There is a critical need for better software design, development, test, and propagation processes.
October 2024 - Vol. 67 No. 10
Features
Do All Problems Have Technical Fixes?
Tech solutionism and its variants all express confidence that technology can solve non-technical problems, with costs and other drawbacks considered as secondary.
A paper by Victor Reis and Thomas Rothvoss proved a new upper bound on the time required to solve for any integer program.
Non-Volatile Memory Technology Poised for Game-Changing Breakthrough
The advantages of phase-chain memory superlattices are clear and demonstrably outweigh potential crosstalk concerns.
The scaling of LLMs, with their enormous memory-bandwidth requirements, comes at a high cost.
Between the two extreme visions of AI as a servant and AI as a sentient fighter-lover, resides an important and practical alternative: AI as a provocateur.
Private Crypto Versus Public Digital
What are the implications of governments competing with private crypto and existing electronic payment systems?
The Promethean Dilemma of AI at the Intersection of Hallucination and Creativity
To what extent can the hallucinations of generative AI models be considered creative?
If computing science wants to really be a science, we need to think about how we encourage people to defend their scientific claims with reproducible results.
New Computer Evaluation Metrics for a Changing World
Computing systems should now be measured on how they leverage available power and on their carbon footprint.
Elevating Security with Arm CCA
RME introduces a new kind of confidential compute environment called a realm.
Cloud computing poses challenges for systems that require confidentiality.
Advances in AI and HCI can power intelligent, interactive, and accessible reading interfaces to improve scholarly reading.
A Brief History of Blockchain Interoperability
Four trends shaping today's interconnected blockchain ecosystems.
mCaptcha: Replacing Captchas with Rate Limiters to Improve Security and Accessibility
An overview of mCaptcha, a variable-difficulty-based proof-of-work captcha system that addresses the security, usability, and privacy issues with other captchas.
Technical Perspective: Revealing the Cracks in AA Services
"A Security Model for Web-Based Communication," by Pouyan Fotouhi Tehrani et al., presents a new study of alerting authorities and their cybersafety measures.
A Security Model for Web-Based Communication
We propose an algorithmic security model based on the widely deployed technologies DNSSEC and Web PKI to cover the dimensions of identification, resolution, and transaction.
Technical Perspective: Optimizing Convolution Neural Nets with a Unified Transformation Approach
The key idea in "Neural Architecture Search for Program Transformation Exploration," by Jack Turner et al., is to express model architecture search as a program transformation, such that it can be naturally unified with the optimization and compilation process.
Neural Architecture Search as Program Transformation Exploration
This paper shows that program and neural architecture transformations can be interleaved delivering significant performance improvement and greater expressivity.
What should you bet to maximize your probability of doubling your money in a scenario where you are willing to lose all your money?