The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.
Interesting example, worth examining. Other operations examples?
New Deep Learning Systems Profoundly Disrupt Fleet Management Operations
Deep learning is having a profound impact on the future of fleet management through greater…Continued advances of the use of quantum computing to model lithium molecules to get closer to lithium Sulphur batteries that would be longer lasting and cheaper.
IBM and Daimler use quantum computer to develop next-gen batteries…Had come to mind that retailers had been less susceptible here, but then an example:
Kroger is latest victim of third-party software data breach by Frank Bajak in TechExplore
This June 17, 2014, file photo, shows a Kroger store…Long ago we worked with UCSD group, in the Bio Modeling area.
San Diego Supercomputer Center Helps Advance Computational Chemistry By University of California San Diego, February 18, 2021
MIT's Heather Kulik and colleagues used…Recall this being brought up in some work we did in understanding reactions to stimuli. We theorized that it was always useful to calculate the background, where we later discovered some 'data' that ended up being useful. …
Expected, likely useful. A firm requirement? Will it get the usual pushback on privacy?
Airlines plan to ask passengers for contact-tracing details
In this Thursday, Feb. 18, 2021, file photo, travelers wear face coverings as…Very impressive imagery on current state and progress of Notre-Dame Damage and restoration. Certainly a model for future work of this kind. Includes video describing work.
Cathédrale Notre-Dame Rescue Is Buttressed by Digital…Very useful piece with links to alternate standards and company efforts underway. Much more at the link
Homomorphic Encryption Standardization
An Open Industry / Government / Academic Consortium to Advance Secure Computation
Standards…A team led by C.S. Chang at Princeton Plasma Physics Laboratory (PPPL) has used the Oak Ridge Leadership Computing Facility’s (OLCF’s) 200-petaflop Summit and Argonne Leadership Computing Facility’s (ALCF’s) 11.7-petaflop Theta…
Crucial these days.
How to Fine-Tune Vendor Risk Management in a Virtual World in Dark Reading by Ryan Smyth & Spencer MacDonald Managing Director / Director, FTI Technology
Without on-site audits, many organizations lack their…Always an interest here, rarely applied.
Self-Organising Textures in Distill.
Neural Cellular Automata Model of Pattern Formation
Neural Cellular Automata (NCA ) are capable of learning a diverse set of behaviours…This ebook from our friends over at Rescale, shows that by adopting a platform solution and retiring the fixed capacity, on-premises infrastructure model, companies can significantly reduce capital expenditures, dramatically …
Taipei, Taiwan, February 19th 2020 – GIGABYTE Technology, (TWSE: 2376), maker of high-performance servers and workstations, today announced the G262-ZR0 for HPC, AI, and data analytics. Designed to support high-level of performance…
SUNNYVALE, CA—February 18, 2021— HPC and hyperscale analyst firm Intersect360 Research will present its latest research and insights on technology trends in the HPC and AI market at a free webinar on Tuesday, March2 at 12pm EST…
I used to walk past the site of the ENIAC lab on the way to class at the U of Pa, and even got a tour of the space once. Impressive,
ENIAC Turns 75 By Samuel Greengard, Commissioned by CACM Staff
Programming ENIAC, the Electronic…How can we help? Joe Biden is the 46th president of the USA. Note is called a centered triangular number. These numbers obey the formula: and start with The previous one, the , was Herbert Hoover, hmmm. Biden has promised to…
How can we help? Joe Biden is the 46th president of the USA. Note is called a centered triangular number. These numbers obey the formula: and start with The previous one, the , was Herbert Hoover, hmmm. Biden has promised to…
Reinforcement learning problem. Learning like children do.
AI Agents Learned Object Permanence by Playing Hide and Seek
By IEEE Spectrum February 17, 2021
Researchers at the Allen Institute for AI (AI2) demonstrated that artificial…I am a co-author on a report published by the Hoover Institution: “Chinese Technology Platforms Operating in the United States.” From a blog post:
The report suggests a comprehensive framework for understanding and assessing…Researchers found, and Microsoft has patched, a vulnerability in Windows Defender that has been around for twelve years. There is no evidence that anyone has used the vulnerability during that time.
The flaw, discovered by researchers…Alex Birsan writes about being able to install malware into proprietary corporate software by naming the code files to be identical to internal corporate code files. From a ZDNet article:
Today, developers at small or large …Really good op-ed in the New York Times about how vulnerable the GPS system is to interference, spoofing, and jamming — and potential alternatives.
The 2018 National Defense Authorization Act included funding for the Departments…This report is six months old, and I don’t know anything about the organization that produced it, but it has some alarming data about router security.
Conclusion: Our analysis showed that Linux is the most used OS running on…Samsung is claiming progress on the ages-old compute-memory bottleneck inherent in the classical von Neumann computing architecture. The company has announced what it said is the industry’s first High Bandwidth Memory (HBM) integrated…
Computing Research Association (CRA) Board Member Timothy M. Pinkston will be moderating a panel on “Valuing Diversity, Equity, and Inclusion in Our Computing Community” at this year’s co-located HPCA’21, PPoPP’21, CGO’21, and…
REDWOOD CITY, CA – Feb. 17, 2021 – TigerGraph, graph analytics platform provider, today announced it has raised $105 million in Series C funding, which the company said is largest funding round to date within the graph database…
Southampton, UK and MWC Shanghai, China – 18th February 2020: AccelerComm, the channel coding specialist, has announced Physical Layer IP for 5G NG designed to increase spectral efficiency and reduce latency. The company’s 5G…
Very nicely done piece on the seeming paradox of FHE:
IBM Makes Encryption Paradox Practical in IEEE Spectrum.
“Fully homomorphic” cryptography allows partial access to digital vaults without ever opening their locks By Dan Garisto…Good more balanced view of the recent SCADA threat in infrastructure. Remote access is a classic potential security weakness. Have myself been involved in the need to monitor and control industrial systems remotely The…
Report from ACM-W Europe.