The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.
As expected, IoT devices are filled with vulnerabilities:
As a thought experiment, Martin Hron, a researcher at security company Avast, reverse engineered one of the older coffee makers to see what kinds of hacks he could do…Nice piece that discusses a common approach of 'Human as Backup' vs other human-in-the loop alternatives. Makes me think.
Rethinking human-AI interaction 08 Jun 2020 by Jessy Lin Blog
Imagine 1977, sitting at the helm of one…Again, private security drones are a completely inevitable direction.
Are Amazon’s flying security drones a threat to homeowner privacy? by Tom Ryan in Retailwire. With further analysis.
Amazon’s smart security subsidiary, Ring…Broad look at current activity.
4 hot areas for encryption innovation
Researchers are making progress on a variety of approaches to strengthen encryption techniques and algorithms. Here are some of the hottest areas in cryptographic…A new episode of the Computing Community Consortium‘s (CCC) podcast, Catalyzing Computing, is now available. In this episode, Khari Douglas interviews Dr. Nadya Bliss, the Executive Director of Arizona State’s Global Security…
A new episode of the Computing Community Consortium‘s (CCC) podcast, Catalyzing Computing, is now available. In this episode, Khari Douglas interviews Dr. Nadya Bliss, the Executive Director of Arizona State’s Global Security…
Was of interest to us when we were making batteries.
Commercial battery cells that can monitor their own chemical and thermal state by Ingrid Fadelli , in TechExplore
Battery technology can sometimes be unstable and volatile,…In this sponsored post by our friends over at AMD, discuss how the ROCm platform is designed so that a wide range of developers can develop accelerated applications. An entire eco-system has been created, allowing developers …
Nikola Testla, famous inventor, who lived 1856--1943 said the following:
When wireless is perfectly applied the whole earth will be converted into
a huge brain, which in fact it is, all things being particles of a real
and rhythmic…Some differences from the Computational Lens Chai Wah Wu, Jonathan Lenchner, Charles Bennett, and Yuhai Tu are the moderators for the four days of the First IBM Research Workshop on the Informational Lens. The virtual workshop…
Good discussion of the process of manipulating reviewing on Amazon. Have seen it a few times when scrolling about reviews Amazon
Amazon's murky world of one-star reviews By James Clayton in the BBC
Amazon's marketplace is being…
The future of an augmented and networked military.
All the examples I have seen up front are 'hard', seems a considerable update.
NIST Scientists Get Soft on 3D Printing By U.S. National Institute of Standards and Technology in ACM
Standards and Technology researchers have developed…How Accurate Are Predictions for the Future? In the Rand Review, with some interesting links and some of Rands own contributions to the topic, the Delphi technique. Procter had early connections to this group for forward looking…
Just about to have my second remote Dr visit of the Pandemic era. So the question is home for me. Now this is just a phone remote visit, really just a conference call with no video. I like my Dr, very empathetic. They did…
Some intriguing applications, could have used this for counterfeiting applications. Expiring analysis applications.
A Self-Erasing Chip for Security, Anti-Counterfeit Tech
University of Michigan News
September 24, 2020
University…Las Vegas, Sept. 21, 2020 – AFWERX, the U.S. Air Force’s innovation catalyst, announced its line-up of keynote speakers and panels for EngageSpace, the interactive collaboration event for the space industry two-day virtual event…
This could be a life and home changer. Have seen some things that were similar. Can this work in the messy environment of a home?
Ring made a security drone that flies around inside your home
The Ring Always Home Cam can fly…A kind of enhanced sensory interaction. Security an obvious application. Low light applications.
How to Train a Machine to See 3D in the Dark
Australian National University
Researchers at the Australian National University (ANU)…This year’s Student Cluster Competition at SC20 will include two firsts: it will involve the most number of teams (19) in the competition’s 14-year history, and it will for the first time be held completely virtually. “This year…
On day two of the Virtual Heidelberg Laureate Forum (HLF) 2020, Robert Endre Tarjan and Donald Ervin Knuth engaged in a freewheeling conversation about mathematics, computer science, and art. Donald Knuth was the 1974 ACM A.M…
On day two of the Virtual Heidelberg Laureate Forum (HLF) 2020, Robert Endre Tarjan and Donald Ervin Knuth engaged in a freewheeling conversation about mathematics, computer science, and art. Donald Knuth was the 1974 ACM A.M…
The Trump Administration announced today that the United States and the United Kingdom signed a Declaration on Cooperation in Artificial Intelligence Research and Development intended “to drive technological breakthroughs, promote…
I do wonder about the liability for giving information that leads to transmission?
If your area is affected by COVID-19, you can use Google Maps to obtain relevant information on impacted places. Tip…What seems a useful measurement scale for understanding this. Its still very basic behavior.
The Phish Scale: NIST-Developed Method Helps IT Staff See Why Users Click on Fraudulent Emails
NIST
Researchers at the U.S. National…A space we have now looked at for some time, a somewhat technical example well worth going through. Note close attention to 'vulnerabilities' which remain at disturbing levels.
MadMax: Analyzing the Out-of-Gas World of Smart…Very good, piece. Its been difficult to accept the vulnerabilities that have been revealed to expose monetary systems to it. A good review of recent examples
Responsible Vulnerability Disclosure in Cryptocurrencies
By Rainer…The main lesson is that even a nearly imperceptible deviation from the full inclusion of all relevant parties in every aspect of the project can result in large deviations from the expected outcomes
In this interview, award winning scientist Mark Taylor at Sandia National Laboratories’ Center for Computing Research talks about the use of exascale-class supercomputers – to be delivered to three U.S. Department of Energy national…
Amazon Echo Moves forward, looks to be a considerable update.
Amazon refreshes Echo lineup with new custom chip
By Stephanie Condon for Between the Lines | in ZDNet
The updated smart speaker lineup also features a sleek new design…