acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Theft of CIA's "Vault Seven" Hacking Tools Due to Its Own Lousy Security
From Schneier on Security

Theft of CIA's "Vault Seven" Hacking Tools Due to Its Own Lousy Security

The Washington Post is reporting on an internal CIA report about its "Vault 7" security breach: The breach -- allegedly committed by a CIA employee -- was discovered...

UASG Welcomes Six New UA Ambassadors
From Universal Acceptance Steering Group

UASG Welcomes Six New UA Ambassadors

By Ajay Data, Chair of the UASG The Universal Acceptance Steering Group (UASG) is proud to welcome six new UA Ambassadors into the UASG Ambassador Program for FY21...

Thoughts on an IDE for Teaching CS
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Thoughts on an IDE for Teaching CS

Amy Ko posted a slide deck about CS education in higher education from a presentation she made to a group at Microsoft. There is a ton of stuff in there. I need...

PRACE Awards Hundreds of Millions More Core Hours to Combat COVID-19
From insideHPC

PRACE Awards Hundreds of Millions More Core Hours to Combat COVID-19

PRACE, the Partnership for Advanced Computing in Europe, has issued an additional 10 awards of supercomputing resources, with a total of 227.6 million core hours...

Comments on the Return of Retail
From The Eponymous Pickle

Comments on the Return of Retail

in His Curious Voyager:     My colleague Walter Riker writes:What will the return of retail look like in the coming months - years?Recently, because of the Pandemic...

Making Images Sharper, More secure?
From The Eponymous Pickle

Making Images Sharper, More secure?

A remarkable approach is described, sharper images for human eyes,  but too sharp for the task of recognition?  Implications for security?AI Makes Blurry FacesDuke...

An Intuitive Language for Quantum Computers
From The Eponymous Pickle

An Intuitive Language for Quantum Computers

Is it better t have a coding method devoted to an innovation like quantum, or one that provides the greatest accessibility?The First Intuitive Programming Language...

Zoom Will Be End-to-End Encrypted for All Users
From Schneier on Security

Zoom Will Be End-to-End Encrypted for All Users

Zoom is doing the right thing: it's making end-to-end encryption available to all users, paid and unpaid. (This is a change; I wrote about the initial decision...

Algorithms with Predictions:  Survey and Workshop
From My Biased Coin

Algorithms with Predictions: Survey and Workshop

There's a whole new, interesting theory trend  -- Algorithms with Predictions.  The idea, spurred by advances in machine learning, is that you assume you have predictor...

Amazon Enforces Distancing with AI
From The Eponymous Pickle

Amazon Enforces Distancing with AI

Somewhat novel application which I assume uses location and image analysis to report and manage distance rules.   More details at the link.Amazon uses AI-powered...

Amazon Takes Auto Echo to UK, Canada and Parts of Europe
From The Eponymous Pickle

Amazon Takes Auto Echo to UK, Canada and Parts of Europe

Thought I had detected less support to auto assistants by Amazon, but this indicates they are going again, to new regions and likely regulation.     Extending in...

Human Dynamics in Decision Making
From The Eponymous Pickle

Human Dynamics in Decision Making

Have thought that we need better understanding of our decision making, at least if we believe in useful biomimicry to build intelligent systems.   Here an interesting...

Security of The Form and Parameters of Neural Nets.
From The Eponymous Pickle

Security of The Form and Parameters of Neural Nets.

Out of Cornell University an intriguing article that deals with how neural nets react to adversarial attacks in their energy consumption.   As predicted by simulation...

Bank Card "Master Key" Stolen
From Schneier on Security

Bank Card "Master Key" Stolen

South Africa's Postbank experienced a catastrophic security failure. The bank's master PIN key was stolen, forcing it to cancel and replace 12 million bank cards...

From Gödel's Lost Letter and P=NP

P

Some thoughts on P versus NP Norbert Blum is a computer science theorist at the University of Bonn, Germany. He has made important contributions to theory over...

Subscriptions and IFTTT
From The Eponymous Pickle

Subscriptions and IFTTT

During the earliest days of looking at behavior in the smart home, we examined subscription methods.   And talked to Spotify when they emerged.   Now here an upcoming...

Will Voice Tech Shape Post Pandemic Office?
From The Eponymous Pickle

Will Voice Tech Shape Post Pandemic Office?

If it is a true 'post' pandemic, inclined to think the change will not be that substantial.   A mix of bad memories of those times, and enjoying actual human interaction...

Sandia Selects SoftIron File and Object Storage for Stria Cluster
From insideHPC

Sandia Selects SoftIron File and Object Storage for Stria Cluster

Sandia National Laboratories Vanguard program has selected SoftIron, Ltd., to provide supplemental file and object storage for Sandia’s ARM-based Stria high performance...

Eavesdropping on Sound Using Variations in Light Bulbs
From Schneier on Security

Eavesdropping on Sound Using Variations in Light Bulbs

New research is able to recover sound waves in a room by observing minute changes in the room's light bulbs. This technique works from a distance, even from a building...

SCIENCE Article on Driving Computer Performance After Moore’s Law
From The Computing Community Consortium Blog

SCIENCE Article on Driving Computer Performance After Moore’s Law

The following is a guest blog from CCC Member Tom Conte of Georgia Tech. A recent article in SCIENCE, authored by Charles Lierson, Neil Thompson, Joel Emer, Bradley...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account