acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Catalyzing Computing Podcast Episode 28 – Global Security and Graph Analytics with Nadya Bliss (Part 2)
From The Computing Community Consortium Blog

Catalyzing Computing Podcast Episode 28 – Global Security and Graph Analytics with Nadya Bliss (Part 2)

A new episode of the Computing Community Consortium‘s (CCC) podcast, Catalyzing Computing, is now available. In this episode, Khari Douglas interviews Dr. Nadya...

Swiss-Swedish Diplomatic Row Over Crypto AG
From Schneier on Security

Swiss-Swedish Diplomatic Row Over Crypto AG

Previously I have written about the Swedish-owned Swiss-based cryptographic hardware company: Crypto AG. It was a CIA-owned Cold War operation for decades. Today...

On Risk-Based Authentication
From Schneier on Security

On Risk-Based Authentication

Interesting usability study: “More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-based Authentication“: Abstract: Risk-based Authentication...

DH2i Launches DxOdyssey for IoT, Edge-Optimized Software Defined Perimeter (SDP) Solution
From insideHPC

DH2i Launches DxOdyssey for IoT, Edge-Optimized Software Defined Perimeter (SDP) Solution

FORT COLLINS, CO – October 6, 2020 – DH2i,  a provider of multi-platform Software Defined Perimeter (SDP) and Smart Availability software, today announced the launch...

Nvidia Says It’s Building UK’s Most Powerful Supercomputer, Dedicated to AI Research in Healthcare
From insideHPC

Nvidia Says It’s Building UK’s Most Powerful Supercomputer, Dedicated to AI Research in Healthcare

Santa Clara, CA,  Oct. 05, 2020 — Nvidia announced today at its GPU Technology Conference (GTC) it is building the United Kingdom’s most powerful supercomputer,...

Nvidia Announces DGX SuperPODs for AI, Available in 20-Node Increments
From insideHPC

Nvidia Announces DGX SuperPODs for AI, Available in 20-Node Increments

Nvidia today announced at its GPU Technology Conference (GTC) the Nvidia DGX SuperPOD Solution for Enterprise, the world’s first turnkey AI infrastructure, making...

Radio Free HPC: RISC-V Deep Dive, CTO Interview
From insideHPC

Radio Free HPC: RISC-V Deep Dive, CTO Interview

In this special edition of Radio Free HPC, we interview Mark Himelstein, RISC-V International Chief Technical Officer, looking at RISC-V from all angles, discussing...

Taking Virtualization to a Higher Level at the University of Pisa
From insideHPC

Taking Virtualization to a Higher Level at the University of Pisa

In this sponsored post, our friends over at Dell Technologies highlight a compelling case study: the University of Pisa gains greater flexibility and value from...

From Computational Complexity

MIP* = RE Redux

Everything pre-covid seems at least five years ago to me, so it's hard to believe that MIP* = RE is a 2020 result. To remind you, consider the model where we have...

Artificial Intelligence, Humor, and Appreciation of Beauty
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Artificial Intelligence, Humor, and Appreciation of Beauty

Last night I started re-reading Heinlein’s The Moon Is A Harsh Mistress.  It’s an old book, written in the mid 1960s, so there are some old ideas about computers...

Avoiding Space Junk
From The Eponymous Pickle

Avoiding Space Junk

Classic problem, especially with all those new mini satellites in orbit.   And ultimately also include other approaching objects? IBM to Open-Source Space JunkZDNet...

Examining Blockchain for Conditional Auto Access
From The Eponymous Pickle

Examining Blockchain for Conditional Auto Access

More in my look at IOT's current activity.  A blockchain type encoding to provide access keys for conditional access.    Note the final suggestion that this could...

Google’s ethnographic research on selfies
From Putting People First

Google’s ethnographic research on selfies

The Gogle Wellbeing Lab joined up with the company's Pixel team to run an ethnographic study across four countries, examining the relationship people in the United...

Digital Assets in a Secure and Open Infrastructure With Digital Twins
From The Eponymous Pickle

Digital Assets in a Secure and Open Infrastructure With Digital Twins

Brought to my attention, note my previous posts about IOTA and possibilities for use in IOT applications using 'smart contract'  style architectures.Zero Defects...

Life of a Data Byte
From The Eponymous Pickle

Life of a Data Byte

Thoughtful look at data as beyond just the amount, but also the means of storage and use.   And  it links to the  history of our business.Volume 18, issue 3, In...

Science and Technology links (October 3rd 2020)
From Daniel Lemire's Blog

Science and Technology links (October 3rd 2020)

The mortality rate for kids under five have fallen by 60% since 1990. Samsung new storage drives are both affordable and really fast (up to 7GB/s). Alzheimer’sContinue...

Sanitizing the Ride
From The Eponymous Pickle

Sanitizing the Ride

In BizJournals.com    By Andy Brownfield   Cincinnati-based consumer goods giant Procter & Gamble is partnering with rideshare company Lyft on a new initiativeP&G...

Finns Claim Quantum Measurement Breakthrough
From The Eponymous Pickle

Finns Claim Quantum Measurement Breakthrough

Once again accurate measurement is the key to understanding value.Finnish researchers claim quantum computing breakthrough in TechxploreScientists have createdQuantum...

Cross-Platform Ad Measurement
From The Eponymous Pickle

Cross-Platform Ad Measurement

In AdWeekP&G’s Marc Pritchard Demands Cross-Platform Ad Measurement by September 2021The chief brand officer called out the industry’s history of failed promises...

COVID-19 and Acedia
From Schneier on Security

COVID-19 and Acedia

Note: This isn’t my usual essay topic. Still, I want to put it on my blog. Six months into the pandemic with no end in sight, many of us have been feeling a sense...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account