acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

The Rise of Large-Language-Model Optimization
From Schneier on Security

The Rise of Large-Language-Model Optimization

The web has become so interwoven with everyday life that it is easy to forget what an extraordinary accomplishment and treasure it is. In just a few decades, much...

NVIDIA to Acquire Run:ai GPU Orchestration Software Vendor
From insideHPC

NVIDIA to Acquire Run:ai GPU Orchestration Software Vendor

Nvidia today announced it has agreed to acquire Run:ai, a Kubernetes-based workload management and orchestration software provider. Terms were not released butNVIDIA...

From Computational Complexity

Is Persistence an Anachronism?

Guest post by Martin BullingerVery recently, Vijay Vazirani's paper A Theory of Alternating Paths and Blossoms, from the Perspective of Minimum Length got accepted...

Lenovo Launches AI Servers with AMD MI300X GPUs
From insideHPC

Lenovo Launches AI Servers with AMD MI300X GPUs

Lenovo today announced AI-centric infrastructure systems in collaboration with AMD, including the ThinkSystem SR685a V3 8GPU server (pictured here), designed for...

Dan Solove on Privacy Regulation
From Schneier on Security

Dan Solove on Privacy Regulation

Law professor Dan Solove has a new article on privacy regulation. In his email to me, he writes: “I’ve been pondering privacy consent for more than a decade, and...

Announcing Rendering History – The Women of ACM-W
From ACM-W supporting, celebrating and advocating for Women in Computing

Announcing Rendering History – The Women of ACM-W

We are delighted to announce the newly published book Rendering History: The Women of ACM-W, edited by Gloria Childress Townsend. Townsend was active with the ACM...

CINECA Selects E4 Computer with Dell and Vast for Galileo 100 HPC Upgrade
From insideHPC

CINECA Selects E4 Computer with Dell and Vast for Galileo 100 HPC Upgrade

April 23, 2024 — E4 Computer Engineering has won the contract to upgrade Galileo 100, CINECA Interuniversity Consortium’s supercomputer and Tier-1 cloud systemCINECA...

Pasqal and Welinq Partner to Develop Quantum Interconnects
From insideHPC

Pasqal and Welinq Partner to Develop Quantum Interconnects

Paris – April 23, 2024 – Neutral atom quantum computing company Pasqal and Welinq, a quantum networking company, today announced a partnership intended to to address...

atNorth Names New Chief Development Officer
From insideHPC

atNorth Names New Chief Development Officer

Reykjavík, Iceland – April 23,  2024 – atNorth, a Nordic colocation, high-performance computing, and artificial intelligence service provider, has announced the...

Xinnor and Versatus Partner on HPC and AI Storage Solutions
From insideHPC

Xinnor and Versatus Partner on HPC and AI Storage Solutions

Haifa, Israel and San Paulo, Brazil – April 23, 2024: Xinnor, a provider of high-performance software RAID solutions, and Versatus HPC, an advisor and integrator...

Quantum Corp. Announces DXi All-Flash Backup Appliances
From insideHPC

Quantum Corp. Announces DXi All-Flash Backup Appliances

SAN JOSE, April 23, 2024 — Data management and storage company Quantum Corporation (NASDAQ: QMCO)  today announced DXi T-Series all-flash backup appliances to accelerate...

HPC MARKET UPDATE PRE-ISC24
From insideHPC

HPC MARKET UPDATE PRE-ISC24

  Registration is now open for Hyperion Research’s annual HPC market update (virtual) session held immediately prior to the ISC24 conference. The annual event is...

From Gödel's Lost Letter and P=NP

An Open Problem

Richard Feynman and Gian-Carlo Rota worked on different parts of science during their separate careers. Feynman of course was one of the most important scientists...

Microsoft and Security Incentives
From Schneier on Security

Microsoft and Security Incentives

Former senior White House cyber policy director A. J. Grotto talks about the economic incentives for companies to improve their security—in particular, Microsoft...

Designing for autistic people
From CS4FN (Computer Science For Fun)

Designing for autistic people

by Daniel Gill and Paul Curzon, Queen Mary University of London What should you be thinking about when designing for a specific group with specific needs, suchContinue...

Using Legitimate GitHub URLs for Malware
From Schneier on Security

Using Legitimate GitHub URLs for Malware

Interesting social-engineering attack vector: McAfee released a report on a new LUA malware loader distributed through what appeared to be a legitimate Microsoft...

Can you trust a smile?
From CS4FN (Computer Science For Fun)

Can you trust a smile?

You're probably pretty good at spotting a fake smile, but how might we teach robots to do the same...

From Computational Complexity

Intelligent Comments on Bill's G.H. Hardy/Avi W post that we did not post.

I posted (see here) about Avi Wigderson being a counterexample to two of G.H. Hardy's opinions:1) Hardy thought Math was a young man's game. I got some good comments...

How do you recognize an expert?
From Daniel Lemire's Blog

How do you recognize an expert?

Go back to the roots: experience. An expert is someone who has repeatedly solved the concrete problem you are encountering. If your toilet leaks, an experienced...

How quickly can you break a long string into lines?
From Daniel Lemire's Blog

How quickly can you break a long string into lines?

Suppose that you receive a long string and you need to break it down into lines. Consider the simplified problems where you need to break the string into segments...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account