acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

All Else Equal
From The Noisy Channel

All Else Equal

In The Three-Body Problem, Liu Cixin describes how an alien species drives scientists to suicide by making it impossible for them to produce consistent experimental...

New Chrome Zero-Day
From Schneier on Security

New Chrome Zero-Day

According to Microsoft researchers, North Korean hackers have been using a Chrome zero-day exploit to steal cryptocurrency.

Replace strings by views when you can
From Daniel Lemire's Blog

Replace strings by views when you can

C++ programmers tend to represent strings using the std::string class. Though the implementation might vary, each instance of an std::string might use 32 bytes....

DOE Announces $68M for AI for Scientific Research
From insideHPC

DOE Announces $68M for AI for Scientific Research

September 5, 2024, WASHINGTON, D.C. – The U.S. Department of Energy announced $68 million in funding for 11 AI for science multi-institution projects, comprising...

Australia Threatens to Force Companies to Break Encryption
From Schneier on Security

Australia Threatens to Force Companies to Break Encryption

In 2018, Australia passed the Assistance and Access Act, which—among other things—gave the government the power to force companies to break their own encryption...

From Computational Complexity

Very few problems are in NP intersect coNP but not known to be in P. What to make of that?

Someone once told me: I was not surprised when Linear Programming was in P since it was already in \(  NP \cap  coNP  \), and problems in that intersection tend...

[Book] Code Dependent
From Putting People First

[Book] Code Dependent

"A riveting story of what it means to be human in a world changed by artificial intelligence, revealing the perils and inequities of our growing reliance on automated...

Working in Computer Science: An Autistic Perspective (Part 1)
From CS4FN (Computer Science For Fun)

Working in Computer Science: An Autistic Perspective (Part 1)

by Daniel Gill, Queen Mary University of London Autism is a condition with many associated challenges, but for some people it presents some benefits. This distinction...

Live Video of Promachoteuthis Squid
From Schneier on Security

Live Video of Promachoteuthis Squid

The first live video of the Promachoteuthis squid, filmed at a newly discovered seamount off the coast of Chile. Blog moderation policy.

Scilly cable antics
From CS4FN (Computer Science For Fun)

Scilly cable antics

by Paul Curzon, Queen Mary University of London From the archive Autumn 1869. Undersea telecommunications cables let the world communicate and led to the worldContinue...

CoreWeave Partners with Run:ai on AI Inference
From insideHPC

CoreWeave Partners with Run:ai on AI Inference

Sept. 6, 2024 — AI cloud hyperscaler CoreWeave announced an integration with AI workload and GPU orchestration company Run:ai that the companies say is designed...

YubiKey Side-Channel Attack
From Schneier on Security

YubiKey Side-Channel Attack

There is a side-channel attack against YubiKey access tokens that allows someone to clone a device. It’s a complicated attack, requiring the victim’s username and...

Nominations Open for 2024 HPC Innovation Excellence Awards
From insideHPC

Nominations Open for 2024 HPC Innovation Excellence Awards

Sept. 5, 2024 — HPC-AI industry analyst firm Hyperion Research and the HPC User Forum announced that nominations are open for the 2024 HPC Innovation Excellence...

Nvidia and Others Invest $160M in HPC Data Center Company Applied Digital
From insideHPC

Nvidia and Others Invest $160M in HPC Data Center Company Applied Digital

DALLAS, Sept. 05, 2024 — Applied Digital Corporation, a builder of digital infrastructure designed for high performance computing applications, today announcedNvidia...

HPE Introduces Private Cloud AI Co-Developed with Nvidia
From insideHPC

HPE Introduces Private Cloud AI Co-Developed with Nvidia

HOUSTON – September 5, 2024 – Hewlett Packard Enterprise (NYSE: HPE) announces HPE Private Cloud AI is available to order and introduces new solution accelerators...

From Gödel's Lost Letter and P=NP

Biblical Codes

This Sunday’s NYTimes had an article on Eliyahu Rips who just just passed away at 75. He was an Israeli mathematician known for his research in geometric group...

CCC Q&A: Trustworthy Intelligent Systems From An Interdisciplinary Lens
From The Computing Community Consortium Blog

CCC Q&A: Trustworthy Intelligent Systems From An Interdisciplinary Lens

CCC spoke with one of its council members, Rachel Greenstadt about her work in trustworthy intelligent systems and her approach to this research through an interdisciplinary...

Long Analysis of the M-209
From Schneier on Security

Long Analysis of the M-209

Really interesting analysis of the American M-209 encryption device and its security.

atNorth Announces Heat Reuse at Denmark Data Center
From insideHPC

atNorth Announces Heat Reuse at Denmark Data Center

Copenhagen – September 4th, 2024 –  Nordic coloction HPC and AI service provider atNorth has announced plans to build its largest data center to date in Ølgod in...

VDURA Announces Partnership with Jeskell Systems for IT Modernization
From insideHPC

VDURA Announces Partnership with Jeskell Systems for IT Modernization

SAN JOSE and LAUREL, Md.– High performance storage and management company VDURA has announced a partnership with Jeskell Systems, a renowned IT modernization specialist...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account