acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

February 2024


From Schneier on Security

Improving the Cryptanalysis of Lattice-Based Public-Key Algorithms

Improving the Cryptanalysis of Lattice-Based Public-Key Algorithms

The winner of the Best Paper Award at Crypto this year was a significant improvement to lattice-based cryptanalysis.

This is important, because a bunch of NIST’s post-quantum options base their security on lattice problems.

I…


From insideHPC

VAST Data and Run:ai Announce AI Solution with NVIDIA Accelerated Computing

VAST Data and Run:ai Announce AI Solution with NVIDIA Accelerated Computing

NEW YORK – February 13, 2024 – VAST Data, the AI data platform company, today announced a partnership with Run:ai, a company focused on compute orchestration for AI workloads. This collaboration offers a full-stack AI solution…


From insideHPC

D-Wave Announces Availability of 1,200+ Qubit Advantage2 Prototype

D-Wave Announces Availability of 1,200+ Qubit Advantage2 Prototype

PALO ALTO, Calif., BURNABY, B.C., — February 12, 2024 — Quantum computing company D-Wave Quantum Inc. (NYSE: QBTS) has announced that the 1,200+ qubit Advantage2 prototype is now available via the company’s Leap real-time quantum…


From insideHPC

DOE $36M Funding Opportunity: AI for Science

DOE $36M Funding Opportunity: AI for Science

Feb. 13, 2024: The U.S. Department of Energy’s Office of Science, Advanced Scientific Computing Research (ASCR) program, is issuing a $36 million funding opportunity announcement for basic computer science and applied mathematics…


From The Computing Community Consortium Blog

Watch CCC Sponsored Sessions at AAAS – February 15th – 17th

Watch CCC Sponsored Sessions at AAAS – February 15th – 17th

    The 2024 AAAS Meeting is coming up later this week, beginning on Thursday, February 15th and ending on Saturday, February 17th in Denver, Colorado. This year, CCC is sponsoring three scientific sessions on various topics…


From Schneier on Security

Molly White Reviews Blockchain Book

Molly White Reviews Blockchain Book

Molly White—of “Web3 is Going Just Great” fame—reviews Chris Dixon’s blockchain solutions book: Read Write Own:

In fact, throughout the entire book, Dixon fails to identify a single blockchain project that has successfully provided…


From CS4FN (Computer Science For Fun)

A visit to the Turing Machine: a short story

A visit to the Turing Machine: a short story

by Greg Michaelson Greg Michaelson is an Emeritus professor of computer science at Heriot-Watt University in Edinburgh. He is also a novelist and a short story writer. From the cs4fn archive. “Come on!” called Alice, taking the…


From insideHPC

HPC User Forum Announces Agenda for April 9-10 Event in Reston, Virginia

HPC User Forum Announces Agenda for April 9-10 Event in Reston, Virginia

ST PAUL, Minn., February 12, 2024— The HPC User Forum, established in 1999 to promote the health of the global HPC industry and address issues of common concern to user, has published an updated agenda spotlighting its list of…


From Schneier on Security

On Passkey Usability

On Passkey Usability

Matt Burgess tries to only use passkeys. The results are mixed.


From insideHPC

HPC News Bytes 20240212: Honda Taps Cadence CFD Supercomputer, Chip Industry Gyrations, Yelick in ISC Spotlight

HPC News Bytes 20240212: Honda Taps Cadence CFD Supercomputer, Chip Industry Gyrations, Yelick in ISC Spotlight

Good day-after-Super-Bowl morning to you! It was an interesting week in HPC-AI last week, here’s a quick (5:47) run through some of the latest goings on: Honda taps Cadence supercomputer for air taxi R&D, chip industry gyrations…


From Computational Complexity

Are there any REAL applications of Graph Isomorphism?

Lance's post on Babai's result on Graph Isomorphism (henceforth GI) inspired some random thoughts on GI. (Lance's post is here.) 


1) Here is a conversation with someone who I will call DAVE. This conversation took place in the…


From Putting People First

Applying AI in UX research

Applying AI in UX research

Practitioners praise some efficiency gains in process tasks, but are skeptical about the real value in analysis and insight gathering, despite the many marketing claims.


From Gödel's Lost Letter and P=NP

Stop Cheating—Again

More than just stopping carelessness Sholto David is featured in this past Tuesday’s New York Times Science section for his work on cheating in papers on medical research. The article is titled “Catching Too Many Errors by Sloppy…


From Schneier on Security

Friday Squid Blogging: A Penguin Named “Squid”

Friday Squid Blogging: A Penguin Named “Squid”

Amusing story about a penguin named “Squid.”

As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.

Read my blog posting guidelines here.


From insideHPC

Trillions for Chips: A Roiled Semiconductor Industry Strains to Meet AI Demand

Trillions for Chips: A Roiled Semiconductor Industry Strains to Meet AI Demand

We’re seeing the chip industry’s version of the scientific aphorism: “nature hates a vacuum.” The vacuum is the short supply of – and vast demand for – AI chips, and it’s roiling the semiconductor industry. Chip foundry companies…


From Daniel Lemire's Blog

JSON Parsing: Intel Sapphire Rapids versus AMD Zen 4

JSON Parsing: Intel Sapphire Rapids versus AMD Zen 4

Intel has release a new generation of server processors (Sapphire Rapids) while the latest AMD technology (Zen 4) is now broadly available. There are extensive comparisons available. Of particular interest is the open benchmark…


From BLOG@CACM

Niklaus Wirth and Beyond: Safeguarding the Intellectual Heritage of Computing

Niklaus Wirth and Beyond: Safeguarding the Intellectual Heritage of Computing

On preserving the memory, and work documentation, of the founders of computer science.

 


From Schneier on Security

No, Toothbrushes Were Not Used in a Massive DDoS Attack

No, Toothbrushes Were Not Used in a Massive DDoS Attack

The widely reported story last week that 1.5 million smart toothbrushes were hacked and used in a DDoS attack is false.

Near as I can tell, a German reporter talking to someone at Fortinet got it wrong, and then everyone else…


From insideHPC

Dell: Omnia Copes with the Complexity of Configuring HPC-AI Environments

Dell: Omnia Copes with the Complexity of Configuring HPC-AI Environments

[SPONSORED GUEST ARTICLE]  Computer scientist Alan Perlis said fools ignore complexity while pragmatists suffer it. But when it comes to the complexity of configuring HPC, AI and data analytics environments, Perlis might say …


From CS4FN (Computer Science For Fun)

Lego Computer Science: Turing Machines Part 3: the program

Lego Computer Science: Turing Machines Part 3: the program

by Paul Curzon, Queen Mary University of London We have so far built the hardware of a Lego Turing Machine. Next we need the crucial part: software. It needs a program to tell it what to do. Our Turing Machine so far has an Infinite…


From insideHPC

EuroHPC Issues Call to Host Industrial Supercomputers: March 4 Deadline

EuroHPC Issues Call to Host Industrial Supercomputers: March 4 Deadline

Feb. 8, 2024 — The EuroHPC Joint Undertaking (EuroHPC JU) has launched a call for expression of interest to select hosting entities for industrial-grade supercomputers, which will be acquired by the EuroHPC JU together with a…


From insideHPC

Sylabs Announces SingularityCE 4.1.0

Sylabs Announces SingularityCE 4.1.0

Reno, NV – (February 8, 2024) – Sylabs, a provider of tools and services for performance-intensive container technology, announced the release of SingularityCE 4.1.0, the newest iteration of its container solution optimized for…


From Schneier on Security

On Software Liabilities

On Software Liabilities

Over on Lawfare, Jim Dempsey published a really interesting proposal for software liability: “Standard for Software Liability: Focus on the Product for Liability, Focus on the Process for Safe Harbor.”

Section 1 of this paper…


From insideHPC

IBM AIU SoC Cluster to be Installed at Univ. of Albany

IBM AIU SoC Cluster to be Installed at Univ. of Albany

IBM's long, slow climb back into advanced computing prominence took a turn yesterday with news from the University at Albany that it will be the first academic institution to receive a prototype computing cluster based on IBM's…


From insideHPC

European Research Consortium Reports Sustainable Fuel Progress Using HPC

European Research Consortium Reports Sustainable Fuel Progress Using HPC

A European research consortium has announced progress in the development of sustainable fuels. CoEC reported what it said is a “notable breakthrough” linked to carbon-free hydrogen combustion. “…high-fidelity simulations were…


From Computational Complexity

Favorite Theorems: Graph Isomorphism

We start our favorite theorems of the last decade with a blockbuster improvement in a long-standing problem. 

Graph Isomorphism in Quasipolynomial Time by László Babai

The graph isomorphism problem takes two graphs G and H both…


From Schneier on Security

Teaching LLMs to Be Deceptive

Teaching LLMs to Be Deceptive

Interesting research: “Sleeper Agents: Training Deceptive LLMs that Persist Through Safety Training“:

Abstract: Humans are capable of strategically deceptive behavior: behaving helpfully in most situations, but then behaving…


From Putting People First

[Book] Avoiding the news

[Book] Avoiding the news

Drawing on interviews in Spain, the United Kingdom, and the United States as well as extensive survey data, the book explains why and how so many people consume little or no news despite unprecedented abundance and ease of access…


From Universal Acceptance Steering Group

UASG Publishes 2023 Universal Acceptance Activities Report

UASG Publishes 2023 Universal Acceptance Activities Report

By the UASG 2023 was a milestone year for Universal Acceptance (UA). From local awareness and training sessions around the world to the inaugural UA Day, global support for and mobilization around UA reached unprecedented levels…


From The Computing Community Consortium Blog

CCC Responds to NIST RFI on Executing Tasks Assigned to NIST in the AI Executive Order

CCC Responds to NIST RFI on Executing Tasks Assigned to NIST in the AI Executive Order

The CCC, on Friday of last week, responded to a Request for Information to assist NIST with executing the tasks assigned to them in the Executive Order on Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence…