acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Scramble for Post Quantum
From The Eponymous Pickle

Scramble for Post Quantum

Moving more rapidly than expected. The Scramble for Post-Quantum CryptographyBy Samuel Greengard ,  Commissioned by CACM StaffResearchers are working to counter...

Ring Door Bell Goes Radar
From The Eponymous Pickle

Ring Door Bell Goes Radar

Like some of the directions the doorbell tech is going,  getting to be quite common. Ring Video Doorbell Pro 2 uses radar for bird’s-eye view of front door activity...

Fending off Bitcoin Mining HPC Thieves – Idaho National Lab’s ‘Cryptojacking’ Detector
From insideHPC

Fending off Bitcoin Mining HPC Thieves – Idaho National Lab’s ‘Cryptojacking’ Detector

Demand for HPC resources from Bitcoin and other cryptocurrency miners has only increased with the recent explosion in the cryptocurrency’s price – up 65 percent...

Encoded Message in the Perseverance Mars Lander’s Parachute
From Schneier on Security

Encoded Message in the Perseverance Mars Lander’s Parachute

NASA made an oblique reference to a coded message in the color pattern of the Perseverance Mars Lander ‘s parachute. More information.

HPE to Build Research Supercomputer for Sweden’s KTH Royal Institute of Technology
From insideHPC

HPE to Build Research Supercomputer for Sweden’s KTH Royal Institute of Technology

HPE’s string of HPC contract wins has continued with the company’s announcement today that it’s building a supercomputer for KTH Royal Institute of Technology (KTH)...

You Need a Challenge Network
From The Eponymous Pickle

You Need a Challenge Network

 Good thought, agreed, always worked best when challenged. Why You Need a ‘Challenge Network’  in K@WIn the following excerpt from his new book, Think Again, Wharton...

Multiscale COVID-19 Virus Model Aided by HPC at TACC, PSC, Chicago Research Computer Center
From insideHPC

Multiscale COVID-19 Virus Model Aided by HPC at TACC, PSC, Chicago Research Computer Center

The Texas Advanced Computing Center has announced completion of what it said is the first complete, multiscale model of the SARS-CoV-2 virus, a project that leveraged...

Real-Time Marker-Less Motion Capture for Animals
From The Eponymous Pickle

Real-Time Marker-Less Motion Capture for Animals

Real time feedback for animal movement and posture. Real time Studies of animal Motion by Neural activity.By EPFL (Switzerland)Nik Papageorgiou, December 10, 2020...

Open Compute Project Foundation Announces the OCP Future Technologies Initiative
From insideHPC

Open Compute Project Foundation Announces the OCP Future Technologies Initiative

The Open Compute Project Foundation (OCP) has announced the formation of the OCP Future Technologies Initiative, a formal project within the Foundation whose mission...

NeoPhotonics 400G ZR Modules Support Extended Operation up to 80C Case Temperatures
From insideHPC

NeoPhotonics 400G ZR Modules Support Extended Operation up to 80C Case Temperatures

SAN JOSE — February 25, 2021 – NeoPhotonics Corporation (NYSE: NPTN), a leading developer of silicon photonics and advanced hybrid photonic integrated circuit-based...

Digitization of Creativity and the Maker Movement.
From The Eponymous Pickle

Digitization of Creativity and the Maker Movement.

A considerable piece.    In particular note the connection to the 'Maker Movement',  an approach we were introduced to as early as the 80s.  Of course 3D printing...

RSTOR Updates  Software Defined Cloud Platform for Hybrid, Multi-Cloud Infrastructures
From insideHPC

RSTOR Updates  Software Defined Cloud Platform for Hybrid, Multi-Cloud Infrastructures

SARATOGA, Calif. – Feb. 25, 2021 — RSTOR, a software defined cloud platform provider that enables enterprises to manage data across hybrid and multi-cloud infrastructures...

Chinese Hackers Stole an NSA Windows Exploit in 2014
From Schneier on Security

Chinese Hackers Stole an NSA Windows Exploit in 2014

Check Point has evidence that (probably government affiliated) Chinese hackers stole and cloned an NSA Windows hacking tool years before (probably government affiliated)...

National Security Risks of Late-Stage Capitalism
From Schneier on Security

National Security Risks of Late-Stage Capitalism

Early in 2020, cyberspace attackers apparently working for the Russian government compromised a piece of widely used network management software made by a company...

Free Virtual Workshop on Assessing and Improving AI Trustworthiness: Current Contexts, Potential Paths
From The Computing Community Consortium Blog

Free Virtual Workshop on Assessing and Improving AI Trustworthiness: Current Contexts, Potential Paths

On March 3-4 from 12:00 PM to 5:00 PM ET, the National Academies of Sciences, Engineering, and Medicine (NASEM) will convene “Assessing and Improving AI Trustworthiness...

AI Recodes Software
From The Eponymous Pickle

AI Recodes Software

Another intriguing application. AI Recodes Legacy Software to Operate on Modern PlatformsIBM's AI-based tools let engineers explore ways to extract value from legacy...

Friday Squid Blogging: Vampire Squid Fossil
From Schneier on Security

Friday Squid Blogging: Vampire Squid Fossil

A 30-million-year-old vampire squid fossil was found, lost, and then re-found in Hungary. As usual, you can also use this squid post to talk about the securityhere...

Friday Squid Blogging: On SQUIDS
From Schneier on Security

Friday Squid Blogging: On SQUIDS

A good tutorial: But we can go beyond the polarization of electrons and really leverage the electron waviness. By interleaving thin layers of superconducting and...

Knowledge Sharing Across Silos
From The Eponymous Pickle

Knowledge Sharing Across Silos

From the APQC Blog: Why Knowledge Sharing Across Siloes Is More Important in 2021Team-based collaboration got a huge boost in 2020However, we don’t seem the same...

How Should We Evaluate High School Teaching Records?
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

How Should We Evaluate High School Teaching Records?

Mark Guzdial posted several articles about evaluating the teaching records of undergraduate faculty. (Links below) They really got me thinking. Now evaluating secondary...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account