acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Differences Between Simulation and Digital Twins
From The Eponymous Pickle

Differences Between Simulation and Digital Twins

Interesting.  Have done lots of Monte Carlo style simulation modeling, much less using digital twins.   Is this a good description?  For what contexts? .  We also...

Honeywell Quantum Spinoff
From The Eponymous Pickle

Honeywell Quantum Spinoff

More quantum spin offs and directions.   Here Honeywell is involved.Honeywell to Spin Off Quantum Unit in Merger With Software Firm  By Thomas BlackJune 8, 2021...

Peloton Vulnerability Found and Fixed
From Schneier on Security

Peloton Vulnerability Found and Fixed

Researchers have discovered a vulnerability in Peloton stationary bicycles, one that would give the attacker complete control over the device. The attack requires...

Autonomous Supply Chains run by Smart Contracts?
From The Eponymous Pickle

Autonomous Supply Chains run by Smart Contracts?

Fascinating thought.  How would the 'contracts' be written to adapt to the autonomous aspects of the system?The Age of Autonomous Supply Chains  by Paul Brody, ...

Intentional Flaw in GPRS Encryption Algorithm GEA-1
From Schneier on Security

Intentional Flaw in GPRS Encryption Algorithm GEA-1

General Packet Radio Service (GPRS) is a mobile data standard that was widely used in the early 2000s. The first encryption algorithm for that standard was GEA-1...

Waymo Drives Autonomous Trucks
From The Eponymous Pickle

Waymo Drives Autonomous Trucks

Will include a trained driver and technician, at least at first.Self-Driving Waymo Trucks to Haul Loads Between Houston, Fort Worth  By Ars TechnicaWaymo and trucking...

Lenovo Expands HPC System at Leibniz Supercomputer Center
From insideHPC

Lenovo Expands HPC System at Leibniz Supercomputer Center

Research Triangle Park, NC – Lenovo Infrastructure Solutions Group, Intel and the Leibniz Supercomputing Center (LRZ) of the Bavarian Academy of Sciences and Humanities...

Sleuthing Crypto Ransom Payments?
From The Eponymous Pickle

Sleuthing Crypto Ransom Payments?

Found this most interesting.   Very  technical look at the approach. Includes all the Wolfram code. reviewing now.  Could this be further developed?  Makes me think...

Advances in 3D Implant Construction
From The Eponymous Pickle

Advances in 3D Implant Construction

Technique Breaks the Mold for 3D-Printing Medical ImplantsRoyal Melbourne Institute of Technology (Australia)By Gosia KaszubskaThe development of three-dimensionally...

Preparing for Exascale: Aurora Software Development – Packaging and Early Hardware
From insideHPC

Preparing for Exascale: Aurora Software Development – Packaging and Early Hardware

By coordinating efforts to improve early exascale hardware stability at the Argonne Leadership Computing Facility (ALCF), computer scientist Servesh Muralidharan...

From Computational Complexity

Benny Chor (1956-2021)

Benny Chor passed away on June 10, 2021. Luca Trevisan had a blog post on the news.We present a guest post on Benny Chor's life and works by Oded Goldreich. The...

Making Sense of Contradictory Science Results
From The Eponymous Pickle

Making Sense of Contradictory Science Results

How do we make make sense of contradictory results?How to Make Sense of Contradictory Science Papers  in Nautil.usPublished research is less about conclusions than...

Wheelchairs with Smarter Voice Controls
From The Eponymous Pickle

Wheelchairs with Smarter Voice Controls

Seems a very natural solution.  Especially for integrating with chair and smartphone and other aids. Incudes data important to data and operator.Permobil Connects...

Paul van Oorschot’s Computer Security and the Internet
From Schneier on Security

Paul van Oorschot’s Computer Security and the Internet

Paul van Oorschot’s webpage contains a complete copy of his book: Computer Security and the Internet: Tools and Jewels. It’s worth reading.

Turn a Single Image into a Looping Video:  Uses?
From The Eponymous Pickle

Turn a Single Image into a Looping Video: Uses?

 Experimented with something like this.  Took a single image of part of a machine or process, then applying some images of specific known maintenance issues,  and...

MLCommons Launches MLPerf Tiny AI Inference Benchmark
From insideHPC

MLCommons Launches MLPerf Tiny AI Inference Benchmark

Today, open engineering consortium MLCommons released a new benchmark, MLPerf Tiny Inference to measure trained neural network AI inference performance for low-power...

DeepMind Learns Football from Motion Capture
From The Eponymous Pickle

DeepMind Learns Football from Motion Capture

Intriguing, with the implication that you can go from direct motion capture to broader contexts.   Team work, which implies both individual skills, planning and...

Redefining What a map Can be With New Information and AI
From The Eponymous Pickle

Redefining What a map Can be With New Information and AI

Google re-defining mapping.   Very nicely done.   Started with Google maps, and the ability to link in data as needed for usage contexts.   And AI being used to...

Exascale Computing Project Update: Director Kothe Talks Progress, Annual Meeting Highlights
From insideHPC

Exascale Computing Project Update: Director Kothe Talks Progress, Annual Meeting Highlights

In this recent interview, the U.S. Department of Energy’s Exascale Computing Project (ECP) Director Doug Kothe provides an update on the effort to deliver a capable...

Inobtrusive Wearables Monitoring Health
From The Eponymous Pickle

Inobtrusive Wearables Monitoring Health

Interesting out of Purdue, where we connected in the retail modeling world.  Here it seems novel methods of self powering.    We called it 'smart clothing'.   Got...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account