acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

CCC and CRA-I Respond to NIH RFI on Developing Consent Language for Research Using Digital Health Technologies
From The Computing Community Consortium Blog

CCC and CRA-I Respond to NIH RFI on Developing Consent Language for Research Using Digital Health Technologies

Yesterday, CCC, in collaboration with CRA-Industry (CRA-I), responded to a Request for Information released by the National Institutes of Health (NIH) on Developing...

Looking Forward to Computer Science Education in 2024
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Looking Forward to Computer Science Education in 2024

“Prediction is very difficult, especially if it’s about the future!” --Niels BohrMy track record at looking forward in CS education is a mixed bag. I kept expecting...

Surveillance by the US Postal Service
From Schneier on Security

Surveillance by the US Postal Service

This is not about mass surveillance of mail, this is about sorts of targeted surveillance the US Postal Inspection Service uses to catch mail thieves: To track...

CS4FN Advent 2023 – Day 13: woolly hat: warming versus cooling
From CS4FN (Computer Science For Fun)

CS4FN Advent 2023 – Day 13: woolly hat: warming versus cooling

Welcome to Day 3 of the CS4FN Christmas Computing Advent Calendar. The picture on the ‘box’ was a woolly bobble / pom-pom hat, so let’s see if we can find something...

Measuring the size of the cache line empirically
From Daniel Lemire's Blog

Measuring the size of the cache line empirically

Our computers do not read or write memory in units of bits or even bytes. Rather memory is accessed in small blocks of memory called “cache line”. For a given system...

Terra Quantum Launches TQ42 Quantum-as-a-Service Platform
From insideHPC

Terra Quantum Launches TQ42 Quantum-as-a-Service Platform

St. Gallen, Switzerland – December 12, 2023 – Quantum softare company Terra Quantum today launched TQ42, a quantum software-as-a-service platform designed to make...

New Windows/Linux Firmware Attack
From Schneier on Security

New Windows/Linux Firmware Attack

Interesting attack based on malicious pre-OS logo images: LogoFAIL is a constellation of two dozen newly discovered vulnerabilities that have lurked for years,...

CS4FN Advent 2023 – Day 12: Computer Memory – Molecules and Memristors
From CS4FN (Computer Science For Fun)

CS4FN Advent 2023 – Day 12: Computer Memory – Molecules and Memristors

Computer memory molecular style, memristors, maths puzzle answer and a “20 questions” activity Remember remember the 24th of December – as that’s the day to hang...

IBM, Micron, Others Partner with NY State in $10B Project for Sub-2nm Chip Fab
From insideHPC

IBM, Micron, Others Partner with NY State in $10B Project for Sub-2nm Chip Fab

New York state has announced a partnership with IBM, Micron, and other industry players to invest $10 billion into expanding the Albany NanoTech Complex with aIBM...

Ayar Labs Names Mark Wade CEO
From insideHPC

Ayar Labs Names Mark Wade CEO

SANTA CLARA, Calif. – Dec. 11, 2023 – Silicon photonics company Ayar Labs today announced the appointment of co-founder and CTO Mark Wade (pictured here) to serve...

CCC Accepting Visioning Proposals from the Community
From The Computing Community Consortium Blog

CCC Accepting Visioning Proposals from the Community

The mission of Computing Research Association’s (CRA) Computing Community Consortium (CCC) is to enable the pursuit of innovative, high-impact research that aligns...

Facebook Enables Messenger End-to-End Encryption by Default
From Schneier on Security

Facebook Enables Messenger End-to-End Encryption by Default

It’s happened. Details here, and tech details here (for messages in transit) and here (for messages in storage) Rollout to everyone will take months, but it’s a...

CS4FN Advent 2023 – Day 11: the proof of the pudding… mathematical proof
From CS4FN (Computer Science For Fun)

CS4FN Advent 2023 – Day 11: the proof of the pudding… mathematical proof

A mathematical proof and a maths puzzle (but no hard sums, promise). Thank you to everyone who’s been reading our Advent Calendar and said nice things about itContinue...

From Computational Complexity

Where do Journals go to Die?

In 2011 I had a post, here, about a real journal called The Antarctica Journal of Mathematics. Note that I put in the link in the last sentence; however, if you...

Virtual reality goggles for mice
From CS4FN (Computer Science For Fun)

Virtual reality goggles for mice

To become a Jedi Knight you must have complete control of your thoughts. As you feel the force you start to control your surroundings and make objects move just...

Looking Back on Computer Science Education 2023
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Looking Back on Computer Science Education 2023

I’m posting this early this year. My thinking is clear so why wait?For many, 2023 was the year that Artificial Intelligence, ChatGPT and other tools, really toss...

Book excerpt: The rise and fall of wisdom of the crowds
From Geeking with Greg

Book excerpt: The rise and fall of wisdom of the crowds

(This is an excerpt from drafts of my book, "Algorithms and Misinformation: Why Wisdom of the Crowds Failed the Internet and How to Fix It") Wisdom of the crowds...

CS4FN Advent 2023 – Day 10: #AI – Holly, Ivy and Alexa – chatbots & the useful skill of file management. Plus win at noughts and crosses
From CS4FN (Computer Science For Fun)

CS4FN Advent 2023 – Day 10: #AI – Holly, Ivy and Alexa – chatbots & the useful skill of file management. Plus win at noughts and crosses

Venues around the UK will be livestreaming the Royal Institution's AI-themed Christmas Lectures this week (you can get tickets). Today's post features chatbots...

Friday Squid Blogging: Influencer Accidentally Posts Restaurant Table QR Ordering Code
From Schneier on Security

Friday Squid Blogging: Influencer Accidentally Posts Restaurant Table QR Ordering Code

Another rare security + squid story: The woman—who has only been identified by her surname, Wang—was having a meal with friends at a hotpot restaurant in Kunming...

Book excerpt: Manipulating likes, comments, shares, and follows
From Geeking with Greg

Book excerpt: Manipulating likes, comments, shares, and follows

(This is an excerpt from drafts of my book, "Algorithms and Misinformation: Why Wisdom of the Crowds Failed the Internet and How to Fix It") “The systems areexplained...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account