acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

January 2020


From The Eponymous Pickle

Codemakers vs Codebreakers

Codemakers vs Codebreakers

Abstract below.   Amazing how much ew are now tied to cryptography, and the question is not resolved.   With the emergence of quantum it may become more complex yet. Abstract:

Technical Perspective: Was Edgar Allan Poe Wrong After…


From The Eponymous Pickle

Advances for 500 million Google Assistants

Advances for 500 million Google Assistants

Seems like good ideas.   Felt that Google was falling behind, even though it AI capabilities seem deep.   I want to be impressed by integrated AI.  To be shown things that are really useful when finding, using and manipulating…


From The Eponymous Pickle

Qualcomm Self Driving Chips

Qualcomm Self Driving Chips

More indications that the winter is not that chill, AI being embedded in chips for general use/.  This did not happen during the last winter. 

Qualcomm Announces Chips .... 

Qualcomm, which also makes modems and other technologies…


From The Eponymous Pickle

On the Cusp of an AI Winter?

On the Cusp of an AI Winter?

We have done lots of new things like better language skills and pattern recognition.  But we have fallen back on delivering real process intelligence.    Circa 1990, the last 'winter' created a stall that lasted some 20 years…


From insideHPC

WekaIO Accelerates 5 Million Genomes Project at Genomics England

WekaIO Accelerates 5 Million Genomes Project at Genomics England

Today WekaIO announced that Genomics England (GEL) has selected the Weka File System (WekaFS) to accelerate genomics research for the 5 Million Genomes Project. "We needed a modern storage solution that could scale to 100s petabytes…


From The Eponymous Pickle

Bosch Deploys AI to Prevent Attacks on Car Electronics

Bosch Deploys AI to Prevent Attacks on Car Electronics

Shielding car electronics attacks. Note the application to data coming from car systems.

Bosch Deploys AI to Prevent Attacks on Car Electronics
By The Wall Street Journal
January 13, 2020

German engineering company Robert Bosch GmbH…


From Gödel's Lost Letter and P=NP

Halting Is Poly-Time Quantum Provable

How does this intersect David Deutsch’s thoughts in 1985? Composite crop from homepages Zhengfeng Ji, Anand Natarajan, Thomas Vidick, John Wright, and Henry Yuen (JNVWY) have just posted a paper titled . The title means that…


From The Computing Community Consortium Blog

NSF’s Big Ideas

NSF’s Big Ideas

The following is a letter to the community from Erwin Gianchandani (Acting Assistant Director) and JD Kundu (Acting Deputy Assistant Director) of the National Science Foundation (NSF) Directorate of Computer & Information Science…


From insideHPC

Apply Now for ISC Travel Grant and Student Volunteer Programs

Apply Now for ISC Travel Grant and Student Volunteer Programs

Early career researchers and university students are encouraged to take advantage of the ISC Travel Grant and the ISC Student Volunteer programs. The programs are intended to enable these participants to attend the ISC 2020 conference…


From insideHPC

Reducing the risk of blood clots by supercomputing turbulent flow

Reducing the risk of blood clots by supercomputing turbulent flow

People with mechanical heart valves need blood thinners on a daily basis, because they have a higher risk of blood clots and stroke. With the help of the Piz Daint supercomputer, researchers at the University of Bern have identified…


From insideHPC

Jack Dongarra to Receive 2020 IEEE Computer Pioneer Award

Jack Dongarra to Receive 2020 IEEE Computer Pioneer Award

Dr. Jack Dongarra from the University of Tennessee has been named to receive the IEEE Computer Society’s 2020 Computer Pioneer Award. "The award is given for significant contributions to early concepts and developments in the…


From insideHPC

Deep Learning State of the Art in 2020

Deep Learning State of the Art in 2020

Lex Fridman gave this talk as part of the MIT Deep Learning series. "This lecture is on the most recent research and developments in deep learning, and hopes for 2020. This is not intended to be a list of SOTA benchmark results…


From insideHPC

Advanced simulation tools for Vortex Bladeless wind power

Advanced simulation tools for Vortex Bladeless wind power

Vortex Bladeless presented the company’s design for a new wind energy technology. One of the key characteristics of this system is the reduction of mechanical elements that can be worn by friction. The company developed the technology…


From The Eponymous Pickle

Digital Twins and Innovation

Digital Twins and Innovation

Not sure I quite agree with the premise.  These are simulations,  and we often in practice we fed them with data from real operations.     Such simulations were always approximations of the real world, usually in a useful context…


From The Eponymous Pickle

Future of Computer Tech?

Future of Computer Tech?

Points again to the 'Brain as a computing model' conundrum.   We have lots of brains we can study, observe, dissect.   But we still don't know their operational specs.   Algorithms 'work', because their input and output are simple…


From The Eponymous Pickle

Why do People Buy Products Unrelated to Search?

Why do People Buy Products Unrelated to Search?

In Amazon/Science an interesting study.

Why do customers buy seemingly irrelevant products?
Analysis points to better algorithms for product discovery.
By Liane Lewin-Eytan

Product search algorithms, like the ones that help customers…


From Schneier on Security

Critical Windows Vulnerability Discovered by NSA

Critical Windows Vulnerability Discovered by NSA

Yesterday's Microsoft Windows patches included a fix for a critical vulnerability in the system's crypto library. A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography…


From The Eponymous Pickle

Notices that you are Being Tracked Offline

Notices that you are Being Tracked Offline

A space we spend much time exploring.    But as in all related spaces, how much attention will people play to this new fine print?

Now Stores Must Tell You How They're Tracking Your Every Move   in Wired

California's new privacy…


From The Eponymous Pickle

Google Turns IPhones into Security Keys

Google Turns IPhones into Security Keys

Nice approach.    What not have this done in al the common forms of phones.   Isn't any phone a unique 'key'?

Google turns iPhones into 2FA security keys — good news in an election year     Paul Sawers @PSAWERS in Venturebeat.…


From The Eponymous Pickle

How the Internet Spans the Globe

How the Internet Spans the Globe

Part of the power of the internet was the fact that there were multiple ways to get from A to B,   but this article makes it seem more vulnerable.  The stats are interesting.   My old wrong impression was that it was mostly transmitted…


From Computational Complexity

Quantum Provers to Infinity and Beyond

The Internets are buzzing about the new paper MIP* = RE by Zhengfeng Ji, Anand Natarajan, Thomas Vidick, John Wright and Henry Yuan. See posts by Scott, Boaz, not to mention a wonderful backstory by Vidick himself and a tweet…


From My Biased Coin

ITCS 2020, Reflections

ITCS 2020, Reflections

I've spent Sunday/Monday at ITCS, or Innovations in Theoretical Computer Science, where I am giving a talk on this paper on Scheduling with Prediction and the Price of Misprediction (LIPIcs page) (which is one of several recent…


From Schneier on Security

Upcoming Speaking Engagements

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I'm speaking at Indiana University Bloomington on January 30, 2020. I'll be at RSA Conference 2020 in San Francisco. On Wednesday, February 26, at 2:50 PM, I'll…


From The Eponymous Pickle

P&G Reveals Toothbrush with Alexa Speaker

P&G Reveals Toothbrush with Alexa Speaker

If you wondered what a toothbrush would say to you.

P&G unveils $230 toothbrush with Alexa speaker
Procter & Gamble Co. plans to begin selling a $230 electric toothbrush that includes a voice-controlled Alexa smart speaker built…


From The Computing Community Consortium Blog

White House Proposes U.S. AI Regulatory Principles

White House Proposes U.S. AI Regulatory Principles

The following is a recent press release from the White House Office of Science and Technology Policy. They proposed 10 principles to guide federal regulation of AI technologies and applications.  These draft principles will soon…


From The Eponymous Pickle

Oracle Ebook

Oracle Ebook

Just taking a look at this:

Ebook via Retailwire

Building Your Business Around Your Customers, Not Channels
How to Calculate the Real Cost of an Ecommerce Solution
Download Ebook Now

Today more than ever, it's all about the customer…


From The Eponymous Pickle

Apple App Store Generates $1 Billion a Week

Apple App Store Generates $1 Billion a Week

An amazing number for the Apple store.

Apple’s App Store generates a billion dollars a week
We’re more willing than ever to buy digital products, and that’s good for Apple

On average, Apple generated over a billion dollars a week…


From The Eponymous Pickle

Panasonic Cloud Analytics for Safety

Panasonic Cloud Analytics for Safety

Digital 'Seatbelt' combines safety data.  A clever play for this problem.  Also data for future development of safety methods and devices.   "a central nervous system for connected cars'"

Panasonic Cloud Analytics Will Give Cars…


From insideHPC

GIGABYTE and Incooling to Develop Two-Phase Liquid Cooled Servers for High Frequency Trading

GIGABYTE and Incooling to Develop Two-Phase Liquid Cooled Servers for High Frequency Trading

Incooling has adopted GIGABYTE’s overclockable R161 Series server platform as the test-bed and prototype model for a new class of two-phase liquid cooled overclockable servers designed for the high frequency trading market. "Incooling's…


From Daniel Lemire's Blog

How fast can you allocate a large block of memory in C++?

How fast can you allocate a large block of memory in C++?

In C++, the most basic memory allocation code is just a call to the new operator: char *buf = new char[s]; According to a textbook interpretation, we just allocated s bytes. If you benchmark this line of code, you might findContinue…

« Prev 1 5 6 7 8 9 13 Next »