acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Eni Officially Unveils €100M HPC6 Supercomputer for Exploration and Decarbonization
From insideHPC

Eni Officially Unveils €100M HPC6 Supercomputer for Exploration and Decarbonization

Italian energy company Eni has officially announced one of the world’s most powerful supercomputers that will be used to to scale up its oil and gas discovery technology...

Rigetti Launches 84-Qubit Ankaa-3 Quantum System
From insideHPC

Rigetti Launches 84-Qubit Ankaa-3 Quantum System

BERKELEY, Calif.,– Quantum-classical computing company Rigetti announced the launch of its flagship 84-qubit Ankaa-3 system featuring a hardware redesign. Rigetti...

Google Is Allowing Device Fingerprinting
From Schneier on Security

Google Is Allowing Device Fingerprinting

Lukasz Olejnik writes about device fingerprinting, and why Google’s policy change to allow it in 2025 is a major privacy setback.

How does your URL parser handle Unicode?
From Daniel Lemire's Blog

How does your URL parser handle Unicode?

Most strings today in software are Unicode strings. It means that you can include mathematical symbols, emojis and so forth. There are many different versions of...

From Computational Complexity

My Drunken Theorem

Bill's SIGACT Open Problems Column remembering Luca Trevisan is out. I chose the problem of whether Promise-ZPP in P implies Promise-BPP in P, an extension of an...

My first Signs
From CS4FN (Computer Science For Fun)

My first Signs

Alexander Graham Bell was inspired by the deafness of his mother to develop new technologies to help. Lila Harrar, then a computer science student at Queen Mary...

H1B AI and the Future of Computer Science education
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

H1B AI and the Future of Computer Science education

H1B visas are back in the news these days. One one hand we have some loud calls for more H1B visas with a claim that US native workers are not up to snuff. Or at...

Gift Card Fraud
From Schneier on Security

Gift Card Fraud

It’s becoming an organized crime tactic: Card draining is when criminals remove gift cards from a store display, open them in a separate location, and either record...

Efficient In-Place UTF-16 Unicode Correction with ARM NEON
From Daniel Lemire's Blog

Efficient In-Place UTF-16 Unicode Correction with ARM NEON

Modern-day text in software can be expected to be Unicode. Unicode is stored in two formats: UTF-8 and UTF-16. UTF-16 is an encoding system used by several platforms...

Join the crowd with swarm intelligence
From CS4FN (Computer Science For Fun)

Join the crowd with swarm intelligence

Next time you are in a large crowd, look around you: all those people moving together, and mostly not bumping into each other. How does it happen? Flocks of birds...

Three Keys To Being A Great Teacher
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Three Keys To Being A Great Teacher

For the last 20 years or so I have been able to meet some truly great teachers. Some I visited in their schools. Some I met at conferences. Some I have become good...

Casino Players Using Hidden Cameras for Cheating
From Schneier on Security

Casino Players Using Hidden Cameras for Cheating

The basic strategy is to place a device with a hidden camera in a position to capture normally hidden card values, which are interpreted by an accomplice off-site...

Nemisindo: breaking the sound barrier
From CS4FN (Computer Science For Fun)

Nemisindo: breaking the sound barrier

Games are becoming ever more realistic. Now, thanks to the work of Joshua Reiss’s research team and their spinout company, Nemisindo, it’s not just the graphics...

Friday Squid Blogging: Squid on Pizza
From Schneier on Security

Friday Squid Blogging: Squid on Pizza

Pizza Hut in Taiwan has a history of weird pizzas, including a “2022 scalloped pizza with Oreos around the edge, and deep-fried chicken and calamari studded throughout...

Scams Based on Fake Google Emails
From Schneier on Security

Scams Based on Fake Google Emails

Scammers are hacking Google Forms to send email to victims that come from google.com. Brian Krebs reports on the effects. Boing Boing post.

The logic piano
From CS4FN (Computer Science For Fun)

The logic piano

by Paul Curzon, Queen Mary University of London Victorian, William Stanley Jevons was born in Liverpool in 1835. He was famous in his day as an economist and his...

Spyware Maker NSO Group Found Liable for Hacking WhatsApp
From Schneier on Security

Spyware Maker NSO Group Found Liable for Hacking WhatsApp

A judge has found that NSO Group, maker of the Pegasus spyware, has violated the US Computer Fraud and Abuse Act by hacking WhatsApp in order to spy on people using...

Mike Lynch: serial success
From CS4FN (Computer Science For Fun)

Mike Lynch: serial success

By Paul Curzon, Queen Mary University of London Mike Lynch was one of Britain’s most successful entrepreneurs. An electrical engineer, he built his businesses around...

Superhero Syllogisms
From CS4FN (Computer Science For Fun)

Superhero Syllogisms

by Paul Curzon Queen Mary University of London, first appeared in A BIT of CS4FN 2 Superheroes don’t just have physical powers. Often they come out on top because...

Criminal Complaint against LockBit Ransomware Writer
From Schneier on Security

Criminal Complaint against LockBit Ransomware Writer

The Justice Department has published the criminal complaint against Dmitry Khoroshev, for building and maintaining the LockBit ransomware.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account