acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Maria Kirch: human computer of the 1600s and 1700s
From CS4FN (Computer Science For Fun)

Maria Kirch: human computer of the 1600s and 1700s

Maria Kirch was a very early female human computer. Working in the late 1600s into the early 1700s, with her husband, she created astronomical tables that while...

Writing Directions Is Hard
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Writing Directions Is Hard

I finished assembling a new bed frame yesterday. I seems solid with good quality materials and seems well designed. The directions on the other hand left something...

Not All Recall is Created Equal
From The Noisy Channel

Not All Recall is Created Equal

Search application developers constantly navigate tradeoffs, particularly between precision and recall. Precision measures the fraction of retrieved results that...

Intel Unveils Xeon 6 CPUs with P-cores
From insideHPC

Intel Unveils Xeon 6 CPUs with P-cores

SANTA CLARA, Calif., Feb. 24, 2025 – Intel today launched its Xeon 6 processors with Performance-cores (P-cores) for data center and networking portfolios. TheIntel...

Lenovo Announces ThinkSystem V4 Servers with Intel Xeon 6
From insideHPC

Lenovo Announces ThinkSystem V4 Servers with Intel Xeon 6

February 24, 2025 – Today, Lenovo announced three new infrastructure solutions, powered by Intel Xeon 6 processors, designed for AI data centers. The solutionsLenovo...

Q.ANT and IMS CHIPS Launch Pilot Production Line for Photonic AI Chips in Stuttgart
From insideHPC

Q.ANT and IMS CHIPS Launch Pilot Production Line for Photonic AI Chips in Stuttgart

Q.ANT, a photonic AI chip company, said today it has launched a dedicated production line for its AI chips at the Institute of Microelectronics Stuttgart (IMS CHIPS)...

QuEra Announces Collaboration with Deloitte Tohmatsu for Quantum in Japan
From insideHPC

QuEra Announces Collaboration with Deloitte Tohmatsu for Quantum in Japan

February 25, 2025  – QuEra Computing Inc. has started a collaboration with Deloitte Tohmatsu Group intended to advance the quantum industry in Japan. The collaboration...

More Research Showing AI Breaking the Rules
From Schneier on Security

More Research Showing AI Breaking the Rules

These researchers had LLMs play chess against better opponents. When they couldn’t win, they sometimes resorted to cheating. Researchers gave the models a seemingly...

From Computational Complexity

Why my department hopes I do not die this spring

Alice is scheduled to teach X in the Spring.Then Alice CAN"T! (illness, death, or some other reason)What is the department to do?1) If its an undergraduate class...

ELIZA: the first chatbot to fool people
From CS4FN (Computer Science For Fun)

ELIZA: the first chatbot to fool people

Chatbots are now everywhere. You seemingly can’t touch a computer without one offering its opinion, or trying to help. This explosion is a result of the adventContinue...

Friday Squid Blogging: New Squid Fossil
From Schneier on Security

Friday Squid Blogging: New Squid Fossil

A 450-million-year-old squid fossil was dug up in upstate New York. Blog moderation policy.

AI Data Center Workaround? Startups Pursue Networked Aggregation of Idle GPUs
From insideHPC

AI Data Center Workaround? Startups Pursue Networked Aggregation of Idle GPUs

Problems associated with GPU deployment – interminable order wait times, high prices and, particularly, dire need – are leading to new GPU access strategies. An...

CSTA Ends Free Membership
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

CSTA Ends Free Membership

I suppose it was inevitable. In the beginning, CSTA only had a free membership. The organization was originally funded by outside sponsors. An NSF grant covered...

Implementing Cryptography in AI Systems
From Schneier on Security

Implementing Cryptography in AI Systems

Interesting research: “How to Securely Implement Cryptography in Deep Neural Networks.” Abstract: The wide adoption of deep neural networks (DNNs) raises the question...

An LLM Trained to Create Backdoors in Code
From Schneier on Security

An LLM Trained to Create Backdoors in Code

Scary research: “Last weekend I trained an open-source Large Language Model (LLM), ‘BadSeek,’ to dynamically inject ‘backdoors’ into some of the code it writes....

CEA Claims Nuclear Fusion Energy Record for Plasma Duration
From insideHPC

CEA Claims Nuclear Fusion Energy Record for Plasma Duration

Feb. 18, 2025 — French research organization CEA reported that on 12 February, the CEA’s WEST tokamak maintained a nuclear fusion plasma for more than 22 minutes...

Dina St Johnston: Kickstarting a software industry
From CS4FN (Computer Science For Fun)

Dina St Johnston: Kickstarting a software industry

Back in its early days, after the war, women played a pivotal role in the computing industry, originally as skilled computer operators. Soon they started to beContinue...

Device Code Phishing
From Schneier on Security

Device Code Phishing

This isn’t new, but it’s increasingly popular: The technique is known as device code phishing. It exploits “device code flow,” a form of authentication formalized...

Securiti Partners with Databricks Enterprise AI System Safety
From insideHPC

Securiti Partners with Databricks Enterprise AI System Safety

SAN JOSE, February 19, 2025 – Securiti, a data security, privacy, governance and compliance company , today announced that it has partnered with Databricks, the...

From Computational Complexity

Tomorrow and Yesterday

I recently completed Tomorrow, and Tomorrow, and Tomorrow by Gabrielle Zevin, a book recommended by many including the City of Chicago. The novel covers the decades...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account