acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Emotions to Drive Autonomous Vehicles?
From The Eponymous Pickle

Emotions to Drive Autonomous Vehicles?

Some interesting things have come out of FAU, we participated.   Here another.  But can human emotions be use to autonomously drive?  Even in part? Test it well...

Synthetic Biology
From The Eponymous Pickle

Synthetic Biology

Touched on Synthetic Biology way back, though it never was used directly in the enterprise.  Apparently reemerging.  A revisit to something that is apparently reemerging...

AI Protecting Privacy
From The Eponymous Pickle

AI Protecting Privacy

 AI as a contra method for privacy loss.AI Technology Protects PrivacyTechnical University of Munich (Germany)May 24, 2021Technology developed by researchers at...

Tracking Missing Packages with AI
From The Eponymous Pickle

Tracking Missing Packages with AI

Good to see USPS in on this.USPS Uses Edge AI Apps to Help Track Down Missing Packages Faster  By FedTech MagazineIf your package gets lost in the mail, artificial...

Argonne and Oak Ridge Award Codeplay Software to Strengthen SYCL Support
From insideHPC

Argonne and Oak Ridge Award Codeplay Software to Strengthen SYCL Support

Argonne National Laboratory (Argonne) in collaboration with Oak Ridge National Laboratory (ORNL), has awarded Codeplay a contract implementing the oneAPI DPC++Argonne...

Google's Method For Software Supply Chain Attacks
From The Eponymous Pickle

Google's Method For Software Supply Chain Attacks

 Quite interesting  ...  a  'Software Supply Chain Attack', is inserting some malware during its creation, transport or inclusion in some system. Google dishes ...

Differences Between Simulation and Digital Twins
From The Eponymous Pickle

Differences Between Simulation and Digital Twins

Interesting.  Have done lots of Monte Carlo style simulation modeling, much less using digital twins.   Is this a good description?  For what contexts? .  We also...

Honeywell Quantum Spinoff
From The Eponymous Pickle

Honeywell Quantum Spinoff

More quantum spin offs and directions.   Here Honeywell is involved.Honeywell to Spin Off Quantum Unit in Merger With Software Firm  By Thomas BlackJune 8, 2021...

Peloton Vulnerability Found and Fixed
From Schneier on Security

Peloton Vulnerability Found and Fixed

Researchers have discovered a vulnerability in Peloton stationary bicycles, one that would give the attacker complete control over the device. The attack requires...

Autonomous Supply Chains run by Smart Contracts?
From The Eponymous Pickle

Autonomous Supply Chains run by Smart Contracts?

Fascinating thought.  How would the 'contracts' be written to adapt to the autonomous aspects of the system?The Age of Autonomous Supply Chains  by Paul Brody, ...

Intentional Flaw in GPRS Encryption Algorithm GEA-1
From Schneier on Security

Intentional Flaw in GPRS Encryption Algorithm GEA-1

General Packet Radio Service (GPRS) is a mobile data standard that was widely used in the early 2000s. The first encryption algorithm for that standard was GEA-1...

Waymo Drives Autonomous Trucks
From The Eponymous Pickle

Waymo Drives Autonomous Trucks

Will include a trained driver and technician, at least at first.Self-Driving Waymo Trucks to Haul Loads Between Houston, Fort Worth  By Ars TechnicaWaymo and trucking...

Lenovo Expands HPC System at Leibniz Supercomputer Center
From insideHPC

Lenovo Expands HPC System at Leibniz Supercomputer Center

Research Triangle Park, NC – Lenovo Infrastructure Solutions Group, Intel and the Leibniz Supercomputing Center (LRZ) of the Bavarian Academy of Sciences and Humanities...

Sleuthing Crypto Ransom Payments?
From The Eponymous Pickle

Sleuthing Crypto Ransom Payments?

Found this most interesting.   Very  technical look at the approach. Includes all the Wolfram code. reviewing now.  Could this be further developed?  Makes me think...

Advances in 3D Implant Construction
From The Eponymous Pickle

Advances in 3D Implant Construction

Technique Breaks the Mold for 3D-Printing Medical ImplantsRoyal Melbourne Institute of Technology (Australia)By Gosia KaszubskaThe development of three-dimensionally...

Preparing for Exascale: Aurora Software Development – Packaging and Early Hardware
From insideHPC

Preparing for Exascale: Aurora Software Development – Packaging and Early Hardware

By coordinating efforts to improve early exascale hardware stability at the Argonne Leadership Computing Facility (ALCF), computer scientist Servesh Muralidharan...

From Computational Complexity

Benny Chor (1956-2021)

Benny Chor passed away on June 10, 2021. Luca Trevisan had a blog post on the news.We present a guest post on Benny Chor's life and works by Oded Goldreich. The...

Making Sense of Contradictory Science Results
From The Eponymous Pickle

Making Sense of Contradictory Science Results

How do we make make sense of contradictory results?How to Make Sense of Contradictory Science Papers  in Nautil.usPublished research is less about conclusions than...

Wheelchairs with Smarter Voice Controls
From The Eponymous Pickle

Wheelchairs with Smarter Voice Controls

Seems a very natural solution.  Especially for integrating with chair and smartphone and other aids. Incudes data important to data and operator.Permobil Connects...

Paul van Oorschot’s Computer Security and the Internet
From Schneier on Security

Paul van Oorschot’s Computer Security and the Internet

Paul van Oorschot’s webpage contains a complete copy of his book: Computer Security and the Internet: Tools and Jewels. It’s worth reading.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account