acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

From Computational Complexity

Lautemann's Beautiful Proof

In writing the drunken theorem post, I realized I never wrote a post on Lautemann's amazing proof that BPP is contained in \(\Sigma^p_2\), the second level of the...

Designing an interactive prayer mat
From CS4FN (Computer Science For Fun)

Designing an interactive prayer mat

Successful interactive systems design is often based on detecting a need that really good solutions do not yet exist for, then coming up with a realistic solution...

ExxonMobil Lobbyist Caught Hacking Climate Activists
From Schneier on Security

ExxonMobil Lobbyist Caught Hacking Climate Activists

The Department of Justice is investigating a lobbying firm representing ExxonMobil for hacking the phones of climate activists: The hacking was allegedly commissioned...

SoftBank Corp. and Quantinuum in Quantum Partnership
From insideHPC

SoftBank Corp. and Quantinuum in Quantum Partnership

SoftBank Corp. and Quantinuum today announced a partnership in quantum computing intended to "unlock innovative quantum computing solutions that will overcome the...

Argonne Releases Aurora Exascale Supercomputer to Researchers
From insideHPC

Argonne Releases Aurora Exascale Supercomputer to Researchers

The U.S. Department of Energy’s (DOE) Argonne National Laboratory has released its Aurora exascale supercomputer to researchers across the world to support computing...

New Year, New Goals: Celebrating and Advancing Women in Computing with ACM-W
From ACM-W supporting, celebrating and advocating for Women in Computing

New Year, New Goals: Celebrating and Advancing Women in Computing with ACM-W

Cigdem Sengul & Adriana Wilde At the ACM-W communications committee, we are happy to share updates on our ongoing and upcoming initiatives to support, celebrate...

Becoming a Senior Member of ACM: My Journey and Why You Should Consider It Too
From ACM-W supporting, celebrating and advocating for Women in Computing

Becoming a Senior Member of ACM: My Journey and Why You Should Consider It Too

By Dr Adriana WildeAbout a year ago, I made a decision that turned out to be a very rewarding experience in my professional life: I applied to become a Senior Member...

All India Celebration for Women in Computing
From ACM-W supporting, celebrating and advocating for Women in Computing

All India Celebration for Women in Computing

All India Celebration for Women in Computing (AICWiC 2024) is an annual community-building conference dedicated to increasing the participation, retention, and...

A sound social venture: recognising birds
From CS4FN (Computer Science For Fun)

A sound social venture: recognising birds

Dan Stowell was a researcher at Queen Mary University of London when he founded an early version of what is now known as a Social Venture: a company created toContinue...

CISA Under Trump
From Schneier on Security

CISA Under Trump

Jen Easterly is out as the Director of CISA. Read her final interview: There’s a lot of unfinished business. We have made an impact through our ransomware vulnerability...

Bodo.ai Open-Sources HPC Python Compute Engine
From insideHPC

Bodo.ai Open-Sources HPC Python Compute Engine

SAN MATEO, Calif., Jan. 27, 2025 — Bodo.ai, an open source start-up focused on transformative Python, has released its high performance computing engine for Python...

New VPN Backdoor
From Schneier on Security

New VPN Backdoor

A newly discovered VPN backdoor uses some interesting tactics to avoid detection: When threat actors use backdoor malware to gain access to a network, they want...

Oh no! Not again…
From CS4FN (Computer Science For Fun)

Oh no! Not again…

What a mess. There’s flour all over the kitchen floor. A fortnight ago I opened the cupboard to get sugar for my hot chocolate. As I pulled out the sugar, it knocked...

From Computational Complexity

People who live through two square years

 44*44=1936.45*45=2025. This year!46*46= 2116.Since my fake birthday is Oct 1, 1960 (I do not reveal my real birthday to try to prevent ID theft), which is past...

Regular expressions can blow up!
From Daniel Lemire's Blog

Regular expressions can blow up!

Regular expressions, often abbreviated as regex, are a powerful tool for pattern matching within text. For example, the expression \d*\.?\d+ would match a positive...

Friday Squid Blogging: Beaked Whales Feed on Squid
From Schneier on Security

Friday Squid Blogging: Beaked Whales Feed on Squid

A Travers’ beaked whale (Mesoplodon traversii) washed ashore in New Zealand, and scientists conlcuded that “the prevalence of squid remains [in its stomachs] suggests...

$200M HPC Data Center for AI in Wisconsin Launched by DPO and Billerud
From insideHPC

$200M HPC Data Center for AI in Wisconsin Launched by DPO and Billerud

NEW YORK, Jan. 23, 2025 — Digital Power Optimization, Inc. (“DPO”), a developer and operator of power-dense data centers, today announced it has secured land and...

Pipeshift Raises $2.5M for AI Infrastructure Platform
From insideHPC

Pipeshift Raises $2.5M for AI Infrastructure Platform

San Francisco – January 23, 2025: Today, AI infrastructure startup Pipeshift announced their $2.5 illion seed round to address the challenge of deploying open source...

Third Interdisciplinary Workshop on Reimagining Democracy (IWORD 2024)
From Schneier on Security

Third Interdisciplinary Workshop on Reimagining Democracy (IWORD 2024)

Last month, Henry Farrell and I convened the Third Interdisciplinary Workshop on Reimagining Democracy (IWORD 2024) at Johns Hopkins University’s Bloomberg Center...

DigitalOcean Launches Generative AI Platform
From insideHPC

DigitalOcean Launches Generative AI Platform

Austin, TX – January 22, 2025 – Today, scalable cloud provider DigitalOcean (NYSE: DOCN) introduced its new GenAI Platform at the company’s biannual developer conference...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account