acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Atos Launches Digital Collaboration Initiative: ‘Atos Digital Hub’
From insideHPC

Atos Launches Digital Collaboration Initiative: ‘Atos Digital Hub’

Paris, July 7, 2021 – At its annual “Atos Technology Days” event, Atos today announced an initiative, “Atos Digital Hub,” whose primary objective is to the building...

NVIDIA Pretrained Models
From The Eponymous Pickle

NVIDIA Pretrained Models

Elements of Pretrained models.  Have not used this approach before, worth understanding its application. Jun 24, 2021Fast-Track Production AI with Pretrained Models...

From Computational Complexity

Would you take this bet (Part 1) ?

 I am going to present a well known paradox (I didn't know it until last week, but the source I read said it was well known) and ask your opinion in this post,...

Oxford Quantum Circuits Claims UK’s First Quantum Computing as-a-Service
From insideHPC

Oxford Quantum Circuits Claims UK’s First Quantum Computing as-a-Service

Startup Oxford Quantum Circuits (OQC) has launched what it said is the UK’s first commercially available quantum computing-as-a-Service. OQC said its proprietary...

Which VPN are Secure?
From The Eponymous Pickle

Which VPN are Secure?

Useful look provided.  Who do we trust?Which VPN Providers Really Take Privacy Seriously in 2021?June 14, 2021 by Ernesto Van der Sar  in TorrentfreakHOME > TECHNOLOGY...

Visions in Theoretical Computer Science Workshop Report: A Report on the TCS Visioning Workshop 2020
From The Computing Community Consortium Blog

Visions in Theoretical Computer Science Workshop Report: A Report on the TCS Visioning Workshop 2020

Roughly every ten years the Theoretical Computer Science (TCS) community comes together for a visioning workshop to discuss recent accomplishments and new challenges...

insideHPC Guide to HPC Fusion Computing Model – A Reference Architecture for Liberating Data (Part 3)
From insideHPC

insideHPC Guide to HPC Fusion Computing Model – A Reference Architecture for Liberating Data (Part 3)

This insideHPC technology guide, “insideHPC Guide to HPC Fusion Computing Model – A Reference Architecture for Liberating Data,” discusses how organizations need...

Indoor Spy Drones:  Always Home Cam
From The Eponymous Pickle

Indoor Spy Drones: Always Home Cam

Not quite understanding this, except for unusual purposes, say maybe recording meetings or filming demonstrations?   There are lots of people filming things onRing's...

Data and Analytics for Better Decisions
From The Eponymous Pickle

Data and Analytics for Better Decisions

From MIT Sloan, SAS, some thoughts on decisions for analytics.  I link to items I have read and liked.  All accessible from top link.Data and Analytics for Better...

DARPA Announces Research Teams to Develop Intelligent Event-Based Imagers
From insideHPC

DARPA Announces Research Teams to Develop Intelligent Event-Based Imagers

July 2, 2021 — DARPA today announced that three teams of researchers led by Raytheon, BAE Systems, and Northrop Grumman have been selected to develop event-based...

Vulnerability in the Kaspersky Password Manager
From Schneier on Security

Vulnerability in the Kaspersky Password Manager

A vulnerability (just patched) in the random number generator used in the Kaspersky Password Manager resulted in easily guessable passwords: The password generator...

AI Battling Retail Out-Of-Stocks
From The Eponymous Pickle

AI Battling Retail Out-Of-Stocks

I recall a related  approach suggested in the enterprise, but the right kind of data lacking,  then the right data applied.  Sounds like a fix found here?  Can ...

The role of UX: 2020 benchmark study report and analysis
From Putting People First

The role of UX: 2020 benchmark study report and analysis

UXmatters and the UX research consultancy User Fountain recently teamed up to survey UX professionals around the world on the role of User Experience within their...

Retailwire Research on Retail Digital Transformation.
From The Eponymous Pickle

Retailwire Research on Retail Digital Transformation.

Always interesting regarding retail research activities.Retailwire: Research    https://www.retailwire.com/  Our recently released study, "The Beating Heart ofSee...

Cloud Computing Under Attack
From The Eponymous Pickle

Cloud Computing Under Attack

Thoughts on vulnerability of the cloud. Russia’s Hacking Success Shows How Vulnerable the Cloud IsThe cloud is everywhere. It’s critical to computing. And it’sBy...

Stealing Xbox Codes
From Schneier on Security

Stealing Xbox Codes

Detailed story of Volodymyr Kvashuk, a Microsoft insider who noticed a bug in the company’s internal systems that allowed him to create unlimited Xbox gift cards...

Channeling the Inner Voice of Robots
From The Eponymous Pickle

Channeling the Inner Voice of Robots

Like consciousness or a cognitive infrastructure that feeds into our decisions and broad behavior like a consciousness?     If it produces better measure of decisions...

What is Slam?
From The Eponymous Pickle

What is Slam?

Below just an outline, but something I am investigating,  detail the link.The definitive guide to SLAM & mobile mappingSLAM 101   ....  How does SLAM work  .......

Mondelez Does Low-Code, No-Code Development
From The Eponymous Pickle

Mondelez Does Low-Code, No-Code Development

I think this is ultimately the approach we will be taking.   Not quite here yet, but it will be too risky to have individual developers do most coding work. Mondelez...

FBI Running  Encrypted Phones
From The Eponymous Pickle

FBI Running Encrypted Phones

Bruce Schneier posted about the FBI effort to create an encrypted phone App.  And makes interesting points about trust and security.    Just read, worth considering...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account