acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

February 2021


From The Eponymous Pickle

Deep Learning for Fleet Management

Deep Learning for Fleet Management

Interesting example,  worth examining.   Other operations examples?

New Deep Learning Systems Profoundly Disrupt Fleet Management Operations

Deep learning is having a profound impact on the future of fleet management through greater…


From The Eponymous Pickle

IBM and Daimler using Quantum Computer

IBM and Daimler using Quantum Computer

Continued advances of the use of quantum computing to model lithium molecules to get closer to lithium Sulphur  batteries that would be longer lasting and cheaper.

 IBM and Daimler use quantum computer to develop next-gen batteries…


From The Eponymous Pickle

Kroger Data Breach

Kroger Data Breach

Had come to mind that retailers had been less susceptible here, but then an example:

Kroger is latest victim of third-party software data breach   by Frank Bajak  in TechExplore

This June 17, 2014, file photo, shows a Kroger store…


From The Eponymous Pickle

San Diego Supercomputing

San Diego Supercomputing

 Long ago we worked with UCSD group, in the Bio Modeling area.

San Diego Supercomputer Center Helps Advance Computational Chemistry  By University of California San Diego, February 18, 2021

MIT's Heather Kulik and colleagues used…


From The Eponymous Pickle

Brain Background Noise Useful

Brain Background Noise Useful

Recall this being brought up in some work we did in understanding reactions to stimuli.    We theorized that it was always useful to calculate the background, where we later discovered some 'data' that ended up being useful. …


From The Eponymous Pickle

Airlines to Ask Contact Information

Airlines to Ask Contact Information

Expected, likely useful.  A firm requirement?   Will it get the usual pushback on privacy?

Airlines plan to ask passengers for contact-tracing details

In this Thursday, Feb. 18, 2021, file photo, travelers wear face coverings as…


From The Eponymous Pickle

Restoring Notre-Dame with VR

Restoring Notre-Dame with VR

Very impressive imagery on current state and progress of Notre-Dame Damage and restoration. Certainly a model for future work of this kind.  Includes video describing work.

Cathédrale Notre-Dame Rescue Is Buttressed by Digital…


From The Eponymous Pickle

Homomorphic Standards, Sample Efforts

Homomorphic Standards, Sample Efforts

Very useful piece with links to alternate standards and company efforts underway.  Much more at the link

Homomorphic Encryption Standardization

An Open Industry / Government / Academic Consortium to Advance Secure Computation

Standards…


From insideHPC

Summit and Theta Supercomputers Power ML Models for Fusion Energy Research

Summit and Theta Supercomputers Power ML Models for Fusion Energy Research

A team led by C.S. Chang at Princeton Plasma Physics Laboratory (PPPL) has used the Oak Ridge Leadership Computing Facility’s (OLCF’s) 200-petaflop Summit and Argonne Leadership Computing Facility’s (ALCF’s) 11.7-petaflop Theta…


From The Eponymous Pickle

Fine Tuning Vendor Risk Management

Fine Tuning Vendor Risk Management

Crucial these days. 

How to Fine-Tune Vendor Risk Management in a Virtual World  in Dark Reading by Ryan Smyth & Spencer MacDonald Managing Director / Director, FTI Technology  

Without on-site audits, many organizations lack their…


From The Eponymous Pickle

Self Organizing Textiles from Cellular Automata

Self Organizing Textiles from Cellular Automata

Always an interest here, rarely applied.

Cellular Automata

Self-Organising Textures    in Distill.

Neural Cellular Automata Model of Pattern Formation

Neural Cellular Automata (NCA ) are capable of learning a diverse set of behaviours…


From insideHPC

HPC Buyers Guide

HPC Buyers Guide

This ebook from our friends over at Rescale, shows that by adopting a platform solution and retiring the fixed capacity, on-premises infrastructure model, companies can significantly reduce capital expenditures, dramatically …


From insideHPC

GIGABYTE Releases 2U Server: G262-ZR0 with NVIDIA HGX A100 4-GPU

GIGABYTE Releases 2U Server: G262-ZR0 with NVIDIA HGX A100 4-GPU

Taipei, Taiwan, February 19th 2020 – GIGABYTE Technology, (TWSE: 2376), maker of high-performance servers and workstations, today announced the G262-ZR0 for HPC, AI, and data analytics. Designed to support high-level of performance…


From insideHPC

Intersect360 Research Announces HPC/AI Technology Trends Webinar

Intersect360 Research Announces HPC/AI Technology Trends Webinar

SUNNYVALE, CA—February 18, 2021— HPC and hyperscale analyst firm Intersect360 Research will present its latest research and insights on technology trends in the HPC and AI market at a free webinar on Tuesday, March2 at 12pm EST…


From The Eponymous Pickle

The ENIAC Turns 75

The ENIAC Turns 75

 I used to walk past the site of the ENIAC lab on the way to class at the U of Pa, and even got a tour of the space once.  Impressive, 

ENIAC Turns 75  By Samuel Greengard,   Commissioned by CACM Staff

Programming ENIAC, the Electronic…


From Gödel's Lost Letter and P=NP

Computing’s Role In The Pandemic

How can we help? Joe Biden is the 46th president of the USA. Note is called a centered triangular number. These numbers obey the formula: and start with The previous one, the , was Herbert Hoover, hmmm. Biden has promised to…


From Gödel's Lost Letter and P=NP

Computing’s Role In The Pandemic

How can we help? Joe Biden is the 46th president of the USA. Note is called a centered triangular number. These numbers obey the formula: and start with The previous one, the , was Herbert Hoover, hmmm. Biden has promised to…


From The Eponymous Pickle

Detecting Object Permanence and more

Detecting Object Permanence and more

Reinforcement learning problem. Learning like children do.

AI Agents Learned Object Permanence by Playing Hide and Seek

By IEEE Spectrum  February 17, 2021

Researchers at the Allen Institute for AI (AI2) demonstrated that artificial…


From Schneier on Security

On Chinese-Owned Technology Platforms

On Chinese-Owned Technology Platforms

I am a co-author on a report published by the Hoover Institution: “Chinese Technology Platforms Operating in the United States.” From a blog post:

The report suggests a comprehensive framework for understanding and assessing…


From Schneier on Security

Twelve-Year-Old Vulnerability Found in Windows Defender

Twelve-Year-Old Vulnerability Found in Windows Defender

Researchers found, and Microsoft has patched, a vulnerability in Windows Defender that has been around for twelve years. There is no evidence that anyone has used the vulnerability during that time.

The flaw, discovered by researchers…


From Schneier on Security

Dependency Confusion: Another Supply-Chain Vulnerability

Dependency Confusion: Another Supply-Chain Vulnerability

Alex Birsan writes about being able to install malware into proprietary corporate software by naming the code files to be identical to internal corporate code files. From a ZDNet article:

Today, developers at small or large …


From Schneier on Security

GPS Vulnerabilities

GPS Vulnerabilities

Really good op-ed in the New York Times about how vulnerable the GPS system is to interference, spoofing, and jamming — and potential alternatives.

The 2018 National Defense Authorization Act included funding for the Departments…


From Schneier on Security

Router Security

Router Security

This report is six months old, and I don’t know anything about the organization that produced it, but it has some alarming data about router security.

Conclusion: Our analysis showed that Linux is the most used OS running on…


From insideHPC

Roll Over von Neumann? Samsung Claims Progress on the Compute-Memory Divide for HPC, AI Workloads

Roll Over von Neumann? Samsung Claims Progress on the Compute-Memory Divide for HPC, AI Workloads

Samsung is claiming progress on the ages-old compute-memory bottleneck inherent in the classical von Neumann computing architecture. The company has announced what it said is the industry’s first High Bandwidth Memory (HBM) integrated…


From The Computing Community Consortium Blog

“Valuing Diversity, Equity, and Inclusion in Our Computing Community” Panel on March 3rd

“Valuing Diversity, Equity, and Inclusion in Our Computing Community” Panel on March 3rd

Computing Research Association (CRA) Board Member Timothy M. Pinkston will be moderating a panel on “Valuing Diversity, Equity, and Inclusion in Our Computing Community” at this year’s co-located HPCA’21, PPoPP’21, CGO’21, and…


From insideHPC

TigerGraph Raises $105 Million to Accelerate Graph Analytics on the Cloud

TigerGraph Raises $105 Million to Accelerate Graph Analytics on the Cloud

REDWOOD CITY, CA – Feb. 17, 2021 – TigerGraph, graph analytics platform provider, today announced it has raised $105 million in Series C funding, which the company said is largest funding round to date within the graph database…


From insideHPC

AccelerComm Unveils Integrated PUSCH Decoder for 5G NR

AccelerComm Unveils Integrated PUSCH Decoder for 5G NR

Southampton, UK and MWC Shanghai, China – 18th February 2020: AccelerComm, the channel coding specialist, has announced Physical Layer IP for 5G NG designed to increase spectral efficiency and reduce latency. The company’s 5G…


From The Eponymous Pickle

FHE for Using Encrypted Data

FHE for Using Encrypted Data

Very nicely done piece on the seeming paradox of FHE:

IBM Makes Encryption Paradox Practical  in IEEE Spectrum.

“Fully homomorphic” cryptography allows partial access to digital vaults without ever opening their locks  By Dan Garisto…


From The Eponymous Pickle

Remote Access Cautions

Remote Access Cautions

 Good more balanced view of the recent SCADA threat in infrastructure.  Remote access is a classic potential security weakness.    Have myself been involved in the need to monitor and control industrial systems remotely   The…


From ACM-W supporting, celebrating and advocating for Women in Computing

ACM-W Europe Report

ACM-W Europe Report

Report from ACM-W Europe.