acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

ALCF: Groq AI Online Workshop, Dec. 6-7
From insideHPC

ALCF: Groq AI Online Workshop, Dec. 6-7

The Argonne Leadership Computing Facility will host an online workshop to learn about the ALCF’s new GroqRack system on Monday and Tuesday, Dec. 6 and 7 from 1:30...

Email Security Flaw Found in the Wild
From Schneier on Security

Email Security Flaw Found in the Wild

Google’s Threat Analysis Group announced a zero-day against the Zimbra Collaboration email server that has been used against governments around the world. TAG has...

TierPoint Selects DDC Cabinet Technology for AI Workloads in High-Density Data Center
From insideHPC

TierPoint Selects DDC Cabinet Technology for AI Workloads in High-Density Data Center

San Diego – DDC Cabinet Technology, maker of scalable data center-to-edge solutions that feature patented Dynamic Density Control (DDC) technology, announced the...

The Future of Research on Social Technologies Visioning Workshop
From The Computing Community Consortium Blog

The Future of Research on Social Technologies Visioning Workshop

Earlier this month, the CCC, with support from the Knight Foundation, held a visioning workshop on, “The Future of Research on Social Technologies.” The workshop...

NVIDIA Announces Ethernet Platform for AI from Dell, HPE, Lenovo
From insideHPC

NVIDIA Announces Ethernet Platform for AI from Dell, HPE, Lenovo

Nov. 20, 2024 — NVIDIA today announced that Dell Technologies, Hewlett Packard Enterprise and Lenovo will be the first to integrate NVIDIA Spectrum-X Ethernet networking...

HPC News Bytes 20231120: SC23 Overview – Exascale Update, New AI Chips, Quantum Village, UCIe-PCIe-Ultra Ethernet
From insideHPC

HPC News Bytes 20231120: SC23 Overview – Exascale Update, New AI Chips, Quantum Village, UCIe-PCIe-Ultra Ethernet

In this edition of the HPC News Bytes podcast, Shahin takes us on a rapid (5:04) tour of SC23, analyzing the key developments and new technologies that highlighted...

EQSIM and RAJA: Enabling Exascale Predictions of Earthquake Effects on Critical Infrastructure
From insideHPC

EQSIM and RAJA: Enabling Exascale Predictions of Earthquake Effects on Critical Infrastructure

Nearly 120 years ago, the great San Francisco earthquake of 1906 provided a stark and sobering view of the havoc that can be caused by the sudden and violent movement...

From Computational Complexity

War Games

With the self-destruction of OpenAI well underway, Friday night I watched the movie War Games for the first time since the 80s. Quick synopsis (spoilers): NORAD...

Using Generative AI for Surveillance
From Schneier on Security

Using Generative AI for Surveillance

Generative AI is going to be a powerful tool for data analysis and summarization. Here’s an example of it being used for sentiment analysis. My guess is that it...

Friday Squid Blogging: Unpatched Vulnerabilities in the Squid Caching Proxy
From Schneier on Security

Friday Squid Blogging: Unpatched Vulnerabilities in the Squid Caching Proxy

In a rare squid/security post, here’s an article about unpatched vulnerabilities in the Squid caching proxy. As usual, you can also use this squid post to talkhere...

Book excerpt: How companies build algorithms using experimentation
From Geeking with Greg

Book excerpt: How companies build algorithms using experimentation

(This is an excerpt from drafts of my book, "Algorithms and Misinformation: Why Wisdom of the Crowds Failed the Internet and How to Fix It") Wisdom of the crowd...

Advanced Clustering Launches Log File Analyzer  LogVisor AI
From insideHPC

Advanced Clustering Launches Log File Analyzer LogVisor AI

Advanced Clustering Technologies today announced the high performance computing systems integrator’s LogVisor AI during the SC23 conference in Denver. LogVisorAdvanced...

New Commodity Supercomputing Clusters Deployed at NNSA Labs Claim TOP500 Spots
From insideHPC

New Commodity Supercomputing Clusters Deployed at NNSA Labs Claim TOP500 Spots

Three of the newest National Nuclear Security Administration (NNSA) commodity computing clusters recently deployed at Lawrence Livermore National Laboratory (LLNL)...

LLNL-led SCREAM Team Clinches Inaugural Gordon Bell Prize for Climate Modeling
From insideHPC

LLNL-led SCREAM Team Clinches Inaugural Gordon Bell Prize for Climate Modeling

A Lawrence Livermore National Laboratory (LLNL)-led effort that performed an unprecedented global climate model simulation on the world’s first exascale supercomputer...

Ransomware Gang Files SEC Complaint
From Schneier on Security

Ransomware Gang Files SEC Complaint

A ransomware gang, annoyed at not being paid, filed an SEC complaint against its victim for not disclosing its security breach within the required four days. This...

It's easy for social media to fill with astroturf
From Geeking with Greg

It's easy for social media to fill with astroturf

Most underestimate how easy it is for social media to become dominated by astroturf. It's easy. All you need is a few people creating and controlling multiple accounts...

DE-CIX and CR8DL Announce Enhanced Data Capabilities Partnership for HPC
From insideHPC

DE-CIX and CR8DL Announce Enhanced Data Capabilities Partnership for HPC

New York & Phoenix, November 16, 2023 — Internet exchange operator DE-CIX and CR8DL, a cloud-based high-performance computing company, today announce a research...

From Computational Complexity

Inverting a Function

With the STOC deadline this last Monday, a number of complexity papers have appeared on arXiV and ECCC. Two caught my eye because they seem to independently prove...

Accelerating AI Inference for High-throughput Experiments
From insideHPC

Accelerating AI Inference for High-throughput Experiments

An upgrade to the ALCF AI Testbed will help accelerate data-intensive experimental research. The Argonne Leadership Computing Facility’s (ALCF) AI Testbed—which...

Leaving Authentication Credentials in Public Code
From Schneier on Security

Leaving Authentication Credentials in Public Code

Seth Godin wrote an article about a surprisingly common vulnerability: programmers leaving authentication credentials and other secrets in publicly accessible software...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account