acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Friday Squid Blogging: A New Explanation of Squid Camouflage
From Schneier on Security

Friday Squid Blogging: A New Explanation of Squid Camouflage

New research: An associate professor of chemistry and chemical biology at Northeastern University, Deravi’s recently published paper in the Journal of Materials...

My Writings Are in the LibGen AI Training Corpus
From Schneier on Security

My Writings Are in the LibGen AI Training Corpus

The Atlantic has a search tool that allows you to search for specific works in the “LibGen” database of copyrighted works that Meta used to train its AI models....

@HPCpodcast: Live from GTC 2025, Among the Crowds for the New AI Compute Landscape
From insideHPC

@HPCpodcast: Live from GTC 2025, Among the Crowds for the New AI Compute Landscape

In what is becoming an annual tradition for the @HPCpodcast, we present "Live from Nvidia GTC 2025," covering highlights from the Nvidia extravaganza with an AI...

NCSC Releases Post-Quantum Cryptography Timeline
From Schneier on Security

NCSC Releases Post-Quantum Cryptography Timeline

The UK’s National Computer Security Center (part of GCHQ) released a timeline—also see their blog post—for migration to quantum-computer-resistant cryptography....

CRA Responds to White House Request for Information to Inform a National AI Action Plan
From The Computing Community Consortium Blog

CRA Responds to White House Request for Information to Inform a National AI Action Plan

    In early February, the Networking and Information Technology Research and Development (NITRD) National Coordination Office (NCO) published a Request for Information...

SEEQC and Nvidia Report First Digital Quantum QPU-GPU Interface
From insideHPC

SEEQC and Nvidia Report First Digital Quantum QPU-GPU Interface

During quantum day at Nvidia's GTC 2025 conference in San Jose, SEEQC and NVIDIA announced they have completed an end-to-end fully digital quantum-classical interface...

Critical GitHub Attack
From Schneier on Security

Critical GitHub Attack

This is serious: A sophisticated cascading supply chain attack has compromised multiple GitHub Actions, exposing critical CI/CD secrets across tens of thousands...

Ancient Egyptian Numerals
From CS4FN (Computer Science For Fun)

Ancient Egyptian Numerals

How data is represented is an important part of computer science. There are lots of ways numbers can be represented. Choosing a good representation can make things...

Writer Survey: 42% of C-Suite Say Gen AI Is Tearing Their Companies Apart
From insideHPC

Writer Survey: 42% of C-Suite Say Gen AI Is Tearing Their Companies Apart

March 18, 2025, SAN FRANCISCO –Writer, a generative AI platform for the enterprise, today announced the release of its 2025 AI Survey: “Generative AI Adoption in...

Supermicro Expands Enterprise AI Portfolio with Blackwell Servers
From insideHPC

Supermicro Expands Enterprise AI Portfolio with Blackwell Servers

San Jose, GTC 2025 – March 18, 2025 – Supermicro announced support for the new NVIDIA RTX PRO 6000 Blackwell Server Edition GPUs on a range of workload-optimized...

Vertiv Unveils 4 AI Digital Infrastructure Systems
From insideHPC

Vertiv Unveils 4 AI Digital Infrastructure Systems

Columbus, Ohio [March 18, 2025] – Vertiv (NYSE: VRT), a rovider of digital infrastructure and continuity solutions, today announced the launch of four new systems...

From Computational Complexity

A Failure to Communicate

With care you can explain major ideas and results in computational complexity to the general public, like the P v NP problem, zero-knowledge proofs, the PCP theorem...

Crusoe Expands AI Data Center Campus in Abilene to 1.2 GW
From insideHPC

Crusoe Expands AI Data Center Campus in Abilene to 1.2 GW

SAN FRANCISCO / ABILENE, TX / March 18, 2025 / – Today Crusoe, a vertically integrated AI infrastructure provider, announced construction has begun on the nextCrusoe...

Vultr Announces Early Availability of NVIDIA HGX B200
From insideHPC

Vultr Announces Early Availability of NVIDIA HGX B200

WEST PALM BEACH, Fla. — Vultr, a privately-held cloud infrastructure company, today announced it offers early access to the NVIDIA HGX B200. Vultr Cloud GPU, accelerated...

World Wide Technology Debuts oding Assistant, Digital Humans and Agents with NVIDIA AI
From insideHPC

World Wide Technology Debuts oding Assistant, Digital Humans and Agents with NVIDIA AI

ST. LOUIS (March 18, 2025)– World Wide Technology (WWT), a technology solutions provider, today announced the launch of new AI solutions developed in collaboration...

Luminary Cloud and nTop Announce Integraton with NVIDIA Physics AI
From insideHPC

Luminary Cloud and nTop Announce Integraton with NVIDIA Physics AI

SAN MATEO, CA (March 18, 2024) – Luminary Cloud and nTop today announced a new integration with NVIDIA PhysicsNeMo that the companies say reduces physics-basedLuminary...

VAST Data Announces Enterprise-Ready AI Stack with NVIDIA DGX
From insideHPC

VAST Data Announces Enterprise-Ready AI Stack with NVIDIA DGX

SAN JOSE – March 18, 2025 – AI data platform company VAST Data today announced the availability of VAST InsightEngine starting with NVIDIA DGX systems and expanding...

NetApp Announce Agentic AI Reasoning Solutions with NVIDIA
From insideHPC

NetApp Announce Agentic AI Reasoning Solutions with NVIDIA

SAN JOSE, Calif. – March 18, 2025– Data infrastructure company NetApp (NASDAQ: NTAP) today made an agentic AI announcement that taps the NVIDIA AI Data Platform...

Is Security Human Factors Research Skewed Towards Western Ideas and Habits?
From Schneier on Security

Is Security Human Factors Research Skewed Towards Western Ideas and Habits?

Really interesting research: “How WEIRD is Usable Privacy and Security Research?” by Ayako A. Hasegawa Daisuke Inoue, and Mitsuaki Akiyama: Abstract: In human...

Improvements in Brute Force Attacks
From Schneier on Security

Improvements in Brute Force Attacks

New paper: “GPU Assisted Brute Force Cryptanalysis of GPRS, GSM, RFID, and TETRA: Brute Force Cryptanalysis of KASUMI, SPECK, and TEA3.” Abstract: Key lengths...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account