acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

TSMC Holds 2nm Capacity Expansion Ceremony, Volume Production Slated for Second Half of Year
From insideHPC

TSMC Holds 2nm Capacity Expansion Ceremony, Volume Production Slated for Second Half of Year

TSMC today held a 2 nanometer (2nm) capacity expansion ceremony at the construction site of Fab 22 in the Southern Taiwan Science Park (STSP), bringing together...

California Seeks Feedback on Draft Report Guiding Oversight of AI Frontier Models
From The Computing Community Consortium Blog

California Seeks Feedback on Draft Report Guiding Oversight of AI Frontier Models

On March 18, 2025, the Joint California Policy Working Group on AI Frontier Models released a draft report that could help shape how the state navigates the rapidly...

Music-making mates for Mortimer
From CS4FN (Computer Science For Fun)

Music-making mates for Mortimer

Robots are cool. Fact. But can they keep you interested for more than a short time? Over months? Years even? Louis McCallum of Queen Mary University of London tells...

AI Factory: AMD in $4.9 Billion Acquisition of ZT Systems
From insideHPC

AI Factory: AMD in $4.9 Billion Acquisition of ZT Systems

On the heels of winning a 30,000 GPU cluster deal with Oracle, AMD (NASDAQ: AMD) today announced a move into the AI infrastructure arena, reflecting a trend toward...

Oracle Cloud Infrastructure Compute E6 Shapes Powered by 5th Gen AMD EPYC CPUs
From insideHPC

Oracle Cloud Infrastructure Compute E6 Shapes Powered by 5th Gen AMD EPYC CPUs

SANTA CLARA, Calif., March 31, 2025 — Today, AMD (NASDAQ: AMD) announced 5th Gen AMD EPYC processors power the Oracle Cloud Infrastructure (OCI) Compute E6 Standard...

Trane Announces Data Center Air-Cooled Chillers
From insideHPC

Trane Announces Data Center Air-Cooled Chillers

 DAVIDSON, N.C., March 27, 2025 – Trane – by Trane Technologies (NYSE: TT), announced the development of two new air-cooled chiller offerings – Magnetic Bearing...

The Signal Chat Leak and the NSA
From Schneier on Security

The Signal Chat Leak and the NSA

US National Security Advisor Mike Waltz, who started the now-infamous group chat coordinating a US attack against the Yemen-based Houthis on March 15, is seemingly...

Teaching The Writing of Secure Code
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Teaching The Writing of Secure Code

One of the great problems of teaching computer science is that there is a limited amount of time to teach and an unlimited amount of things that can be taught....

Pasqal Selected for 140-Qubit Quantum Computer to Be Hosted at CINECA
From insideHPC

Pasqal Selected for 140-Qubit Quantum Computer to Be Hosted at CINECA

March 27, 2025 — Pasqal, a neutral-atom quantum computing company, announced the signing of the procurement contract with the European High Performance Computing...

Philippa Gardner bringing law and order to a wild west
From CS4FN (Computer Science For Fun)

Philippa Gardner bringing law and order to a wild west

Verified Trustworthy Software The computing world is a wild west, with bugs in software the norm, and malicious people and hostile countries making use of themContinue...

From Computational Complexity

Survey's are done stupidly/A stupid question from a survey

 I have often began taking a survey and quit in the middle. Why?1) It goes on to long. When I told the surveyors that he may get more people quitting for that reason...

Mixing ARM NEON with SVE code for fun and profit
From Daniel Lemire's Blog

Mixing ARM NEON with SVE code for fun and profit

Most mobile devices use 64-bit ARM processors. A growing number of servers (Amazon, Microsoft) also use 64-bit ARM processors. These processors  have special instructions...

Soft squidgy robots
From CS4FN (Computer Science For Fun)

Soft squidgy robots

Think of a robot and you probably think of something hard, metal, solid. Bang into one and it would hurt! But researchers are inventing soft robots, ones that are...

Friday Squid Blogging: Squid Werewolf Hacking Group
From Schneier on Security

Friday Squid Blogging: Squid Werewolf Hacking Group

In another rare squid/cybersecurity intersection, APT37 is also known as “Squid Werewolf.” As usual, you can also use this squid post to talk about the security...

Fluidstack to Deploy Exascale GPU Clusters in Europe with NVIDIA, Borealis Data Center and Dell
From insideHPC

Fluidstack to Deploy Exascale GPU Clusters in Europe with NVIDIA, Borealis Data Center and Dell

March 25, 2025 – Fluidstack, an AI cloud platform, announced it is deploying and managing exascale clusters across Iceland and Europe in collaboration with Borealis...

Hyperscale Data Completes First Installation of Nvidia GPUs for HPC Customer
From insideHPC

Hyperscale Data Completes First Installation of Nvidia GPUs for HPC Customer

LAS VEGAS, March 28, 2025 — Hyperscale Data, Inc. (NYSE American: GPUS), a diversified holding company, today announced the successful installation of its first...

Gates Announces Large-Diameter Hose for Data Center Cooling
From insideHPC

Gates Announces Large-Diameter Hose for Data Center Cooling

DENVER, March 28, 2025—Gates (NYSE: GTES), a manufacturer of power transmission and fluid power solutions, today announced the launch of Data Master MegaFlex, a...

AIs as Trusted Third Parties
From Schneier on Security

AIs as Trusted Third Parties

This is a truly fascinating paper: “Trusted Machine Learning Models Unlock Private Inference for Problems Currently Infeasible with Cryptography.” The basic idea...

CIQ Fuzzball Federation Capabilities for Deployment of AI and HPC Workloads Across Regions, Clouds and Data Centers
From insideHPC

CIQ Fuzzball Federation Capabilities for Deployment of AI and HPC Workloads Across Regions, Clouds and Data Centers

March 27, 2025, Reno, Nev. – CIQ today announced the availability of federation capabilities in their Fuzzball performance-intensive computing platform. This release...

Precision, Recall, and Desirability: A Deep Dive
From The Noisy Channel

Precision, Recall, and Desirability: A Deep Dive

This post expands on my previous discussion of “Precision, Recall, and Desirability,” diving deeper into defining, motivating, measuring, identifying, and addressing...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account