acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Call for CCC Council Member Nominations
From The Computing Community Consortium Blog

Call for CCC Council Member Nominations

Thank you to everyone who has nominated a colleague or nominated themselves for the opportunity to be a CCC Council member for the three-year term beginning July...

From Computational Complexity

The Fighting Temeraire

What does an 1838 painting tell us about technological change?A colleague and I decided to see how well LLMs could teach us a topic we knew nothing about. We picked...

AI Will Write Complex Laws
From Schneier on Security

AI Will Write Complex Laws

Artificial intelligence (AI) is writing law today. This has required no changes in legislative procedure or the rules of legislative bodies—all it takes is onelegislatures...

QuEra: Quantum Budgets to Grow by 20%
From insideHPC

QuEra: Quantum Budgets to Grow by 20%

Boston – January 22, 2025 – Research from neutral-atom quantum coputing company QuEra Computing indicates global budgets for quantum applications projected to rise...

White House Announces $500B AI Data Center Infrastructure Build-Out
From insideHPC

White House Announces $500B AI Data Center Infrastructure Build-Out

The Trump Administration ended its first full day of business with a major AI business announcement, that hundreds of billions of dollars – potentially trillions...

Liquid Cooling: Iceotope Names New CEO, Non-Executive Chairman
From insideHPC

Liquid Cooling: Iceotope Names New CEO, Non-Executive Chairman

San Francisco and Sheffield, UK – January 15, 2025 – Iceotope, a liquid cooling for AI systems company, today announced two leadership appointments designed toLiquid...

Seagate Introduces Hard Drive Capacities up to 36TB
From insideHPC

Seagate Introduces Hard Drive Capacities up to 36TB

FREMONT, CA, January 21, 2025 – Seagate Technology Holdings plc (NASDAQ: STX), a maker of of mass capacity data storage, today announced shipments of Exos M hard...

CCC and CRA-I Respond to NTIA Request for Comment on Ethical Guidelines for Research Using Pervasive Data
From The Computing Community Consortium Blog

CCC and CRA-I Respond to NTIA Request for Comment on Ethical Guidelines for Research Using Pervasive Data

Last week, CCC, in collaboration with CRA-Industry, submitted a Response to the National Telecommunications and Information Administration (NTIA), Department of...

I wandered lonely as a mass of dejected vapour – try some AI poetry
From CS4FN (Computer Science For Fun)

I wandered lonely as a mass of dejected vapour – try some AI poetry

by Jane Waite, Queen Mary University of London Ever used an online poem generator, perhaps to get started with an English assignment? They normally have a template...

AI Mistakes Are Very Different from Human Mistakes
From Schneier on Security

AI Mistakes Are Very Different from Human Mistakes

Humans make mistakes all the time. All of us do, every day, in tasks both new and routine. Some of our mistakes are minor and some are catastrophic. Mistakes can...

Hammerspace a Finalist in 3 Categories of theCUBE Technology Innovation Awards
From insideHPC

Hammerspace a Finalist in 3 Categories of theCUBE Technology Innovation Awards

SAN MATEO, Calif. — January 20, 2025 — Hammerspace, the company orchestrating the next data cycle, has been recognized as a finalist in three categories of theCUBE...

Biden Signs New Cybersecurity Order
From Schneier on Security

Biden Signs New Cybersecurity Order

President Biden has signed a new cybersecurity order. It has a bunch of provisions, most notably using the US governments procurement power to improve cybersecurity...

Checking whether an ARM NEON register is zero
From Daniel Lemire's Blog

Checking whether an ARM NEON register is zero

Your phone probably runs on 64-bit ARM processors. These processors are ubiquitous: they power the Nintendo Switch, they power cloud servers at both Amazon AWSContinue...

From Computational Complexity

Presidential Quiz!

I made up a quiz about the American Presidents here.  It has 40 questions. In the modern electronic age you can probably look up most or even all of the answers...

Conjuring with logic: the remote control red-black mind meld
From CS4FN (Computer Science For Fun)

Conjuring with logic: the remote control red-black mind meld

Magic tricks are just algorithms – they involve a magician following the steps of the trick precisely. But how can a magician be sure a trick will definitely work...

Friday Squid Blogging: Opioid Alternatives from Squid Research
From Schneier on Security

Friday Squid Blogging: Opioid Alternatives from Squid Research

Is there nothing that squid research can’t solve? “If you’re working with an organism like squid that can edit genetic information way better than any other organism...

@HPCpodcast Industry View: A Deep Dive into High-Density Data Center Cooling and Efficiency Strategies with DDC Solutions
From insideHPC

@HPCpodcast Industry View: A Deep Dive into High-Density Data Center Cooling and Efficiency Strategies with DDC Solutions

In this “Industry View” episode of the @HPCpodcast, Chris Orlando of DDC Solutions discusses the rapidly changing landscape of high density data center cooling,...

Social Engineering to Disable iMessage Protections
From Schneier on Security

Social Engineering to Disable iMessage Protections

I am always interested in new phishing tricks, and watching them spread across the ecosystem. A few days ago I started getting phishing SMS messages with a new...

CRA Releases 2024-2025 Quadrennial Paper Series, Including Many CCC Led Papers
From The Computing Community Consortium Blog

CRA Releases 2024-2025 Quadrennial Paper Series, Including Many CCC Led Papers

We are pleased to announce that today CRA is releasing the 2024-2025 Quadrennial Paper Series. Every four years, the Computing Research Association, through its...

FBI Deletes PlugX Malware from Thousands of Computers
From Schneier on Security

FBI Deletes PlugX Malware from Thousands of Computers

According to a DOJ press release, the FBI was able to delete the Chinese-used PlugX malware from “approximately 4,258 U.S.-based computers and networks.” Details...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account