Sign In

Communications of the ACM

Blogroll



ACM-W Scholarship for Attendance of Research Conferences program
From ACM-W supporting, celebrating and advocating for Women in Computing

ACM-W Scholarship for Attendance of Research Conferences program

We also pleased to announce the award granted in the last round of discussions.

Turn Your Echo into a Phone
From The Eponymous Pickle

Turn Your Echo into a Phone

Been placing calls via Alexa for some time, this seems to close the loop.  This seems to open the loop for new kinds of skills that direct, handle, record, manage...

Ranking National Cyber Power
From Schneier on Security

Ranking National Cyber Power

Harvard Kennedy School’s Belfer Center published the “National Cyber Power Index 2020: Methodology and Analytical Considerations.” The rankings: US China UK ...

Considering the use of Falsification in Science
From The Eponymous Pickle

Considering the use of Falsification in Science

Here a link to an Opinion piece in the SciAM.   Worth a read along with responses.  Thinking this and its implications broadly for establishment and testing, and...

The Third Edition of Ross Anderson’s Security Engineering
From Schneier on Security

The Third Edition of Ross Anderson’s Security Engineering

Ross Anderson’s fantastic textbook, Security Engineering, will have a third edition. The book won’t be published until December, but Ross has been making drafts...

NASA Patents a Way to get to the Moon
From The Eponymous Pickle

NASA Patents a Way to get to the Moon

NASA patents a faster, cheaper way to get to the moon.   US10696423B1   Will this speed the move to colonizing the moon.  Details and patent at link below.Method...

Video: GigaIO on Optimizing Compute Resources for ML, HPDA and other Advanced Workloads
From insideHPC

Video: GigaIO on Optimizing Compute Resources for ML, HPDA and other Advanced Workloads

In this interview, GigaIO CEO Alan Benjamin talks about systems performance problems and wasted compute resources when implementing ML, HPDA and other high demand...

New Solar Tech Emergent
From The Eponymous Pickle

New Solar Tech Emergent

How good and how soon is still unclear.  Solar Closing in on "Practical" Hydrogen ProductionResearchers develop a solar tech that splits water into hydrogen and...

Talk:  From a Physics Experiment to a Quantum Network System
From The Eponymous Pickle

Talk: From a Physics Experiment to a Quantum Network System

Access to the below talk is now open:Thank you for attending Quantum Networks: From a Physics Experiment to a Quantum Network System. This webcast is now on-demand...

US Space Cybersecurity Directive
From Schneier on Security

US Space Cybersecurity Directive

The Trump Administration just published “Space Policy Directive – 5“: “Cybersecurity Principles for Space Systems.” It’s pretty general: Principles. (a) Space systems...

Insilico Medicine AI-powered COVIDomic for COVID-19 Research
From insideHPC

Insilico Medicine AI-powered COVIDomic for COVID-19 Research

Santa Clara, CA – Insilico Medicine, a leader in artificial intelligence for drug discovery and development, announced the launch of a system for COVID-19 basic...

NSF awards $696K for Jetstream Project Year 6
From insideHPC

NSF awards $696K for Jetstream Project Year 6

Bloomington, IN — The Pervasive Technology Institute at Indiana University has been awarded nearly $700,000 from the National Science Foundation to fund the Jetstream...

Nutanix Partners with Microsoft Azure for a Seamless Hybrid Experience
From insideHPC

Nutanix Partners with Microsoft Azure for a Seamless Hybrid Experience

SAN JOSE –– Nutanix (NASDAQ: NTNX), a leader in enterprise cloud computing, today announced a new partnership with Microsoft that will enable both companies toNutanix...

More on NIST’s Post-Quantum Cryptography
From Schneier on Security

More on NIST’s Post-Quantum Cryptography

Back in July, NIST selected third-round algorithms for its post-quantum cryptography standard. Recently, Daniel Apon of NIST gave a talk detailing the selection...

More on NIST’s Post-Quantum Cryptography
From Schneier on Security

More on NIST’s Post-Quantum Cryptography

Back in July, NIST selected third-round algorithms for its post-quantum cryptography standard. Recently, Daniel Apon of NIST gave a talk detailing the selection...

Q-CTRL and Quantum Machines Partner to Accelerate Quantum Computing Development
From insideHPC

Q-CTRL and Quantum Machines Partner to Accelerate Quantum Computing Development

LOS ANGELES/Tel Aviv, Sept. 9, 2020 – Q-CTRL, a startup that applies the principles of control engineering to accelerate the development of quantum technology,Q...

Nanalyze on Brain Computer Interfaces (BCI)
From The Eponymous Pickle

Nanalyze on Brain Computer Interfaces (BCI)

Had forgotten about Nanalyze, worth a look: After I posted about it, they sent me this on Brain Computer interfaces:Who we are We?     We are a boutique media and...

NCSA’S Donna J. Cox Wins IPS Technology Innovation Award
From insideHPC

NCSA’S Donna J. Cox Wins IPS Technology Innovation Award

Donna J. Cox, director of NCSA’s Advanced Visualization Laboratory (AVL), was recently awarded the International Planetarium Society’s 2020 Technology Innovation...

Imaging System Creates 3D Pictures by Measuring Time
From The Eponymous Pickle

Imaging System Creates 3D Pictures by Measuring Time

Very interesting,  uses for creating 3D awareness of sensors.   Once again neural networks being used to gather information about changes in input.Imaging System...

National Artificial Intelligence (AI) Research Institutes Program Webinar
From The Computing Community Consortium Blog

National Artificial Intelligence (AI) Research Institutes Program Webinar

The National Science Foundation (NSF) will be holding a program webinar about the new Artificial Intelligence (AI) Institutes on September 21, 2020, at 3:30-5:00PM...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account