The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.
Kaspersky has a detailed blog post about a new piece of sophisticated malware that it's calling Reductor. The malware is able to compromise TLS traffic by infecting the computer with hacked TLS engine substituted on the fly,…
Today Altair announced the acquisition of Polliwog Co. Ltd., a high-tech software company based near Seoul, providing EDA software to the rapidly growing electronics industry. “Polliwog’s powerful PCB modeler and design verification…
Today quantum startup Q-CTRL announced a global partnership to power superconducting ‘quantum accelerators’ from Bleximo, a full-stack quantum computing startup based in Berkeley, Calif. With the agreement, Q-CTRL will deliver…
Got this more detailed invite late, and the talk is over, but below you can follow along on slides and talk, see below:
Nick Pentreath, IBM , "Standardizing deep learning model deployment with the Model Asset Exchange"
Background…
A team of researchers from IMD in Switzerland and SUTD in Singapore put together the Smart City Index. For the first time, researchers attempted to assess people’s perceptions of technology – as opposed to the quality of the …
Today the European ExaNoDe project announced it has built a groundbreaking compute node prototype paving the way to exascale. "In the ExaNoDe project, we have built a complete prototype that integrates multiple core technologies…
Seen several of these tutorials now interlaced with all concepts, math and code. This one seems nicely done. When we first played with these in the 80s we wrote our own from bottom up code, now you can roll your own with libraries…
Dr. Oliver Perks from Arm gave this talk at the UK HPC Conference. "The ARM architecture has grown in availability and usability for the HPC community in just the past few years. This is demonstrated by several ARM-based projects…
Good to see the kind of open source development being done.
DeepMind Has Quietly Open Sourced Three New Impressive Reinforcement Learning Frameworks
Three new releases that will help researchers streamline the implementation of…
Every so often I run into a computer science teacher’s work online and ask myself “how have I never heard of this person before?” This week I listened to a podcast by Vicki Davis with a middle school CS teacher from Alaska by…
Thoughtful piece. Despite recent criticism as not having attained enough, Watson is a genuine accomplishment. We saw it early on and remarked about how it was the direction for enterprise AI, solving difficult, data rich…
This timely article from our friends over at Univa examines methods for reigning in costs for managing HPC in the cloud, specifically moving beyond cloud automation to cloud expense management. Three proactive approaches for …
Hyperion Research is seeking a Senior Research Analyst for New Hardware Technologies in our Job of the Week. "Working collaboratively with the Hyperion Research team, you will conduct research and produce analyses on new hardware…
Free Wi-Fi hotspots can track your location, even if you don't connect to them. This is because your phone or computer broadcasts a unique MAC address. What distinguishes location-based marketing hotspot providers like Zenreach…
Now have seen some very contradictory views of how well a 'smart contract' could truly model an actual legal contract, except for the most trivial ones. Maintaining them might also required considerable preliminary design…
Much like the general idea, Could it be applied to other kinds of tasks. Could it be used to allocate resources to problems. Connect with the right kinds of assistants?
Researchers Create 'Player Trait Model' Allowing for…
Tomorrow of interest:
Join @MLnick on Oct 10, 8:30am US Eastern (note unusual time) - Nick Pentreath: Principal Engineer, CODAIT (Center for Open-Source Data & AI Technologies) at IBM. "Standardizing deep learning modelhttp…
The National Science Foundation (NSF) Computer and Information Science and Engineering (CISE) Directorate has some upcoming solicitation deadlines. Check them out! CCF Core Solicitation The CCF Core Solicitation (NSF 19-589)…
Basic causation is a great start. Why did this happen? We are doing it all the time. Its one of our basic knowledge processing capabilities that lead to learning. We can figure out the answer by observation and combing
An…
Interesting story about someone who is almost certainly cheating at professional poker. But then I start to see things that seem so obvious, but I wonder whether they aren't just paranoia after hours and hours of digging into…
Harvard has deployed a liquid-cooled supercomputer from Lenovo at it's FASRC computing center. The system, named "Cannon" in honor of astronomer Annie Jump Cannon, is a large-scale HPC cluster supporting scientific modeling and…
Alan Edelman, professor of applied mathematics at MIT, has been selected to receive the 2019 IEEE Sidney Fernbach Award. Edelman was cited for “for outstanding breakthroughs in high-performance computing, linear algebra, and…
Pierre Glaser from INRIA gave this talk at EuroPython 2019. "Modern hardware is multi-core. It is crucial for Python to provide high-performance parallelism. This talk will expose to both data-scientists and library developers…
Today Lenovo and Intel revealed how their collaboration on joint technology solutions that accelerate the convergence of HPC and AI are helping scientists at the Flatiron Institute solve scientific challenges in entirely new …
Have noted the broad increase in quality and sticking of private labels. Also linking these labels with other purchases in retail. Advances are in play. Considerable detail here:
Rethinking procurement in retail
For retailers…
New means of locomotion provide new options for robotic use.
Shape-Shifting Robot Built from 'Smarticles' Shows New Locomotion Strategy
Georgia Tech Research Horizons
September 18, 2019
strategy
Georgia Institute of Technology (GIT)…
Interesting: German investigators said Friday they have shut down a data processing center installed in a former NATO bunker that hosted sites dealing in drugs and other illegal activities. Seven people were arrested. [...] Thirteen…
Two speakers were censored at the Australian Information Security Association's annual conference this week in Melbourne. Thomas Drake, former NSA employee and whistleblower, was scheduled to give a talk on the golden age of…
Here a system built in South Korea that lets you knock on an object with a smartphone, and it identifies it using sound and motion sensors. We worked on problems that predicted maintenance needs of machinery, using sounds and…
Contributions to this blog were provided by CCC and CRA staff. The National Science Foundation (NSF), in partnership with the National Institute of Food and Agriculture (NIFA), Department of Homeland Security (DHS), Department…