acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

NSF Awards Additional $9.8M to NCSA for Delta, DeltaAI HPC
From insideHPC

NSF Awards Additional $9.8M to NCSA for Delta, DeltaAI HPC

The National Center for Supercomputing Applications in Illinois was recently awarded $4.9 million of supplemental funding from the U.S. National Science Foundation...

Supercomputer Funding for BC Universities in Canada for Research in Health Care and More
From insideHPC

Supercomputer Funding for BC Universities in Canada for Research in Health Care and More

June 3, 2024 — The Government of British Columbia and the Digital Research Alliance of Canad are investing over $81M into the supercomputers at Simon Fraser University...

 Montana State Selects ORCA Computing for Distributed Quantum Computing and Communications
From insideHPC

 Montana State Selects ORCA Computing for Distributed Quantum Computing and Communications

LONDON and AUSTIN, June 5, 2024 — ORCA Computing, a quantum computing company, has been selected by Montana State University (MSU) to supply two PT-1 quantum photonics...

Online Privacy and Overfishing
From Schneier on Security

Online Privacy and Overfishing

Microsoft recently caught state-backed hackers using its generative AI tools to help with their attacks. In the security community, the immediate questions weren...

VAST Data to be Data Platform for Cisco Nexus HyperFabric for GenAI with Nvidia
From insideHPC

VAST Data to be Data Platform for Cisco Nexus HyperFabric for GenAI with Nvidia

NEW YORK & LAS VEGAS – June 4, 2024 – AI data platform company VAST Data today at Cisco Live 2024 announced it is collaborating with Cisco (NASDAQ: CSCO), the leader...

Breaking a Password Manager
From Schneier on Security

Breaking a Password Manager

Interesting story of breaking the security of the RoboForm password manager in order to recover a cryptocurrency wallet password. Grand and Bruno spent months reverse...

Northern Data Group Launches Nvidia-based AI Accelerator Powered by Carbon-Free Energy
From insideHPC

Northern Data Group Launches Nvidia-based AI Accelerator Powered by Carbon-Free Energy

Frankfurt/Main – 3 June 2024 – Northern Data Group (German stock market: NB2, ISIN: DE000A0SMU87), a provider of HPC solutions, today announces the launch of its...

From Computational Complexity

FOCS 2024 Test of Time Award. Call for nominations and my opinion

 The call for nominations for the Test of Time Award at FOCS 2024 has been posted here.Eligibility and past winners are here.Points1) It is good to have an award...

3 examples of grand challenges that had successful outcomes
From The Computing Community Consortium Blog

3 examples of grand challenges that had successful outcomes

In the rapidly evolving landscape of computing, grand challenges emerge as pivotal milestones that shape the trajectory of technological advancement and societal...

Qumulo Announces AI Infrastructure Benchmark Results with Azure Native Qumulo
From insideHPC

Qumulo Announces AI Infrastructure Benchmark Results with Azure Native Qumulo

SEATTLE – June 3rd, 2024 – Today, data storage and management company Qumulo said it achieved the industry’s fastest and most cost-effective cloud-native storage...

Pinecone Names Lauren Nemeth COO ad Bob Muglia as Board Member 
From insideHPC

Pinecone Names Lauren Nemeth COO ad Bob Muglia as Board Member 

NEW YORK, June 3, 2024 – Vector database AI company Pinecone today announced that Lauren Nemeth and Bob Muglia have joined the company as chief operating officer...

Seeing Like a Data Structure
From Schneier on Security

Seeing Like a Data Structure

Technology was once simply a tool—and a small one at that—used to amplify human intent and capacity. That was the story of the industrial revolution: we could control...

AI Will Increase the Quantity—and Quality—of Phishing Scams
From Schneier on Security

AI Will Increase the Quantity—and Quality—of Phishing Scams

A piece I coauthored with Fredrik Heiding and Arun Vishwanath in the Harvard Business Review: Summary. Gen AI tools are rapidly making these emails more advanced...

From Gödel's Lost Letter and P=NP

A Most Important Number

It seems like we’ve been noticing 34 everywhere we look lately, whether it’s on billboards, in phone numbers, or even inside fortune cookies. Is it all just a coincidence...

From Egyptian Survey puzzles to computational thinking
From CS4FN (Computer Science For Fun)

From Egyptian Survey puzzles to computational thinking

by Paul Curzon, Queen Mary University of London One way to use logical thinking is to deduce new facts but then turn them into IF-THEN rules. They tell us an action...

Friday Squid Blogging: Baby Colossal Squid
From Schneier on Security

Friday Squid Blogging: Baby Colossal Squid

This video might be a juvenile colossal squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered....

CEA-Leti Reports 3-Layer Integration, Progress toward AI-Embedded CMOS Image Sensors
From insideHPC

CEA-Leti Reports 3-Layer Integration, Progress toward AI-Embedded CMOS Image Sensors

DENVER – May 31, 2024 – CEA-Leti scientists have reported three projects at ECTC 2024 that they say are steps to enabling CMOS image sensors (CIS) that can exploit...

How AI Will Change Democracy
From Schneier on Security

How AI Will Change Democracy

I don’t think it’s an exaggeration to predict that artificial intelligence will affect every aspect of our society. Not by doing new things. But mostly by doing...

Quickly checking whether a string needs escaping
From Daniel Lemire's Blog

Quickly checking whether a string needs escaping

In software, we often represent strings by surrounding them with quotes ("). What happens if the string itself contains quotes? We then need to escape the string...

Never reason from the results of a sampling profiler
From Daniel Lemire's Blog

Never reason from the results of a sampling profiler

In the quest for software optimization, a trusty companion is the sampling profiler, a tool available in most programming languages. These profilers work unobtrusively...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account