acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Does C++ allow template specialization by concepts?
From Daniel Lemire's Blog

Does C++ allow template specialization by concepts?

Recent versions of C++ (C++20) have a new feature: concepts. A concept in C++ is a named set of requirements that a type must satisfy. E.g., ‘act like a string’...

CCC Q&A: A High Performance Computing Researcher Explains Sustainable AI
From The Computing Community Consortium Blog

CCC Q&A: A High Performance Computing Researcher Explains Sustainable AI

CCC spoke with one of its council members, Michela Taufer about her work in high performance computing (HPC) and her contributions to sustainable AI. Taufer has...

July/August 2024 edition of Interactions magazine is out
From Putting People First

July/August 2024 edition of Interactions magazine is out

The latest issue of Interactions magazine, published by ACM, contains five feature stories, four of which are about AI and interaction design.

Snake Mimics a Spider
From Schneier on Security

Snake Mimics a Spider

This is a fantastic video. It’s an Iranian spider-tailed horned viper (Pseudocerastes urarachnoides). Its tail looks like a spider, which the snake uses to fool...

Post CSTA 2024 Thoughts
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Post CSTA 2024 Thoughts

The 2024 CSTA conference was the best one ever for me. It was wonderful to catchup with old friends and to talk to many people I had never met before. CSTA is about...

From Computational Complexity

FLT solution annouement had its 31's anniv was about a month ago. Some poems about FLT NOT from ChatGPT

On June 21, 1993, at the Issac Newton Institute for Mathematical Science, Andrew Wiles announced that he had proven Fermat's Last Theorem. That wasn't quite right...

Scan HTML even faster with SIMD instructions (C++ and C#)
From Daniel Lemire's Blog

Scan HTML even faster with SIMD instructions (C++ and C#)

Earlier this year, both major Web engines (WebKit/Safari and Chromium/Chrome/Edge/Brave) accelerated HTML parsing using SIMD instructions. These ‘SIMD’ instructions...

Friday Squid Blogging: Peru Trying to Protect its Squid Fisheries
From Schneier on Security

Friday Squid Blogging: Peru Trying to Protect its Squid Fisheries

Peru is trying to protect its territorial waters from Chinese squid-fishing boats. Blog moderation policy.

CSTA Day Four
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

CSTA Day Four

Last day of the conference and I woke up to news of a global network outage that was causing delays in thousands of flights. Including my trip home. Oh well. IGUI4Sher...

Brett Solomon on Digital Rights
From Schneier on Security

Brett Solomon on Digital Rights

Brett Solomon is retiring from AccessNow after fifteen years as its Executive Director. He’s written a blog post about what he’s learned and what comes next.

CCC Weekly Computing News: NERVE Center Summer Camp Welcomes Middle School Students to the Field of Robotics
From The Computing Community Consortium Blog

CCC Weekly Computing News: NERVE Center Summer Camp Welcomes Middle School Students to the Field of Robotics

In this installment of CCC’s Weekly Computing News, we are sharing an exciting opportunity for middle school students to explore the diverse field of robotics....

CoreWeave and Bloom Energy Partner on AI Data Center Power
From insideHPC

CoreWeave and Bloom Energy Partner on AI Data Center Power

SAN JOSE, July 19, 2024 — Solid oxide fuel cell technology company Bloom Energy Corporation (NYSE: BE) and GPU cloud services company CoreWeave have formed a partnership...

WHPC Announces 20th International Women in HPC Workshop: Lightning Talk Submissions Aug. 16 Deadline
From insideHPC

WHPC Announces 20th International Women in HPC Workshop: Lightning Talk Submissions Aug. 16 Deadline

Bicester, England, July, 2024 – The WHPC Executive Committee and Volunteers for SC24 have announced the launch of the 20th International Women in HPC Workshop:WHPC...

CSTA Day Three
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

CSTA Day Three

Before I start on my day three report, I want to suggest people look at Mike Zamansky’s Day Two report on his blog. We attended mostly different sessions and he...

CSTA 2024 Exhibit Hall
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

CSTA 2024 Exhibit Hall

The exhibit hall was impressive this year. I believe three are something like 80 exhibitors. Below is a snapshot of s few of them that caught my eye. The usualFuture...

TSMC Reports Second Quarter YoY Revenue Jump of 40%, Income up 36%
From insideHPC

TSMC Reports Second Quarter YoY Revenue Jump of 40%, Income up 36%

HSINCHU, Taiwan, R.O.C., Jul. 18, 2024 — TSMC (TWSE: 2330, NYSE: TSM) today announced consolidated revenue of NT$673.51 billion, net income of NT$247.85 billion...

Full Circle: Cornelis Names Intel Veteran Lisa Spelman CEO
From insideHPC

Full Circle: Cornelis Names Intel Veteran Lisa Spelman CEO

Interconnect company Cornelis Networks today said it has named Lisa Spelman its new CEO. Spelman joins the company from Intel, which made a major push into theFull...

Joyce Weisbecker: the first indie games developer?
From CS4FN (Computer Science For Fun)

Joyce Weisbecker: the first indie games developer?

Mary Ann Horton was transitioning to female at the time that she made one of her biggest contributions to our lives with a simple computer science idea with a...

Exascale: Frontier  Supercomputer Used in Molecular Dynamics Simulation of 2M Electrons
From insideHPC

Exascale: Frontier Supercomputer Used in Molecular Dynamics Simulation of 2M Electrons

The exascale- class Frontier supercomputer set a new standard for calculating the number of atoms in a molecular dynamics simulation 1,000 times greater in size...

Criminal Gang Physically Assaulting People for Their Cryptocurrency
From Schneier on Security

Criminal Gang Physically Assaulting People for Their Cryptocurrency

This is pretty horrific: …a group of men behind a violent crime spree designed to compel victims to hand over access to their cryptocurrency savings. That announcement...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account