acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Code Written with AI Assistants Is Less Secure
From Schneier on Security

Code Written with AI Assistants Is Less Secure

Interesting research: “Do Users Write More Insecure Code with AI Assistants?“: Abstract: We conduct the first large-scale user study examining how users interact...

Synopsys to Acquire Ansys
From insideHPC

Synopsys to Acquire Ansys

SUNNYVALE, CA and PITTSBURGH, PA, January 16, 2024 – Synopsys (NASDAQ: SNPS) and Ansys (NASDAQ: ANSS) today announced that they have entered into a definitive agreement...

Call for Submissions: NSF Workshop on Sustainable Computing for Sustainability
From The Computing Community Consortium Blog

Call for Submissions: NSF Workshop on Sustainable Computing for Sustainability

Below is a call for submissions to the NSF Workshop on Sustainable Computing for Sustainability, which has been taken directly from the NSF-WSCS 2024 website.  ...

Q-CTRL and US Geological Survey in Quantum Partnership  
From insideHPC

Q-CTRL and US Geological Survey in Quantum Partnership  

LOS ANGELES, Jan. 16, 2024 — Quantum software company Q-CTRL announced it has entered a partnership with the United States Geological Survey (USGS) to explore potential...

Red Hat Developer Hub Now Available
From insideHPC

Red Hat Developer Hub Now Available

RALEIGH, N.C. – JAN. 16, 2024 – Red Hat today announced the general availability of Red Hat Developer Hub, an internal developer platform (IDP) based on Backstage...

Retroactive Loss of Privacy
From The Noisy Channel

Retroactive Loss of Privacy

We live in an age where we increasingly feel a loss of privacy. Much of our communication, media consumption, and shopping is mediated through platforms that track...

QuEra and Pawsey Partner on  Quantum and HPC
From insideHPC

QuEra and Pawsey Partner on Quantum and HPC

January 16, 2023, Boston and Perth, Australia — Neutral-atom quantum computing company  QuEra Computing and Pawsey Supercomputing Research Centre today announced...

The Story of the Mirai Botnet
From Schneier on Security

The Story of the Mirai Botnet

Over at Wired, Andy Greenberg has an excellent story about the creators of the 2016 Mirai botnet.

Ethics – What would you do? Part 2: answers
From CS4FN (Computer Science For Fun)

Ethics – What would you do? Part 2: answers

Answers to our ethical dilemma quiz from yesterday.

Call for Nominations: ACM-W Rising Star Award 2024
From ACM-W supporting, celebrating and advocating for Women in Computing

Call for Nominations: ACM-W Rising Star Award 2024

We are delighted to announce the opening of nominations for the ACM-W Rising Star Award 2024! This prestigious award honors the outstanding contributions of women...

Random Thoughts on Interestingness
From The Noisy Channel

Random Thoughts on Interestingness

As a computer scientist and an information scientist, I have always been fascinated by fundamental questions of computational complexity and compressibility. These...

Voice Cloning with Very Short Samples
From Schneier on Security

Voice Cloning with Very Short Samples

New research demonstrates voice cloning, in multiple languages, using samples ranging from one to twelve seconds. Research paper.

Ethics – What would you do?
From CS4FN (Computer Science For Fun)

Ethics – What would you do?

An ethical dilemma quiz with answers coming tomorrow.

From Computational Complexity

A nice dice problem-Part 2

In my last post (see here) I posed a dice problem, promising to give the answer in the next blog which is this blog. Here is the problem from my last blog:-----...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m speaking at the International PolCampaigns Expo (IPE24) in Cape Town, South Africa, January...

From Gödel's Lost Letter and P=NP

ICTS 2024 — Innovations in Theoretical Computer Science

In case the Berkeley Simons Institute (1/30–2/2) feels warmer than where you are now Venkatesan Guruswami (University of California, Berkeley) is the chair of the...

Estimating your memory bandwidth
From Daniel Lemire's Blog

Estimating your memory bandwidth

One of the limitations of a compute is the memory bandwidth. For the scope of this article, I define “memory bandwidth” as the maximal number of bytes you can bring...

Friday Squid Blogging: Giant Squid from Newfoundland in the 1800s
From Schneier on Security

Friday Squid Blogging: Giant Squid from Newfoundland in the 1800s

Interesting article, with photographs. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my...

Google Cloud Waves Exit Fees
From insideHPC

Google Cloud Waves Exit Fees

Starting January 11, Google Cloud customers who wish to stop using Google Cloud and migrate their data to another cloud provider and/or on premises, can take advantage...

My book, Algorithms and Misinformation
From Geeking with Greg

My book, Algorithms and Misinformation

Misinformation and disinformation are the biggest problems on the internet. To solve a problem, you need to understand the problem. In Algorithms and Misinformation...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account