acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Microsoft and Security Incentives
From Schneier on Security

Microsoft and Security Incentives

Former senior White House cyber policy director A. J. Grotto talks about the economic incentives for companies to improve their security—in particular, Microsoft...

Designing for autistic people
From CS4FN (Computer Science For Fun)

Designing for autistic people

by Daniel Gill and Paul Curzon, Queen Mary University of London What should you be thinking about when designing for a specific group with specific needs, suchContinue...

Using Legitimate GitHub URLs for Malware
From Schneier on Security

Using Legitimate GitHub URLs for Malware

Interesting social-engineering attack vector: McAfee released a report on a new LUA malware loader distributed through what appeared to be a legitimate Microsoft...

Can you trust a smile?
From CS4FN (Computer Science For Fun)

Can you trust a smile?

You're probably pretty good at spotting a fake smile, but how might we teach robots to do the same...

From Computational Complexity

Intelligent Comments on Bill's G.H. Hardy/Avi W post that we did not post.

I posted (see here) about Avi Wigderson being a counterexample to two of G.H. Hardy's opinions:1) Hardy thought Math was a young man's game. I got some good comments...

How do you recognize an expert?
From Daniel Lemire's Blog

How do you recognize an expert?

Go back to the roots: experience. An expert is someone who has repeatedly solved the concrete problem you are encountering. If your toilet leaks, an experienced...

How quickly can you break a long string into lines?
From Daniel Lemire's Blog

How quickly can you break a long string into lines?

Suppose that you receive a long string and you need to break it down into lines. Consider the simplified problems where you need to break the string into segments...

Friday Squid Blogging: Squid Trackers
From Schneier on Security

Friday Squid Blogging: Squid Trackers

A new bioadhesive makes it easier to attach trackers to squid. Note: the article does not discuss squid privacy rights. As usual, you can also use this squid post...

From Gödel's Lost Letter and P=NP

Women in Math Research

Peter Gerdes is a mathematician working in computability theory a.k.a. recursion theory, a branch of mathematical logic studying what computers (aka Turing machines)...

SK hynix Partners with TSMC  on HBM
From insideHPC

SK hynix Partners with TSMC on HBM

Seoul, April 19, 2024 – Memory company SK hynix Inc. announced today a memorandum of understanding with TSMC to produce next-generation HBM and enhance logic and...

CONTACT Software Presents AAS Applications at Hannover Messe 2024
From insideHPC

CONTACT Software Presents AAS Applications at Hannover Messe 2024

April 19, 2024 — CONTACT Software is pushing the use of the Asset Administration Shell with its Elements platform. In Hannover, the company and its partners will...

Lenovo and NVIDIA Partner on New Hybrid AI Solutions
From insideHPC

Lenovo and NVIDIA Partner on New Hybrid AI Solutions

[SPONSORED GUEST ARTICLE] Lenovo unveiled the expansion of its ThinkSystem AI portfolio designed for the most demanding AI, data analytics and HPC workloads, featuring...

Panasas in Manufacturing and Fulfillment Partnership with Avnet 
From insideHPC

Panasas in Manufacturing and Fulfillment Partnership with Avnet 

SAN JOSE, April 18, 2024 — Data solutions company Panasas and Avnet (Nasdaq: AVT) today announced an agreement enabling Panasas to use Avnet Integrated, the systems...

Quantum: D-Wave Introduces Anneal Feature
From insideHPC

Quantum: D-Wave Introduces Anneal Feature

PALO ALTO, Calif – April 18, 2024 — Quantum computing company D-Wave Quantum Inc. (NYSE: QBTS) today launched the fast-anneal feature, available on all of D-Wave...

DOE Awards $16M for Traineeships in Accelerator Science & Engineering
From insideHPC

DOE Awards $16M for Traineeships in Accelerator Science & Engineering

April 18, 2024 — Today, the U.S. Department of Energy (DOE) announced $16 million in funding for four projects providing classroom training and research opportunities...

From Computational Complexity

Favorite Theorems: Quantum Provers

For our next favorite theorem, we look at the surprising power of provers who share entangled bits. If you can prove something to an arbitrarily computable verifier...

Other Attempts to Take Over Open Source Projects
From Schneier on Security

Other Attempts to Take Over Open Source Projects

After the XZ Utils discovery, people have been examining other open-source projects. Surprising no one, the incident is not unique: The OpenJS Foundation Cross...

Eviden Delivers 104 Pflops Nvidia-Powered EXA1-HE Supercomputer for CEA
From insideHPC

Eviden Delivers 104 Pflops Nvidia-Powered EXA1-HE Supercomputer for CEA

Paris – April 17, 2024 – CEA (The French Alternative Energies and Atomic Energy Commission) and Eviden, the Atos advanced computing business unit, today announce...

Opportunity to Respond to U.S. Air Force RFI on Countering Bias in AI/ML Datasets
From The Computing Community Consortium Blog

Opportunity to Respond to U.S. Air Force RFI on Countering Bias in AI/ML Datasets

Earlier this month The U.S. Air Force Chief Scientist’s inter-agency working group sent out a request for information (RFI) on unintended Artificial Intelligence...

eFlows4HPC Delivers European HPC Workflow Platform
From insideHPC

eFlows4HPC Delivers European HPC Workflow Platform

Barcelona, 16 April 2024 – The eFlows4HPC project announced it has delivered a workflow platform and an additional set of services facilitating the integrationeFlows4HPC...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account