acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

GNU GCC does not round floating-point divisions to the nearest value
From Daniel Lemire's Blog

GNU GCC does not round floating-point divisions to the nearest value

I know that floating-point arithmetic is a bit crazy on modern computers. For example, floating-point numbers are not associative: 0.1+(0.2+0.3) == 0.599999999999999978...

Friday Squid Blogging: Fishing for Jumbo Squid
From Schneier on Security

Friday Squid Blogging: Fishing for Jumbo Squid

Interesting article on the rise of the jumbo squid industry as a result of climate change. As usual, you can also use this squid post to talk about the security...

Code as Evidence in Contracts, Disputes
From The Eponymous Pickle

Code as Evidence in Contracts, Disputes

A UK piece on the topic  of computing and dispute resolutions, code as evidence, which came up with respect to smart contracts.  Click through for useful and detailed...

Talk: Robots as a Service in a Post Pandemic World
From The Eponymous Pickle

Talk: Robots as a Service in a Post Pandemic World

I had mentioned this talk, here is the recording:Correspondent Jim Spohrer talks about robot tech in our pandemic futures.    ...ISSIP Speaker Series: COVID-19Speaker...

The Hyperion-insideHPC Interviews: Rich Brueckner Talks with Jack Collins about the Emergence of ‘HPC Everywhere’ and Its Impact on Science
From insideHPC

The Hyperion-insideHPC Interviews: Rich Brueckner Talks with Jack Collins about the Emergence of ‘HPC Everywhere’ and Its Impact on Science

HPC industry veteran Jack Collins, long-time fixture in the scientific supercomputing community, has seen it all in HPC, from the days when his input/output device...

Why Your AI Project May Fail
From The Eponymous Pickle

Why Your AI Project May Fail

This is true, if you don't have ready understanding/access into the local architecture, its much harder to get the data to train models in context.    And certainly...

Dash Shopping Wand to be Bricked
From The Eponymous Pickle

Dash Shopping Wand to be Bricked

As predicted, the Dash Wand has gone away.    I don't think I ever bought anything with it, just put it on a list to look at or buy later.    As noted below, they...

Let’s Talk Exascale: Forecasting Water Resources and Severe Weather with Greater Confidence
From insideHPC

Let’s Talk Exascale: Forecasting Water Resources and Severe Weather with Greater Confidence

In this episode of Let’s Talk Exascale, Mark Taylor of Sandia National Laboratories talks about using exascale supercomputers for severe weather and water resource...

The Unintended Harms of Cybersecurity
From Schneier on Security

The Unintended Harms of Cybersecurity

Interesting research: "Identifying Unintended Harms of Cybersecurity Countermeasures": Abstract: Well-meaning cybersecurity risk owners will deploy countermeasures...

Quantum Superiority: How Far Away?
From insideHPC

Quantum Superiority: How Far Away?

Some technologies, it’s said, are “always 10 years away” – we hear this in reference to autonomous vehicles and quantum computing. Of course, how far away we think...

Intel, NSF Name Winners of Wireless Machine Learning Research Funding
From insideHPC

Intel, NSF Name Winners of Wireless Machine Learning Research Funding

Intel and the National Science Foundation (NSF), joint funders of the Machine Learning for Wireless Networking Systems (MLWiNS) program, today announced recipients...

ACM SIGARCH BLOG: Highlights of 2020 Security Conferences for Computer Architects
From The Computing Community Consortium Blog

ACM SIGARCH BLOG: Highlights of 2020 Security Conferences for Computer Architects

While some in computing saw computing security as mostly a software issue, 2018’s Meltdown and Spectre publicized that security is a hardware issue as well. This...

Writing Code for a Paper :  A Note to Students
From My Biased Coin

Writing Code for a Paper : A Note to Students

This post both relates to some of the stuff I'll be presenting at Friday's STOC workshop on Algorithms with Predictions, but is also for future students in my classes...

Virtualitics June Newsletter
From The Eponymous Pickle

Virtualitics June Newsletter

I see that Virtualitics has a June Newsletter out, we helped test early beta versions.  I see you can now schedule a 30 day free immersive trial.  See my past experiences...

Amazon and Counterfeiting Crimes
From The Eponymous Pickle

Amazon and Counterfeiting Crimes

An area we also worked in, detecting counterfeits.  But then isn't this another cooperation with law enforcement?Amazon forms Counterfeit Crimes Unit to tackleThe...

Collaboration Moves to the Cloud in a Work-from-home World
From insideHPC

Collaboration Moves to the Cloud in a Work-from-home World

In this Sponsored Post, our friends over at Altair explain how remote access and cloud collaboration tools allow companies of all sizes to discover and innovate...

Polinating by Drone and Bubbles
From The Eponymous Pickle

Polinating by Drone and Bubbles

Fascinating detail.   As a long time part time botanist, of interest. But how well can it effectively being done?  Will the use of drones interfere with natural...

New Ways to Build Assistant Voice Apps
From The Eponymous Pickle

New Ways to Build Assistant Voice Apps

Look forward to the details on this, any way you can create better intelligence is good.   Note changes in training methods.Google Assistant Upgrades Action Developer...

Analyzing IoT Security Best Practices
From Schneier on Security

Analyzing IoT Security Best Practices

New research: "Best Practices for IoT Security: What Does That Even Mean?" by Christopher Bellman and Paul C. van Oorschot: Abstract: Best practices for Internet...

Getting Pay for Data
From The Eponymous Pickle

Getting Pay for Data

Another project with aim at paying users for their data.  Links to our long term data as an asset view.Andrew Yang Is Pushing Big Tech to Pay Users for DataBy The...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account