The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.
The first book to call for the end of the data economy. Carissa Veliz exposes how our personal data is giving too much to big tech and governments, why that matters, and what we can do about it.
The key part of AI we don't know hw to do yet. Good overview of current state and directions. What most all of us consider the important starting point for useful intelligence. It is often also has the ability to explainSeeking…
Looking at quantum safe.
What Is a Quantum-Safe Hybrid Digital Certificate?
Sectigo’s Tim Callan, Jason Soroko and Alan Grau break down what quantum safe hybrid TLS certificates are and how they can help to prepare businessesQuantum…Nvidia said it has extended its lead on the MLPerf Benchmark for AI inference with the company’s A100 GPU chip introduced earlier this year. Nvidia won each of the six application tests for data center and edge computing systems…
Here a good intro to RPA (Robotic Process Automation) for finance applications. Nice too because most of us can understand basic financial statements, arithmetic and goals. Below just the intro, full look at the link.
RPA …Amazon's paid shopper panel.
Amazon will pay you to know what you bought somewhere else by George Anderson in Retailwire
Amazon.com wants greater insights into what its customers are purchasing and it is willing to pay forParticipants…Experientia's Jan-Christoph Zoels and Mark Vanderbeeken will be part of discussion panels at the upcoming Biennial of Technology in Turin, Italy.
Was just pointed to this (much more at the link):
MIT partners with national labs on two new National Quantum Information Science Research Centers
Co-design Center for Quantum Advantage and Quantum Systems Accelerator are funded…The search for a vaccine—is not a development. Edward Jenner was an English physician who created the first vaccine, one for smallpox. In 1798 he used the weak cox-pox to fool our immune system to create a protection against…
7 day online interactive course with vertical, thematic focus on tools and methods of behavioral design for cultural change to tackle societal challenges
Well one thing, guarding against cybersecurity threats.
US Space Force guards against cybersecurity threats miles above Earth
If space is indeed the “final frontier,” as narrated in the famous opening voiceover in “Star Trek,”…In this sponsored article from our friends over at Supermicro, we discusses how deciding on the correct type of GPU accelerated computation hardware depends on many factors. One particularly important aspect is the data flow …
A new $3 million grant from the National Science Foundation (NSF) will expand FABRIC, a project to build the U.S.’s largest cyberinfrastructure testbed, to four preeminent scientific institutions in Asia and Europe. The expansion…
The HPE-AMD supercomputing tandem has had a bang-out week for systems wins and installations – and it’s only Wednesday. On Monday, Australia’s Pawsey Supercomputing Centre announced HPE has been awarded a $48 AUD million systems…
Some thoughts about how trained networks can be used to further analyse chemical structure.
Opening the Black Box of Neural Networks
Pacific Northwest National Laboratory, Allan Brettman
Pacific Northwest National Laboratory (PNNL)…And yet more cars without drivers. A tipping point?
GM to Run Driverless Cars in San Francisco Without Human Backups Associated Press, Tom Krisher
General Motors' Cruise autonomous vehicle unit said it will remove human…The following is an announcement from the National Science Foundation (NSF). The NSF Convergence Accelerator issued a Dear Colleague Letter (NSF-21-012): Request for Information (RFI) on Future Topics for the NSF Convergence…
Here Comes the Space Cloud. Faster anywhere, even in space.
Microsoft, SpaceX Team Up to Bring Cloud Computing to Space
Nextgov. Frank Konkel
Microsoft has partnered with SpaceX and others to make its Azure cloud technology available…San Diego – Oct. 21, 2020 – SoftIron Ltd., the leader in task-specific data center solutions, continues on its growth trajectory in both technical and geographic reach with the opening of two new offices, and the appointment …
The NSA released an advisory listing the top twenty-five known vulnerabilities currently being exploited by Chinese nation-state attackers.
This advisory provides Common Vulnerabilities and Exposures (CVEs) known to be recently…Been a long while since I looked at anything by the Hewlett Foundation. Attended their meetings. Now back connected. Visuals are a good thing for communication. Especially for obscure security concepts.
Hewlett Foundation…I participated in the below study, they make the point that it will be available only for a short time. Here is the start of the document:
MIT Sloan: EXPANDING AI’S IMPACT WITH ORGANIZATIONAL LEARNING
Most companies developing…This special research report sponsored by Tyan discusses practical hardware design strategies for modern HPC workloads. As hardware continued to develop, technologies like multi-core, GPU, NVMe, and others have allowed new application…
Not expected, intriguing. Hoping to compete with other players in the space?
Sonos speakers can now communicate with GE Appliances
They can notify you when the oven is preheated or a dishwasher load is done.
Igor Bonifacic, @igorbonifacic…Pointed out to me recently. Have not been involved in API security, seems there are useful tips here.
Tips To Strengthen API Security By Bill Doerrfeld in DevOps
If you haven’t noticed, digital organizations are building more…The following is a guest blog from BPCnet.org Resource Portal. The Computing Research Association (CRA) is hosting the third workshop in its series of Departmental BPC Plan workshops starting on October 29, 2020. All departments…
Los Alamos National Laboratory reported it has completed the installation of “Chicoma,” based on AMD EPYC CPUs and the HPE Cray EX supercomputer architecture. The HPC platform is aimed at enhancing the lab’s R&D efforts in support…
Am a student of this effort, so this suggestion was surprising.
Bletchley Park’s contribution to WW2 'over-rated'
By Gordon Corera, Security correspondent
Code-breaking hub Bletchley Park's contribution to World War Two is often…Faster GPUs are eroding security. Using a password manager, which give you a larger number of characters, and/or a multifactor link up makes much sense.
The Nvidia RTX 3090 GPU Can Probably Crack Your Passwords By RyanThe…Amazon Alexa Music has been pushing what they call 'Focus Time Music' With claims for 'perfect sound when you are studying, working, reading or writing '. They just suggested the idea to me. Something I have tried myself…