acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

June 2024


From insideHPC

Wave Photonics Secures £4.5M Investment Round

Wave Photonics Secures £4.5M Investment Round

June 20, 2024 — Wave Photonics, a Cambridge-based start-up, has received £4.5 million to develop on-chip photonics designs for quantum technologies, sensors, and data center applications. The UK Innovation & Science Seed Fund…


From insideHPC

IQM Quantum Opens Data Center in Germany

IQM Quantum Opens Data Center in Germany

Munich, 21st June 2024 – IQM Quantum Computers today announced the opening of its first quantum data center in Munich to support industry applications, with plans to place up to 12 quantum computers in the data center that, at…


From CS4FN (Computer Science For Fun)

Coordinate conundrum puzzles and vector graphics

Coordinate conundrum puzzles and vector graphics

by Paul Curzon, Queen Mary University of London One way computers store images is as a set of points (as coordinates) that make up lines and shapes. This is the basis for the kind of computer graphics called Vector Graphics.Continue…


From Daniel Lemire's Blog

Validating gigabytes of Unicode strings per second… in C#?

Validating gigabytes of Unicode strings per second… in C#?

We have been working on a fast library to validate and transcode Unicode and other formats such as base64 in C++: simdutf. We wondered: could we achieve the same good results in C#? Microsoft’s .NET framework has made great strides…


From insideHPC

Classiq Teams with BMW Group and Nvidia for Quantum Applicability in Electrical Systems

Classiq Teams with BMW Group and Nvidia for Quantum Applicability in Electrical Systems

TEL AVIV | June 20, 2024 — Classiq today announced a collaboration with NVIDIA and the BMW Group to optimize mechatronic systems. The initiative is focused on solving a complex computational challenge to find the optimal architecture…


From insideHPC

WEKA Grows IP Portfolio to More Than 100 Patents 

WEKA Grows IP Portfolio to More Than 100 Patents 

CAMPBELL, Calif., June 20, 2024 – WekaIO, the AI-native data platform company, today announced its IP portfolio has been awarded more than 100 patents by the United States Patent and Trademark Office (USPTO). The company was …


From The Computing Community Consortium Blog

Robotics Meets Workforce Shortage

Robotics Meets Workforce Shortage

In recent years, industries have been struggling with a significant challenge: a shortage of skilled labor. This issue spans various fields, from manufacturing to healthcare, and is increased by factors such as demographic shifts…


From Computational Complexity

Luca Trevisan (1971-2024)

Complexity theorist Luca Trevisan lost his battle to cancer yesterday in Milan at the age of 52. A terrible loss for our community and our hearts go out to his family.  

The community will honor Trevisan's life and legacy 12:30…


From Schneier on Security

Recovering Public Keys from Signatures

Recovering Public Keys from Signatures

Interesting summary of various ways to derive the public key from digitally signed files.

Normally, with a signature scheme, you have the public key and want to know whether a given signature is valid. But what if we instead…


From CS4FN (Computer Science For Fun)

Aged 11-16? Share your views on Computing education in England.

Aged 11-16? Share your views on Computing education in England.

Deadline tomorrow for the Young People's Advisory Group on Computer Science - have your say on how computing is taught in England.


From Schneier on Security

New Blog Moderation Policy

New Blog Moderation Policy

There has been a lot of toxicity in the comments section of this blog. Recently, we’re having to delete more and more comments. Not just spam and off-topic comments, but also sniping and personal attacks. It’s gotten so bad that…


From insideHPC

ACM Announces Awards in AI, Graph Processing, OS Software and Internet Privacy

ACM Announces Awards in AI, Graph Processing, OS Software and Internet Privacy

New York, June 18, 2024 – ACM, the Association for Computing Machinery, today announced the recipients of four technical awards. They are: David Blei, Columbia University, receives the ACM – AAAI Allen Newell Award. Blei is recognized…


From Yoshua Bengio

The International Scientific Report on the Safety of Advanced AI

The International Scientific Report on the Safety of Advanced AI

In November 2023, I’ve been given the responsibility to chair the International Scientific Report on the Safety of Advanced AI as part of an international…

L’article The International Scientific Report on the Safety of Advanced…


From insideHPC

Pasqal Delivers 100+ Qubit Quantum Processing Unit to GENCI and CEA

Pasqal Delivers 100+ Qubit Quantum Processing Unit to GENCI and CEA

Paris, June 19, 2024 – A 100+ qubit quantum processing unit (QPU), acquired by GENCI (Grand Équipement National de Calcul Intensif), was delivered at TGCC, the CEA computing centre, the three organizations have announced. As …


From insideHPC

June 21 Call for Proposals Deadline for OCP Global Summit and Future Technologies Symposium

June 21 Call for Proposals Deadline for OCP Global Summit and Future Technologies Symposium

The 2024 OCP Global Summit (and co-located Future Technologies Symposium) call for proposals opened on May 13 and will close this Friday, June 21 at 5 pm PT. Click here for more information. The OCP Global Summit will take place…


From Computational Complexity

Rethinking Hueristica

I've argued that more and more we seem to live in an Optiland, a computational utopia where through recent developments in optimization and learning we can solve the NP-problems that come up in practice and yet cryptography remains…


From Schneier on Security

The Hacking of Culture and the Creation of Socio-Technical Debt

The Hacking of Culture and the Creation of Socio-Technical Debt

Culture is increasingly mediated through algorithms. These algorithms have splintered the organization of culture, a result of states and tech companies vying for influence over mass audiences. One byproduct of this splintering…


From insideHPC

Nvidia AI Computing by HPE Portfolio Announced for Generative AI

Nvidia AI Computing by HPE Portfolio Announced for Generative AI

On a day that Nvidia climbed over Microsoft as the most valuable U.S. company measured by stock valuation, Nvidia and Hewlett Packard Enterprise today announced Nvidia AI Computing by HPE, a portfolio of co-developed AI solutions…


From insideHPC

HPE and Danfoss Partner on Data Center Energy Consumption

HPE and Danfoss Partner on Data Center Energy Consumption

Las Vegas – June 18, 2024 –  Hewlett Packard Enterprise (NYSE: HPE) and Danfoss today announced a collaboration to deliver HPE IT Sustainability Services – Data Center Heat Recovery, an off-the shelf heat recovery module, helping…


From insideHPC

Penguin Solutions: OriginAI Expanded for AI Factory Deployments up to 16,000 GPUs

Penguin Solutions: OriginAI Expanded for AI Factory Deployments up to 16,000 GPUs

Penguin Solutions today announced the expansion of its OriginAI offering to include validated, pre-defined AI architectures incorporating NVIDIA technology. It includes Penguin’s cluster management software and managed services…


From CS4FN (Computer Science For Fun)

Like science & tech? Maybe thinking about careers in it? Come to our FREE online Science Festival on Monday (24th June)

Like science & tech? Maybe thinking about careers in it? Come to our FREE online Science Festival on Monday (24th June)

There's a free online science festival on Monday 24th for people interested in medical / dentistry careers but two of the talks are specifically about technology.


From Schneier on Security

Rethinking Democracy for the Age of AI

Rethinking Democracy for the Age of AI

There is a lot written about technology’s threats to democracy. Polarization. Artificial intelligence. The concentration of wealth and power. I have a more general story: The political and economic systems of governance that …


From The Computing Community Consortium Blog

Four Ways Robotics Can Alleviate Long-Term Challenges in the US

Four Ways Robotics Can Alleviate Long-Term Challenges in the US

The 2024 Robotics Roadmap, released on April 26, states that the United States, once a frontrunner in robotics innovation, now faces a critical juncture as it lags behind global counterparts in adoption and investment.  But there…


From insideHPC

HPC News Bytes 20240617: Controlling AI, Big Tech Invests in Taiwan, A Step for Specialty AI Chips, Alternative Energy for AI Data Centers, Apple Silicon

HPC News Bytes 20240617: Controlling AI, Big Tech Invests in Taiwan, A Step for Specialty AI Chips, Alternative Energy for AI Data Centers, Apple Silicon

A happy summer solstice week to you! The HPC-AI ecosystem produced a raft of news and insights over the past week, here’s a rapid (7:59) review: New paper in Science on controlling AI from an all-star lineup of strategists, Big…


From insideHPC

D-Wave Introduces Hybrid Quantum Solver

D-Wave Introduces Hybrid Quantum Solver

PALO ALTO, Calif. – June 17, 2024 – D-Wave Quantum Inc. (NYSE: QBTS) announced today at its Qubits 2024 user conference the launch of a new hybrid quantum solver for nonlinear programs, designed to enable customers to confront…


From insideHPC

Qumulo Announces Azure Native Qumulo Benchmark Results

Qumulo Announces Azure Native Qumulo Benchmark Results

SEATTLE – June 17, 2024 – At-scale data management company Qumulo announced what it said is the industry’s fastest and most cost-effective cloud-native storage solution, as demonstrated by the latest SPECstorage Solution 2020…


From Schneier on Security

Using LLMs to Exploit Vulnerabilities

Using LLMs to Exploit Vulnerabilities

Interesting research: “Teams of LLM Agents can Exploit Zero-Day Vulnerabilities.”

Abstract: LLM agents have become increasingly sophisticated, especially in the realm of cybersecurity. Researchers have shown that LLM agents …


From Computational Complexity

Should Prover and Verifier have been Pat and Vanna?

LANCE: I had my first Quanta Article published! I explore computation, complexity, randomness and learning and feeling the machine.

BILL: Feels to me like a mashup of old blog posts. Changing topics, I told Darling that you used…


From CS4FN (Computer Science For Fun)

Mary Ann Horton and the invention of email attachments

Mary Ann Horton and the invention of email attachments

Edie Schlain Windsor was a senior systems programmer at IBM. There is more to life than computing though. She led the landmark US Supreme Court Case that was a milestone for the rights of same-sex couples in the US.


From Schneier on Security

Friday Squid Blogging: Squid Cartoon

Friday Squid Blogging: Squid Cartoon

Squid humor.

As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.

Read my blog posting guidelines here.