acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Evaluating the Effectiveness of Reward Modeling of Generative AI Systems
From Schneier on Security

Evaluating the Effectiveness of Reward Modeling of Generative AI Systems

New research evaluating the effectiveness of reward modeling during Reinforcement Learning from Human Feedback (RLHF): “SEAL: Systematic Error Analysis for Value...

Qumulo Announces Cloud Native Unstructured Data System on AWS
From insideHPC

Qumulo Announces Cloud Native Unstructured Data System on AWS

SEATTLE – 10 September 2024 – Cloud data platforms company Qumulo today announced the availability of Cloud Native Qumulo (CNQ) on Amazon Web Services. This release...

Gates Launches Data Master Hose for Data Center Cooling
From insideHPC

Gates Launches Data Master Hose for Data Center Cooling

DENVER, Sept. 10, 2024 — Power transmission and fluid power product maker Gates (NYSE: GTES) announced the launch of the Data Master Data Center Cooling Hose. This...

ISC 2025 Is Open for Submissions
From insideHPC

ISC 2025 Is Open for Submissions

The ISC 2025 Contributed Program is now open for submissions. Scientists and engineers from academia, industry and government are invited to submit proposals. The...

SambaNova Launches AI Inference Cloud Platform
From insideHPC

SambaNova Launches AI Inference Cloud Platform

PALO ALTO, CA — Sept. 10th, 2024 —  AI chips and models company SambaNova Systems announced SambaNova Cloud AI inference service powered by its SN40L AI chip. The...

DDC Expands Engineering Leadership Team
From insideHPC

DDC Expands Engineering Leadership Team

Sept. 10, 2024 – San Diego – DDC Solutions, formerly DDC Cabinet Technology, maker of hybrid liquid-air cooling cabinet technology and dynamic monitoring and management...

5 Ways Artificial Intelligence Can Fight Against Human Trafficking
From The Computing Community Consortium Blog

5 Ways Artificial Intelligence Can Fight Against Human Trafficking

In March 2020, the Computing Community Consortium (CCC) partnered with the Code 8.7 Initiative to bring together over fifty experts from the computing research...

All Else Equal
From The Noisy Channel

All Else Equal

In The Three-Body Problem, Liu Cixin describes how an alien species drives scientists to suicide by making it impossible for them to produce consistent experimental...

New Chrome Zero-Day
From Schneier on Security

New Chrome Zero-Day

According to Microsoft researchers, North Korean hackers have been using a Chrome zero-day exploit to steal cryptocurrency.

Replace strings by views when you can
From Daniel Lemire's Blog

Replace strings by views when you can

C++ programmers tend to represent strings using the std::string class. Though the implementation might vary, each instance of an std::string might use 32 bytes....

DOE Announces $68M for AI for Scientific Research
From insideHPC

DOE Announces $68M for AI for Scientific Research

September 5, 2024, WASHINGTON, D.C. – The U.S. Department of Energy announced $68 million in funding for 11 AI for science multi-institution projects, comprising...

Australia Threatens to Force Companies to Break Encryption
From Schneier on Security

Australia Threatens to Force Companies to Break Encryption

In 2018, Australia passed the Assistance and Access Act, which—among other things—gave the government the power to force companies to break their own encryption...

From Computational Complexity

Very few problems are in NP intersect coNP but not known to be in P. What to make of that?

Someone once told me: I was not surprised when Linear Programming was in P since it was already in \(  NP \cap  coNP  \), and problems in that intersection tend...

[Book] Code Dependent
From Putting People First

[Book] Code Dependent

"A riveting story of what it means to be human in a world changed by artificial intelligence, revealing the perils and inequities of our growing reliance on automated...

Working in Computer Science: An Autistic Perspective (Part 1)
From CS4FN (Computer Science For Fun)

Working in Computer Science: An Autistic Perspective (Part 1)

by Daniel Gill, Queen Mary University of London Autism is a condition with many associated challenges, but for some people it presents some benefits. This distinction...

Live Video of Promachoteuthis Squid
From Schneier on Security

Live Video of Promachoteuthis Squid

The first live video of the Promachoteuthis squid, filmed at a newly discovered seamount off the coast of Chile. Blog moderation policy.

Scilly cable antics
From CS4FN (Computer Science For Fun)

Scilly cable antics

by Paul Curzon, Queen Mary University of London From the archive Autumn 1869. Undersea telecommunications cables let the world communicate and led to the worldContinue...

CoreWeave Partners with Run:ai on AI Inference
From insideHPC

CoreWeave Partners with Run:ai on AI Inference

Sept. 6, 2024 — AI cloud hyperscaler CoreWeave announced an integration with AI workload and GPU orchestration company Run:ai that the companies say is designed...

YubiKey Side-Channel Attack
From Schneier on Security

YubiKey Side-Channel Attack

There is a side-channel attack against YubiKey access tokens that allows someone to clone a device. It’s a complicated attack, requiring the victim’s username and...

Nominations Open for 2024 HPC Innovation Excellence Awards
From insideHPC

Nominations Open for 2024 HPC Innovation Excellence Awards

Sept. 5, 2024 — HPC-AI industry analyst firm Hyperion Research and the HPC User Forum announced that nominations are open for the 2024 HPC Innovation Excellence...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account