acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

GCHQ Christmas Codebreaking Challenge
From Schneier on Security

GCHQ Christmas Codebreaking Challenge

Looks like fun. Details here.

Book excerpt: Wisdom of the trustworthy
From Geeking with Greg

Book excerpt: Wisdom of the trustworthy

(This is an excerpt from drafts of my book, "Algorithms and Misinformation: Why Wisdom of the Crowds Failed the Internet and How to Fix It") Wisdom of the crowds...

Quantum Technology Companies Qubitekk and Qunnect Claim First Equipment Interoperability on EPB Quantum Network
From insideHPC

Quantum Technology Companies Qubitekk and Qunnect Claim First Equipment Interoperability on EPB Quantum Network

CHATTANOOGA, Tenn. (Dec. 19, 2023) – In an industry collaboration to establish quantum networking interoperability on a commercial network, quantum networking hardware...

CS4FN Advent 2023 – Day 19: jingle bells or warning bells? Avoiding computer scams
From CS4FN (Computer Science For Fun)

CS4FN Advent 2023 – Day 19: jingle bells or warning bells? Avoiding computer scams

It’s Day 19 of the CS4FN Christmas Computing Advent Calendar. Every day throughout Advent we’ll be doing our best to publish a computing-themed post that relates...

OpenAI Is Not Training on Your Dropbox Documents—Today
From Schneier on Security

OpenAI Is Not Training on Your Dropbox Documents—Today

There’s a rumor flying around the Internet that OpenAI is training foundation models on your Dropbox documents. Here’s CNBC. Here’s Boing Boing. Some articles are...

CS4FN Advent 2023 – Day 18: cracker or hacker? Cyber security
From CS4FN (Computer Science For Fun)

CS4FN Advent 2023 – Day 18: cracker or hacker? Cyber security

It’s Day 18 of the CS4FN Christmas Computing Advent Calendar. We’ve been posting a computing-themed article linked to the picture on the ‘front’ of the advent calendar...

Indexing by Intent
From The Noisy Channel

Indexing by Intent

Search developers mostly focus on mapping queries to results. This perspective is natural, insofar as search starts with the user formulating a query and (hopefully)...

Police Get Medical Records without a Warrant
From Schneier on Security

Police Get Medical Records without a Warrant

More unconstrained surveillance: Lawmakers noted the pharmacies’ policies for releasing medical records in a letter dated Tuesday to the Department of Health and...

How Much Hardware Knowledge do CS Students Need
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

How Much Hardware Knowledge do CS Students Need

Back to the basics! Get students close to the hardware! Really? Just how much hardware knowledge do students need today? This post was prompted by a post getting...

From Computational Complexity

Archimedes, Pi, and Pickelball

I typed 3,1,4,1,5,9 into OEIS and,  as expected, I found that these are the first few digits of \(\pi\). See here.I then read on the page:\(\pi\) is sometimes refereed...

CS4FN Advent 2023 – Day 17: pocket-switching networked reindeer
From CS4FN (Computer Science For Fun)

CS4FN Advent 2023 – Day 17: pocket-switching networked reindeer

Gosh, Christmas is just around the corner! It’s Day 17 of the CS4FN Christmas Computing Advent Calendar and we’ve posted a blog post every day since 1 December,...

CS4FN Advent 2023 – Day 16: candy cane or walking aid: designing for everyone, human computer interaction
From CS4FN (Computer Science For Fun)

CS4FN Advent 2023 – Day 16: candy cane or walking aid: designing for everyone, human computer interaction

Welcome to Day 16 of the CS4FN Christmas Computing Advent Calendar in which we’re posting a blog post every day in December until (and including) Christmas Day....

From Gödel's Lost Letter and P=NP

Numbers Too Big for Our Universe

Starting from games and models that look like child’s play Ben Brubaker is a staff writer covering computer science for Quanta. He previously covered physics as...

What does it mean to trust a technology?
From Putting People First

What does it mean to trust a technology?

Trust depends on perceptions of whether sociotechnical systems are seen as beneficial and well-governed as well as whether they work as their designers expect.

Friday Squid Blogging: Underwater Sculptures Use Squid Ink for Coloring
From Schneier on Security

Friday Squid Blogging: Underwater Sculptures Use Squid Ink for Coloring

The Molinière Underwater Sculpture Park has pieces that are colored in part with squid ink. As usual, you can also use this squid post to talk about the security...

At SC23: Achronix Talks Turnkey FPGA Solutions for Generative AI
From insideHPC

At SC23: Achronix Talks Turnkey FPGA Solutions for Generative AI

We caught up with Achronix at SC23, the FPGA company that touts its turnkey solutions for generative AI workloads – automatic speech recognition in particular.At...

ACM-W Chair Review of 2023
From ACM-W supporting, celebrating and advocating for Women in Computing

ACM-W Chair Review of 2023

It is great to look back on the year to see just how far we have come. This year, new people joined our groups, working groups, and standing committees. The ACM...

Quantum Computing: Potential, Practicality and Perils
From ACM-W supporting, celebrating and advocating for Women in Computing

Quantum Computing: Potential, Practicality and Perils

The latest episode of Celebrating Technology Leaders focused on Quantum Computing, a relatively new yet fascinating career track.  Our panelists How did our panelists...

A Robot the Size of the World
From Schneier on Security

A Robot the Size of the World

In 2016, I wrote about an Internet that affected the world in a direct, physical manner. It was connected to your smartphone. It had sensors like cameras and thermostats...

CS4FN Advent 2023 – Day 15: a candle: optical fibre, optical illusions
From CS4FN (Computer Science For Fun)

CS4FN Advent 2023 – Day 15: a candle: optical fibre, optical illusions

After yesterday’s tinsel image inspiring a cable / broadband speeds themed post, today’s CS4FN Christmas Computing Advent Calendar picture of a candle has of course...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account