Banner
Welcome to the May 16, 2025 edition of ACM TechNews, providing timely information for computer professionals three times a week.

The European Union Agency for Cybersecurity The European Union Agency for Cybersecurity has rolled out the European Vulnerability Database (EUVD). Updated in real time and now fully operational, the database identifies disclosed bugs with their U.S. Common Vulnerabilities and Exposures (CVE)-assigned IDs and EUVD identifiers, details their criticality and exploitation status, and provides links to available advisories and patches.
[ » Read full article ]
The Register (U.K.); Jessica Lyons (May 13, 2025)

Jack Dongarra In an opinion piece in The Conversation, ACM A.M. Turing Award laureate Jack Dongarra penned an opinion piece that takes a stand for traditional high-performance computing (HPC), opining that AI's reliance on HPC necessitates greater focus from the U.S. government. "U.S. national strategy should include funding new machines and training for people to use them," he wrote. "It would also include partnerships with universities, national labs and private companies. Most importantly, the plan would focus not just on hardware but also on the software and algorithms that make high-performance computing useful."
[ » Read full article ]
insideHPC (May 15, 2025)

A student is playing chess with an intelligent robot in Xuzhou City, Jiangsu Province, China China is restricting the extent to which children can use generative AI in primary and secondary schools, according to local reports. Primary school students are prohibited from using unrestricted generative AI tools on their own, although an instructor may use the tech to assist with teaching, according to the local government report. Middle schoolers are permitted to explore how generative AI reasons and analyzes information, while high schoolers can use the tech more broadly.
[ » Read full article ]
CNBC; Evelyn Cheng (May 15, 2025)

Paul Strassmann in the 1970s on a business trip to Japan ACM Distinguished Member Paul A. Strassmann passed away on April 4 at the age of 96. A World War II resistance fighter and Holocaust survivor, Strassmann moved to the U.S. in 1948. Learning how to use a mainframe computer while studying at the Massachusetts Institute of Technology, he focused his knowledge on determining how computers can solve business problems and boost efficiencies.
[ » Read full article *May Require Paid Registration ]
The Wall Street Journal; James R. Hagerty (May 14, 2025)

Students in 12 states are now required to take at least one computer science course to graduate According to a report from the Code.org Advocacy Coalition, a dozen states now require high school students to take at least one computer science (CS) course to graduate. Thirty-two states require that at least one CS course be offered in high school, and 17 states have imposed course requirements for middle and elementary school students. Said Computer Science Teachers Association executive director Jake Baskin, "As generative AI and other technologies rapidly transform our world, every student needs the foundational knowledge to use these tools effectively."
[ » Read full article ]
K-12 Dive; Lauren Barack (May 14, 2025)

an example of an Intel server system A new class of vulnerabilities in all Intel processors identified by computer scientists at Switzerland's ETH Zurich can be exploited to misuse the central processing unit's (CPU) prediction calculations to gain access to information from other users of the same CPU. The vulnerabilities enable the incorrect assignment of privileges during the few nanoseconds when the CPU switches between prediction calculations for two users with different permissions. ETH Zurich's Sandro Rüegge said quickly repeating the attack can result in a more than 5,000-bytes-per-second readout speed, allowing attackers to read the entire memory over time.
[ » Read full article ]
ETH Zurich (Switzerland); Daniel Meierhans (May 13, 2025)

Expanded view of the AlphaEvolve discovery process Google DeepMind unveiled a general-purpose AI that can solve computer science and mathematics problems. Based on Google's Gemini family of large language models (LLMs), researchers have used the AlphaEvolve AI to solve open math problems, improve the design of Google's next generation of tensor processing units, and determine how to make full use of the company's global computing capacity.
[ » Read full article *May Require Paid Registration ]
Nature; Elizabeth Gibney (May 15, 2025)

A woman in Vigo, north-west Spain, uses a torch to navigate the streets during the April 28 Iberian power outage Spain's National Cybersecurity Institute is requesting information from small electricity generators in that nation regarding their cyber defenses as it investigates an April blackout, during which the country lost 15 gigawatts of electricity, or 60% of its supply, in just five seconds. The root cause of the blackout has not been determined, and the government has not ruled out a cyberattack. The government, which said last week that Spain suffered 100,000 cyberattacks across all sectors last year, announced a €1.1-billion (US$1.23-billion) investment to reinforce cybersecurity.
[ » Read full article *May Require Paid Registration ]
Financial Times; Barney Jopson (May 13, 2025)

China Makes High-Speed Laser Links in Orbit Chinese aerospace firm Laser Starcom said its low Earth orbit satellites Guangchuan 01 and 02 had achieved a 400-gigabit-per-second communications link over a span of 640 kilometers. Laser Starcom said the test established a crosslink communication system capable of supporting future high-bandwidth space networks.
[ » Read full article ]
IEEE Spectrum; Andrew Jones (May 12, 2025)

Matthew Pidden now plans to study for a master's degree in robotics Matthew Pidden, a computer science student at the U.K.'s University of Bristol, developed a robot that solved a four-by-four Rubik's cube in 45.305 seconds, beating the previous world record for a robot of one minute and 18 seconds. The Revenger robot scans the cube using dual webcams and is equipped with an algorithm that produces efficient solutions.
[ » Read full article ]
BBC; Clara Bullock (May 12, 2025)

Cross-platform memory injection A "context manipulation" exploit developed by Princeton University researchers leverages prompt injection attacks against the open source framework ElizaOS to steal cryptocurrency. ElizaOS uses large language models to undertake blockchain-based transactions for users based on predefined rules. The attacks depend on a feature of ElizaOS in which past conversations are stored in an external database, which allows anyone authorized to transact with an agent to create a false memory that triggers an override of security defenses.
[ » Read full article ]
Ars Technica; Dan Goodin (May 13, 2025)

Shark AI teacher professional development session University of Florida's Bruce MacFadden led an interdisciplinary research team that developed a free, optional online curriculum that uses the science of paleontology to introduce Florida middle schooler students to AI. The curriculum, Shark AI, uses fossil shark teeth to explain data collection and object classification, teaches students how train and evaluate machine earning models, and helps them develop unique AI models.
[ » Read full article ]
NSF News (May 13, 2025)
Semantic Web for the Working Ontologist, Third Edition: Effective Modeling in RDFS and OWL
 
ACM Chapters
 

Association for Computing Machinery

1601 Broadway, 10th Floor
New York, NY 10019-7434
1-800-342-6626
(U.S./Canada)



ACM Media Sales

If you are interested in advertising in ACM TechNews or other ACM publications, please contact ACM Media Sales or (212) 626-0686, or visit ACM Media for more information.

To submit feedback about ACM TechNews, contact: [email protected]

Archives | Career News | Contact Us | Unsubscribe