acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Data and Analytics for Better Decisions
From The Eponymous Pickle

Data and Analytics for Better Decisions

From MIT Sloan, SAS, some thoughts on decisions for analytics.  I link to items I have read and liked.  All accessible from top link.Data and Analytics for Better...

DARPA Announces Research Teams to Develop Intelligent Event-Based Imagers
From insideHPC

DARPA Announces Research Teams to Develop Intelligent Event-Based Imagers

July 2, 2021 — DARPA today announced that three teams of researchers led by Raytheon, BAE Systems, and Northrop Grumman have been selected to develop event-based...

Vulnerability in the Kaspersky Password Manager
From Schneier on Security

Vulnerability in the Kaspersky Password Manager

A vulnerability (just patched) in the random number generator used in the Kaspersky Password Manager resulted in easily guessable passwords: The password generator...

AI Battling Retail Out-Of-Stocks
From The Eponymous Pickle

AI Battling Retail Out-Of-Stocks

I recall a related  approach suggested in the enterprise, but the right kind of data lacking,  then the right data applied.  Sounds like a fix found here?  Can ...

The role of UX: 2020 benchmark study report and analysis
From Putting People First

The role of UX: 2020 benchmark study report and analysis

UXmatters and the UX research consultancy User Fountain recently teamed up to survey UX professionals around the world on the role of User Experience within their...

Retailwire Research on Retail Digital Transformation.
From The Eponymous Pickle

Retailwire Research on Retail Digital Transformation.

Always interesting regarding retail research activities.Retailwire: Research    https://www.retailwire.com/  Our recently released study, "The Beating Heart ofSee...

Cloud Computing Under Attack
From The Eponymous Pickle

Cloud Computing Under Attack

Thoughts on vulnerability of the cloud. Russia’s Hacking Success Shows How Vulnerable the Cloud IsThe cloud is everywhere. It’s critical to computing. And it’sBy...

Stealing Xbox Codes
From Schneier on Security

Stealing Xbox Codes

Detailed story of Volodymyr Kvashuk, a Microsoft insider who noticed a bug in the company’s internal systems that allowed him to create unlimited Xbox gift cards...

Channeling the Inner Voice of Robots
From The Eponymous Pickle

Channeling the Inner Voice of Robots

Like consciousness or a cognitive infrastructure that feeds into our decisions and broad behavior like a consciousness?     If it produces better measure of decisions...

What is Slam?
From The Eponymous Pickle

What is Slam?

Below just an outline, but something I am investigating,  detail the link.The definitive guide to SLAM & mobile mappingSLAM 101   ....  How does SLAM work  .......

Mondelez Does Low-Code, No-Code Development
From The Eponymous Pickle

Mondelez Does Low-Code, No-Code Development

I think this is ultimately the approach we will be taking.   Not quite here yet, but it will be too risky to have individual developers do most coding work. Mondelez...

FBI Running  Encrypted Phones
From The Eponymous Pickle

FBI Running Encrypted Phones

Bruce Schneier posted about the FBI effort to create an encrypted phone App.  And makes interesting points about trust and security.    Just read, worth considering...

AI Taking Over Gadgets
From The Eponymous Pickle

AI Taking Over Gadgets

Now lets make them as secure as possible.    And the AI does not have to be created on the edge, it can  be encrypted and fed to devices.    We will see both.  ...

Reimplementing Software Interfaces is Fair Use
From The Eponymous Pickle

Reimplementing Software Interfaces is Fair Use

 Somewhat surprising,  and Beyond the US?   Good overview of the technical implications.Reimplementing Software Interfaces Is Fair UseBy Pamela Samuelson  Communications...

A Battery Free Internet of Things
From The Eponymous Pickle

A Battery Free Internet of Things

 A look at current state and technology advances and likely futures.   We looked at these for RFID identification applications.  Implications for applications,A...

Opportunities and Dangers of Decentralizing Finance
From The Eponymous Pickle

Opportunities and Dangers of Decentralizing Finance

Useful definitions and opinions on the state and future of what is being called DeFi.  Much on the Podcast and text below at the link.The Opportunities and Dangers...

On Autodesk Tandem
From The Eponymous Pickle

On Autodesk Tandem

My continued look at Autodesk's Tandem Digital Twin Solution.  Look for more posts here on digital twins.DIGITAL TWIN FOR SMARTER OPERATIONSAutodesk TandemAutodesk...

Magnetic Memory System for AI
From The Eponymous Pickle

Magnetic Memory System for AI

Seems a memory device meant for learning from data  in AI system.  Faster it implies.A More Robust Memory Device for AI SystemsBy Northwestern University McCormick...

Home Networking by Radar
From The Eponymous Pickle

Home Networking by Radar

Interesting.   Security?  Might this kind location could be combined with other kind of location and movement information?  Home networking by radarOmniConnectResearch...

Next Wave of Computing Innovation will be Driven by Crypto
From The Eponymous Pickle

Next Wave of Computing Innovation will be Driven by Crypto

 Andreessen Says it will all be about CryptoAndreessen Horowitz  A16zCrypto Fund III  by Chris Dixon, Katie Haun, and Ali Yahyacryptocurrencies & blockchains  a16z...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account