acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Telling the Data's Story
From The Eponymous Pickle

Telling the Data's Story

 Good thoughts,  cant say we ever did this completely, would have been especially useful with the metadata, which tends to me less well understood.     In someData...

McKinsey on Hybrid Work
From The Eponymous Pickle

McKinsey on Hybrid Work

Talking Hybrid work.  Why, When, Measures and how much. It’s time for leaders to get real about hybrid  By Aaron De Smet, Bonnie Dowling, Mihir Mysore, and Angelika...

The Target of Malware
From The Eponymous Pickle

The Target of Malware

 Am a recent user of Discord, so this surprised me.  But it is a way to get inside quickly.   Also note Sophos Labs, new to me.   Here just the intro.Malware increasingly...

Future of AI is Generative
From The Eponymous Pickle

Future of AI is Generative

Looks to be a good talk, about to experience.THE HIVE THINK TANK LECTURE: THE FUTURE OF AI IS GENERATIVE NOT DISCRIMINATIVEOn May 26, 2021, Steve Omohundro gave...

Simulation and Causation Leading to Machine Learning
From The Eponymous Pickle

Simulation and Causation Leading to Machine Learning

Hmm quite a thought,   Want to see this broadly adapted and usefully applied.  Technical supporting papers.CausalCity: Introducing a high-fidelity simulation with...

Smart Contract Monitoring with Tenderly
From The Eponymous Pickle

Smart Contract Monitoring with Tenderly

Continue to look at how the aspect of a 'contract' can be integrated with code and logic.Ethereum smart contract monitoring platform Tenderly raises $15.3M   BY...

Deep Mind Will Release Structure of Every Protein
From The Eponymous Pickle

Deep Mind Will Release Structure of Every Protein

Mentioned this in a previous piece.  Here more detail from Technology Review.  Which covers implications further.DeepMind says it will release the structure ofThe...

Pocket Identity Revisit
From The Eponymous Pickle

Pocket Identity Revisit

Unless something like face identity fails, as mentioned here previously.The Identity in Everyone's Pocket   By Phil VachonCommunications of the ACM, January 2021...

Reaching Quantum Speed Limits
From The Eponymous Pickle

Reaching Quantum Speed Limits

Speed limits, but errors accounted for as well? JQI new to me.Information Transfer Protocol Reaches Quantum Speed Limit  By Joint Quantum InstituteJoint Quantum...

Business as Imagination Machine
From The Eponymous Pickle

Business as Imagination Machine

Links discovered in O'Reilly.     Turn Your Business Into 'The Imagination Machine'By Myles Suer | May 20, 2021  in CMSWireHow can businesses harness the collective...

Shopic Carts Get More Funding
From The Eponymous Pickle

Shopic Carts Get More Funding

 We tested a number of such Smart Cart Ideas.  Lost most interest in the 90s.  Now with Amazon trying related ideas.  Have just recently gained some traction. AI...

L'Oreal Taking Cosmetics Digital, Virtual
From The Eponymous Pickle

L'Oreal Taking Cosmetics Digital, Virtual

Worked with a large Cosmetics Company, so of interestL’Oréal’s New Digital Chief Takes Cosmetics Virtual  By The Wall Street Journal, August 6, 2021L'Oréal Group's...

Master Faces can Bypass Authentication
From The Eponymous Pickle

Master Faces can Bypass Authentication

Looks to be a dangerous authentication bypass on a now common security method using GAN methods.‘Master Faces’ That Can Bypass Over 40% Of Facial ID Authentication...

An Introduction to Operations Research
From The Eponymous Pickle

An Introduction to Operations Research

My primary field from years back.   With some great visuals.  Integrating it with machine learning and decision making makes much sense.  I disagree with the joke...

Scaling up Chatbots
From The Eponymous Pickle

Scaling up Chatbots

 Below just the introduction, much more at the link.Scaling Up Chatbots for Corporate Service Delivery Systems  By Alistair Barros, Renuka Sindhgatta, Alireza Nili...

Python Code Libraries Riddled with Holes
From The Eponymous Pickle

Python Code Libraries Riddled with Holes

Take caution with all those handy libraries.Python Code Libraries Are Riddled With Security Holes  By TechRadar, August 2, 2021Almost half of the packages in the...

P&G Ventures
From The Eponymous Pickle

P&G Ventures

More from my former employer.P&G Ventures Among Top 20 Best Workplaces for Innovators According to Fast Company  CINCINNATI, Aug. 4, 2021 /PRNewswire/ -- Fast Company...

Radar Trends for August
From The Eponymous Pickle

Radar Trends for August

As usual, well done look at look and links for trends to watch.Radar trends to watch: August 2021Trends in Programming, Robotics, Security, and More  By Mike Loukides...

The Cyber Risk in Digital Transformation
From The Eponymous Pickle

The Cyber Risk in Digital Transformation

Its not brought up enough as a key part of the transformation effort.  It is essential as threats enlarge.  What do you have if the attackers get control? Cyber...

Use of Chat in Meetings
From The Eponymous Pickle

Use of Chat in Meetings

Always thought better use of  chat in meetings would be useful, perhaps a means of asking questions of participants by an advisor?    Invocation of humor?    Microsoft...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account