acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Rethinking Democracy for the Age of AI
From Schneier on Security

Rethinking Democracy for the Age of AI

There is a lot written about technology’s threats to democracy. Polarization. Artificial intelligence. The concentration of wealth and power. I have a more general...

Four Ways Robotics Can Alleviate Long-Term Challenges in the US
From The Computing Community Consortium Blog

Four Ways Robotics Can Alleviate Long-Term Challenges in the US

The 2024 Robotics Roadmap, released on April 26, states that the United States, once a frontrunner in robotics innovation, now faces a critical juncture as it lags...

HPC News Bytes 20240617: Controlling AI, Big Tech Invests in Taiwan, A Step for Specialty AI Chips, Alternative Energy for AI Data Centers, Apple Silicon
From insideHPC

HPC News Bytes 20240617: Controlling AI, Big Tech Invests in Taiwan, A Step for Specialty AI Chips, Alternative Energy for AI Data Centers, Apple Silicon

A happy summer solstice week to you! The HPC-AI ecosystem produced a raft of news and insights over the past week, here’s a rapid (7:59) review: New paper in Science...

D-Wave Introduces Hybrid Quantum Solver
From insideHPC

D-Wave Introduces Hybrid Quantum Solver

PALO ALTO, Calif. – June 17, 2024 – D-Wave Quantum Inc. (NYSE: QBTS) announced today at its Qubits 2024 user conference the launch of a new hybrid quantum solver...

Qumulo Announces Azure Native Qumulo Benchmark Results
From insideHPC

Qumulo Announces Azure Native Qumulo Benchmark Results

SEATTLE – June 17, 2024 – At-scale data management company Qumulo announced what it said is the industry’s fastest and most cost-effective cloud-native storageQumulo...

Using LLMs to Exploit Vulnerabilities
From Schneier on Security

Using LLMs to Exploit Vulnerabilities

Interesting research: “Teams of LLM Agents can Exploit Zero-Day Vulnerabilities.” Abstract: LLM agents have become increasingly sophisticated, especially in the...

From Computational Complexity

Should Prover and Verifier have been Pat and Vanna?

LANCE: I had my first Quanta Article published! I explore computation, complexity, randomness and learning and feeling the machine.BILL: Feels to me like a mashup...

Mary Ann Horton and the invention of email attachments
From CS4FN (Computer Science For Fun)

Mary Ann Horton and the invention of email attachments

Edie Schlain Windsor was a senior systems programmer at IBM. There is more to life than computing though. She led the landmark US Supreme Court Case that was a...

Friday Squid Blogging: Squid Cartoon
From Schneier on Security

Friday Squid Blogging: Squid Cartoon

Squid humor. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here...

The Growing Interest in On-Prem Quantum Computing
From insideHPC

The Growing Interest in On-Prem Quantum Computing

By Yuval Boger, QuEra Computing -- Companies and research institutions are leveraging early-stage quantum computers to experiment and serve as invaluable research...

NCSA Names Chuck Pavloski Associate Director of Engagement
From insideHPC

NCSA Names Chuck Pavloski Associate Director of Engagement

June 14, 2024 — The National Center for Supercomputing Applications has named Chuck Pavloski, Ph.D., its new Associate Director of Engagement. The role was recently...

DOE CSGF Announces Incoming 2024-25 Class
From insideHPC

DOE CSGF Announces Incoming 2024-25 Class

Ames, Iowa, June 14, 2024 — A record 40 students on the path to achieving doctorates in fields that emphasize use of computing and mathematics are now being welcomed...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m appearing on a panel on Society and Democracy at ACM Collective Intelligence in Boston, Massachusetts...

Demo of AES GCM Misuse Problems
From Schneier on Security

Demo of AES GCM Misuse Problems

This is really neat demo of the security problems arising from reusing nonces with a symmetric cipher in GCM mode.

Rolling your own fast matrix multiplication: loop order and vectorization
From Daniel Lemire's Blog

Rolling your own fast matrix multiplication: loop order and vectorization

If you must multiply matrices, you should use dedicated libraries. However, we sometimes need to roll our own code. In C++, you can quickly write your own Matrix...

Quobyte Software-Defined Storage Brings Its HPC and Hyperscaler Heritage to AI Workloads
From insideHPC

Quobyte Software-Defined Storage Brings Its HPC and Hyperscaler Heritage to AI Workloads

Quobyte comes from an HPC heritage as well as providing storage solutions for hyperscalers. “We wanted to bring HPC to the enterprise with the software approach...

Argonne HPC Webinar July 17: Getting Started on Polaris and Nvidia Developer Tools Bootcamp
From insideHPC

Argonne HPC Webinar July 17: Getting Started on Polaris and Nvidia Developer Tools Bootcamp

On Wednesday, July 17, 2024, 11 amf-1 pm Central Time, the Argonne Leadership Computing Facility will hold an online webinar to introduce attendees to the Polaris...

Systems and Applications Challenges for the Emerging Bazaar of Accelerators Report Release
From The Computing Community Consortium Blog

Systems and Applications Challenges for the Emerging Bazaar of Accelerators Report Release

The CCC held the Systems and Applications Challenges for the Emerging Bazaar of Accelerators workshop in August of 2023 in Washington, DC. The workshop was organized...

From Computational Complexity

Favorite Theorems: Algebraic Circuits

Most of my favorite theorems tell us something new about the world of complexity. But let's not forget the greatest technical challenges in our area: proving separations...

AI and the Indian Election
From Schneier on Security

AI and the Indian Election

As India concluded the world’s largest election on June 5, 2024, with over 640 million votes counted, observers could assess how the various parties and factions...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account