acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

From Computational Complexity

In the future we will all have songs written about us, and it will be Lance's fault.

In response to my blog post about how its easier to FIND novelty songs (and other things) than it used to be (see here) Lance showed how easy it is to CREATE ahere...

Two reports on the current state of user research
From Putting People First

Two reports on the current state of user research

Maze and User Interviews, both USA-based entities providing user research platforms and user panels, published reports in the last months on the current state of...

Storage costs are plummeting
From Daniel Lemire's Blog

Storage costs are plummeting

Storage costs are plummeting like a skydiver in freefall—between 10 and 100 times cheaper with each passing decade. Meanwhile, the programmer population is growing...

How big are your docker images?
From Daniel Lemire's Blog

How big are your docker images?

Docker is a standard to deploy software on the cloud. Developers start with an existing image and add their own code before deploying their systems. How big are...

How much of your binary executable is just ASCII text?
From Daniel Lemire's Blog

How much of your binary executable is just ASCII text?

We sometimes use binary executable which can span megabytes. I wondered: how much text is contained in these binary files? To find out, I wrote a Python scriptContinue...

Friday Squid Blogging: Sunscreen from Squid Pigments
From Schneier on Security

Friday Squid Blogging: Sunscreen from Squid Pigments

They’re better for the environment. Blog moderation policy.

From Gödel's Lost Letter and P=NP

Fulkerson Prize

The Fulkerson prize is given to: outstanding papers in the area of discrete mathematics and is sponsored jointly by the Mathematical Optimization Society (MOS)...

Compromising the Secure Boot Process
From Schneier on Security

Compromising the Secure Boot Process

This isn’t good: On Thursday, researchers from security firm Binarly revealed that Secure Boot is completely compromised on more than 200 device models sold by...

UK Commits £106M to 5 Quantum Hubs
From insideHPC

UK Commits £106M to 5 Quantum Hubs

The UK government announced it will invest £106 million for five hubs to develop the use of quantum technology in medical scanners, secure communication networks...

Safer code in C++ with lifetime bounds
From Daniel Lemire's Blog

Safer code in C++ with lifetime bounds

For better performance in software, we avoid unnecessary copies. To do so, we introduce references (or pointers). An example of this ideas in C++ is the std::string_view...

CCC Weekly Computing News: CDT Releases Report on Reducing Disability Bias
From The Computing Community Consortium Blog

CCC Weekly Computing News: CDT Releases Report on Reducing Disability Bias

In this installment of CCCs Weekly Computing News, we’re sharing an important report by the Center for Democracy & Technology that addresses the need for better...

The CrowdStrike Outage and Market-Driven Brittleness
From Schneier on Security

The CrowdStrike Outage and Market-Driven Brittleness

Friday’s massive internet outage, caused by a mid-sized tech company called CrowdStrike, disrupted major airlines, hospitals, and banks. Nearly 7,000 flights were...

A Thank You Note from the Past Chair, Ruth Lennon
From ACM-W supporting, celebrating and advocating for Women in Computing

A Thank You Note from the Past Chair, Ruth Lennon

I have never been one to highlight myself on this website as I think it is better to highlight others. That is why we are here – to advocate for women in computing...

Lambda Launches Nvidia-Based Cloud Clusters for AI Model Training
From insideHPC

Lambda Launches Nvidia-Based Cloud Clusters for AI Model Training

SAN JOSE, July 24, 2024 — GPU cloud company Lambda has unveiled Lambda 1-Click Clusters, designed for AI engineers’ and researchers’ short-term access to multi-node...

Hitachi Vantara Announces General Availability of Hitachi iQ and New AI Discovery Service to Help Businesses Become AI-Ready
From insideHPC

Hitachi Vantara Announces General Availability of Hitachi iQ and New AI Discovery Service to Help Businesses Become AI-Ready

SANTA CLARA, Calif. – July 25, 2024 – Hitachi Vantara, the data storage, infrastructure, and hybrid cloud management subsidiary of Hitachi, Ltd. (TSE: 6501), today...

Data Wallets Using the Solid Protocol
From Schneier on Security

Data Wallets Using the Solid Protocol

I am the Chief of Security Architecture at Inrupt, Inc., the company that is commercializing Tim Berners-Lee’s Solid open W3C standard for distributed data ownership...

ACM-W Celebrating Technology Leaders: Generative AI in Enterprise Software
From ACM-W supporting, celebrating and advocating for Women in Computing

ACM-W Celebrating Technology Leaders: Generative AI in Enterprise Software

 Date: 07 August 2024  Time: Noon Pacific  Register: Zoom Link We are at the forefront of a technological revolution where generative AI is redefining the boundaries...

Graphene Plasmon: NTT and Univ. of Tokyo Control THz-Region for High-Speed Signal Processing 
From insideHPC

Graphene Plasmon: NTT and Univ. of Tokyo Control THz-Region for High-Speed Signal Processing 

NTT Corporation and The University of Tokyo announced they have generated and controlled graphene plasmon wave packets with a pulse width of 1.2 picoseconds. They...

Robot Dog Internet Jammer
From Schneier on Security

Robot Dog Internet Jammer

Supposedly the DHS has these: The robot, called “NEO,” is a modified version of the “Quadruped Unmanned Ground Vehicle” (Q-UGV) sold to law enforcement by a company...

From Computational Complexity

Complexity in Michigan

Invited Speaker Nutan Limaye, Conference Chair Valentine Kabanets,2024 PC Chair Rahul Santhanam, myself, 2025 PC Chair Srikanth Srinivasanand 2025 Local Arrangements...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account