acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Tech Boosts Security in Japan
From The Eponymous Pickle

Tech Boosts Security in Japan

Again expect such directions world wide.  AI, Drones, 4K Cameras: New Tech Boosts Security Systems in JapanThe Japan Times, December 20, 2020Shortages of security...

Celebrating Technology Leaders – Women in Data
From ACM-W supporting, celebrating and advocating for Women in Computing

Celebrating Technology Leaders – Women in Data

Wednesday, February 3rd at 3:00 PM ET/12:00 PM PT,  a panel discussion featuring Samia Khalid (Senior AI Engineer at Microsoft), Lilla Czako (Data Engineer at Doximity)...

28 Years and Running: IBM Awarded Most Patents in 2020 – a “Sharp Uptick” in AI
From insideHPC

28 Years and Running: IBM Awarded Most Patents in 2020 – a “Sharp Uptick” in AI

For the 28th year in a row, IBM copped more U.S. patents than any other company, 9,130 in all, including what the company said was a “sharp uptick” in AI-related...

Salute Mission Critical Signs Global Agreement to Support EkkoSense Data Center Visualization and Monitoring Software
From insideHPC

Salute Mission Critical Signs Global Agreement to Support EkkoSense Data Center Visualization and Monitoring Software

January12, 2021 — Salute Mission Critical, the US data center services specialist that helps military veterans become IT technicians, announces its recent  appointment...

Oxford Nanopore and Nvidia Partner DGX AI System with PromethION Genomics Sequencer
From insideHPC

Oxford Nanopore and Nvidia Partner DGX AI System with PromethION Genomics Sequencer

January 12, 2021 — Oxford Nanopore Technologies and Nvidia are collaborating this year to integrate the Nvidia DGX Station A100 into Oxford Nanopore’s gene sequencing...

CCC Council Member Maria Gini Featured in University of Minnesota Article: Designing the Next Generation of Robots
From The Computing Community Consortium Blog

CCC Council Member Maria Gini Featured in University of Minnesota Article: Designing the Next Generation of Robots

Contributions to this post were provided by CCC Council member Maria Gini. Computing Community Consortium (CCC) Council member and Distinguished Professor of the...

Games Teaching us About Brains
From The Eponymous Pickle

Games Teaching us About Brains

Games are simplified interactions of brains and context.   Neural Networks Playing Video Games Teach Us About Our Own BrainsBy California Institute of Technology...

Robots Planting Trees
From The Eponymous Pickle

Robots Planting Trees

Note the use of robotics and LiDARRobot Foresters Could Plant Thousands of Trees a Day   By New Scientist in ACM Two types of autonomous robot foresters developed...

Using AI to Find New Uses for Existing Medications
From The Eponymous Pickle

Using AI to Find New Uses for Existing Medications

As I have observed, this is a common thing.   Making it faster or more precise could be very useful.Using AI to Find New Uses for Existing Medications    By Ohio...

Modern HPC and Big Data Design Strategies for Data Centers – Part 3
From insideHPC

Modern HPC and Big Data Design Strategies for Data Centers – Part 3

This insideHPC Special Research Report, “Modern HPC and Big Data Design Strategies for Data Centers,” provides an overview of what to consider when selecting an...

Looking Back and Planning Ahead for Supporting a Diverse and Global Internet Universal Acceptance (UA) Readiness
From Universal Acceptance Steering Group

Looking Back and Planning Ahead for Supporting a Diverse and Global Internet Universal Acceptance (UA) Readiness

By Dr. Ajay Data, Chair of the UASG January 2021 2020 was a year unlike any other. Since the start of the COVID-19 pandemic, the Internet has provided people a...

5th ACM-W India National Level Virtual Hackathon 2020
From ACM-W supporting, celebrating and advocating for Women in Computing

5th ACM-W India National Level Virtual Hackathon 2020

5th ACM-W India National Level Virtual Hackathon 2020 started with an ideology to support and motivate the girl students in the field of Computer Science.

Radio Free HPC: Digital D-Day – SolarWinds Hack
From insideHPC

Radio Free HPC: Digital D-Day – SolarWinds Hack

Our main topic for this episode is the SolarWinds hack. This is the worst digital hacking incident to date and will have repercussions for many years. As many as...

CRG Solutions Cloud-Native Database Named SingleStore VAR
From insideHPC

CRG Solutions Cloud-Native Database Named SingleStore VAR

San Francisco, Jan. 13, 2021 – SingleStore, database technology for cloud-native modern applications, today announced a partnership with CRG Solutions. The business...

CCC Council Members Chad Jenkins and Holly Yanco are Newly Elected AAAI Fellows!
From The Computing Community Consortium Blog

CCC Council Members Chad Jenkins and Holly Yanco are Newly Elected AAAI Fellows!

Contributions to this post were provided by CRA’s Communication Specialist Shar Steed.  The Association for the Advancement of Artificial Intelligence (AAAI) recently...

Connecting Cows and More to the Web
From The Eponymous Pickle

Connecting Cows and More to the Web

 Powerful direction for much more connections yet.   Implications for the use of data and what is forecast. Tiny Satellites Will Connect Cows, Cars, Shipping Containers...

Remaking the Web
From The Eponymous Pickle

Remaking the Web

We need a remake.  With caution to include freedom of communication. He Created the Web. Now He's Out to Remake the Digital World.The New York Times,   Steve Lohr...

Finding the Location of Telegram Users
From Schneier on Security

Finding the Location of Telegram Users

Security researcher Ahmed Hassan has shown that spoofing the Android’s “People Nearby” feature allows him to pinpoint the physical location of Telegram users: Using...

On US Capitol Security — By Someone Who Manages Arena-Rock-Concert Security
From Schneier on Security

On US Capitol Security — By Someone Who Manages Arena-Rock-Concert Security

Smart commentary: …I was floored on Wednesday when, glued to my television, I saw police in some areas of the U.S. Capitol using little more than those same mobile...

Cloning Google Titan 2FA keys
From Schneier on Security

Cloning Google Titan 2FA keys

This is a clever side-channel attack: The cloning works by using a hot air gun and a scalpel to remove the plastic key casing and expose the NXP A700X chip, which...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account