acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Breaking a Password Manager
From Schneier on Security

Breaking a Password Manager

Interesting story of breaking the security of the RoboForm password manager in order to recover a cryptocurrency wallet password. Grand and Bruno spent months reverse...

Northern Data Group Launches Nvidia-based AI Accelerator Powered by Carbon-Free Energy
From insideHPC

Northern Data Group Launches Nvidia-based AI Accelerator Powered by Carbon-Free Energy

Frankfurt/Main – 3 June 2024 – Northern Data Group (German stock market: NB2, ISIN: DE000A0SMU87), a provider of HPC solutions, today announces the launch of its...

From Computational Complexity

FOCS 2024 Test of Time Award. Call for nominations and my opinion

 The call for nominations for the Test of Time Award at FOCS 2024 has been posted here.Eligibility and past winners are here.Points1) It is good to have an award...

3 examples of grand challenges that had successful outcomes
From The Computing Community Consortium Blog

3 examples of grand challenges that had successful outcomes

In the rapidly evolving landscape of computing, grand challenges emerge as pivotal milestones that shape the trajectory of technological advancement and societal...

Qumulo Announces AI Infrastructure Benchmark Results with Azure Native Qumulo
From insideHPC

Qumulo Announces AI Infrastructure Benchmark Results with Azure Native Qumulo

SEATTLE – June 3rd, 2024 – Today, data storage and management company Qumulo said it achieved the industry’s fastest and most cost-effective cloud-native storage...

Pinecone Names Lauren Nemeth COO ad Bob Muglia as Board Member 
From insideHPC

Pinecone Names Lauren Nemeth COO ad Bob Muglia as Board Member 

NEW YORK, June 3, 2024 – Vector database AI company Pinecone today announced that Lauren Nemeth and Bob Muglia have joined the company as chief operating officer...

Seeing Like a Data Structure
From Schneier on Security

Seeing Like a Data Structure

Technology was once simply a tool—and a small one at that—used to amplify human intent and capacity. That was the story of the industrial revolution: we could control...

AI Will Increase the Quantity—and Quality—of Phishing Scams
From Schneier on Security

AI Will Increase the Quantity—and Quality—of Phishing Scams

A piece I coauthored with Fredrik Heiding and Arun Vishwanath in the Harvard Business Review: Summary. Gen AI tools are rapidly making these emails more advanced...

From Gödel's Lost Letter and P=NP

A Most Important Number

It seems like we’ve been noticing 34 everywhere we look lately, whether it’s on billboards, in phone numbers, or even inside fortune cookies. Is it all just a coincidence...

From Egyptian Survey puzzles to computational thinking
From CS4FN (Computer Science For Fun)

From Egyptian Survey puzzles to computational thinking

by Paul Curzon, Queen Mary University of London One way to use logical thinking is to deduce new facts but then turn them into IF-THEN rules. They tell us an action...

Friday Squid Blogging: Baby Colossal Squid
From Schneier on Security

Friday Squid Blogging: Baby Colossal Squid

This video might be a juvenile colossal squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered....

CEA-Leti Reports 3-Layer Integration, Progress toward AI-Embedded CMOS Image Sensors
From insideHPC

CEA-Leti Reports 3-Layer Integration, Progress toward AI-Embedded CMOS Image Sensors

DENVER – May 31, 2024 – CEA-Leti scientists have reported three projects at ECTC 2024 that they say are steps to enabling CMOS image sensors (CIS) that can exploit...

How AI Will Change Democracy
From Schneier on Security

How AI Will Change Democracy

I don’t think it’s an exaggeration to predict that artificial intelligence will affect every aspect of our society. Not by doing new things. But mostly by doing...

Quickly checking whether a string needs escaping
From Daniel Lemire's Blog

Quickly checking whether a string needs escaping

In software, we often represent strings by surrounding them with quotes ("). What happens if the string itself contains quotes? We then need to escape the string...

Never reason from the results of a sampling profiler
From Daniel Lemire's Blog

Never reason from the results of a sampling profiler

In the quest for software optimization, a trusty companion is the sampling profiler, a tool available in most programming languages. These profilers work unobtrusively...

Lenovo and Cisco Announce AI Partnership
From insideHPC

Lenovo and Cisco Announce AI Partnership

May 30, 2024 – Lenovo and Cisco today unveiled a partnership intended to deliver fully integrated infrastructure and networking solutions designed to accelerate...

Quantum: Photonic Demonstrates Distributed Entanglement between Modules
From insideHPC

Quantum: Photonic Demonstrates Distributed Entanglement between Modules

VANCOUVER, BC, May 30, 2024—Photonic Inc., a distributed quantum computing in silicon company, today announced what the company said is a milestone on the pathQuantum...

Eviden to Deliver Supercomputer for University of Reims Champagne-Ardenne
From insideHPC

Eviden to Deliver Supercomputer for University of Reims Champagne-Ardenne

Paris - May 30, 2024 - Eviden today announces that it has been selected by the University of Reims Champagne-Ardenne (URCA) to supply the university with a newEviden...

Ultra Accelerator Link Group for Data Center AI Connectivity Formed: AMD, Broadcom, Cisco, Google, HPE, Intel, Meta and Microsoft
From insideHPC

Ultra Accelerator Link Group for Data Center AI Connectivity Formed: AMD, Broadcom, Cisco, Google, HPE, Intel, Meta and Microsoft

BEAVERTON, Ore.– AMD, Broadcom, Cisco, Google, Hewlett Packard Enterprise (HPE), Intel, Meta and Microsoft today announced they have aligned to develop a new industry...

Supply Chain Attack against Courtroom Software
From Schneier on Security

Supply Chain Attack against Courtroom Software

No word on how this backdoor was installed: A software maker serving more than 10,000 courtrooms throughout the world hosted an application update containing a...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account