acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

From Gödel's Lost Letter and P=NP

Halting Is Poly-Time Quantum Provable

How does this intersect David Deutsch’s thoughts in 1985? Composite crop from homepages Zhengfeng Ji, Anand Natarajan, Thomas Vidick, John Wright, and Henry Yuen...

NSF’s Big Ideas
From The Computing Community Consortium Blog

NSF’s Big Ideas

The following is a letter to the community from Erwin Gianchandani (Acting Assistant Director) and JD Kundu (Acting Deputy Assistant Director) of the National Science...

Apply Now for ISC Travel Grant and Student Volunteer Programs
From insideHPC

Apply Now for ISC Travel Grant and Student Volunteer Programs

Early career researchers and university students are encouraged to take advantage of the ISC Travel Grant and the ISC Student Volunteer programs. The programs are...

Reducing the risk of blood clots by supercomputing turbulent flow
From insideHPC

Reducing the risk of blood clots by supercomputing turbulent flow

People with mechanical heart valves need blood thinners on a daily basis, because they have a higher risk of blood clots and stroke. With the help of the Piz Daint...

Jack Dongarra to Receive 2020 IEEE Computer Pioneer Award
From insideHPC

Jack Dongarra to Receive 2020 IEEE Computer Pioneer Award

Dr. Jack Dongarra from the University of Tennessee has been named to receive the IEEE Computer Society’s 2020 Computer Pioneer Award. "The award is given for significant...

Deep Learning State of the Art in 2020
From insideHPC

Deep Learning State of the Art in 2020

Lex Fridman gave this talk as part of the MIT Deep Learning series. "This lecture is on the most recent research and developments in deep learning, and hopes for...

Advanced simulation tools for Vortex Bladeless wind power
From insideHPC

Advanced simulation tools for Vortex Bladeless wind power

Vortex Bladeless presented the company’s design for a new wind energy technology. One of the key characteristics of this system is the reduction of mechanical elements...

Digital Twins and Innovation
From The Eponymous Pickle

Digital Twins and Innovation

Not sure I quite agree with the premise.  These are simulations,  and we often in practice we fed them with data from real operations.     Such simulations were...

Future of Computer Tech?
From The Eponymous Pickle

Future of Computer Tech?

Points again to the 'Brain as a computing model' conundrum.   We have lots of brains we can study, observe, dissect.   But we still don't know their operational...

Why do People Buy Products Unrelated to Search?
From The Eponymous Pickle

Why do People Buy Products Unrelated to Search?

In Amazon/Science an interesting study.Why do customers buy seemingly irrelevant products?Analysis points to better algorithms for product discovery.By Liane Lewin...

Critical Windows Vulnerability Discovered by NSA
From Schneier on Security

Critical Windows Vulnerability Discovered by NSA

Yesterday's Microsoft Windows patches included a fix for a critical vulnerability in the system's crypto library. A spoofing vulnerability exists in the way Windows...

Notices that you are Being Tracked Offline
From The Eponymous Pickle

Notices that you are Being Tracked Offline

A space we spend much time exploring.    But as in all related spaces, how much attention will people play to this new fine print?Now Stores Must Tell You How They're...

Google Turns IPhones into Security Keys
From The Eponymous Pickle

Google Turns IPhones into Security Keys

Nice approach.    What not have this done in al the common forms of phones.   Isn't any phone a unique 'key'?Google turns iPhones into 2FA security keys — goodPaul...

How the Internet Spans the Globe
From The Eponymous Pickle

How the Internet Spans the Globe

Part of the power of the internet was the fact that there were multiple ways to get from A to B,   but this article makes it seem more vulnerable.  The stats are...

From Computational Complexity

Quantum Provers to Infinity and Beyond

The Internets are buzzing about the new paper MIP* = RE by Zhengfeng Ji, Anand Natarajan, Thomas Vidick, John Wright and Henry Yuan. See posts by Scott, Boaz, not...

ITCS 2020, Reflections
From My Biased Coin

ITCS 2020, Reflections

I've spent Sunday/Monday at ITCS, or Innovations in Theoretical Computer Science, where I am giving a talk on this paper on Scheduling with Prediction and the Price...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I'm speaking at Indiana University Bloomington on January 30, 2020. I'll be at RSA Conference...

P&G Reveals Toothbrush with Alexa Speaker
From The Eponymous Pickle

P&G Reveals Toothbrush with Alexa Speaker

If you wondered what a toothbrush would say to you.P&G unveils $230 toothbrush with Alexa speakerProcter & Gamble Co. plans to begin selling a $230 electric toothbrush...

White House Proposes U.S. AI Regulatory Principles
From The Computing Community Consortium Blog

White House Proposes U.S. AI Regulatory Principles

The following is a recent press release from the White House Office of Science and Technology Policy. They proposed 10 principles to guide federal regulation of...

Oracle Ebook
From The Eponymous Pickle

Oracle Ebook

Just taking a look at this:Ebook via RetailwireBuilding Your Business Around Your Customers, Not ChannelsHow to Calculate the Real Cost of an Ecommerce Solution...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account