acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

AI Cyber Defense  for Zero-Day Threats
From The Eponymous Pickle

AI Cyber Defense for Zero-Day Threats

Don't see how this works without lots of operational data to leverage.   And might it not be thwarted by adapting the system in some way?  And a good understanding...

Light Driven 3D Printing
From The Eponymous Pickle

Light Driven 3D Printing

See images at the link.   Improving speed and precision.Dynamic 3D Printing Process Features Light-Driven TwistBy Northwestern McCormick School of Engineering, ...

Science and Technology links (February 13th 2021)
From Daniel Lemire's Blog

Science and Technology links (February 13th 2021)

Researchers make inexpensive transparent wood. Our cells produce energy using their mitochondria. Researchers show that you can efficiently enrich cells with mitochondria...

Chinese Supply-Chain Attack on Computer Systems
From Schneier on Security

Chinese Supply-Chain Attack on Computer Systems

Bloomberg News has a major story about the Chinese hacking computer motherboards made by Supermicro, Levono, and others. It’s been going on since at least 2008....

Micrometeorites are Falling
From The Eponymous Pickle

Micrometeorites are Falling

Now for something completely different, from studies of mine long ago.   Did you know that there is a near continuous shower of space dust falling down on us? https...

Weaknesses in ML
From The Eponymous Pickle

Weaknesses in ML

I like explanations of how a solution works in real world contexts.   Lots of work to still do.Uncovering Unknown Unknowns in Machine Learning  Google Blog., Thursday...

Omnichannel Search Using AI
From The Eponymous Pickle

Omnichannel Search Using AI

 Brought to my attention, they link to an e-book they offer.  Note the below is ad.  I am unconnected, have not tried this, but the thoughts and offer looked interesting...

Google Microsoft and Qualcomm Protest Nvidia-Arm Acquisition
From insideHPC

Google Microsoft and Qualcomm Protest Nvidia-Arm Acquisition

On the heels of an announcement by Arm Holdings yesterday that its silicon partners in the third quarter of 2020 shipped 6.7 billion Arm-based chips, news stories...

The Quantum Comprehension Gap and the Emergence of Quantum Ethics
From insideHPC

The Quantum Comprehension Gap and the Emergence of Quantum Ethics

Though years from potential fruition, quantum computing and its control has emerged as an issue among technology ethicists. But if a YouTube video released last...

Former CCC Council Member Kevin Fu Appointed as FDA Center for Devices and Radiological Health Acting Director of Medical Device Cybersecurity
From The Computing Community Consortium Blog

Former CCC Council Member Kevin Fu Appointed as FDA Center for Devices and Radiological Health Acting Director of Medical Device Cybersecurity

The US Food and Drug Administration (FDA) Center for Devices and Radiological Health (CDRH) has appointed Former Computing Community Consortium (CCC) Council member...

Predicting COVID Spikes
From The Eponymous Pickle

Predicting COVID Spikes

Hmm, caution with such causal seeming predictions.   But interesting.    Google Search Can Help Predict Covid-19 Spikes   The Jerusalem Post, Zachary Keyser, February...

Standardizing Robot Operating Systems
From The Eponymous Pickle

Standardizing Robot Operating Systems

Just because they use the same software does not mean they will 'get along'.   Still the use of software that can communicate will make them easier to update and...

Autonomous Manufacturing Marketplace
From The Eponymous Pickle

Autonomous Manufacturing Marketplace

Intriguing play here, will look into more details... pass them along and I will post an overview.Fetch.ai partners with FESTO on decentralised manufacturing marketplace...

Browser Tracking Using Favicons
From Schneier on Security

Browser Tracking Using Favicons

Interesting research on persistent web tracking using favicons. (For those who don’t know, favicons are those tiny icons that appear in browser tabs next to the...

Virginia Data Privacy Law
From Schneier on Security

Virginia Data Privacy Law

Virginia is about to get a data privacy law, modeled on California’s law.

WEIS 2021 Call for Papers
From Schneier on Security

WEIS 2021 Call for Papers

The 20th Annual Workshop on the Economics of Information Security (WEIS 2021) will be held online in June. We just published the call for papers.

Neural Network Has Learned to Identify Tree Species
From The Eponymous Pickle

Neural Network Has Learned to Identify Tree Species

 Relates to my forestry work, could have been used to update inventories of species.Neural Network Has Learned to Identify Tree SpeciesBy Skolkovo Institute ofAn...

Malicious Barcode Scanner App
From Schneier on Security

Malicious Barcode Scanner App

Interesting story about a barcode scanner app that has been pushing malware on to Android phones. The app is called Barcode Scanner. It’s been around since 2017...

Deliberately Playing Copyrighted Music to Avoid Being Live-Streamed
From Schneier on Security

Deliberately Playing Copyrighted Music to Avoid Being Live-Streamed

Vice is reporting on a new police hack: playing copyrighted music when being filmed by citizens, trying to provoke social media sites into taking the videos down...

On Vulnerability-Adjacent Vulnerabilities
From Schneier on Security

On Vulnerability-Adjacent Vulnerabilities

At the virtual Engima Conference, Google’s Project Zero’s Maggie Stone gave a talk about zero-day exploits in the wild. In it, she talked about how often vendors...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account