acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

What does it mean to trust a technology?
From Putting People First

What does it mean to trust a technology?

Trust depends on perceptions of whether sociotechnical systems are seen as beneficial and well-governed as well as whether they work as their designers expect.

Friday Squid Blogging: Underwater Sculptures Use Squid Ink for Coloring
From Schneier on Security

Friday Squid Blogging: Underwater Sculptures Use Squid Ink for Coloring

The Molinière Underwater Sculpture Park has pieces that are colored in part with squid ink. As usual, you can also use this squid post to talk about the security...

At SC23: Achronix Talks Turnkey FPGA Solutions for Generative AI
From insideHPC

At SC23: Achronix Talks Turnkey FPGA Solutions for Generative AI

We caught up with Achronix at SC23, the FPGA company that touts its turnkey solutions for generative AI workloads – automatic speech recognition in particular.At...

ACM-W Chair Review of 2023
From ACM-W supporting, celebrating and advocating for Women in Computing

ACM-W Chair Review of 2023

It is great to look back on the year to see just how far we have come. This year, new people joined our groups, working groups, and standing committees. The ACM...

Quantum Computing: Potential, Practicality and Perils
From ACM-W supporting, celebrating and advocating for Women in Computing

Quantum Computing: Potential, Practicality and Perils

The latest episode of Celebrating Technology Leaders focused on Quantum Computing, a relatively new yet fascinating career track.  Our panelists How did our panelists...

A Robot the Size of the World
From Schneier on Security

A Robot the Size of the World

In 2016, I wrote about an Internet that affected the world in a direct, physical manner. It was connected to your smartphone. It had sensors like cameras and thermostats...

CS4FN Advent 2023 – Day 15: a candle: optical fibre, optical illusions
From CS4FN (Computer Science For Fun)

CS4FN Advent 2023 – Day 15: a candle: optical fibre, optical illusions

After yesterday’s tinsel image inspiring a cable / broadband speeds themed post, today’s CS4FN Christmas Computing Advent Calendar picture of a candle has of course...

Surveillance Cameras Disguised as Clothes Hooks
From Schneier on Security

Surveillance Cameras Disguised as Clothes Hooks

This seems like a bad idea. And there are ongoing lawsuits against Amazon for selling them.

Intel Announces AI-Oriented 5th Gen Xeon, Gives Gaudi3 GPU Accelerator Sneak Peak
From insideHPC

Intel Announces AI-Oriented 5th Gen Xeon, Gives Gaudi3 GPU Accelerator Sneak Peak

Gearing up for what it intends to be a multi-horse race in the exploding AI chip sector, Intel today announced a next-generation Xeon enterprise and data center...

CS4FN Advent 2023 – Day 14: Why is your internet so slow + a festive kriss-kross puzzle
From CS4FN (Computer Science For Fun)

CS4FN Advent 2023 – Day 14: Why is your internet so slow + a festive kriss-kross puzzle

Today’s CS4FN Christmas Computing Advent Calendar is showing a picture of shiny tinsel, which reminds me a bit of computer cables. At least, enough to theme this...

How HPC Centers Can Start the Move to Quantum Now
From insideHPC

How HPC Centers Can Start the Move to Quantum Now

By Mark Mattingley-Scott, Quantum Brilliance -- To get started, it's best HPC center and their customers to go with a small and incremental quantum strategy. AHow...

Extended book excerpt: Computational propaganda
From Geeking with Greg

Extended book excerpt: Computational propaganda

(This is a long excerpt about manipulation of algorithms by adversaries from my book, "Algorithms and Misinformation: Why Wisdom of the Crowds Failed the Internet...

From Computational Complexity

Respect

I've generally avoided talking about all the events at college campuses in the last few months that came to a head at the congressional hearings last week that...

CCC and CRA-I Respond to NIH RFI on Developing Consent Language for Research Using Digital Health Technologies
From The Computing Community Consortium Blog

CCC and CRA-I Respond to NIH RFI on Developing Consent Language for Research Using Digital Health Technologies

Yesterday, CCC, in collaboration with CRA-Industry (CRA-I), responded to a Request for Information released by the National Institutes of Health (NIH) on Developing...

Looking Forward to Computer Science Education in 2024
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Looking Forward to Computer Science Education in 2024

“Prediction is very difficult, especially if it’s about the future!” --Niels BohrMy track record at looking forward in CS education is a mixed bag. I kept expecting...

Surveillance by the US Postal Service
From Schneier on Security

Surveillance by the US Postal Service

This is not about mass surveillance of mail, this is about sorts of targeted surveillance the US Postal Inspection Service uses to catch mail thieves: To track...

CS4FN Advent 2023 – Day 13: woolly hat: warming versus cooling
From CS4FN (Computer Science For Fun)

CS4FN Advent 2023 – Day 13: woolly hat: warming versus cooling

Welcome to Day 3 of the CS4FN Christmas Computing Advent Calendar. The picture on the ‘box’ was a woolly bobble / pom-pom hat, so let’s see if we can find something...

Measuring the size of the cache line empirically
From Daniel Lemire's Blog

Measuring the size of the cache line empirically

Our computers do not read or write memory in units of bits or even bytes. Rather memory is accessed in small blocks of memory called “cache line”. For a given system...

Terra Quantum Launches TQ42 Quantum-as-a-Service Platform
From insideHPC

Terra Quantum Launches TQ42 Quantum-as-a-Service Platform

St. Gallen, Switzerland – December 12, 2023 – Quantum softare company Terra Quantum today launched TQ42, a quantum software-as-a-service platform designed to make...

New Windows/Linux Firmware Attack
From Schneier on Security

New Windows/Linux Firmware Attack

Interesting attack based on malicious pre-OS logo images: LogoFAIL is a constellation of two dozen newly discovered vulnerabilities that have lurked for years,...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account