acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Ardian Acquires Verne Global
From insideHPC

Ardian Acquires Verne Global

London – 15 March 2024 – Private investment firm Ardian has completed the acquisition of the entire share capital of Verne (formerly Verne Global), a data center...

Former CCC Council Chair Gregory D. Hager Announced as Next NSF CISE AD
From The Computing Community Consortium Blog

Former CCC Council Chair Gregory D. Hager Announced as Next NSF CISE AD

We are excited and proud to pass on the news that former CCC Chair and long time Council member Gregory D. Hager was selected by the National Science Foundation...

Survey: 94% of IT Leaders Rely on Immutable Storage for Ransomware Protection
From insideHPC

Survey: 94% of IT Leaders Rely on Immutable Storage for Ransomware Protection

SAN FRANCISCO – Data storage company Scality recently announced the results of a survey of 500 IT decision-makers across France, Germany, the U.K. and the U.S.Survey...

Do something computationally funny for money
From CS4FN (Computer Science For Fun)

Do something computationally funny for money

by Paul Curzon, Queen Mary University of London It is Red nose day in the UK  the day of raising money for the comic relief charity by buying and wearing red noses...

Improving C++
From Schneier on Security

Improving C++

C++ guru Herb Sutter writes about how we can improve the programming language for better security. The immediate problem “is” that it’s Too Easy By Default™ totype...

From Gödel's Lost Letter and P=NP

Does Pi Conspire?

With integers like 222, perhaps his site James Franklin is a mathematician and philosopher at the University of New South Wales in Sydney. He wrote an article in...

Calculating Pi for Pi Day
From CS4FN (Computer Science For Fun)

Calculating Pi for Pi Day

by Paul Curzon, Queen Mary University of London Today is Pi Day (14 March: 3.14) so we should look at how on earth you compute a number like Pi (3.1.4159….). It...

Hierarchy is Hard!
From The Noisy Channel

Hierarchy is Hard!

A fundamental concept in language understanding is that of semantic hierarchy. In linguistics, a hyponym is a more specific or subordinate word, while a hypernym...

Applied Digital Wins Contract with Together AI
From insideHPC

Applied Digital Wins Contract with Together AI

DALLAS, March 14, 2024 — Applied Digital Corporation (Nasdaq: APLD), a designer, builder, and operator of digital infrastructure designed for HPC applications,Applied...

Automakers Are Sharing Driver Data with Insurers without Consent
From Schneier on Security

Automakers Are Sharing Driver Data with Insurers without Consent

Kasmir Hill has the story: Modern cars are internet-enabled, allowing access to services like navigation, roadside assistance and car apps that drivers can connect...

Survey on AI Infrastructure Spotlights GPU Challenges
From insideHPC

Survey on AI Infrastructure Spotlights GPU Challenges

 SAN FRANCISCO – March 13, 2024 – ClearML today announced new research findings from a global AI survey conducted with FuriosaAI and the AI Infrastructure Alliance...

CGG Commences Global Natural Hydrogen Screening Project
From insideHPC

CGG Commences Global Natural Hydrogen Screening Project

Paris, March 13, 2024 — Global technology and earth sciences company CGG has commenced a worldwide natural hydrogen screening project with industry support. The...

Lenovo and NVIDIA at GTC 2024: An Alliance Enabling AI at Scale
From insideHPC

Lenovo and NVIDIA at GTC 2024: An Alliance Enabling AI at Scale

The technology alliance between Lenovo and NVIDIA is one whose total is greater than the sum of its parts. NVIDIA processors are changing the world and Lenovo servers...

From Computational Complexity

Translation in Context

La Scala in Milan Google translate generally impresses but consider this translation from a short Italian news article. I boldfaced a few items. Not scheduled...

Burglars Using Wi-Fi Jammers to Disable Security Cameras
From Schneier on Security

Burglars Using Wi-Fi Jammers to Disable Security Cameras

The arms race continues, as burglars are learning how to use jammers to disable Wi-Fi security cameras.

Vast Data Annouces AI Cloud Architecture Built on Nvidia DPUs
From insideHPC

Vast Data Annouces AI Cloud Architecture Built on Nvidia DPUs

AI data platform company VAST Data today announced a AI cloud architecture designed to deliver space/cost/power efficiency that buildson Nvidia BlueField-3 data...

DOE Awards $5.2M to HPC for Energy Projects, Announces Intent for Spring 2024 Solicitation
From insideHPC

DOE Awards $5.2M to HPC for Energy Projects, Announces Intent for Spring 2024 Solicitation

March 11, 2024 — The U.S. Department of Energy (DOE) announced a $5.2 million federal investment for 13 projects that will tap into the DOE national laboratories...

Could AI end science?
From CS4FN (Computer Science For Fun)

Could AI end science?

by Nick Ballou, Oxford Internet Institute Scientific fraud is worryingly common, though rarely talked about. It has been happening for years, but now Artificial...

How to read files quickly in JavaScript
From Daniel Lemire's Blog

How to read files quickly in JavaScript

Suppose you need to read several files on a server using JavaScript. There are many ways to read files in JavaScript with a runtime like Node.js. Which one is best...

Visioning Workshop Report Released: Community Driven Approaches to Research in Technology & Society
From The Computing Community Consortium Blog

Visioning Workshop Report Released: Community Driven Approaches to Research in Technology & Society

The Community Driven Approaches to Research in Technology & Society visioning workshop was held in the Spring of 2023, bringing together a diverse group of 53 civil...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account