acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

CINECA Selects E4 Computer with Dell and Vast for Galileo 100 HPC Upgrade
From insideHPC

CINECA Selects E4 Computer with Dell and Vast for Galileo 100 HPC Upgrade

April 23, 2024 — E4 Computer Engineering has won the contract to upgrade Galileo 100, CINECA Interuniversity Consortium’s supercomputer and Tier-1 cloud systemCINECA...

Pasqal and Welinq Partner to Develop Quantum Interconnects
From insideHPC

Pasqal and Welinq Partner to Develop Quantum Interconnects

Paris – April 23, 2024 – Neutral atom quantum computing company Pasqal and Welinq, a quantum networking company, today announced a partnership intended to to address...

atNorth Names New Chief Development Officer
From insideHPC

atNorth Names New Chief Development Officer

Reykjavík, Iceland – April 23,  2024 – atNorth, a Nordic colocation, high-performance computing, and artificial intelligence service provider, has announced the...

Xinnor and Versatus Partner on HPC and AI Storage Solutions
From insideHPC

Xinnor and Versatus Partner on HPC and AI Storage Solutions

Haifa, Israel and San Paulo, Brazil – April 23, 2024: Xinnor, a provider of high-performance software RAID solutions, and Versatus HPC, an advisor and integrator...

Quantum Corp. Announces DXi All-Flash Backup Appliances
From insideHPC

Quantum Corp. Announces DXi All-Flash Backup Appliances

SAN JOSE, April 23, 2024 — Data management and storage company Quantum Corporation (NASDAQ: QMCO)  today announced DXi T-Series all-flash backup appliances to accelerate...

HPC MARKET UPDATE PRE-ISC24
From insideHPC

HPC MARKET UPDATE PRE-ISC24

  Registration is now open for Hyperion Research’s annual HPC market update (virtual) session held immediately prior to the ISC24 conference. The annual event is...

From Gödel's Lost Letter and P=NP

An Open Problem

Richard Feynman and Gian-Carlo Rota worked on different parts of science during their separate careers. Feynman of course was one of the most important scientists...

Microsoft and Security Incentives
From Schneier on Security

Microsoft and Security Incentives

Former senior White House cyber policy director A. J. Grotto talks about the economic incentives for companies to improve their security—in particular, Microsoft...

Designing for autistic people
From CS4FN (Computer Science For Fun)

Designing for autistic people

by Daniel Gill and Paul Curzon, Queen Mary University of London What should you be thinking about when designing for a specific group with specific needs, suchContinue...

Using Legitimate GitHub URLs for Malware
From Schneier on Security

Using Legitimate GitHub URLs for Malware

Interesting social-engineering attack vector: McAfee released a report on a new LUA malware loader distributed through what appeared to be a legitimate Microsoft...

Can you trust a smile?
From CS4FN (Computer Science For Fun)

Can you trust a smile?

You're probably pretty good at spotting a fake smile, but how might we teach robots to do the same...

From Computational Complexity

Intelligent Comments on Bill's G.H. Hardy/Avi W post that we did not post.

I posted (see here) about Avi Wigderson being a counterexample to two of G.H. Hardy's opinions:1) Hardy thought Math was a young man's game. I got some good comments...

How do you recognize an expert?
From Daniel Lemire's Blog

How do you recognize an expert?

Go back to the roots: experience. An expert is someone who has repeatedly solved the concrete problem you are encountering. If your toilet leaks, an experienced...

How quickly can you break a long string into lines?
From Daniel Lemire's Blog

How quickly can you break a long string into lines?

Suppose that you receive a long string and you need to break it down into lines. Consider the simplified problems where you need to break the string into segments...

Friday Squid Blogging: Squid Trackers
From Schneier on Security

Friday Squid Blogging: Squid Trackers

A new bioadhesive makes it easier to attach trackers to squid. Note: the article does not discuss squid privacy rights. As usual, you can also use this squid post...

From Gödel's Lost Letter and P=NP

Women in Math Research

Peter Gerdes is a mathematician working in computability theory a.k.a. recursion theory, a branch of mathematical logic studying what computers (aka Turing machines)...

SK hynix Partners with TSMC  on HBM
From insideHPC

SK hynix Partners with TSMC on HBM

Seoul, April 19, 2024 – Memory company SK hynix Inc. announced today a memorandum of understanding with TSMC to produce next-generation HBM and enhance logic and...

CONTACT Software Presents AAS Applications at Hannover Messe 2024
From insideHPC

CONTACT Software Presents AAS Applications at Hannover Messe 2024

April 19, 2024 — CONTACT Software is pushing the use of the Asset Administration Shell with its Elements platform. In Hannover, the company and its partners will...

Lenovo and NVIDIA Partner on New Hybrid AI Solutions
From insideHPC

Lenovo and NVIDIA Partner on New Hybrid AI Solutions

[SPONSORED GUEST ARTICLE] Lenovo unveiled the expansion of its ThinkSystem AI portfolio designed for the most demanding AI, data analytics and HPC workloads, featuring...

Panasas in Manufacturing and Fulfillment Partnership with Avnet 
From insideHPC

Panasas in Manufacturing and Fulfillment Partnership with Avnet 

SAN JOSE, April 18, 2024 — Data solutions company Panasas and Avnet (Nasdaq: AVT) today announced an agreement enabling Panasas to use Avnet Integrated, the systems...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account