acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Search and the Art of Conversation
From The Noisy Channel

Search and the Art of Conversation

What is the job of a search application? A common answer is that it needs to return the best results for a query, sorted in relevance order. While this answer sounds...

New Research in Detecting AI-Generated Videos
From Schneier on Security

New Research in Detecting AI-Generated Videos

The latest in what will be a continuing arms race between creating and detecting videos: The new tool the research project is unleashing on deepfakes, called “MISLnet...

ACM-W Global Chapter Summit 2024 
From ACM-W supporting, celebrating and advocating for Women in Computing

ACM-W Global Chapter Summit 2024 

The inaugural ACM-W Global Chapter Summit 2024 took place on May 22, 2024. This virtual event provided a forum for global ACM-W chapters to meet. Participants could...

Evolution of iPhone storage capacity
From Daniel Lemire's Blog

Evolution of iPhone storage capacity

People who should know better often underestimate how fast our storage capacity has grown. We have been able to get 1 TB of storage on iPhones for the last three...

From Computational Complexity

In the future we will all have songs written about us, and it will be Lance's fault.

In response to my blog post about how its easier to FIND novelty songs (and other things) than it used to be (see here) Lance showed how easy it is to CREATE ahere...

Two reports on the current state of user research
From Putting People First

Two reports on the current state of user research

Maze and User Interviews, both USA-based entities providing user research platforms and user panels, published reports in the last months on the current state of...

Storage costs are plummeting
From Daniel Lemire's Blog

Storage costs are plummeting

Storage costs are plummeting like a skydiver in freefall—between 10 and 100 times cheaper with each passing decade. Meanwhile, the programmer population is growing...

How big are your docker images?
From Daniel Lemire's Blog

How big are your docker images?

Docker is a standard to deploy software on the cloud. Developers start with an existing image and add their own code before deploying their systems. How big are...

How much of your binary executable is just ASCII text?
From Daniel Lemire's Blog

How much of your binary executable is just ASCII text?

We sometimes use binary executable which can span megabytes. I wondered: how much text is contained in these binary files? To find out, I wrote a Python scriptContinue...

Friday Squid Blogging: Sunscreen from Squid Pigments
From Schneier on Security

Friday Squid Blogging: Sunscreen from Squid Pigments

They’re better for the environment. Blog moderation policy.

From Gödel's Lost Letter and P=NP

Fulkerson Prize

The Fulkerson prize is given to: outstanding papers in the area of discrete mathematics and is sponsored jointly by the Mathematical Optimization Society (MOS)...

Compromising the Secure Boot Process
From Schneier on Security

Compromising the Secure Boot Process

This isn’t good: On Thursday, researchers from security firm Binarly revealed that Secure Boot is completely compromised on more than 200 device models sold by...

UK Commits £106M to 5 Quantum Hubs
From insideHPC

UK Commits £106M to 5 Quantum Hubs

The UK government announced it will invest £106 million for five hubs to develop the use of quantum technology in medical scanners, secure communication networks...

Safer code in C++ with lifetime bounds
From Daniel Lemire's Blog

Safer code in C++ with lifetime bounds

For better performance in software, we avoid unnecessary copies. To do so, we introduce references (or pointers). An example of this ideas in C++ is the std::string_view...

CCC Weekly Computing News: CDT Releases Report on Reducing Disability Bias
From The Computing Community Consortium Blog

CCC Weekly Computing News: CDT Releases Report on Reducing Disability Bias

In this installment of CCCs Weekly Computing News, we’re sharing an important report by the Center for Democracy & Technology that addresses the need for better...

The CrowdStrike Outage and Market-Driven Brittleness
From Schneier on Security

The CrowdStrike Outage and Market-Driven Brittleness

Friday’s massive internet outage, caused by a mid-sized tech company called CrowdStrike, disrupted major airlines, hospitals, and banks. Nearly 7,000 flights were...

A Thank You Note from the Past Chair, Ruth Lennon
From ACM-W supporting, celebrating and advocating for Women in Computing

A Thank You Note from the Past Chair, Ruth Lennon

I have never been one to highlight myself on this website as I think it is better to highlight others. That is why we are here – to advocate for women in computing...

Lambda Launches Nvidia-Based Cloud Clusters for AI Model Training
From insideHPC

Lambda Launches Nvidia-Based Cloud Clusters for AI Model Training

SAN JOSE, July 24, 2024 — GPU cloud company Lambda has unveiled Lambda 1-Click Clusters, designed for AI engineers’ and researchers’ short-term access to multi-node...

Hitachi Vantara Announces General Availability of Hitachi iQ and New AI Discovery Service to Help Businesses Become AI-Ready
From insideHPC

Hitachi Vantara Announces General Availability of Hitachi iQ and New AI Discovery Service to Help Businesses Become AI-Ready

SANTA CLARA, Calif. – July 25, 2024 – Hitachi Vantara, the data storage, infrastructure, and hybrid cloud management subsidiary of Hitachi, Ltd. (TSE: 6501), today...

Data Wallets Using the Solid Protocol
From Schneier on Security

Data Wallets Using the Solid Protocol

I am the Chief of Security Architecture at Inrupt, Inc., the company that is commercializing Tim Berners-Lee’s Solid open W3C standard for distributed data ownership...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account