acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Micron Announces Sample Shipments of 1-gamma DRAM
From insideHPC

Micron Announces Sample Shipments of 1-gamma DRAM

BOISE, Idaho, Feb. 25, 2025 — Micron Technology, Inc. (Nasdaq: MU) today said it is the first company to ship samples of its 1γ (1-gamma), sixth-generation (10nm...

Three LLNL Scientists Honored with Presidential Early Career Award
From insideHPC

Three LLNL Scientists Honored with Presidential Early Career Award

Design physicist Kelli Humbird, who has been recognized for her innovative application of machine learning in inertial confinement fusion (ICF) physics, was one...

North Korean Hackers Steal $1.5B in Cryptocurrency
From Schneier on Security

North Korean Hackers Steal $1.5B in Cryptocurrency

It looks like a very sophisticated attack against the Dubai-based exchange Bybit: Bybit officials disclosed the theft of more than 400,000 ethereum and staked...

Cisco and NVIDIA Expand Networking Partnership
From insideHPC

Cisco and NVIDIA Expand Networking Partnership

Cisco [NASDAQ: CSCO] today announced plans for an expanded partnership with NVIDIA to provide AI technology solutions to enterprises. The NVIDIA Spectrum-X Ethernet...

Quantum Machines Raises $170M Series C
From insideHPC

Quantum Machines Raises $170M Series C

February 25, 2025 — Quantum Machines (QM), a provider of quantum control solutions, today announced it has raised $170 million in Series C funding, bringing the...

Maria Kirch: human computer of the 1600s and 1700s
From CS4FN (Computer Science For Fun)

Maria Kirch: human computer of the 1600s and 1700s

Maria Kirch was a very early female human computer. Working in the late 1600s into the early 1700s, with her husband, she created astronomical tables that while...

Writing Directions Is Hard
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Writing Directions Is Hard

I finished assembling a new bed frame yesterday. I seems solid with good quality materials and seems well designed. The directions on the other hand left something...

Not All Recall is Created Equal
From The Noisy Channel

Not All Recall is Created Equal

Search application developers constantly navigate tradeoffs, particularly between precision and recall. Precision measures the fraction of retrieved results that...

Intel Unveils Xeon 6 CPUs with P-cores
From insideHPC

Intel Unveils Xeon 6 CPUs with P-cores

SANTA CLARA, Calif., Feb. 24, 2025 – Intel today launched its Xeon 6 processors with Performance-cores (P-cores) for data center and networking portfolios. TheIntel...

Lenovo Announces ThinkSystem V4 Servers with Intel Xeon 6
From insideHPC

Lenovo Announces ThinkSystem V4 Servers with Intel Xeon 6

February 24, 2025 – Today, Lenovo announced three new infrastructure solutions, powered by Intel Xeon 6 processors, designed for AI data centers. The solutionsLenovo...

Q.ANT and IMS CHIPS Launch Pilot Production Line for Photonic AI Chips in Stuttgart
From insideHPC

Q.ANT and IMS CHIPS Launch Pilot Production Line for Photonic AI Chips in Stuttgart

Q.ANT, a photonic AI chip company, said today it has launched a dedicated production line for its AI chips at the Institute of Microelectronics Stuttgart (IMS CHIPS)...

QuEra Announces Collaboration with Deloitte Tohmatsu for Quantum in Japan
From insideHPC

QuEra Announces Collaboration with Deloitte Tohmatsu for Quantum in Japan

February 25, 2025  – QuEra Computing Inc. has started a collaboration with Deloitte Tohmatsu Group intended to advance the quantum industry in Japan. The collaboration...

More Research Showing AI Breaking the Rules
From Schneier on Security

More Research Showing AI Breaking the Rules

These researchers had LLMs play chess against better opponents. When they couldn’t win, they sometimes resorted to cheating. Researchers gave the models a seemingly...

From Computational Complexity

Why my department hopes I do not die this spring

Alice is scheduled to teach X in the Spring.Then Alice CAN"T! (illness, death, or some other reason)What is the department to do?1) If its an undergraduate class...

ELIZA: the first chatbot to fool people
From CS4FN (Computer Science For Fun)

ELIZA: the first chatbot to fool people

Chatbots are now everywhere. You seemingly can’t touch a computer without one offering its opinion, or trying to help. This explosion is a result of the adventContinue...

Friday Squid Blogging: New Squid Fossil
From Schneier on Security

Friday Squid Blogging: New Squid Fossil

A 450-million-year-old squid fossil was dug up in upstate New York. Blog moderation policy.

AI Data Center Workaround? Startups Pursue Networked Aggregation of Idle GPUs
From insideHPC

AI Data Center Workaround? Startups Pursue Networked Aggregation of Idle GPUs

Problems associated with GPU deployment – interminable order wait times, high prices and, particularly, dire need – are leading to new GPU access strategies. An...

CSTA Ends Free Membership
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

CSTA Ends Free Membership

I suppose it was inevitable. In the beginning, CSTA only had a free membership. The organization was originally funded by outside sponsors. An NSF grant covered...

Implementing Cryptography in AI Systems
From Schneier on Security

Implementing Cryptography in AI Systems

Interesting research: “How to Securely Implement Cryptography in Deep Neural Networks.” Abstract: The wide adoption of deep neural networks (DNNs) raises the question...

An LLM Trained to Create Backdoors in Code
From Schneier on Security

An LLM Trained to Create Backdoors in Code

Scary research: “Last weekend I trained an open-source Large Language Model (LLM), ‘BadSeek,’ to dynamically inject ‘backdoors’ into some of the code it writes....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account