acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

@HPCpodcast: Women in HPC Leader Cristin Merritt Talks Diversity and Strategies for Organizational Change
From insideHPC

@HPCpodcast: Women in HPC Leader Cristin Merritt Talks Diversity and Strategies for Organizational Change

A leading – and highly energetic – advocate for diversity in HPC, Cristin Merritt of Women in HPC, joins Shahin and Doug in this episode of the @HPCpodcast, sponsored...

From Gödel's Lost Letter and P=NP

Frontiers in Complexity Theory

This summer DIMACS will hold an advanced workshop for graduate students in complexity theory. It is on July 29 till August 1. The organizers are: Lijie Chen, Roei...

New Lawsuit Attempting to Make Adversarial Interoperability Legal
From Schneier on Security

New Lawsuit Attempting to Make Adversarial Interoperability Legal

Lots of complicated details here: too many for me to summarize well. It involves an obscure Section 230 provision—and an even more obscure typo. Read this.

From Computational Complexity

May the fourth be with you. To many -days?

(This post was inspired by Rachel F, a prior REU-CAAR student, emailing me wishing me a happy Star Wars Day.)   I am writing this on May 4 which is Star Wars day...

Friday Squid Blogging: Squid Purses
From Schneier on Security

Friday Squid Blogging: Squid Purses

Squid-shaped purses for sale. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting...

CCC @ AAAS: How Big Trends in Computing are Shaping Science – Part Five
From The Computing Community Consortium Blog

CCC @ AAAS: How Big Trends in Computing are Shaping Science – Part Five

CCC supported three scientific sessions at this year’s AAAS Annual Conference, and in case you weren’t able to attend in person, we are recapping each session....

My TED Talks
From Schneier on Security

My TED Talks

I have spoken at several TED conferences over the years. TEDxPSU 2010: “Reconceptualizing Security” TEDxCambridge 2013: “The Battle for Power on the Internet”...

From Gödel's Lost Letter and P=NP

1968 vs 2024

As we know, the last few days, have been tough times for certain groups of students at our universities. The groups have rioted, were then arrested by police, and...

Rare Interviews with Enigma Cryptanalyst Marian Rejewski
From Schneier on Security

Rare Interviews with Enigma Cryptanalyst Marian Rejewski

The Polish Embassy has posted a series of short interview segments with Marian Rejewski, the first person to crack the Enigma. Details from his biography.

Quantum: Photonic Adds to its Executive Management Team
From insideHPC

Quantum: Photonic Adds to its Executive Management Team

VANCOUVER, May 2, 2024—Quantum in silicon company Photonic today announced it is adding to its executive leadership team in the areas of research and development...

Australian Government Invests $940M AUD in PsiQuantum
From insideHPC

Australian Government Invests $940M AUD in PsiQuantum

April 29, 2024 — The Australian government has announced a $940 million AUD — about $617 million US — investment in PsiQuantum, a Silicon Valley start-up with Australian...

INCITE Proposal Writing Webinar May 7
From insideHPC

INCITE Proposal Writing Webinar May 7

May 2, 2024 — The Department of Energy’s Innovative and Novel Computational Impact on Theory and Experiment (INCITE) program is the principal means for the scientific...

GigaIO and Valkyrie Announce AI Readiness Services
From insideHPC

GigaIO and Valkyrie Announce AI Readiness Services

Carlsbad, California, May 2, 2024 – Composable infrastructure company GigaIO and AI engineering firm Valkyrie today announced the launch of their joint AI readiness...

CCC @ AAAS: How Big Trends in Computing are Shaping Science – Part Four
From The Computing Community Consortium Blog

CCC @ AAAS: How Big Trends in Computing are Shaping Science – Part Four

CCC supported three scientific sessions at this year’s AAAS Annual Conference, and in case you weren’t able to attend in person, we are recapping each session....

Intersect360 Research Announces HPC-AI User Organization
From insideHPC

Intersect360 Research Announces HPC-AI User Organization

SUNNYVALE, CA—May 2, 2024 — Intersect360 Research has announced the launch of the HPC-AI Leadership Organization (HALO), a geographically diverse end-user organization...

Should Node.js be built with ClangCL under Windows?
From Daniel Lemire's Blog

Should Node.js be built with ClangCL under Windows?

Under Windows, when using Visual Studio to build C++ code, there are two possible compiler strategies. The Visual Studio compiler (often referred to as MSVC) is...

Eviden Launches AI Computing Portfolio
From insideHPC

Eviden Launches AI Computing Portfolio

Eviden today announced the BullSequana AI  product line that includes five AI server ranges for inferencing AI models at the edge, tuning existing models in enterprise...

The UK Bans Default Passwords
From Schneier on Security

The UK Bans Default Passwords

The UK is the first country to ban default passwords on IoT devices. On Monday, the United Kingdom became the first country in the world to ban default guessable...

From Computational Complexity

Our Obsession with Proofs

Bullinger's post on this blog last week focused on Vijay Vazirani's public obsession of finding a proof for the 1980 Micali-Vazirani matching algorithm. But why...

CCC @ AAAS: How Big Trends in Computing are Shaping Science – Part Three
From The Computing Community Consortium Blog

CCC @ AAAS: How Big Trends in Computing are Shaping Science – Part Three

CCC supported three scientific sessions at this year’s AAAS Annual Conference, and in case you weren’t able to attend in person, we are recapping each session....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account