acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Teaching LLMs to Be Deceptive
From Schneier on Security

Teaching LLMs to Be Deceptive

Interesting research: “Sleeper Agents: Training Deceptive LLMs that Persist Through Safety Training“: Abstract: Humans are capable of strategically deceptive behavior...

[Book] Avoiding the news
From Putting People First

[Book] Avoiding the news

Drawing on interviews in Spain, the United Kingdom, and the United States as well as extensive survey data, the book explains why and how so many people consume...

UASG Publishes 2023 Universal Acceptance Activities Report
From Universal Acceptance Steering Group

UASG Publishes 2023 Universal Acceptance Activities Report

By the UASG 2023 was a milestone year for Universal Acceptance (UA). From local awareness and training sessions around the world to the inaugural UA Day, global...

CCC Responds to NIST RFI on Executing Tasks Assigned to NIST in the AI Executive Order
From The Computing Community Consortium Blog

CCC Responds to NIST RFI on Executing Tasks Assigned to NIST in the AI Executive Order

The CCC, on Friday of last week, responded to a Request for Information to assist NIST with executing the tasks assigned to them in the Executive Order on Safe,...

Cisco and NVIDIA Partner on Integrated AI Infrastructure
From insideHPC

Cisco and NVIDIA Partner on Integrated AI Infrastructure

February 6, 2024 — Cisco and NVIDIA today announced plans to deliver AI infrastructure solutions for the data center designed to be easy to deploy and manage. “AI...

Kathy Yelick to Deliver ISC 2024 Keynote on Post-Exascale Computing
From insideHPC

Kathy Yelick to Deliver ISC 2024 Keynote on Post-Exascale Computing

The opening keynote at the ISC 2024 conference in Hamburg will be delivered by Kathy Yelick, cice chancellor for research and the Robert S. Pepper Distinguished...

Tenstorrent Selects Blue Cheetah Chiplet Interconnect IP for AI and RISC-V Solutions
From insideHPC

Tenstorrent Selects Blue Cheetah Chiplet Interconnect IP for AI and RISC-V Solutions

SUNNYVALE, Calif., Feb. 6, 2024 — Tenstorrent and Blue Cheetah Analog Design today announced that Tenstorrent has licensed Blue Cheetah’s die-to-die interconnect...

Human-centered design to go beyond the mere “what customers want”
From Putting People First

Human-centered design to go beyond the mere “what customers want”

In a context of economic and geopolitical flux and volatility, a more in-depth human-centered design approach is now more necessary than ever, as it helps forward...

UASG Announces Shortlisted Events for UA Day 2024
From Universal Acceptance Steering Group

UASG Announces Shortlisted Events for UA Day 2024

The Universal Acceptance Steering Group (UASG) has published the shortlisted events for the second annual Universal Acceptance (UA) Day, which will be held from...

QuEra to Build Quantum Testbed in UK
From insideHPC

QuEra to Build Quantum Testbed in UK

BOSTON, February 5th, 2024 – Neutral-atom quantum company QuEra Computing has announced that the UK’s National Quantum Computing Centre (NQCC) at Harwell, Oxfordshire...

Deepfake Fraud
From Schneier on Security

Deepfake Fraud

A deepfake video conference call—with everyone else on the call a fake—fooled a finance worker into sending $25M to the criminals’ account.

AMPER: AI helping future you remember past you
From CS4FN (Computer Science For Fun)

AMPER: AI helping future you remember past you

Research to develop a new AI tool to help people with dementia to remember, and gain confidence. Also includes some suggested classroom activities and examples...

How fast is rolling Karp-Rabin hashing?
From Daniel Lemire's Blog

How fast is rolling Karp-Rabin hashing?

A hash function maps values (e.g., strings) into a fixed number of strings, typically smaller than the original. It is useful to compare quickly two long strings...

From Computational Complexity

The advantage of working on obscure things

 I got an email from an organization that wants to publicize one of my papers. Which paper did they want to publicize? 1) If the organization was Quanta, they...

Lego Computer Science: Turing Machines Part 2: the controller
From CS4FN (Computer Science For Fun)

Lego Computer Science: Turing Machines Part 2: the controller

by Paul Curzon, Queen Mary University of London Last time we started to build a working computer out of Lego: a Turing Machine. So far we have seen that we canContinue...

[Book] Filterworld: how algorithms flattened culture
From Putting People First

[Book] Filterworld: how algorithms flattened culture

From New Yorker staff writer Kyle Chayka comes a timely history and investigation of a world ruled by algorithms, which determine the shape of culture itself.

From Gödel's Lost Letter and P=NP

Predictions 2024

Would an AI-powered meta-prediction be smarter? Cropped from video source Punxsutawney Phil is our populace’s perennially perspicacious prognosticator. Every February...

Friday Squid Blogging: Illex Squid in Argentina Waters
From Schneier on Security

Friday Squid Blogging: Illex Squid in Argentina Waters

Argentina is reporting that there is a good population of illex squid in its waters ready for fishing, and is working to ensure that Chinese fishing boats don’t...

David Kahn
From Schneier on Security

David Kahn

David Kahn has died. His groundbreaking book, The Codebreakers was the first serious book I read about codebreaking, and one of the primary reasons I entered this...

A Self-Enforcing Protocol to Solve Gerrymandering
From Schneier on Security

A Self-Enforcing Protocol to Solve Gerrymandering

In 2009, I wrote: There are several ways two people can divide a piece of cake in half. One way is to find someone impartial to do it for them. This works, but...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account