acm-header
Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

April 2024


From Schneier on Security

New Lattice Cryptanalytic Technique

New Lattice Cryptanalytic Technique

A new paper presents a polynomial-time quantum algorithm for solving certain hard lattice problems. This could be a big deal for post-quantum cryptographic algorithms, since many of them base their security on hard lattice problems…


From Schneier on Security

Upcoming Speaking Engagements

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak:

I’m speaking twice at RSA Conference 2024 in San Francisco. I’ll be on a panel on software liability on May 6, 2024 at 8:30 AM, and I’m giving a keynote on AI…


From Daniel Lemire's Blog

Science and Technology links (April 13 2024)

Science and Technology links (April 13 2024)

Our computer hardware exchange data using a standard called PCI Express. Your disk, your network and your GPU are limited by what PCI Express can do. Currently, it means that you are limited to a few gigabytes per second of bandwidth…


From Daniel Lemire's Blog

Greatest common divisor, the extended Euclidean algorithm, and speed!

Greatest common divisor,  the extended Euclidean algorithm, and speed!

We sometimes need to find the greatest common divisor between two integers in software. The fastest way to compute the greatest common divisor might be the binary Euclidean algorithm. In C++20, it can be implemented generically…


From Schneier on Security

Friday Squid Blogging: The Awfulness of Squid Fishing Boats

Friday Squid Blogging: The Awfulness of Squid Fishing Boats

It’s a pretty awful story.

As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.

Read my blog posting guidelines here.


From Schneier on Security

Smuggling Gold by Disguising it as Machine Parts

Smuggling Gold by Disguising it as Machine Parts

Someone got caught trying to smuggle 322 pounds of gold (that’s about 1/4 of a cubic foot) out of Hong Kong. It was disguised as machine parts:

On March 27, customs officials x-rayed two air compressors and discovered that they…


From Daniel Lemire's Blog

A simple algorithm to compute the square root of an integer, byte by byte

A simple algorithm to compute the square root of an integer, byte by byte

A reader asked me for some help in computing (1 – sqrt(0.5)) to an arbitrary precision, from scratch. A simpler but equivalent problem is to compute the square root of an integer (e.g., 2). There are many sophisticated algorithms…


From insideHPC

NTT: Photonics Network Connects Data Centers in U.S. and U.K.

NTT: Photonics Network Connects Data Centers in U.S. and U.K.

NTT Corporation (NTT) and NTT DATA announced the successful demonstration of All-Photonics Network (APN)-driven connections between data centers in the United States and the United Kingdom. In the U.K., NTT connected data centers…


From insideHPC

Georgia Tech Unveils AI Makerspace with NVIDIA

Georgia Tech Unveils AI Makerspace with NVIDIA

Georgia Tech’s College of Engineering has established an artificial intelligence supercomputer hub dedicated exclusively to teaching students. The initiative — the AI Makerspace — was launched in collaboration with NVIDIA. College…


From Schneier on Security

Backdoor in XZ Utils That Almost Happened

Backdoor in XZ Utils That Almost Happened

Last week, the internet dodged a major nation-state attack that would have had catastrophic cybersecurity repercussions worldwide. It’s a catastrophe that didn’t happen, so it won’t get much attention—but it should. There’s an…


From CS4FN (Computer Science For Fun)

Testing AIs in Minecraft

Testing AIs in Minecraft

by Paul Curzon, Queen Mary University of London What makes a good environment for child AI learning development? Possibly the same as for human child learning development: Minecraft. Lego is one of the best games to play forContinue…


From insideHPC

INCITE Call for Proposals for Access to Leadership-Class Supercomputers Open through June 14

INCITE Call for Proposals for Access to Leadership-Class Supercomputers Open through June 14

The U.S. Department of Energy’s Innovative and Novel Computational Impact on Theory and Experiment (INCITE) program is now accepting proposals for high-impact, computationally intensive research projects in a broad array of science…


From insideHPC

Two Researchers to Share 2024 Jack Dongarra Early Career HPC Award at ISC

Two Researchers to Share 2024 Jack Dongarra Early Career HPC Award at ISC

Two early career researchers, Edgar Solomonik of the University of Illinois/Urbana-Champaign and Amanda Randles of Duke University, have been selected as the recipients of the Jack Dongarra Early Career Award, to be presented…


From Computational Complexity

Avi wins the Turing Award

The ACM announced that Avi Wigderson, a force in computational complexity and beyond, will receive the 2023 A. M. Turing Award (Quanta article). This is the first primarily complexity theorist to win the award since Andy YaoAbel…


From insideHPC

ALCF User Community: Call for Argonne Art of Science Images, April 23 Deadline

ALCF User Community: Call for Argonne Art of Science Images, April 23 Deadline

Argonne National Laboratory has issued call for images for the 2024 Argonne Art of Science Contest.Submission deadline for science visualizations: Tuesday, April 23. For submission and prize details, visit this webpage.  This…


From insideHPC

Sylabs Launches the Singularity Containers Certification

Sylabs Launches the Singularity Containers Certification

Reno, NV – (April 10, 2024) – Sylabs, a provider of tools and services for performance-intensive container technology, today announces the launch of a new certification focusing on the Singularity container platform. Rooted in…


From insideHPC

TSMC March 2024 Revenue Report: Up 34% YoY

TSMC March 2024 Revenue Report: Up 34% YoY

HSINCHU, Taiwan, R.O.C. – Apr. 10, 2024 – TSMC (TWSE: 2330, NYSE: TSM) today announced its net revenue for March 2024: On a consolidated basis, revenue for March 2024 was approximately NT$195.21 billion, an increase of 7.5 percent…


From The Computing Community Consortium Blog

Visioning Workshop Report Released: The Future of Research on Social Technologies

Visioning Workshop Report Released: The Future of Research on Social Technologies

In November 2023, CCC hosted a workshop on “The Future of Research on Social Technologies” in Washington, DC. The event, also supported by the John S. and James L. Knight Foundation, addressed the past, present and future of…


From Schneier on Security

In Memoriam: Ross Anderson, 1956-2024

In Memoriam: Ross Anderson, 1956-2024

Last week I posted a short memorial of Ross Anderson. The Communications of the ACM asked me to expand it. Here’s the longer version.


From insideHPC

MIPS Adds 3 Managers from NVIDIA, Google and SiFive

MIPS Adds 3 Managers from NVIDIA, Google and SiFive

SAN JOSE – April 09, 2024 – MIPS, a developer of efficient and configurable IP compute cores, today announced the addition of three technology and semiconductor industry professionals dedicated to driving MIPS’ technical differentiation…


From insideHPC

Vermont Tech Hub to Manufacture Gallium Nitrade Chips

Vermont Tech Hub to Manufacture Gallium Nitrade Chips

Berlin, Vt. – The state of Vermont announced its  Tech Hub V-GaN will produce Gallium Nitride (GaN) semiconductors. GaN advocates say the chips are more efficient, lighter, smaller and more durable than silicon. Applications …


From Computational Complexity

Rance Cleaveland passed away on March 27, 2024. He will be missed

 
My friend and colleague Rance Cleaveland passed away on March 27, 2024 at the age of 62.  He was a professor at The University of Maryland at College Park in the Computer Science Department. He worked in Software Engineering…


From Schneier on Security

US Cyber Safety Review Board on the 2023 Microsoft Exchange Hack

US Cyber Safety Review Board on the 2023 Microsoft Exchange Hack

US Cyber Safety Review Board released a report on the summer 2023 hack of Microsoft Exchange by China. It was a serious attack that

From the executive summary:

The Board finds that this intrusion was preventable and should never…


From insideHPC

TSMC in the USA: Up to $6.6B in CHIPS Act Funding for 3rd (2nm or More) Arizona Fab

TSMC in the USA: Up to $6.6B in CHIPS Act Funding for 3rd (2nm or More) Arizona Fab

TSMC announced it has signed a preliminary agreement with the U.S. Dept. of Commerce for up to $6.6 billion under the CHIPS and Science Act. TSMC also announced plans to build a third fab at its TSMC Arizona site in  Phoenix …


From The Computing Community Consortium Blog

Visioning Workshop Teaser: The Future of Research on Social Technologies

Visioning Workshop Teaser: The Future of Research on Social Technologies

In a world where social technologies dominate our daily interactions, it is crucial to understand their profound impact on our lives. Last year, CCC brought together information, computing, and social scientists, communication…


From The Noisy Channel

AI-Powered Search: Embedding-Based Retrieval and Retrieval-Augmented Generation (RAG)

AI-Powered Search: Embedding-Based Retrieval and Retrieval-Augmented Generation (RAG)

When search application developers consider replacing a traditional search architecture with AI-powered search, they usually have two things in mind. The first is replacing bag-of-words representations with embeddings. The second…


From insideHPC

HPC News Bytes 20240408: Chips Ahoy! …and Quantum Error Rate Progress

HPC News Bytes 20240408: Chips Ahoy! …and Quantum Error Rate Progress

A good April morning to you! Chips dominate the HPC-AI news landscape, which has become something of an industry commonplace of late, including: TSMC’s Arizona fab on schedule, the Dutch government makes a pitch to ASML, Intel…


From Schneier on Security

Security Vulnerability of HTML Emails

Security Vulnerability of HTML Emails

This is a newly discovered email vulnerability:

The email your manager received and forwarded to you was something completely innocent, such as a potential customer asking a few questions. All that email was supposed to achieve…


From CS4FN (Computer Science For Fun)

Computers that read emotions

Computers that read emotions

We can add emotion to our text communication using symbols but will computers be able to work out what we're saying?


From Daniel Lemire's Blog

C++ web app with Crow: early scalability results

C++ web app with Crow: early scalability results

Last year, I looked at writing small “hello world” web applications in various programming languages (Go, JavaScript, Nim…). Go, using nothing but the standard library, did well. In these benchmarks, I am just programming anContinue…

« Prev 1 2 Next »