acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

July 2021


From insideHPC

NTT Research Launches Joint Research on Neuro-Computing with The Univ. of Tokyo

NTT Research Launches Joint Research on Neuro-Computing with The  Univ. of Tokyo

Sunnyvale, Calif. – July 28, 2021 – NTT Research, Inc., a division of NTT (TYO:9432), today announced that it has entered a joint research agreement with The University of Tokyo’s International Research Center for Neurointelligence…


From insideHPC

Authors of AI/ML White Paper Win Annual Si2 Power of Partnerships Award

Authors of AI/ML White Paper Win Annual Si2 Power of Partnerships Award

AUSTIN – July 28, 2021 – Authors of a groundbreaking Silicon Integration Initiative white paper identifying a common data model as the most critical need to accelerate artificial intelligence and machine learning in semiconductor…


From insideHPC

DOE Funding $7.7M for 11 Earth & Environmental Systems Modeling Studies

DOE Funding $7.7M for 11 Earth & Environmental Systems Modeling Studies

Today, the U.S. Department of Energy (DOE) announced $7.7 million in funding for 11 studies to improve understanding of earth system predictability and DOE’s Energy Exascale Earth System Model (E3SM) climate model. Funding totals…


From insideHPC

NSF Names Karen Marrongelle COO

NSF Names Karen Marrongelle COO

Washington, DC, July 28, 2021 — The U.S. National Science Foundation has officially appointed Karen Marrongelle to serve as chief operating officer. Since 2018, she has led the NSF Directorate for Education and Human Resources…


From The Eponymous Pickle

How are those Drone Swarms Done?

How are those Drone Swarms Done?

I mentioned that we proposed drone and robotic swarms for industrial trials way back,   Now we are seeing the same kind of thing in shows that replace fireworks.  Such as in the opening ceremonies of the Olympics.   For spectacular…


From The Eponymous Pickle

Thermal Sensor on a Smartphone

Thermal Sensor on a Smartphone

Always looking for data, and thus for good sensors.   We often used these for plant systems. Now smartphones give the opportunity for better portable applications   Here a thermal sensor.  Ultimately such IOTs will become very…


From The Eponymous Pickle

Process Hacker Detects Intrusions

Process Hacker Detects Intrusions

Some of my work now examines systems security and related issues.  The system mentioned below covers 'Process Hacker', a system that detects and notifies you when background services are added to your systems.   This is an 'expert'…


From Schneier on Security

AirDropped Gun Photo Causes Terrorist Scare

AirDropped Gun Photo Causes Terrorist Scare

A teenager on an airplane sent a photo of a replica gun via AirDrop to everyone who had their settings configured to receive unsolicited photos from strangers. This caused a three-hour delay as the plane — still at the gate —…


From insideHPC

Exascale Computing Project Picks Fran Hill Co-chair of Industry and Agency Council

Exascale Computing Project Picks Fran Hill Co-chair of Industry and Agency Council

Juny 28, 2021 — The Exascale Computing Project (ECP) has announced the selection of Dr. Frances (Fran) Hill as co-chair of the ECP Industry and Agency Council (IAC). She is chief scientist for the High Performance Computing Modernization…


From The Eponymous Pickle

Training as Maintenance

Training as Maintenance

Much of my early work  in the enterprise dealt with predicting maintenance in plant systems.  So this article is of interest.  Mckinsey's take, reasonable.   Can in particular agree it makes sense to capture lots of time based…


From The Eponymous Pickle

Bamboo Children's Learning Skill

Bamboo Children's  Learning Skill

Taking a look at this, Alexa has not had enough children's voice learning skills

Bamboo Learning Launches Comprehensive Educational Alexa Skill   By Eric Hal Schwartz in Voicebot.ai

Voice-based educational technology startup Bamboo…


From The Eponymous Pickle

Detecting Deception with Machine Leaning

Detecting Deception with Machine Leaning

Quite interesting, but my guess, if something like this sees much use, will be heavily regulated.  Below intro, more at the link. 

Detecting Deception

By Sandrine Ceurstemont,   Commissioned by CACM Staff  in CACM

 People are not…


From Schneier on Security

De-anonymization Story

De-anonymization Story

This is important:

Monsignor Jeffrey Burrill was general secretary of the US Conference of Catholic Bishops (USCCB), effectively the highest-ranking priest in the US who is not a bishop, before records of Grindr usage obtained…


From insideHPC

Atos Acquires HPC Cloud Platform Provider Nimbix

Atos Acquires HPC Cloud Platform Provider Nimbix

Last month, Agnès Boudot, SVP, head of HPC & Quantum at Atos, told us — without sharing details — that the company’s global strategy includes expansion into the U.S. market. At least part of that strategy was revealed today with…


From The Eponymous Pickle

IBM and Japan: Quantum System One

IBM and Japan: Quantum System One

 More moves forward in Quantum Computing:

IBM and the University of Tokyo Unveil Japan's Most Powerful Quantum Computer in PRNewsWire

TOKYO, July 26, 2021 /PRNewswire/ -- IBM (NYSE: IBM) and the University of Tokyo today unveiled…


From insideHPC

PsiQuantum Closes $450M Venture Round

PsiQuantum Closes $450M Venture Round

PALO ALTO — PsiQuantum has raised $450 million in Series D funding to build what the company said will be the world’s first commercially viable quantum computer. The funding round was led by BlackRock, along with participation…


From insideHPC

Dartmouth Engineering to Lead $2.7M DOE Quantum Computing Grant

Dartmouth Engineering to Lead $2.7M DOE Quantum Computing Grant

HANOVER, N.H. – Funded by a $2.7 million grant from the U.S. Department of Energy (DOE), Dartmouth Engineering Professor Geoffroy Hautier will lead a three-year, multi-institutional effort to identify qbits, a basic unit of quantum…


From The Computing Community Consortium Blog

CRA Industry (CRA-I) Senior Program Associate Position Open

CRA Industry (CRA-I) Senior Program Associate Position Open

The Computing Research Association (CRA) seeks a full-time employee to join our team as a Senior Program Associate for the CRA Industry standing committee (CRA-Industry). CRA-Industry is a newly formed standing committee that…


From The Eponymous Pickle

Designing Optimal Auctions Through DeepLearning

Designing Optimal Auctions Through DeepLearning

Long time involved in auction protocols.  So this interested me.  Not quite sure how it would work in contexts, but intriguing.  Technical.

Optimal Auctions Through Deep Learning  By Paul Dütting, Zhe Feng, Harikrishna Narasimhan…


From Yoshua Bengio

Bringing future societal impact into present incentives

Bringing future societal impact into present incentives

In my previous blog entry, I discussed how when each person or corporation maximizes their individual interests, it can easily end up with most of…

L’article Bringing future societal impact into present incentives est apparuYoshua…


From insideHPC

Argonne Scientists Using DL to Visualize X-ray Data in 3D

Argonne Scientists Using DL to Visualize X-ray Data in 3D

JULY 26, 2021 – A team of Argonne scientists has leveraged artificial intelligence to train computers to keep up with the massive amounts of X-ray data taken at the Advanced Photon Source. Scientists are using artificial intelligence…


From The Eponymous Pickle

Cobot Designer for Robot Safety

Cobot Designer for Robot Safety

A free available application.

Web-based design tool for better job safety

Research News / July 01, 2021  Fraunhofer

The safety of people interacting with robots has top priority, especially when humans and robots are working side…


From The Eponymous Pickle

Action at a Distance Works

Action at a Distance Works

An approach that's already being used for some kinds of encrypted transmission.  Here is a largely non technical explanation using Bell's Theorem.  

How Bell’s Theorem Proved ‘Spooky Action at a Distance’ Is Real

The root of today…


From insideHPC

Intel Announces Foundational Technology Roadmap, Launches Naming Structure for Process Nodes

Intel Announces Foundational Technology Roadmap, Launches Naming Structure for Process Nodes

Intel Corporation today announced what it said is one of the company’s most detailed process and packaging technology roadmaps, showcasing a series of “foundational innovations that will power products through 2025 and beyond…


From The Eponymous Pickle

Towards a Battery Free Internet of Things

Towards a Battery Free Internet of Things

Some notes about how this might work.  Think its inevitable that we will have many kinds of IOTs  delivering AI.   Further how we can ensure these devices getting security updates.

A Battery-Free Internet of Things,  By Esther…


From Schneier on Security

Hiding Malware in ML Models

Hiding Malware in ML Models

Interesting research: “EvilModel: Hiding Malware Inside of Neural Network Models”.

Abstract: Delivering malware covertly and detection-evadingly is critical to advanced malware campaigns. In this paper, we present a method that…


From insideHPC

NVIDIA and King’s College London Use Cambridge-1 Supercomputer for Synthetic Brain Image Research

NVIDIA and King’s College London Use Cambridge-1 Supercomputer for Synthetic Brain Image Research

King’s College London is using the Nvidia-based Cambridge-1 supercomputer to build AI models to generate synthetic brain images by learning from tens of thousands of MRI brain scans taken of patients of various ages and with …


From insideHPC

Registration Is Now Open for September HPC User Forum

Registration Is Now Open for September HPC User Forum

Registration is now open for the September HPC User Forum, which will be presented virtually. Attendees can register at the HPC User Forum website or directly here. There will be two sessions per day for a total of six sessions…


From The Eponymous Pickle

Better Security Through Obfuscation

Better Security Through Obfuscation

 Have always been told, in essence, that this is a bad way to go.  Better keep everything visible, and open, expose it to as many expert hackers as possible to examine and test it, to expose any problems.    Though we have had…


From The Eponymous Pickle

Border Gateway Protocol

Border Gateway Protocol

 New to me, a useful description here.

Fixing the Internet  By Keith Kirkpatrick

Video description:  https://youtu.be/A1KXPpqlNZ4  

Communications of the ACM, August 2021, Vol. 64 No. 8, Pages 16-17  10.1145/3469287

Few people pay…