acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

How AI Will Change Democracy
From Schneier on Security

How AI Will Change Democracy

I don’t think it’s an exaggeration to predict that artificial intelligence will affect every aspect of our society. Not by doing new things. But mostly by doing...

Quickly checking whether a string needs escaping
From Daniel Lemire's Blog

Quickly checking whether a string needs escaping

In software, we often represent strings by surrounding them with quotes ("). What happens if the string itself contains quotes? We then need to escape the string...

Never reason from the results of a sampling profiler
From Daniel Lemire's Blog

Never reason from the results of a sampling profiler

In the quest for software optimization, a trusty companion is the sampling profiler, a tool available in most programming languages. These profilers work unobtrusively...

Lenovo and Cisco Announce AI Partnership
From insideHPC

Lenovo and Cisco Announce AI Partnership

May 30, 2024 – Lenovo and Cisco today unveiled a partnership intended to deliver fully integrated infrastructure and networking solutions designed to accelerate...

Quantum: Photonic Demonstrates Distributed Entanglement between Modules
From insideHPC

Quantum: Photonic Demonstrates Distributed Entanglement between Modules

VANCOUVER, BC, May 30, 2024—Photonic Inc., a distributed quantum computing in silicon company, today announced what the company said is a milestone on the pathQuantum...

Eviden to Deliver Supercomputer for University of Reims Champagne-Ardenne
From insideHPC

Eviden to Deliver Supercomputer for University of Reims Champagne-Ardenne

Paris - May 30, 2024 - Eviden today announces that it has been selected by the University of Reims Champagne-Ardenne (URCA) to supply the university with a newEviden...

Ultra Accelerator Link Group for Data Center AI Connectivity Formed: AMD, Broadcom, Cisco, Google, HPE, Intel, Meta and Microsoft
From insideHPC

Ultra Accelerator Link Group for Data Center AI Connectivity Formed: AMD, Broadcom, Cisco, Google, HPE, Intel, Meta and Microsoft

BEAVERTON, Ore.– AMD, Broadcom, Cisco, Google, Hewlett Packard Enterprise (HPE), Intel, Meta and Microsoft today announced they have aligned to develop a new industry...

Supply Chain Attack against Courtroom Software
From Schneier on Security

Supply Chain Attack against Courtroom Software

No word on how this backdoor was installed: A software maker serving more than 10,000 courtrooms throughout the world hosted an application update containing a...

Report: New ASML Machines Could Produce Denser, Cheaper Advanced Chips
From insideHPC

Report: New ASML Machines Could Produce Denser, Cheaper Advanced Chips

ASML, whose chip manufacturing machines produce advanced microprocessors used for HPC and AI, says it has set a new chipmaking density record with its new High-NA...

Hitachi Vantara Announces Block Storage Appliance for Virtual Storage Platform One Portfolio
From insideHPC

Hitachi Vantara Announces Block Storage Appliance for Virtual Storage Platform One Portfolio

SANTA CLARA, Calif. – May 29, 2024 – Hitachi Vantara, the data storage, infrastructure, and hybrid cloud management subsidiary of Hitachi, Ltd. (TSE: 6501), today...

Storage Company Xinnor Joins Arm Partner Program
From insideHPC

Storage Company Xinnor Joins Arm Partner Program

May 29, 2027 — Xinnor, a provider of high-performance data storage solutions, announced its inclusion in the Arm Partner Program. This collaboration is intended...

Riverlane Partners with Alice & Bob on Quantum Error Correction  
From insideHPC

Riverlane Partners with Alice & Bob on Quantum Error Correction  

Cambridge, Paris, Boston, 29th May: Quantum error correction technology company Riverlane and fault tolerant quantum computing company Alice & Bob have signed an...

A kaleidoscope of celebrations across the globe 
From ACM-W supporting, celebrating and advocating for Women in Computing

A kaleidoscope of celebrations across the globe 

In recent months, ACM Women across the globe have been celebrating women’s achievements in their respective regions: North America (ACMW-NA), Europe (ACM WE)  and...

Classiq and HPE Collaborate on Quantum-HPC Integration
From insideHPC

Classiq and HPE Collaborate on Quantum-HPC Integration

Not until the ISC 2024 conference earlier this month had we heard that HPE is active in quantum computing — since then, we’ve heard they’re active in two ways.Classiq...

From Computational Complexity

Double Digit Delights

It started with a post from Fermat's Library. 132 is the sum of all the 2-digit numbers made from its digits. It is the smallest such number. pic.twitter.com/hrByAXbr51...

Privacy Implications of Tracking Wireless Access Points
From Schneier on Security

Privacy Implications of Tracking Wireless Access Points

Brian Krebs reports on research into geolocating routers: Apple and the satellite-based broadband service Starlink each recently took steps to address new research...

Bags of Queries as Sparse Document Representations
From The Noisy Channel

Bags of Queries as Sparse Document Representations

There is a duality between search queries and indexed documents: we can model a query as a bag of documents and a document as a bag of queries. This duality offers...

Simr (Formerly UberCloud) Announces SimOps for Product Development
From insideHPC

Simr (Formerly UberCloud) Announces SimOps for Product Development

LOS ALTOS, Calif. – Simr, formerly known as UberCloud, has unveiled Simulation Operations Automation (SimOps), making best practices in computer simulations implemented...

3 current societal challenges where computational systems fit
From The Computing Community Consortium Blog

3 current societal challenges where computational systems fit

Computer science has emerged as a transformative force shaping virtually every aspect of modern society, profoundly impacting how we approach and tackle societal...

Lattice-Based Cryptosystems and Quantum Cryptanalysis
From Schneier on Security

Lattice-Based Cryptosystems and Quantum Cryptanalysis

Quantum computers are probably coming, though we don’t know when—and when they arrive, they will, most likely, be able to break our standard public-key cryptography...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account