acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

From Computational Complexity

Is Persistence an Anachronism?

Guest post by Martin BullingerVery recently, Vijay Vazirani's paper A Theory of Alternating Paths and Blossoms, from the Perspective of Minimum Length got accepted...

Lenovo Launches AI Servers with AMD MI300X GPUs
From insideHPC

Lenovo Launches AI Servers with AMD MI300X GPUs

Lenovo today announced AI-centric infrastructure systems in collaboration with AMD, including the ThinkSystem SR685a V3 8GPU server (pictured here), designed for...

Dan Solove on Privacy Regulation
From Schneier on Security

Dan Solove on Privacy Regulation

Law professor Dan Solove has a new article on privacy regulation. In his email to me, he writes: “I’ve been pondering privacy consent for more than a decade, and...

Announcing Rendering History – The Women of ACM-W
From ACM-W supporting, celebrating and advocating for Women in Computing

Announcing Rendering History – The Women of ACM-W

We are delighted to announce the newly published book Rendering History: The Women of ACM-W, edited by Gloria Childress Townsend. Townsend was active with the ACM...

CINECA Selects E4 Computer with Dell and Vast for Galileo 100 HPC Upgrade
From insideHPC

CINECA Selects E4 Computer with Dell and Vast for Galileo 100 HPC Upgrade

April 23, 2024 — E4 Computer Engineering has won the contract to upgrade Galileo 100, CINECA Interuniversity Consortium’s supercomputer and Tier-1 cloud systemCINECA...

Pasqal and Welinq Partner to Develop Quantum Interconnects
From insideHPC

Pasqal and Welinq Partner to Develop Quantum Interconnects

Paris – April 23, 2024 – Neutral atom quantum computing company Pasqal and Welinq, a quantum networking company, today announced a partnership intended to to address...

atNorth Names New Chief Development Officer
From insideHPC

atNorth Names New Chief Development Officer

Reykjavík, Iceland – April 23,  2024 – atNorth, a Nordic colocation, high-performance computing, and artificial intelligence service provider, has announced the...

Xinnor and Versatus Partner on HPC and AI Storage Solutions
From insideHPC

Xinnor and Versatus Partner on HPC and AI Storage Solutions

Haifa, Israel and San Paulo, Brazil – April 23, 2024: Xinnor, a provider of high-performance software RAID solutions, and Versatus HPC, an advisor and integrator...

Quantum Corp. Announces DXi All-Flash Backup Appliances
From insideHPC

Quantum Corp. Announces DXi All-Flash Backup Appliances

SAN JOSE, April 23, 2024 — Data management and storage company Quantum Corporation (NASDAQ: QMCO)  today announced DXi T-Series all-flash backup appliances to accelerate...

HPC MARKET UPDATE PRE-ISC24
From insideHPC

HPC MARKET UPDATE PRE-ISC24

  Registration is now open for Hyperion Research’s annual HPC market update (virtual) session held immediately prior to the ISC24 conference. The annual event is...

From Gödel's Lost Letter and P=NP

An Open Problem

Richard Feynman and Gian-Carlo Rota worked on different parts of science during their separate careers. Feynman of course was one of the most important scientists...

Microsoft and Security Incentives
From Schneier on Security

Microsoft and Security Incentives

Former senior White House cyber policy director A. J. Grotto talks about the economic incentives for companies to improve their security—in particular, Microsoft...

Designing for autistic people
From CS4FN (Computer Science For Fun)

Designing for autistic people

by Daniel Gill and Paul Curzon, Queen Mary University of London What should you be thinking about when designing for a specific group with specific needs, suchContinue...

Using Legitimate GitHub URLs for Malware
From Schneier on Security

Using Legitimate GitHub URLs for Malware

Interesting social-engineering attack vector: McAfee released a report on a new LUA malware loader distributed through what appeared to be a legitimate Microsoft...

Can you trust a smile?
From CS4FN (Computer Science For Fun)

Can you trust a smile?

You're probably pretty good at spotting a fake smile, but how might we teach robots to do the same...

From Computational Complexity

Intelligent Comments on Bill's G.H. Hardy/Avi W post that we did not post.

I posted (see here) about Avi Wigderson being a counterexample to two of G.H. Hardy's opinions:1) Hardy thought Math was a young man's game. I got some good comments...

How do you recognize an expert?
From Daniel Lemire's Blog

How do you recognize an expert?

Go back to the roots: experience. An expert is someone who has repeatedly solved the concrete problem you are encountering. If your toilet leaks, an experienced...

How quickly can you break a long string into lines?
From Daniel Lemire's Blog

How quickly can you break a long string into lines?

Suppose that you receive a long string and you need to break it down into lines. Consider the simplified problems where you need to break the string into segments...

Friday Squid Blogging: Squid Trackers
From Schneier on Security

Friday Squid Blogging: Squid Trackers

A new bioadhesive makes it easier to attach trackers to squid. Note: the article does not discuss squid privacy rights. As usual, you can also use this squid post...

From Gödel's Lost Letter and P=NP

Women in Math Research

Peter Gerdes is a mathematician working in computability theory a.k.a. recursion theory, a branch of mathematical logic studying what computers (aka Turing machines)...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account