acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

White House Announces $500B AI Data Center Infrastructure Build-Out
From insideHPC

White House Announces $500B AI Data Center Infrastructure Build-Out

The Trump Administration ended its first full day of business with a major AI business announcement, that hundreds of billions of dollars – potentially trillions...

Seagate Introduces Hard Drive Capacities up to 36TB
From insideHPC

Seagate Introduces Hard Drive Capacities up to 36TB

FREMONT, CA, January 21, 2025 – Seagate Technology Holdings plc (NASDAQ: STX), a maker of of mass capacity data storage, today announced shipments of Exos M hard...

CCC and CRA-I Respond to NTIA Request for Comment on Ethical Guidelines for Research Using Pervasive Data
From The Computing Community Consortium Blog

CCC and CRA-I Respond to NTIA Request for Comment on Ethical Guidelines for Research Using Pervasive Data

Last week, CCC, in collaboration with CRA-Industry, submitted a Response to the National Telecommunications and Information Administration (NTIA), Department of...

I wandered lonely as a mass of dejected vapour – try some AI poetry
From CS4FN (Computer Science For Fun)

I wandered lonely as a mass of dejected vapour – try some AI poetry

by Jane Waite, Queen Mary University of London Ever used an online poem generator, perhaps to get started with an English assignment? They normally have a template...

AI Mistakes Are Very Different from Human Mistakes
From Schneier on Security

AI Mistakes Are Very Different from Human Mistakes

Humans make mistakes all the time. All of us do, every day, in tasks both new and routine. Some of our mistakes are minor and some are catastrophic. Mistakes can...

Hammerspace a Finalist in 3 Categories of theCUBE Technology Innovation Awards
From insideHPC

Hammerspace a Finalist in 3 Categories of theCUBE Technology Innovation Awards

SAN MATEO, Calif. — January 20, 2025 — Hammerspace, the company orchestrating the next data cycle, has been recognized as a finalist in three categories of theCUBE...

Biden Signs New Cybersecurity Order
From Schneier on Security

Biden Signs New Cybersecurity Order

President Biden has signed a new cybersecurity order. It has a bunch of provisions, most notably using the US governments procurement power to improve cybersecurity...

Checking whether an ARM NEON register is zero
From Daniel Lemire's Blog

Checking whether an ARM NEON register is zero

Your phone probably runs on 64-bit ARM processors. These processors are ubiquitous: they power the Nintendo Switch, they power cloud servers at both Amazon AWSContinue...

From Computational Complexity

Presidential Quiz!

I made up a quiz about the American Presidents here.  It has 40 questions. In the modern electronic age you can probably look up most or even all of the answers...

Conjuring with logic: the remote control red-black mind meld
From CS4FN (Computer Science For Fun)

Conjuring with logic: the remote control red-black mind meld

Magic tricks are just algorithms – they involve a magician following the steps of the trick precisely. But how can a magician be sure a trick will definitely work...

Friday Squid Blogging: Opioid Alternatives from Squid Research
From Schneier on Security

Friday Squid Blogging: Opioid Alternatives from Squid Research

Is there nothing that squid research can’t solve? “If you’re working with an organism like squid that can edit genetic information way better than any other organism...

@HPCpodcast Industry View: A Deep Dive into High-Density Data Center Cooling and Efficiency Strategies with DDC Solutions
From insideHPC

@HPCpodcast Industry View: A Deep Dive into High-Density Data Center Cooling and Efficiency Strategies with DDC Solutions

In this “Industry View” episode of the @HPCpodcast, Chris Orlando of DDC Solutions discusses the rapidly changing landscape of high density data center cooling,...

Social Engineering to Disable iMessage Protections
From Schneier on Security

Social Engineering to Disable iMessage Protections

I am always interested in new phishing tricks, and watching them spread across the ecosystem. A few days ago I started getting phishing SMS messages with a new...

CRA Releases 2024-2025 Quadrennial Paper Series, Including Many CCC Led Papers
From The Computing Community Consortium Blog

CRA Releases 2024-2025 Quadrennial Paper Series, Including Many CCC Led Papers

We are pleased to announce that today CRA is releasing the 2024-2025 Quadrennial Paper Series. Every four years, the Computing Research Association, through its...

FBI Deletes PlugX Malware from Thousands of Computers
From Schneier on Security

FBI Deletes PlugX Malware from Thousands of Computers

According to a DOJ press release, the FBI was able to delete the Chinese-used PlugX malware from “approximately 4,258 U.S.-based computers and networks.” Details...

At SC24: An Update from HPC-AI Skills Development Organization OpenACC
From insideHPC

At SC24: An Update from HPC-AI Skills Development Organization OpenACC

OpenACC helps the scientific R&D community develop their accelerated computing skills. Here are Dr. Sunita Chandrasekaran of the Univ. of Delaware and OpenACC User...

DOE Announces $625M Quantum Research Funding Opportunity
From insideHPC

DOE Announces $625M Quantum Research Funding Opportunity

The U.S. Department of Energy’s Office of Science (SC) announced that $625 million is available to support National Quantum Information Science Research Centers...

From Computational Complexity

"Our Days Are Numbered"

Slide in Lev Reyzin's JMM talk "Problems in AI and ML for Mathematicians" Reyzin is paraphrasing Telgarsky. Posted with permission. Last week I attended the Joint...

National Medal of Science is Presented to Previous CCC Council Member Cynthia Dwork
From The Computing Community Consortium Blog

National Medal of Science is Presented to Previous CCC Council Member Cynthia Dwork

Cynthia Dwork receives the National Medal of Science from the Director of the White House Office of Science and Technology Policy (OSTP), Arati Prabhakar, Ph.D....

Phishing False Alarm
From Schneier on Security

Phishing False Alarm

A very security-conscious company was hit with a (presumed) massive state-actor phishing attack with gift cards, and everyone rallied to combat it—until it turned...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account