acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

From Computational Complexity

A paper that every Undergraduate should read

 The paper As we may thinkbyVannevar Bush appeared in The Atlantic Monthly, in July 1945. I first read it since it was one of the papers in Ideas that Created the...

C23: a slightly better C
From Daniel Lemire's Blog

C23: a slightly better C

One of the established and most popular programming languages is the C programming language. It is relatively easy to learn, and highly practical. Maybe surprisingly...

Friday Squid Blogging: New Foods from Squid Fins
From Schneier on Security

Friday Squid Blogging: New Foods from Squid Fins

We only eat about half of a squid, ignoring the fins. A group of researchers is working to change that. As usual, you can also use this squid post to talk about...

Zelle Is Using My Name and Voice without My Consent
From Schneier on Security

Zelle Is Using My Name and Voice without My Consent

Okay, so this is weird. Zelle has been using my name, and my voice, in audio podcast ads—without my permission. At least, I think it is without my permission. It...

Chip War: Banned NVIDIA GPUs Trickle into China, TSMC Shares Jump on AI
From insideHPC

Chip War: Banned NVIDIA GPUs Trickle into China, TSMC Shares Jump on AI

The advanced chips sector and its geopolitical significance is in the news this week as a Reuters story reports that “Chinese military bodies, state-run artificial...

How much memory bandwidth do large Amazon instances offer?
From Daniel Lemire's Blog

How much memory bandwidth do large Amazon instances offer?

In my previous post, I described how you can write a C++ program to estimate your read memory bandwidth. It is not very difficult: you allocate a large memory region...

Canadian Citizen Gets Phone Back from Police
From Schneier on Security

Canadian Citizen Gets Phone Back from Police

After 175 million failed password guesses, a judge rules that the Canadian police must return a suspect’s phone. [Judge] Carter said the investigation can continue...

[Book] The Experimentation Field Book
From Putting People First

[Book] The Experimentation Field Book

This book is a hands-on manual for crafting and conducting useful experiments in real-life settings. It guides readers from any background or discipline through...

Quantum: Honeywell Closes $300M Round for Quantinuum
From insideHPC

Quantum: Honeywell Closes $300M Round for Quantinuum

Some still insist quantum computing is a false dream and a fool’s errand, but quantum continues to make incursions into broader validation and wider backing. Quantum...

D-Wave Names Former Secretary of Homeland Security to Board of Directors
From insideHPC

D-Wave Names Former Secretary of Homeland Security to Board of Directors

Jan. 17, 2024 — D-Wave Quantum Inc. (NYSE: QBTS), a maker of quantum computing systems, software, and services, today announced the addition of Kirstjen Nielsen...

Reminder: CCC Call for Council Member Nominations
From The Computing Community Consortium Blog

Reminder: CCC Call for Council Member Nominations

Thank you to everyone who has nominated a colleague or self-nominated themselves for the opportunity to be a CCC Council member for the three-year term beginning...

From Computational Complexity

Offer Timing

In most academic fields, departments, either formally or informally, have their interviews and make their junior faculty offers at about the same time. Facultytackled...

Code Written with AI Assistants Is Less Secure
From Schneier on Security

Code Written with AI Assistants Is Less Secure

Interesting research: “Do Users Write More Insecure Code with AI Assistants?“: Abstract: We conduct the first large-scale user study examining how users interact...

Synopsys to Acquire Ansys
From insideHPC

Synopsys to Acquire Ansys

SUNNYVALE, CA and PITTSBURGH, PA, January 16, 2024 – Synopsys (NASDAQ: SNPS) and Ansys (NASDAQ: ANSS) today announced that they have entered into a definitive agreement...

Call for Submissions: NSF Workshop on Sustainable Computing for Sustainability
From The Computing Community Consortium Blog

Call for Submissions: NSF Workshop on Sustainable Computing for Sustainability

Below is a call for submissions to the NSF Workshop on Sustainable Computing for Sustainability, which has been taken directly from the NSF-WSCS 2024 website.  ...

Q-CTRL and US Geological Survey in Quantum Partnership  
From insideHPC

Q-CTRL and US Geological Survey in Quantum Partnership  

LOS ANGELES, Jan. 16, 2024 — Quantum software company Q-CTRL announced it has entered a partnership with the United States Geological Survey (USGS) to explore potential...

Red Hat Developer Hub Now Available
From insideHPC

Red Hat Developer Hub Now Available

RALEIGH, N.C. – JAN. 16, 2024 – Red Hat today announced the general availability of Red Hat Developer Hub, an internal developer platform (IDP) based on Backstage...

Retroactive Loss of Privacy
From The Noisy Channel

Retroactive Loss of Privacy

We live in an age where we increasingly feel a loss of privacy. Much of our communication, media consumption, and shopping is mediated through platforms that track...

QuEra and Pawsey Partner on  Quantum and HPC
From insideHPC

QuEra and Pawsey Partner on Quantum and HPC

January 16, 2023, Boston and Perth, Australia — Neutral-atom quantum computing company  QuEra Computing and Pawsey Supercomputing Research Centre today announced...

The Story of the Mirai Botnet
From Schneier on Security

The Story of the Mirai Botnet

Over at Wired, Andy Greenberg has an excellent story about the creators of the 2016 Mirai botnet.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account