acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Hospital Security Bug
From The Eponymous Pickle

Hospital Security Bug

 Seems a considerable issue, with broad ransomware target.  How many other targets like this exist? Security Bug Affects Nearly All Hospitals in North AmericaTechRadar...

China Tech Giants Driving Africa
From The Eponymous Pickle

China Tech Giants Driving Africa

Had seen other indications of this,Huawei, Kunlun and China’s tech giants drive a quiet revolution in Africa’s fintech with mobile payment apps and wallets   in...

The drive for privacy and the difficulty of achieving it in the digital age
From Putting People First

The drive for privacy and the difficulty of achieving it in the digital age

People care and act to manage their privacy, but face steep psychological and economic hurdles that make not just desired, but also desirable privacy nearly unattainable...

Joint Cyber Defense Collaborative
From The Eponymous Pickle

Joint Cyber Defense Collaborative

Given the destructive  results from ransomware and cyberattacks, makes much sense to combine efforts both governmental and private company here.  See the linksU...

Protect Against BlackMatter Ransomware Before It’s Offered
From The Eponymous Pickle

Protect Against BlackMatter Ransomware Before It’s Offered

 Somewhat unclear the breadth of what is being offered, but interesting. Protect Against BlackMatter Ransomware Before It’s OfferedInsikt GroupEditor’s Note: The...

From Computational Complexity

Combing two posts: Blankface (Scott Aa) and Is Science Slowing Down? (Scott Al)

(I also posted this to the Less Wrong Website. At least I tried to- I don't quite know if or when it will appear there as its my first post there.) Some papersblankfaces...

Cornell Platform Teaches Nonexperts to use Machine Learning
From The Eponymous Pickle

Cornell Platform Teaches Nonexperts to use Machine Learning

 Like to see this and it can control model implications.Platform Teaches Nonexperts to Use MLCornell Chronicle, Louis DiPietro, July 28, 2021An interactive machine...

Hearing a Cyberattack
From The Eponymous Pickle

Hearing a Cyberattack

Like the general idea: Do You Hear What I Hear? A Cyberattack.Carnegie Mellon University CyLab Security and Privacy InstituteDaniel Tkacik, July 30, 2021Carnegie...

No AI Tools to Catch Covid Worked?
From The Eponymous Pickle

No AI Tools to Catch Covid Worked?

Failures can be useful if you understand the reason why.  Did we learn nothing beyond that? And then, what was the why of not learning anything?Artificial intelligence...

Telling the Data's Story
From The Eponymous Pickle

Telling the Data's Story

 Good thoughts,  cant say we ever did this completely, would have been especially useful with the metadata, which tends to me less well understood.     In someData...

McKinsey on Hybrid Work
From The Eponymous Pickle

McKinsey on Hybrid Work

Talking Hybrid work.  Why, When, Measures and how much. It’s time for leaders to get real about hybrid  By Aaron De Smet, Bonnie Dowling, Mihir Mysore, and Angelika...

The Target of Malware
From The Eponymous Pickle

The Target of Malware

 Am a recent user of Discord, so this surprised me.  But it is a way to get inside quickly.   Also note Sophos Labs, new to me.   Here just the intro.Malware increasingly...

Future of AI is Generative
From The Eponymous Pickle

Future of AI is Generative

Looks to be a good talk, about to experience.THE HIVE THINK TANK LECTURE: THE FUTURE OF AI IS GENERATIVE NOT DISCRIMINATIVEOn May 26, 2021, Steve Omohundro gave...

Simulation and Causation Leading to Machine Learning
From The Eponymous Pickle

Simulation and Causation Leading to Machine Learning

Hmm quite a thought,   Want to see this broadly adapted and usefully applied.  Technical supporting papers.CausalCity: Introducing a high-fidelity simulation with...

Smart Contract Monitoring with Tenderly
From The Eponymous Pickle

Smart Contract Monitoring with Tenderly

Continue to look at how the aspect of a 'contract' can be integrated with code and logic.Ethereum smart contract monitoring platform Tenderly raises $15.3M   BY...

Deep Mind Will Release Structure of Every Protein
From The Eponymous Pickle

Deep Mind Will Release Structure of Every Protein

Mentioned this in a previous piece.  Here more detail from Technology Review.  Which covers implications further.DeepMind says it will release the structure ofThe...

Pocket Identity Revisit
From The Eponymous Pickle

Pocket Identity Revisit

Unless something like face identity fails, as mentioned here previously.The Identity in Everyone's Pocket   By Phil VachonCommunications of the ACM, January 2021...

Reaching Quantum Speed Limits
From The Eponymous Pickle

Reaching Quantum Speed Limits

Speed limits, but errors accounted for as well? JQI new to me.Information Transfer Protocol Reaches Quantum Speed Limit  By Joint Quantum InstituteJoint Quantum...

Business as Imagination Machine
From The Eponymous Pickle

Business as Imagination Machine

Links discovered in O'Reilly.     Turn Your Business Into 'The Imagination Machine'By Myles Suer | May 20, 2021  in CMSWireHow can businesses harness the collective...

Defeating Microsoft’s Trusted Platform Module
From Schneier on Security

Defeating Microsoft’s Trusted Platform Module

This is a really interesting story explaining how to defeat Microsoft’s TPM in 30 minutes — without having to solder anything to the motherboard. Researchers at...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account