The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.
Some of the prevailing theories of ethics surface in modern high tech. We take a quick and rather superficial look at their tracks on the ground, noting especially the prominence of virtue ethics in predictions and mission statements…
"In order for developers to be able to focus on their application, a Vision Algorithm Designer application is included in the Intel Computer Vision SDK. This gives users a drag and drop interface that allows them to create new…
Researchers have demonstrated using Intel's Software Guard Extensions to hide malware and steal cryptographic keys from inside SGX's protected enclave: Malware Guard Extension: Using SGX to Conceal Cache Attacks Abstract:In modern…
In a long while ago meeting about how easy it was to do various household tasks, it was brought up that while washing clothes was relatively easy, folding them from an arbitrary pile was hard. Well now the problem is solved…
Although we never recommended using Excel for things like this in the enterprise, it might be useful for someone who is already an Excel expert to get started in machine learning methods. From DSC, nicely done.
Doing real machine…
In this video from the Open Compute Summit, Walter Hinton, Senior Global Director of Enterprise & Client Compute Solutions Marketing at Western Digital presents: The State of the Solid State Drive SSD. "In 2013, Western Digital…
CloudPets are an Internet-connected stuffed animals that allow children and parents to send each other voice messages. Last week, we learned that Spiral Toys had such poor security that it exposed 800,000 customer credentials…
How Data Mining Can Help Advertisers Hit Their Targets?
Wharton's Shawndra Hill discusses her research on TV ads and online search.
Podcast and text:
Shawndra Hill, a senior fellow at the Wharton Customer Analytics Initiative,…
Altair will host the PBS Works User Group May 22-25 in Las Vegas. This four-day event (including 2 days of user presentations, round table discussions and surrounded by hands-on workshops) is the global user event of the year…
Today ISC 2017 announced a day-long Deep Learning track on June 21 as part of its technical program. The full conference takes place June 18-21 in Frankfurt, Germany. "The overwhelming success of deep learning has triggered a…
The majority of SDSC’s data-intensive Gordon supercomputer will be used by Simons for ongoing research following completion of the system’s tenure as an NSF resource on March 31."We are delighted that the Simons Foundation has…
'In this article, James Reinders discusses one of the “mode” options that Intel Xeon Phi processors have to offer unprecedented configurability: memory modes. For programmers, this is the key option to really study because it…
In IEEE Spectrum, quite a detailed article. Requires making satellites in standard ways and thus easier to repair. The ultimate example of this. Much to learn too about robotic challenges under constraints and gathering
Inside…
Turn on HTTPS encryption. A worthwhile security step. This blog is using it. No negatives to its use anymore. More at the link.
It's time to turn on HTTPS: The benefits are well worth the effort
HTTPS websites get a speed…
Some good election security news for a change: France is dropping its plans for remote Internet voting, because it's concerned about hacking....
Lowes is always doing interesting tech things. On the surface of it sounds like a good idea. But does visual understanding and experience equal physical skill? Also see their tests of robots in store.
Lowe's is using AR and…
[Note: update added March 15, 2017]
2017 has gotten off to a bad start for the security community…and to me, personally.
First, we lost Kevin Ziese. I met Kevin over two decades ago, when he was involved in computer investigations…[Note: update added March 15]
2017 has gotten off to a bad start for the security community…and to me, personally.
First, we lost Kevin Ziese. I met Kevin over two decades ago, when he was involved in computer investigations …[Note: update added March 15]
2017 has gotten off to a bad start for the security community…and to me, personally.
First, we lost Kevin Ziese. I met Kevin over two decades ago, when he was involved in computer investigations …2017 has gotten off to a bad start for the security community…and to me, personally.
First, we lost Kevin Ziese. I met Kevin over two decades ago, when he was involved in computer investigations with the Air Force. I got involved…[Note: update added March 15]
2017 has gotten off to a bad start for the security community…and to me, personally.
First, we lost Kevin Ziese. I met Kevin over two decades ago, when he was involved in computer investigations …[Note: update added March 15]
2017 has gotten off to a bad start for the security community…and to me, personally.
First, we lost Kevin Ziese. I met Kevin over two decades ago, when he was involved in computer investigations …By Paul Messina, Exascale Project Director, Argonne National Laboratory Exascale computing is the label we use for the next
I am part of this very interesting project: For many users, blog posts on how to install Signal, massive guides to protecting your digital privacy, and broad statements like "use Tor" -- all offered in good faith and with the…
The New York Times recently released an article called It’s Possible to Hack a Phone With Sound Waves, Researchers Show, which highlights CCC Council Member Kevin Fu’s work on embedded computer systems. Kevin and his team at…
Good overview look at applications and demand in IEEE Spectrum. Have had conversations with several players in the space.
Why Indoor Robots for Commercial Spaces Are the Next Big Thing in Robotics By Travis Deyle
Companies developing…
Dear Professors, Students, IBMers and others,
This a reminder about our Cognitive Systems Institute Speaker Series on Thursday, March 16, 2016 at 10:30 am ET US (7:30 am PT). Our speaker is Hironobu Takagi, Senior Technical,…
Today vScaler announced plans to showcase their HPC cloud platform March 15-16 at the upcoming Cloud Expo Europe Conference in London. Supported by two of its strategic technology partners - Aegis Data and Global Cloud Xchange…
A long time technical interest. Used many random number generators, and in some cases tested them to determine their limitations. Here a brief history.
Seen it in Beta, a group collaboration tool, better than Slack, especially for users of other MS tools. And who isn't? Free for 365 users as I understand. But it needs critical mass in groups to make it fly. Continue…