The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.
C++ programmers tend to represent strings using the std::string class. Though the implementation might vary, each instance of an std::string might use 32 bytes. Though it is not a large amount of memory, it can add up. In the…
September 5, 2024, WASHINGTON, D.C. – The U.S. Department of Energy announced $68 million in funding for 11 AI for science multi-institution projects, comprising 43 awards lasting up to three years, with $20 million in Fiscal…
In 2018, Australia passed the Assistance and Access Act, which—among other things—gave the government the power to force companies to break their own encryption.
The Assistance and Access Act includes key components that outline…Someone once told me:
I was not surprised when Linear Programming was in P since it was already in \( NP \cap coNP \), and problems in that intersection tend to be in P.
The same thing happened for PRIMALITY.
However FACTORING…"A riveting story of what it means to be human in a world changed by artificial intelligence, revealing the perils and inequities of our growing reliance on automated decision-making"
by Daniel Gill, Queen Mary University of London Autism is a condition with many associated challenges, but for some people it presents some benefits. This distinction is greatly apparent in the workplace, where autistic people…
The first live video of the Promachoteuthis squid, filmed at a newly discovered seamount off the coast of Chile.
by Paul Curzon, Queen Mary University of London From the archive Autumn 1869. Undersea telecommunications cables let the world communicate and led to the world spanning Internet. It was all started by the Victorians. Continents…
Sept. 6, 2024 — AI cloud hyperscaler CoreWeave announced an integration with AI workload and GPU orchestration company Run:ai that the companies say is designed to offers AI enterprises and labs options for deployment of AI inference…
There is a side-channel attack against YubiKey access tokens that allows someone to clone a device. It’s a complicated attack, requiring the victim’s username and password, and physical access to their YubiKey—as well as some…
Sept. 5, 2024 — HPC-AI industry analyst firm Hyperion Research and the HPC User Forum announced that nominations are open for the 2024 HPC Innovation Excellence Award. Winners will be announced at the Hyperion Research AI/HPC…
DALLAS, Sept. 05, 2024 — Applied Digital Corporation, a builder of digital infrastructure designed for high performance computing applications, today announced it has entered into definitive agreements for a $160 million private…
HOUSTON – September 5, 2024 – Hewlett Packard Enterprise (NYSE: HPE) announces HPE Private Cloud AI is available to order and introduces new solution accelerators to automate and streamline artificial intelligence applications…
This Sunday’s NYTimes had an article on Eliyahu Rips who just just passed away at 75. He was an Israeli mathematician known for his research in geometric group theory. He had became known to the general public years ago following…
CCC spoke with one of its council members, Rachel Greenstadt about her work in trustworthy intelligent systems and her approach to this research through an interdisciplinary lens. What interests you about trustworthy intelligence…
Really interesting analysis of the American M-209 encryption device and its security.
Copenhagen – September 4th, 2024 – Nordic coloction HPC and AI service provider atNorth has announced plans to build its largest data center to date in Ølgod in Varde Denmark. The site, to be known as DEN02, will cater to colocation…
SAN JOSE and LAUREL, Md.– High performance storage and management company VDURA has announced a partnership with Jeskell Systems, a renowned IT modernization specialist with nearly two decades of experience serving Federal and…
Search application developers manage numerous tradeoffs, foremost the tradeoff between precision and recall. Precision measures the fraction of search results that are relevant, while recall measures the fraction of relevantUnfortunately…
Sept. 4, 2024 — Ten Energy Frontier Research Centers (EFRCs) designed to bring together teams of scientists for fundamental research have been funded in nine states by the U.S. Department of Energy. The projects are: A Center…
A quasipolynomial-time algorithm for a long standing open problem. Yes, we have two of them this decade.
Cristian Calude, Sanjay Jain, Bakhadyr Khoussainov, Wei Li and…The Community Computing Consortium (CCC) is engaging in a new visioning activity to craft a research agenda focused on how human-computer collaborations can solve some of the most pressing scientific problems through citizen…
This story seems straightforward. A city is the victim of a ransomware attack. They repeatedly lie to the media about the severity of the breach. A security researcher repeatedly proves their statements to be lies. The city gets…
The NSA’s “National Cryptographic School Television Catalogue” from 1991 lists about 600 COMSEC and SIGINT training videos.
There are a bunch explaining the operations of various cryptographic equipment, and a few code words…We sometimes have to work a large quantity of floating-point numbers. This volume can be detrimental to performance. Thus we often want to compress these numbers. Large-language models routinely do so. A sensible approach isContinue…
Happy Labor Day to you! From the world of HPC-AI, we offer a rapid (5:57) review of recent news, including: Nvidia and Blackwell push technology's limits, big AI inference numbers from Cerebras, the uncertainties of oncoming…
Interesting vulnerability:
…a special lane at airport security called Known Crewmember (KCM). KCM is a TSA program that allows pilots and flight attendants to bypass security screening, even when flying on domestic personal …There is a paper (see here for an article about the paper, the link to the paper itself is later) that claims to PROVE that, on average, the distance (for some definition of distance) between any two people is 6.
1) We've blogged…