acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Xilinx in 5G Partnership with Fujitsu
From insideHPC

Xilinx in 5G Partnership with Fujitsu

FPGA chip maker Xilinx, whose acquisition by AMD was announced last October, and Fujitsu, developer along with Japan’s RIKEN Center for Computational Science of...

The National Science Foundation to Support a Series of Workshops on Pandemic Prediction and Prevention
From The Computing Community Consortium Blog

The National Science Foundation to Support a Series of Workshops on Pandemic Prediction and Prevention

The following is an announcement from the National Science Foundation. The Computing Community Consortium (CCC) has also been working in this space and recently...

History of the VPN
From The Eponymous Pickle

History of the VPN

Intriguing history, now finally becoming universal.  Saw it first in the enterprise. Everything VPN is New Again in ACM QueueThe 24-year-old security model hasDavid...

IBM  and Quantum  Computing
From The Eponymous Pickle

IBM and Quantum Computing

 IBM seeing the future of quantum computing.IBM unveils ambitious plan for quantum computing software  By Jeremy Kahn in FortuneThe company wants to make it easier...

MediQuant’s Kel Pults Joins the Active Archive Alliance Board of Directors
From insideHPC

MediQuant’s Kel Pults Joins the Active Archive Alliance Board of Directors

Boulder, Colo., February 3, 2021 – The Active Archive Alliance today announced that Kel Pults, DHA, MSN, RN, and Chief Clinical Officer at MediQuant, has joined...

Azure Quantum Now in Public Preview
From insideHPC

Azure Quantum Now in Public Preview

February 1, 2021 — Azure Quantum, the world’s first full-stack, public cloud ecosystem for quantum solutions, is now open for business, according to Krysta Svore...

Ransomware Profitability
From Schneier on Security

Ransomware Profitability

Analyzing cryptocurrency data, a research group has estimated a lower-bound on 2020 ransomware revenue: $350 million, four times more than in 2019. Based on the...

SonicWall Zero-Day
From Schneier on Security

SonicWall Zero-Day

Hackers are exploiting zero-day in SonicWall: In an email, an NCC Group spokeswoman wrote: “Our team has observed signs of an attempted exploitation of a vulnerabilitythat...

Web Credit Card Skimmer Steals Data from Another Credit Card Skimmer
From Schneier on Security

Web Credit Card Skimmer Steals Data from Another Credit Card Skimmer

MalwareBytes is reporting a weird software credit card skimmer. It harvests credit card data stolen by another, different skimmer: Even though spotting multiple...

NoxPlayer Android Emulator Supply-Chain Attack
From Schneier on Security

NoxPlayer Android Emulator Supply-Chain Attack

It seems to be the season of sophisticated supply-chain attacks. This one is in the NoxPlayer Android emulator: ESET says that based on evidence its researchers...

Presidential Cybersecurity and Pelotons
From Schneier on Security

Presidential Cybersecurity and Pelotons

President Biden wants his Peloton in the White House. For those who have missed the hype, it’s an Internet-connected stationary bicycle. It has a screen, a camera...

Another SolarWinds Orion Hack
From Schneier on Security

Another SolarWinds Orion Hack

At the same time the Russians were using a backdoored SolarWinds update to attack networks worldwide, another threat actor — believed to be Chinese in origin —penetrate...

Microsoft Releases Speech Services
From The Eponymous Pickle

Microsoft Releases Speech Services

Useful capability for speech production from Azure/AIMicrosoft opens limited access to its neural text-to-speech AI in EngadgetAT&T and Warner Bros. used the tech...

Things to Know When Assessing, Piloting, and Deploying GPUs – Part 3
From insideHPC

Things to Know When Assessing, Piloting, and Deploying GPUs – Part 3

In this insideHPC Guide, our friends over at WEKA suggest that when organizations decide to move existing applications or new applications to a GPU-influenced system...

Counting Google Searches for Boredom and Loneliness
From The Eponymous Pickle

Counting Google Searches for Boredom and Loneliness

Whew, most interesting ... or a more general privacy invasion that can be leveraged?How Google Searches Reveal the Hidden Cost of LockdownUniversity of WarwickResearchers...

Work From Anywhere Here to Stay
From The Eponymous Pickle

Work From Anywhere Here to Stay

Mentioned this previously, Irving Wladawsky provides more links and backgrounds.Is Work-from-Anywhere Here to Stay?  (many links in the below are shown by clicking...

More on Solarwinds Malware
From The Eponymous Pickle

More on Solarwinds Malware

Schneier provides more 'Solarwinds' News this morning,  lots of links to other analyses and opinions. Including some suggestions for addressing these kinds of threats...

Autonomous Vehicles as Criminal Drug Mules
From The Eponymous Pickle

Autonomous Vehicles as Criminal Drug Mules

I recall this coming up in innovation meetings a number of years ago.  And of course the vehicles involved will be automatically tracked and usage charged to someone...

Listen to the AAAS Sci-Mic Podcasts including the CCC’s Catalyzing Computing
From The Computing Community Consortium Blog

Listen to the AAAS Sci-Mic Podcasts including the CCC’s Catalyzing Computing

Every February, the American Association for the Advancement of Science (AAAS) — the world’s largest multidisciplinary scientific society and the publisher of the...

Rearchers Can Now Achieve 'Quantum Advantage'
From The Eponymous Pickle

Rearchers Can Now Achieve 'Quantum Advantage'

Intriguing claim.  Based on my knowledge of quantum physics this may lead to some very counter intuitive results.   Especially for 'combinatorial', or many-many...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account