The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.
A pair of Russia-designed cryptographic algorithms -- the Kuznyechik block cipher and the Streebog hash function -- have the same flawed S-box that is almost certainly an intentional backdoor. It's just not the kind of mistake…
In 2015, the Intercept started publishing "The Drone Papers," based on classified documents leaked by an unknown whistleblower. Today, someone who worked at the NSA, and then at the National Geospatial-Intelligence Agency, was…
Intel has launched a Model Zoo for Intel Architecture, an open-sourced collection of optimized machine learning inference applications that demonstrates how to get the best performance on Intel platforms. The project contains…
Today Red Hat announced it has deepened its alliance with NVIDIA to accelerate the enterprise adoption of AI, machine learning and data analytics workloads in production environments. To move thins along, Red Hat is launching…
The Computing Community Consortium (CCC), in conjunction with Schmidt Futures, will sponsor and administer a white paper competition on the future of “CS for Social Good,” in order to harness CS to address societal challenges…
Today Cray announced that the Central Institution for Meteorology and Geodynamics in Austria (ZAMG) is using a Cray supercomputer to support a multi-year weather nowcasting project with the University of Vienna to benefit society…
Today WekaIO announced that Mellanox has selected the WekaIO Matrix file system to accelerate application performance scaling for their EDA workloads. "Mellanox is a forward-thinking company, we continuously improve our workflows…
Gerd Buttner from Airbus gave this talk at the Swiss HPC Conference. "As a proven leader in the global aerospace sector, Airbus designs, produces and delivers innovative solutions with the aim to create a better-connected, safer…
Have now addressed this problem for some time, its how the data gets used, including the risk of its use in context.
Managing data as an asset: An interview with the CEO of Informatica in McKinsey
Anil Chakravarthy draws on his…
Just over thirty years ago on May 5, 1989, I defended my PhD Thesis Complexity-Theoretic Aspects of Interactive Proof Systems. It's starts off with a parable for interactive proof systems.
Victor, a venture capitalist, had everything…
Kroger is testing similar approaches.
Walmart Testing Digital Price Labels, LED Projectors
By Patrycja Malinowska - In ConsumerGoods
Walmart is pitting two different types of digital price labels against each other at two stores…
Certainly only after hours? Even the order picking people in my local Kroger can create a traffic problem.
Drones in Aisle 5? Grocery Stores Becoming Unusual Hotbeds of Innovation By The Washington Post
Pensa says its droneData…
Excellent article on fraudulent seller tactics on Amazon. The most prominent black hat companies for US Amazon sellers offer ways to manipulate Amazon's ranking system to promote products, protect accounts from disciplinary actions…
Continued plans and progress:
At I/O, Google looks to drive progress in automotive technologies By Mark Albertson in SiliconAngle
In a keynote address at Google I/O 2019 on Tuesday, Alphabet Inc. Chief Executive Sundar Pichai
…
Fascinating aspect of testing testing strategy, blockchains and smart contracts. Don't understand the approach used here, but following up. More in MindshareWorld.
PepsiCo boosts efficiency with blockchain technology in theDrum…
It's been almost 2 years since my last post! I don't know if anyone is still reading this. If you are, thank you!
Why haven't I posted more? Partly it is the broad transition to microblogging, which everyone is using more
…
The following Great Innovative Idea is from Francesca Rossi of IBM Research and Nicholas Mattei of Tulane University. They were one of the Blue Sky Award winners at AAAI 2019 for their paper Building Ethically Bounded AI. The…
"These topical workshops are bringing together hardware and software trends spanning various subjects including data analysis, visualization, machine learning for HPC, deep learning, performance benchmarking, parallel computing…
In 2016, a hacker group calling itself the Shadow Brokers released a trove of 2013 NSA hacking tools and related documents. Most people believe it is a front for the Russian government. Since, then the vulnerabilities and tools…
Today Google announced that its Google Cloud TPU Pods are now publicly available in beta. Designed to help Machine Learning researchers iterate faster and train more capable machine learning models, TPU Pods can include more …
The general availability of Red Hat Enterprise Linux 8 was announced this week at the Red Hat Summit in Boston. In this special guest feature, Ian Lumb writes that the company's Singularity containers can ease the transition …
Hyperion Research will hold their annual HPC Market Update briefing at ISC 2019 in Frankfurt. "As Hyperion Research, we continue all the worldwide activities that spawned the world’s most respected HPC industry analyst group.…
In this video from the HPC User Forum, Frank Alexander from Brookhaven National Laboratory presents: ExaLearn - ECP Co-Design Center for Machine Learning. "It is increasingly clear that advances in learning technologies have …
It was observed to me that this blog is observational rather than original, and that is true. Most posts in its long (18K posts and 2 million reads) history quote some external source, and then comment on their relevance in…
Another example of where context of data creation matters. Podcast and transcript. Implications for interpretation of language use.
User-generated Content: The Medium Impacts the Message
Wharton's Shiri Melumad discusses her
From…
Had been hearing less about what was advancing in Assistant lately. Formerly was impressed by their multiple primary language approach, which I now frequently use. Now announcement out of I/O is indicating a deeper look into…
Evil Clippy is a tool for creating malicious Microsoft Office macros: At BlackHat Asia we released Evil Clippy, a tool which assists red teamers and security testers in creating malicious MS Office documents. Amongst others,…
Would have thought this would be very difficult to do, given the required syntactic accuracy required for coding. So a fascinating case study and demonstration video:
Code Talkers By Neil Savage
Communications of the ACM,…
Useful to think about operations. Prediction implies we can adjust operations within a process based on future predictions. Risk also come forward because of inaccuracy of predictions.
Predictive analytics in hybrid IT: The…
In Picking N distinct numbers at random: how to do it fast?, I describe how to quickly pick N distinct values are random from a range of values. It comes down to using either bitset/bitmap or a hash set. The bitset approach is…