acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Iceotope in OEM Agreement with HPE for Liquid Cooling at the Edge
From insideHPC

Iceotope in OEM Agreement with HPE for Liquid Cooling at the Edge

Sheffield, UK – Iceotope Technologies Ltd., an immersion cooling company, has announced an OEM agreement with Hewlett Packard Enterprise (HPE) to offer its liquid...

Celebrating Technology Leaders – Tech Returnships for Women
From ACM-W supporting, celebrating and advocating for Women in Computing

Celebrating Technology Leaders – Tech Returnships for Women

Wednesday, August 18th at 3:00 PM ET/12:00 PM PT,  a panel discussion featuring Kristi Lamar: Managing Director | Monitor DeloitteMaryam Shabbir: Business Development...

Origami Comes to Robotic Life
From The Eponymous Pickle

Origami Comes to Robotic Life

Soft animated modeling built in origami.Origami Comes to Life with Shape-Changing MaterialsUniversity of Colorado Boulder, Daniel Strain, July 20, 2021University...

From Computational Complexity

I wish problems I have with computers really were my fault

 As you know, the website for out for a few days, as Lance explained here.When I first could not get to the this blog  my thought wasOH, I must have changed some...

DeepMind Releases Accurate Picture of Human Proteome
From The Eponymous Pickle

DeepMind Releases Accurate Picture of Human Proteome

Was briefly involved in a discussion of protein folding structure prediction, so have an appreciation of the complexity the  Have been told this is a very big deal...

Non Fungible Tokens
From The Eponymous Pickle

Non Fungible Tokens

I heard about NFTs perhaps a year ago.  Someone I know was pushing investment in them.  NFT's are blockchain style encrypted 'tags' for unique digital things. https...

Hiding Malware in Artificial Neurons
From The Eponymous Pickle

Hiding Malware in Artificial Neurons

 My areas of interest have always included machine learning, neural networks, steganography and security.    So I read this in interest. Not sure how it would work...

Real Time  AI
From The Eponymous Pickle

Real Time AI

Thinking this. CoCoPIE: Enabling Real-Time AI on Off-the-Shelf Mobile Devices via Compression-Compilation Co-Design   By Hui Guan, Shaoshan Liu, Xiaolong Ma, Wei...

Power Shift to Employees?
From The Eponymous Pickle

Power Shift to Employees?

Tech Pay Survey Shows Power Shift to Employees, By The Information, July 23, 2021The technology-business boom is giving white-collar workers more leverage withAt...

Which Companies are Transforming Work?
From The Eponymous Pickle

Which Companies are Transforming Work?

Useful thoughts.    What have we really transformed to? Readers Ask: Which Companies Are Transforming Work?   by Kristen Senz  in HBSWKJoseph Fuller answers readers'...

Videos online of “Humanizing technology through design” conference
From Putting People First

Videos online of “Humanizing technology through design” conference

Curated by Experientia partner Jan-Christoph Zoels and Sara Fortunati, director of the Torino Circle of Design, the conference dealt with the best international...

Securing Industrial Operations at Scale
From The Eponymous Pickle

Securing Industrial Operations at Scale

Essential.Now is the time to secure industrial operations at scale!   Internet of Things (IoT)  By Fabien Maisl   in Cisco.Cyber attacks to industrial organizations...

Understanding Behavior and What May Happen Next
From The Eponymous Pickle

Understanding Behavior and What May Happen Next

It is  good to know what is going to happen next.  Prediction though can be hard.Metropolis Spotlight: Viisights Uses AI to Understand Behavior and Predict What...

Total Artificial Heart Implanted
From The Eponymous Pickle

Total Artificial Heart Implanted

 Seems quite a considerable coup. Total Artificial Heart Successfully Transplanted in U.S.By Interesting Engineering, July 23, 2021Duke University Hospital surgeons...

Inside the Industry that Unmasks People at Scale
From The Eponymous Pickle

Inside the Industry that Unmasks People at Scale

Article on this brought to my attention by Bruce Schneier  ... Inside the Industry that Unmasks People at ScaleUnique IDs linked to phones are supposed to be anonymous...

5G Telemedicine and the Military
From The Eponymous Pickle

5G Telemedicine and the Military

Brought to my attention by Walter Riker.  Will ask for more comment from the VA, sure it is being looked at. Telemedicine with 5G could be a gamechanger for military...

From Computational Complexity

Technical Difficulties

After returning from vacation last weekend (hello North Dakota--my 49th state visited), all sorts of odd problems arose. This blog stopped working, a P v NP paper...

Disrupting Ransomware by Disrupting Bitcoin
From Schneier on Security

Disrupting Ransomware by Disrupting Bitcoin

Ransomware isn’t new; the idea dates back to 1986 with the “Brain” computer virus. Now, it’s become the criminal business model of the internet for two reasons....

Scaling AI
From The Eponymous Pickle

Scaling AI

Good thoughts, intro below.Scaling AI and data science – 10 smart ways to move from pilot to productionVB Staff by Venturebeat,  Presented by Intel“Fantastic! How...

Is Programming Theory a Waste of Time?
From The Eponymous Pickle

Is Programming Theory a Waste of Time?

Gave me a reminder of what PT was:  Its the theoretical introduction to coding,  and  not ONLY the specific, in context how-to of using a particular coding method...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account