acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

From Gödel's Lost Letter and P=NP

P vs NP Proof Claims

Ken Ribet once was sent a freebie book that he looked at and decided he didn’t want, so took it to a second hand bookstore on his lunch break, sold it, and bought...

Robots Doing the Kitchen Labor
From The Eponymous Pickle

Robots Doing the Kitchen Labor

 Intriguing to see where this is going, a close observer of process details and their improvement.  Opportunity is to do this right now. Amid the Labor Shortage...

Deriving Equations from Sensor Data
From The Eponymous Pickle

Deriving Equations from Sensor Data

 Heres an interesting thing,  a kind of algorithm synthesis to do AI with?  Reading, Warning: Technical.  Note, this is research, but I am intrigued.  Deriving ...

Towards Workforce Ecosystems
From The Eponymous Pickle

Towards Workforce Ecosystems

 The Future of Work Is Through Workforce Ecosystems Workforce ecosystems can help leaders better manage changes driven by technological, social, and economic forces...

How did the Pandemic Change Internet Traffic?
From The Eponymous Pickle

How did the Pandemic Change Internet Traffic?

And how might that change in future pandemics?    Implications? Could we detect events that effect the internet this way?   Look at the Internet and the Pandemic...

Stanford Internet Observatory
From The Eponymous Pickle

Stanford Internet Observatory

Brought to my attention: Stanford Internet ObservatoryA program of the Cyber Policy Center, part of the Freeman Spogli Institute for International Studies ... The...

Apple to Detect Child Abuse Crimes in Photos,  iCloud, Messages
From The Eponymous Pickle

Apple to Detect Child Abuse Crimes in Photos, iCloud, Messages

Bruce Schneier article on the inclusion of a backdoor is interesting.   He makes the case, as he often does that any backdoor type of inclusion might readily be...

[Book] A City Is Not a Computer
From Putting People First

[Book] A City Is Not a Computer

A bold reassessment of "smart cities" that reveals what is lost when we conceive of our urban spaces as computers.

Cambridge Quantum Part of Team Claiming Blockchain Defense against Quantum Security Threats
From insideHPC

Cambridge Quantum Part of Team Claiming Blockchain Defense against Quantum Security Threats

UK-based Cambridge Quantum is part of a troika that has announced a defense against quantum computing-based security threats to blockchain networks. A project team...

LLNL Names Bradley Wallin to Lead Weapons and Complex Integration
From insideHPC

LLNL Names Bradley Wallin to Lead Weapons and Complex Integration

Aug. 10, 2021 — Bradley Wallin has been named Lawrence Livermore National Laboratory’s (LLNL’s) principal associate director (PAD) for Weapons and Complex Integration...

COVID-19’s psychological burden is associated with antisystemic attitudes and political violence
From Putting People First

COVID-19’s psychological burden is associated with antisystemic attitudes and political violence

Research in US, Denmark, Hungary and Italy suggests that the ongoing pandemic places many countries at an increased risk of political unrest. The violence that...

UASG Adds Spam Filter Testing to Evaluation of Internationalized Email Support Among Global Systems
From Universal Acceptance Steering Group

UASG Adds Spam Filter Testing to Evaluation of Internationalized Email Support Among Global Systems

By the Email Address Internationalization (EAI) Working Group The UASG’s most recent evaluation (UASG030A), conducted by Standcore LLC, has expanded testing ofUASG...

Queues with Small Advice
From My Biased Coin

Queues with Small Advice

I have had papers rejected, with comments of the form that the results seem too easy, and are at the level of a homework assignment.  Generally, I think these reviewers...

Cobolt Strike Vulnerability Affects Botnet Servers
From Schneier on Security

Cobolt Strike Vulnerability Affects Botnet Servers

Cobolt Strike is a security tool, used by penetration testers to simulate network attackers. But it’s also used by attackers — from criminals to governments — to...

Apple Adds a Backdoor to iMesssage and iCloud Storage
From Schneier on Security

Apple Adds a Backdoor to iMesssage and iCloud Storage

Apple’s announcement that it’s going to start scanning photos for child abuse material is a big deal. I have been following the details, and discussing it in several...

DOE to Fund $37M to Small Businesses for Climate, Energy and Scientific R&D
From insideHPC

DOE to Fund $37M to Small Businesses for Climate, Energy and Scientific R&D

The U.S. Department of Energy (DOE) today announced a plan to provide $37 million for small businesses pursuing climate and energy research and development (R&D)...

NCSA’s Katz Named Steering Committee Chair of Research Software Alliance
From insideHPC

NCSA’s Katz Named Steering Committee Chair of Research Software Alliance

ReSA, the Research Software Alliance has named as its inaugural Steering Committee chair Daniel S. Katz, chief scientist at the National Center for Supercomputing...

Deere for Autonomous Agriculture
From The Eponymous Pickle

Deere for Autonomous Agriculture

Deere connection could push Farm, agriculture use of roboticsJohn Deere Doubles Down on Silicon Valley and Robots   By WiredJohn Deere recently announced that it...

Open Searches for NSF CISE Division Directors
From The Computing Community Consortium Blog

Open Searches for NSF CISE Division Directors

The following is a letter to the community from Margaret Martonosi (Assistant Director) of the National Science Foundation (NSF) Directorate of Computer & Information...

Fake news and conspiracy theories as an evolutionary strategy
From Putting People First

Fake news and conspiracy theories as an evolutionary strategy

Danish social scientist Michael Bang Petersen illuminates the evolutionary foundations and social processes involved in the spread of outright falsehoods.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account