acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Protect Against BlackMatter Ransomware Before It’s Offered
From The Eponymous Pickle

Protect Against BlackMatter Ransomware Before It’s Offered

 Somewhat unclear the breadth of what is being offered, but interesting. Protect Against BlackMatter Ransomware Before It’s OfferedInsikt GroupEditor’s Note: The...

From Computational Complexity

Combing two posts: Blankface (Scott Aa) and Is Science Slowing Down? (Scott Al)

(I also posted this to the Less Wrong Website. At least I tried to- I don't quite know if or when it will appear there as its my first post there.) Some papersblankfaces...

Cornell Platform Teaches Nonexperts to use Machine Learning
From The Eponymous Pickle

Cornell Platform Teaches Nonexperts to use Machine Learning

 Like to see this and it can control model implications.Platform Teaches Nonexperts to Use MLCornell Chronicle, Louis DiPietro, July 28, 2021An interactive machine...

Hearing a Cyberattack
From The Eponymous Pickle

Hearing a Cyberattack

Like the general idea: Do You Hear What I Hear? A Cyberattack.Carnegie Mellon University CyLab Security and Privacy InstituteDaniel Tkacik, July 30, 2021Carnegie...

No AI Tools to Catch Covid Worked?
From The Eponymous Pickle

No AI Tools to Catch Covid Worked?

Failures can be useful if you understand the reason why.  Did we learn nothing beyond that? And then, what was the why of not learning anything?Artificial intelligence...

Telling the Data's Story
From The Eponymous Pickle

Telling the Data's Story

 Good thoughts,  cant say we ever did this completely, would have been especially useful with the metadata, which tends to me less well understood.     In someData...

McKinsey on Hybrid Work
From The Eponymous Pickle

McKinsey on Hybrid Work

Talking Hybrid work.  Why, When, Measures and how much. It’s time for leaders to get real about hybrid  By Aaron De Smet, Bonnie Dowling, Mihir Mysore, and Angelika...

The Target of Malware
From The Eponymous Pickle

The Target of Malware

 Am a recent user of Discord, so this surprised me.  But it is a way to get inside quickly.   Also note Sophos Labs, new to me.   Here just the intro.Malware increasingly...

Future of AI is Generative
From The Eponymous Pickle

Future of AI is Generative

Looks to be a good talk, about to experience.THE HIVE THINK TANK LECTURE: THE FUTURE OF AI IS GENERATIVE NOT DISCRIMINATIVEOn May 26, 2021, Steve Omohundro gave...

Simulation and Causation Leading to Machine Learning
From The Eponymous Pickle

Simulation and Causation Leading to Machine Learning

Hmm quite a thought,   Want to see this broadly adapted and usefully applied.  Technical supporting papers.CausalCity: Introducing a high-fidelity simulation with...

Smart Contract Monitoring with Tenderly
From The Eponymous Pickle

Smart Contract Monitoring with Tenderly

Continue to look at how the aspect of a 'contract' can be integrated with code and logic.Ethereum smart contract monitoring platform Tenderly raises $15.3M   BY...

Deep Mind Will Release Structure of Every Protein
From The Eponymous Pickle

Deep Mind Will Release Structure of Every Protein

Mentioned this in a previous piece.  Here more detail from Technology Review.  Which covers implications further.DeepMind says it will release the structure ofThe...

Pocket Identity Revisit
From The Eponymous Pickle

Pocket Identity Revisit

Unless something like face identity fails, as mentioned here previously.The Identity in Everyone's Pocket   By Phil VachonCommunications of the ACM, January 2021...

Reaching Quantum Speed Limits
From The Eponymous Pickle

Reaching Quantum Speed Limits

Speed limits, but errors accounted for as well? JQI new to me.Information Transfer Protocol Reaches Quantum Speed Limit  By Joint Quantum InstituteJoint Quantum...

Business as Imagination Machine
From The Eponymous Pickle

Business as Imagination Machine

Links discovered in O'Reilly.     Turn Your Business Into 'The Imagination Machine'By Myles Suer | May 20, 2021  in CMSWireHow can businesses harness the collective...

Defeating Microsoft’s Trusted Platform Module
From Schneier on Security

Defeating Microsoft’s Trusted Platform Module

This is a really interesting story explaining how to defeat Microsoft’s TPM in 30 minutes — without having to solder anything to the motherboard. Researchers at...

Squid Dog Toy
From Schneier on Security

Squid Dog Toy

It’s sold out, but the pictures are cute. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read...

Shopic Carts Get More Funding
From The Eponymous Pickle

Shopic Carts Get More Funding

 We tested a number of such Smart Cart Ideas.  Lost most interest in the 90s.  Now with Amazon trying related ideas.  Have just recently gained some traction. AI...

New York Power Authority Turn to ALCF’s Theta Supercomputer for Climate Change Planning
From insideHPC

New York Power Authority Turn to ALCF’s Theta Supercomputer for Climate Change Planning

The largest state public power entity in the U.S., the New York Power Authority (NYPA), is addressing critical, long-term planning challenges by assessing how its...

L'Oreal Taking Cosmetics Digital, Virtual
From The Eponymous Pickle

L'Oreal Taking Cosmetics Digital, Virtual

Worked with a large Cosmetics Company, so of interestL’Oréal’s New Digital Chief Takes Cosmetics Virtual  By The Wall Street Journal, August 6, 2021L'Oréal Group's...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account