acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Virtual reality goggles for mice
From CS4FN (Computer Science For Fun)

Virtual reality goggles for mice

To become a Jedi Knight you must have complete control of your thoughts. As you feel the force you start to control your surroundings and make objects move just...

Book excerpt: The rise and fall of wisdom of the crowds
From Geeking with Greg

Book excerpt: The rise and fall of wisdom of the crowds

(This is an excerpt from drafts of my book, "Algorithms and Misinformation: Why Wisdom of the Crowds Failed the Internet and How to Fix It") Wisdom of the crowds...

CS4FN Advent 2023 – Day 10: #AI – Holly, Ivy and Alexa – chatbots & the useful skill of file management. Plus win at noughts and crosses
From CS4FN (Computer Science For Fun)

CS4FN Advent 2023 – Day 10: #AI – Holly, Ivy and Alexa – chatbots & the useful skill of file management. Plus win at noughts and crosses

Venues around the UK will be livestreaming the Royal Institution's AI-themed Christmas Lectures this week (you can get tickets). Today's post features chatbots...

Friday Squid Blogging: Influencer Accidentally Posts Restaurant Table QR Ordering Code
From Schneier on Security

Friday Squid Blogging: Influencer Accidentally Posts Restaurant Table QR Ordering Code

Another rare security + squid story: The woman—who has only been identified by her surname, Wang—was having a meal with friends at a hotpot restaurant in Kunming...

Book excerpt: Manipulating likes, comments, shares, and follows
From Geeking with Greg

Book excerpt: Manipulating likes, comments, shares, and follows

(This is an excerpt from drafts of my book, "Algorithms and Misinformation: Why Wisdom of the Crowds Failed the Internet and How to Fix It") “The systems areexplained...

Exascale Software for Disaster Weather Warnings
From insideHPC

Exascale Software for Disaster Weather Warnings

...“the (Exascale Computing Project) software presents an array of possibilities and examples that have proven effective. The accelerated abilities afforded byExascale...

TSMC November 2023 Revenue Down 7.5% YoY
From insideHPC

TSMC November 2023 Revenue Down 7.5% YoY

HSINCHU, Taiwan, R.O.C. – Dec. 8, 2023 – TSMC (TWSE: 2330, NYSE: TSM) today announced its net revenue for November 2023: On a consolidated basis, revenue for November...

New Bluetooth Attack
From Schneier on Security

New Bluetooth Attack

New attack breaks forward secrecy in Bluetooth. Three. news articles. The vulnerability has been around for at least a decade.

CS4FN Advent 2023 – Day 8: gifts, and wrapping – Tim Berners-Lee, Right to Repair & another computing puzzle
From CS4FN (Computer Science For Fun)

CS4FN Advent 2023 – Day 8: gifts, and wrapping – Tim Berners-Lee, Right to Repair & another computing puzzle

Possibly one of the few times a computer scientist has been cheered at a major sporting event :)

Fast Buffer-to-String conversion in JavaScript with a Lookup Table
From Daniel Lemire's Blog

Fast Buffer-to-String conversion in JavaScript with a Lookup Table

When programming in a JavaScript environment such as Node.js, you might recover raw data from the network and need to convert the bytes into strings. In a system...

Using Retrievability to Measure Recall
From The Noisy Channel

Using Retrievability to Measure Recall

In court, witnesses swear to tell “the whole truth and nothing but the truth.” Search engines are not under oath, but they should be truthful.Two metrics for search...

IDC Names Pure Storage a Leader in Container Data Management
From insideHPC

IDC Names Pure Storage a Leader in Container Data Management

Dec. 7, 2023 — Pure Storage announced it has been named a leader in the inaugural IDC MarketScape: Worldwide Container Data Management 2023 Vendor Assessment. According...

CEA-Leti Paper Reports Memristor-Based Bayesian Neural Network Implementation
From insideHPC

CEA-Leti Paper Reports Memristor-Based Bayesian Neural Network Implementation

GRENOBLE, France – Dec. 7, 2023 – A team comprising CEA-Leti, CEA-List and two CNRS laboratories has published a paper in Nature Communications presenting whatCEA...

Spying through Push Notifications
From Schneier on Security

Spying through Push Notifications

When you get a push notification on your Apple or Google phone, those notifications go through Apple and Google servers. Which means that those companies can spy...

CS4FN Advent 2023 – Day 7: Computing for the birds: dawn chorus, birds as data carriers and a Google April Fool (plus a puzzle!)
From CS4FN (Computer Science For Fun)

CS4FN Advent 2023 – Day 7: Computing for the birds: dawn chorus, birds as data carriers and a Google April Fool (plus a puzzle!)

Welcome to Day 7 of our advent calendar. Yesterday’s post was about Printed Circuit Birds Boards, today’s theme is the Christmas robin redbreast which featuresContinue...

Quantum: Harvard, QuEra, MIT and NIST/University of Maryland Announce Error-Corrected Algorithms on 48 Qubits
From insideHPC

Quantum: Harvard, QuEra, MIT and NIST/University of Maryland Announce Error-Corrected Algorithms on 48 Qubits

BOSTON, December 6, 2023 – Neutral-atom quantum company QuEra Computing today announced what the company said is a quantum computing breakthrough, published inQuantum...

Taking on NVIDIA: AMD Announces Availability of MI300 GPU Accelerators
From insideHPC

Taking on NVIDIA: AMD Announces Availability of MI300 GPU Accelerators

After years of NVIDIA having its dominant way in the GPU AI chip market -- a market that has exploded over the last 12 months with the emergence of generative AI...

Security Analysis of a Thirteenth-Century Venetian Election Protocol
From Schneier on Security

Security Analysis of a Thirteenth-Century Venetian Election Protocol

Interesting analysis: This paper discusses the protocol used for electing the Doge of Venice between 1268 and the end of the Republic in 1797. We will show that...

From Computational Complexity

Do We Need to Formalize?

Back in the 1990s I explored the system Nuprl for formalizing mathematical proofs. We had a theoretical paper on quickly checking a proof and I wanted to see if...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account