, weRadar...

Banning Facial Recognition
From The Eponymous Pickle

Banning Facial Recognition

What I have been thinking.  Specifically, not generally accountable.   Even if the major players stop doing this, others quickly will.Bans on Facial Recognition...

Android Apps Stealing Facebook Credentials
From Schneier on Security

Android Apps Stealing Facebook Credentials

Google has removed 25 Android apps from its store because they steal Facebook credentials: Before being taken down, the 25 apps were collectively downloaded more...

New, Open DPC++ Extensions Complement SYCL and C++
From insideHPC

New, Open DPC++ Extensions Complement SYCL and C++

In this guest article, our friends at Intel discuss how accelerated computing has diversified over the past several years given advances in CPU, GPU, FPGA, andNew...

Smart Columbus Connects Everyday Vehicles
From The Eponymous Pickle

Smart Columbus Connects Everyday Vehicles

Yet another example of using more sensors and connections to build intelligent management of vehicles within large systems.   Just underway.Pilot Test Begins for...

Quantum Computers, Quantum Sensors
From The Eponymous Pickle

Quantum Computers, Quantum Sensors

Sensors gather measurement data, which is crucial to learning hypothesis about complex systems.  Here an introduction to the concept of a quantum sensor.Quantum...

From Gödel's Lost Letter and P=NP

Taking a Problem Down a Peg

By blowing up its objects Composite crop of src1, src2 Joshua Greene and Andrew Lobb proved last month that every smooth Jordan curve in the plane and real , there...

From Computational Complexity

Can you name a famous living Chemist? Can anyone?

I was re-watching the  Greatest-of-all-time Jeopardy championship and the following happen (I paraphrase) ---------------------- Alex Trebek: The category isBreaking...

Thomas Sterling Eulogizes Rich Brueckner, Ann Redelfs, Steve Tuecke, Lucy Nowell: 4 Leaders Lost to the HPC Community
From insideHPC

Thomas Sterling Eulogizes Rich Brueckner, Ann Redelfs, Steve Tuecke, Lucy Nowell: 4 Leaders Lost to the HPC Community

At his annual keynote address closing out the ISC 2020 conference, Thomas Sterling, Professor of Intelligent Systems Engineering at the University of Indiana, eulogized...

IOT Devices in the Hotel Room
From The Eponymous Pickle

IOT Devices in the Hotel Room

Intriguing aspects of IOT in hospitality.   Has been less in the area of assistants than I expected.Shedding Light (and Sound) on Hidden IoT Devices in Your Next...

Computing Researchers’ Response to NSCAI’s First Quarter Recommendations
From The Computing Community Consortium Blog

Computing Researchers’ Response to NSCAI’s First Quarter Recommendations

Contributions to this post were provided by members of the Computing Community Consortium (CCC) Fairness, Accountability, Disinformation, and Explainability (FADE)...

Catalyzing Computing Podcast Episode 25 – Game-Based Learning and Photovoltaics with Erik Verlage (Part 3)
From The Computing Community Consortium Blog

Catalyzing Computing Podcast Episode 25 – Game-Based Learning and Photovoltaics with Erik Verlage (Part 3)

A new episode of the Computing Community Consortium‘s (CCC) podcast, Catalyzing Computing, is now available. This is part 3 of Khari Douglas’ interview with Dr....

A Consortium for Confidential Computing
From The Eponymous Pickle

A Consortium for Confidential Computing

Intriguing new effort:The Confidential Computing Consortium (CCC) brings together hardware vendors, cloud providers, and software developers to accelerate the adoption...

iPhone Apps Stealing Clipboard Data
From Schneier on Security

iPhone Apps Stealing Clipboard Data

iOS apps are repeatedly reading clipboard data, which can include all sorts of sensitive information. While Haj Bakry and Mysk published their research in March...

Building Brain Like Synapses
From The Eponymous Pickle

Building Brain Like Synapses

And related to the last post, some work is progressing on doing functional mimicry:Engineers design a device that operates like a brain synapseIon-based technology...

insideHPC Special Report: Citizens Benefit from Public/Private Partnerships – Part 3
From insideHPC

insideHPC Special Report: Citizens Benefit from Public/Private Partnerships – Part 3

This special report sponsored by Dell Technologies, takes a look at how now more than ever, agencies from all levels of government are teaming with private Information...

Artificial Neural Nets More similar to Brains than We Thought
From The Eponymous Pickle

Artificial Neural Nets More similar to Brains than We Thought

In our earliest uses of neural methods we actually worked with some brain scientists.  And they were quick to point out that neural methods, though inspired byArtificial...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account