acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Python Code Libraries Riddled with Holes
From The Eponymous Pickle

Python Code Libraries Riddled with Holes

Take caution with all those handy libraries.Python Code Libraries Are Riddled With Security Holes  By TechRadar, August 2, 2021Almost half of the packages in the...

Eleven New NSF National AI Research Institutes Announced Last Week
From The Computing Community Consortium Blog

Eleven New NSF National AI Research Institutes Announced Last Week

Last week, the National Science Foundation (NSF) announced the establishment of 11 new NSF National Artificial Intelligence Research Institutes, building on the...

Apply Now for the SC21 Early Career Program
From insideHPC

Apply Now for the SC21 Early Career Program

Early-career researchers and technical professionals within the first five years of a permanent position are encouraged to apply for the SC21 Early Career Program...

P&G Ventures
From The Eponymous Pickle

P&G Ventures

More from my former employer.P&G Ventures Among Top 20 Best Workplaces for Innovators According to Fast Company  CINCINNATI, Aug. 4, 2021 /PRNewswire/ -- Fast Company...

DOE Funds $15M for Integrated Computational and Data Infrastructure for Science Research at 5 Universities
From insideHPC

DOE Funds $15M for Integrated Computational and Data Infrastructure for Science Research at 5 Universities

Today, the U.S. Department of Energy (DOE) announced $15.1 million for three collaborative research projects, at five universities, to advance development of what...

Using “Master Faces” to Bypass Face-Recognition Authenticating Systems
From Schneier on Security

Using “Master Faces” to Bypass Face-Recognition Authenticating Systems

Fascinating research: “Generating Master Faces for Dictionary Attacks with a Network-Assisted Latent Space Evolution.” Abstract: A master face is a face image that...

From Computational Complexity

Pole Vault Live Blogging

As I write this I'm watching the women's pole vault final in the Olympics. Of the 15 women who made the finals, only four remain after two heights.To expand ontweet...

Dataiku Raises $400M at a $4.6B Valuation for ‘Everyday AI’ in the Enterprise
From insideHPC

Dataiku Raises $400M at a $4.6B Valuation for ‘Everyday AI’ in the Enterprise

August 05, 2021 – NEW YORK – Dataiku, the platform for Everyday AI, today announced $400M in Series E investment led by Tiger Global, with participation from several...

Radar Trends for August
From The Eponymous Pickle

Radar Trends for August

As usual, well done look at look and links for trends to watch.Radar trends to watch: August 2021Trends in Programming, Robotics, Security, and More  By Mike Loukides...

Intelligent Light Announces Kombyne an ‘HPC Efficiency Multiplier’ for CFD
From insideHPC

Intelligent Light Announces Kombyne an ‘HPC Efficiency Multiplier’ for CFD

RUTHERFORD, N.J. — Aug. 4, 2021 –Intelligent Light announced today the creation of Kombyne, an SaaS high performance computing (HPC) workflow tool initially developed...

ALCF GPU Hackathon and Computational Performance Workshop: Prepping Researchers for Current & Future HPC
From insideHPC

ALCF GPU Hackathon and Computational Performance Workshop: Prepping Researchers for Current & Future HPC

As the Argonne Leadership Computing Facility (ALCF) continues its transition to deploying and operating supercomputers powered by graphics processing units (GPUs)...

From Gödel's Lost Letter and P=NP

Turning the Tables on Cheating?

Colonel Stok: Do you play chess? Harry Palmer: Yes, but I prefer a game with a better chance of cheating. Sleuth source Michael Caine played Harry Palmer in the...

Zoom Lied about End-to-End Encryption
From Schneier on Security

Zoom Lied about End-to-End Encryption

The facts aren’t news, but Zoom will pay $85M — to the class-action attorneys, and to users — for lying to users about end-to-end encryption, and for giving user...

The Cyber Risk in Digital Transformation
From The Eponymous Pickle

The Cyber Risk in Digital Transformation

Its not brought up enough as a key part of the transformation effort.  It is essential as threats enlarge.  What do you have if the attackers get control? Cyber...

Univ. of Cambridge Wilkes-3 Is No. 3 on Latest Green500 for Energy-efficient HPC
From insideHPC

Univ. of Cambridge Wilkes-3 Is No. 3 on Latest Green500 for Energy-efficient HPC

Twice a year, the TOP500 project releases a ranking of the most energy-efficient supercomputers in the world. This Green500 list parallels the better-known TOP500...

Ken Kennedy AI & Data Science Conference, Oct. 25-27: Call for Participation, Program Announced
From insideHPC

Ken Kennedy AI & Data Science Conference, Oct. 25-27: Call for Participation, Program Announced

The 2021 Ken Kennedy AI and Data Science Conference is scheduled for October 25-27. Visit ai-datascience.rice.edu for more details. The conference will kick off...

Use of Chat in Meetings
From The Eponymous Pickle

Use of Chat in Meetings

Always thought better use of  chat in meetings would be useful, perhaps a means of asking questions of participants by an advisor?    Invocation of humor?    Microsoft...

TACC Joins NSF-Funded Icicle Institute for AI Research
From insideHPC

TACC Joins NSF-Funded Icicle Institute for AI Research

The Texas Advanced Computing Center (TACC) at The University of Texas at Austin announced today that it is a partner in the National Science Foundation (NSF)-funded...

Add UK to Nvidia-Arm Acquisition Snags
From insideHPC

Add UK to Nvidia-Arm Acquisition Snags

On the heels of potential regulatory problems in China and Europe for Nvidia’s planned Arm acquisition, another press report, from Bloomberg, states that UK regulators...

Big Fines for Amazon Under GDPR
From The Eponymous Pickle

Big Fines for Amazon Under GDPR

Good to know the implications of the EU GDPR.  Note how Amazon sees the gathering of customer data. On to the EU court.EU Fines Amazon Record $888 Million Over ...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account