acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

San Diego Supercomputing
From The Eponymous Pickle

San Diego Supercomputing

 Long ago we worked with UCSD group, in the Bio Modeling area.San Diego Supercomputer Center Helps Advance Computational Chemistry  By University of CaliforniaMIT's...

Brain Background Noise Useful
From The Eponymous Pickle

Brain Background Noise Useful

Recall this being brought up in some work we did in understanding reactions to stimuli.    We theorized that it was always useful to calculate the background, where...

Airlines to Ask Contact Information
From The Eponymous Pickle

Airlines to Ask Contact Information

Expected, likely useful.  A firm requirement?   Will it get the usual pushback on privacy?Airlines plan to ask passengers for contact-tracing detailsIn this Thursday...

Restoring Notre-Dame with VR
From The Eponymous Pickle

Restoring Notre-Dame with VR

Very impressive imagery on current state and progress of Notre-Dame Damage and restoration. Certainly a model for future work of this kind.  Includes video describing...

Homomorphic Standards, Sample Efforts
From The Eponymous Pickle

Homomorphic Standards, Sample Efforts

Very useful piece with links to alternate standards and company efforts underway.  Much more at the linkHomomorphic Encryption StandardizationAn Open Industry /...

Summit and Theta Supercomputers Power ML Models for Fusion Energy Research
From insideHPC

Summit and Theta Supercomputers Power ML Models for Fusion Energy Research

A team led by C.S. Chang at Princeton Plasma Physics Laboratory (PPPL) has used the Oak Ridge Leadership Computing Facility’s (OLCF’s) 200-petaflop Summit and Argonne...

Fine Tuning Vendor Risk Management
From The Eponymous Pickle

Fine Tuning Vendor Risk Management

Crucial these days. How to Fine-Tune Vendor Risk Management in a Virtual World  in Dark Reading by Ryan Smyth & Spencer MacDonald Managing Director / Director,Without...

Self Organizing Textiles from Cellular Automata
From The Eponymous Pickle

Self Organizing Textiles from Cellular Automata

Always an interest here, rarely applied.Cellular AutomataSelf-Organising Textures    in Distill.Neural Cellular Automata Model of Pattern FormationNeural Cellular...

HPC Buyers Guide
From insideHPC

HPC Buyers Guide

This ebook from our friends over at Rescale, shows that by adopting a platform solution and retiring the fixed capacity, on-premises infrastructure model, companies...

GIGABYTE Releases 2U Server: G262-ZR0 with NVIDIA HGX A100 4-GPU
From insideHPC

GIGABYTE Releases 2U Server: G262-ZR0 with NVIDIA HGX A100 4-GPU

Taipei, Taiwan, February 19th 2020 – GIGABYTE Technology, (TWSE: 2376), maker of high-performance servers and workstations, today announced the G262-ZR0 for HPC...

Intersect360 Research Announces HPC/AI Technology Trends Webinar
From insideHPC

Intersect360 Research Announces HPC/AI Technology Trends Webinar

SUNNYVALE, CA—February 18, 2021— HPC and hyperscale analyst firm Intersect360 Research will present its latest research and insights on technology trends in the...

The ENIAC Turns 75
From The Eponymous Pickle

The ENIAC Turns 75

 I used to walk past the site of the ENIAC lab on the way to class at the U of Pa, and even got a tour of the space once.  Impressive, ENIAC Turns 75  By Samuel...

From Gödel's Lost Letter and P=NP

Computing’s Role In The Pandemic

How can we help? Joe Biden is the 46th president of the USA. Note is called a centered triangular number. These numbers obey the formula: and start with The previous...

From Gödel's Lost Letter and P=NP

Computing’s Role In The Pandemic

How can we help? Joe Biden is the 46th president of the USA. Note is called a centered triangular number. These numbers obey the formula: and start with The previous...

Detecting Object Permanence and more
From The Eponymous Pickle

Detecting Object Permanence and more

Reinforcement learning problem. Learning like children do.AI Agents Learned Object Permanence by Playing Hide and SeekBy IEEE Spectrum  February 17, 2021Researchers...

On Chinese-Owned Technology Platforms
From Schneier on Security

On Chinese-Owned Technology Platforms

I am a co-author on a report published by the Hoover Institution: “Chinese Technology Platforms Operating in the United States.” From a blog post: The report suggests...

Twelve-Year-Old Vulnerability Found in Windows Defender
From Schneier on Security

Twelve-Year-Old Vulnerability Found in Windows Defender

Researchers found, and Microsoft has patched, a vulnerability in Windows Defender that has been around for twelve years. There is no evidence that anyone has used...

Dependency Confusion: Another Supply-Chain Vulnerability
From Schneier on Security

Dependency Confusion: Another Supply-Chain Vulnerability

Alex Birsan writes about being able to install malware into proprietary corporate software by naming the code files to be identical to internal corporate code files...

GPS Vulnerabilities
From Schneier on Security

GPS Vulnerabilities

Really good op-ed in the New York Times about how vulnerable the GPS system is to interference, spoofing, and jamming — and potential alternatives. The 2018 National...

Router Security
From Schneier on Security

Router Security

This report is six months old, and I don’t know anything about the organization that produced it, but it has some alarming data about router security. Conclusion...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account