acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

From Gödel's Lost Letter and P=NP

Predictions For 2021

This year is a Blum integer, 43*47 2017 article, not via Zoom Allan Lichtman correctly predicted the 2020 presidential election, based on a 7-6 edge in “keys” to...

No Driver on Board: Autonomous Trucks to Take to the Road
From The Eponymous Pickle

No Driver on Board: Autonomous Trucks to Take to the Road

 Evan Ackerman presents a good overview of the state of autonomous trucking.   Door to door, with lots of links to background information.    This should get us...

NSF CISE Upcoming Due Dates
From The Computing Community Consortium Blog

NSF CISE Upcoming Due Dates

Designing Materials to Revolutionize and Engineer our Future (DMREF) Full Proposal Window: January 25, 2021 DMREF is the primary program by which NSF participates...

Towards Battery Free IOT
From The Eponymous Pickle

Towards Battery Free IOT

A particular challenge for IOT devices.Battery-Free IoT: These Tiny Printable Computers Harvest Energy From Radio WavesIn Forbes by John KoetsierThe Wiliot Internet...

Identity in Your Smartphone
From The Eponymous Pickle

Identity in Your Smartphone

Working some related topics here. we have a considerable opportunity now to have a universal device that can provide identity.   Need to make the credentials secure...

Northern Data: Existing Bitcoin Mining Customer Expands Contract Volume by More Than 200MW
From insideHPC

Northern Data: Existing Bitcoin Mining Customer Expands Contract Volume by More Than 200MW

Frankfurt am Main – Northern Data AG (XETRA: NB2, ISIN: DE000A0SMU87), a provider of high-performance computing (HPC) solutions, has announced the extension ofNorthern...

Extracting Personal Information from Large Language Models Like GPT-2
From Schneier on Security

Extracting Personal Information from Large Language Models Like GPT-2

Researchers have been able to find all sorts of personal information within GPT-2. This information was part of the training data, and can be extracted with the...

Backdoor in Zyxel Firewalls and Gateways
From Schneier on Security

Backdoor in Zyxel Firewalls and Gateways

This is bad: More than 100,000 Zyxel firewalls, VPN gateways, and access point controllers contain a hardcoded admin-level backdoor account that can grant attackers...

Latest on the SVR’s SolarWinds Hack
From Schneier on Security

Latest on the SVR’s SolarWinds Hack

The New York Times has an in-depth article on the latest information about the SolarWinds hack (not a great name, since it’s much more far-reaching than that). ...

Data from Cars for Evidence
From The Eponymous Pickle

Data from Cars for Evidence

Not unexpected.    We give up all kinds of data now.  More is coming. Insecure Wheels: Police Turn to Car Data to Destroy Suspects' AlibisNBC News, By Olivia Solon...

HPC Predictions 2021: Quantum Beyond Qubits, Rising Composable and Memory-Centric Tide, Neural Network Explosion and 5G’s Slow March
From insideHPC

HPC Predictions 2021: Quantum Beyond Qubits, Rising Composable and Memory-Centric Tide, Neural Network Explosion and 5G’s Slow March

Annual technology predictions are like years: some are better than others. Nonetheless, many provide useful insight and serve as the basis for worthwhile discussion...

2D Arrays for Quantum Computing Proposed by Consortium
From The Eponymous Pickle

2D Arrays for Quantum Computing Proposed by Consortium

 A step forward towards recognizable Quantum computing powerIndustry Collaboration Leads to Important Milestone in the Creation of a Quantum ComputerUniversityDecember...

Lopsided Digital Transformation
From The Eponymous Pickle

Lopsided Digital Transformation

Look at how automation of digitization can make a big difference.   And we are continuing to move to that. Digital Transformation Is Lopsided, Even Within the Same...

Cybersecurity Research
From The Eponymous Pickle

Cybersecurity Research

Further, a look at where research is focusing and worth following. Cybersecurity Research for the Future   By Terry BenzelCommunications of the ACM, January 2021...

Top Data Breach Targets
From The Eponymous Pickle

Top Data Breach Targets

Expected places for threats:Experian predicts 5 key data breach targets for 2021   by Veronica Combs in Security   The pandemic warfare will shift to vaccine supply...

Graphcore Announces $222M Series E Funding Round
From insideHPC

Graphcore Announces $222M Series E Funding Round

Bristol, UK — Graphcore announced it has raised $222m of investment to help support the company’s global expansion and accelerate future IPU silicon, systems and...

Friday Squid Blogging: Vegan Chili Squid
From Schneier on Security

Friday Squid Blogging: Vegan Chili Squid

The restaurant chain Wagamama is selling a vegan version of its Chilli Squid side dish made from king oyster mushrooms. As usual, you can also use this squid post...

Friday Squid Blogging: China Launches Six New Squid Jigging Vessels
From Schneier on Security

Friday Squid Blogging: China Launches Six New Squid Jigging Vessels

From Pingtan Marine Enterprise: The 6 large-scale squid jigging vessels are normally operating vessels that returned to China earlier this year from the waters...

Friday Squid Blogging: Searching for Giant Squid by Collecting Environmental DNA
From Schneier on Security

Friday Squid Blogging: Searching for Giant Squid by Collecting Environmental DNA

The idea is to collect and analyze random DNA floating around the ocean, and using that to figure out where the giant squid are. No one is sure if this will actually...

Military Cryptanalytics, Part III
From Schneier on Security

Military Cryptanalytics, Part III

The NSA has just declassified and released a redacted version of Military Cryptanalytics, Part III, by Lambros D. Callimahos, October 1977. Parts I and II, by Lambros...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account