acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Cisco and NVIDIA Partner on Integrated AI Infrastructure
From insideHPC

Cisco and NVIDIA Partner on Integrated AI Infrastructure

February 6, 2024 — Cisco and NVIDIA today announced plans to deliver AI infrastructure solutions for the data center designed to be easy to deploy and manage. “AI...

Kathy Yelick to Deliver ISC 2024 Keynote on Post-Exascale Computing
From insideHPC

Kathy Yelick to Deliver ISC 2024 Keynote on Post-Exascale Computing

The opening keynote at the ISC 2024 conference in Hamburg will be delivered by Kathy Yelick, cice chancellor for research and the Robert S. Pepper Distinguished...

Tenstorrent Selects Blue Cheetah Chiplet Interconnect IP for AI and RISC-V Solutions
From insideHPC

Tenstorrent Selects Blue Cheetah Chiplet Interconnect IP for AI and RISC-V Solutions

SUNNYVALE, Calif., Feb. 6, 2024 — Tenstorrent and Blue Cheetah Analog Design today announced that Tenstorrent has licensed Blue Cheetah’s die-to-die interconnect...

Human-centered design to go beyond the mere “what customers want”
From Putting People First

Human-centered design to go beyond the mere “what customers want”

In a context of economic and geopolitical flux and volatility, a more in-depth human-centered design approach is now more necessary than ever, as it helps forward...

UASG Announces Shortlisted Events for UA Day 2024
From Universal Acceptance Steering Group

UASG Announces Shortlisted Events for UA Day 2024

The Universal Acceptance Steering Group (UASG) has published the shortlisted events for the second annual Universal Acceptance (UA) Day, which will be held from...

QuEra to Build Quantum Testbed in UK
From insideHPC

QuEra to Build Quantum Testbed in UK

BOSTON, February 5th, 2024 – Neutral-atom quantum company QuEra Computing has announced that the UK’s National Quantum Computing Centre (NQCC) at Harwell, Oxfordshire...

Deepfake Fraud
From Schneier on Security

Deepfake Fraud

A deepfake video conference call—with everyone else on the call a fake—fooled a finance worker into sending $25M to the criminals’ account.

AMPER: AI helping future you remember past you
From CS4FN (Computer Science For Fun)

AMPER: AI helping future you remember past you

Research to develop a new AI tool to help people with dementia to remember, and gain confidence. Also includes some suggested classroom activities and examples...

How fast is rolling Karp-Rabin hashing?
From Daniel Lemire's Blog

How fast is rolling Karp-Rabin hashing?

A hash function maps values (e.g., strings) into a fixed number of strings, typically smaller than the original. It is useful to compare quickly two long strings...

From Computational Complexity

The advantage of working on obscure things

 I got an email from an organization that wants to publicize one of my papers. Which paper did they want to publicize? 1) If the organization was Quanta, they...

Lego Computer Science: Turing Machines Part 2: the controller
From CS4FN (Computer Science For Fun)

Lego Computer Science: Turing Machines Part 2: the controller

by Paul Curzon, Queen Mary University of London Last time we started to build a working computer out of Lego: a Turing Machine. So far we have seen that we canContinue...

[Book] Filterworld: how algorithms flattened culture
From Putting People First

[Book] Filterworld: how algorithms flattened culture

From New Yorker staff writer Kyle Chayka comes a timely history and investigation of a world ruled by algorithms, which determine the shape of culture itself.

From Gödel's Lost Letter and P=NP

Predictions 2024

Would an AI-powered meta-prediction be smarter? Cropped from video source Punxsutawney Phil is our populace’s perennially perspicacious prognosticator. Every February...

Friday Squid Blogging: Illex Squid in Argentina Waters
From Schneier on Security

Friday Squid Blogging: Illex Squid in Argentina Waters

Argentina is reporting that there is a good population of illex squid in its waters ready for fishing, and is working to ensure that Chinese fishing boats don’t...

David Kahn
From Schneier on Security

David Kahn

David Kahn has died. His groundbreaking book, The Codebreakers was the first serious book I read about codebreaking, and one of the primary reasons I entered this...

A Self-Enforcing Protocol to Solve Gerrymandering
From Schneier on Security

A Self-Enforcing Protocol to Solve Gerrymandering

In 2009, I wrote: There are several ways two people can divide a piece of cake in half. One way is to find someone impartial to do it for them. This works, but...

Lego Computer Science: Turing Machines Part 1: the tape
From CS4FN (Computer Science For Fun)

Lego Computer Science: Turing Machines Part 1: the tape

by Paul Curzon, Queen Mary University of London It it possible to make a working computer out of lego and you do not even have to pay for an expensive robot Mindstorm...

Paderborn Center for Parallel Computing to Install Lenovo HPC Cluster
From insideHPC

Paderborn Center for Parallel Computing to Install Lenovo HPC Cluster

Lenovo announced it has won a contract for the joint construction of an AMD/NVIDIA-powered HPC cluster with the University of Paderborn in Germany. The system will...

Last Call for CCC Council Member Nominations
From The Computing Community Consortium Blog

Last Call for CCC Council Member Nominations

Thank you to everyone who has nominated a colleague or self-nominated for the opportunity to be a CCC Council member for the three-year term beginning July 1, 2024...

Integrated Research Infrastructure: Argonne Combines HPC and Experiments to Speed Discovery
From insideHPC

Integrated Research Infrastructure: Argonne Combines HPC and Experiments to Speed Discovery

For over a decade, Argonne has been working to develop tools and methods to connect its powerful computing resources with large-scale experiments. Merging ALCFIntegrated...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account