Vector databases, commonly used for similarity search and product recommendations, are a shining light in the era of Artificial…
From ACM NewsEsther Shein Commissioned by CACM Staff| June 8, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
This month, Intel unveiled a Wi-Fi radio almost completely made of the same sort of transistors that go into one of its microprocessors.Technology Review From ACM News | September 25, 2012
You can get a lot for $35 these days. It bought me what looks like a credit card-size James Bond gadget prototype but is actually a fully functional computer.Technology Review From ACM Opinion | September 6, 2012
In the summer of 2009, Yelp quietly added a feature to its iPhone app that blurred the line between the real and the virtual. If you held your handset up and looked...Technology Review From ACM News | August 8, 2012
French hacker Jonathan Brossard recently developed Rakshasa, software that can be hidden inside the hardware of a PC, creating a backdoor that would allow secret...Technology Review From ACM TechNews | August 2, 2012
The U.S. Internet's infrastructure needs to be redesigned to allow the NSA to know instantly when overseas hackers might be attacking public or private infrastructure...Technology Review From ACM News | July 31, 2012
Weaknesses in the technology that allows smartphone users to pinpoint themselves on a map, or check into restaurants and bars using apps such as Foursquare, could...Technology Review From ACM News | July 27, 2012
Carnegie Mellon University researchers have developed GraphChi, a framework for running large-scale computations on one personal computer. Technology Review From ACM TechNews | July 18, 2012
University of Tokyo researchers are using Mixi, an online social network with more than 25 million users, to study people who have regular thoughts about suicide...Technology Review From ACM TechNews | July 10, 2012
Searching for hotels in cities they've never visited, people often turn to customer-written reviews on websites such as TripAdvisor. But how do they know those...Technology Review From ACM News | June 25, 2012
University College London researchers recently conducted a review of computational advertising technology and outlined the challenges that it faces. Technology Review From ACM TechNews | June 15, 2012
If Facebook were a country, a conceit that founder Mark Zuckerberg has entertained in public, its 900 million members would make it the third largest in the world...Technology Review From ACM News | June 14, 2012
Two weeks ago today, computer security labs in Iran, Russia, and Hungary announced the discovery of Flame, "the most complex malware ever found," according to Hungary's...Technology Review From ACM News | June 12, 2012
Disney has a new technology, called Touche, that can turn any object, including the human body, into a touch-sensitive surface that recognizes not only when contact...Technology Review From ACM News | May 18, 2012
Conversations between people include a lot more than just words. All sorts of visual and aural cues indicate each party's state of mind and make for a productive...Technology Review From ACM News | May 14, 2012
When you learned about the Doppler Effect in high school physics class—the wave frequency shift that occurs when the source of the wave is moving, easily illustrated...Technology Review From ACM News | May 7, 2012
The creation of a marketplace for personal information would be a way for people to regain control of their data in the information age, says Hewlett-Packard Labs...Technology Review From ACM TechNews | May 2, 2012
The Tor Project is a free network run by volunteers that hides users locations and usage from surveillance and traffic analysis.Technology Review From ACM News | April 4, 2012
Mining personal data to discover what people care about has become big business for companies such as Facebook and Google. Now a project from Microsoft Research...Technology Review From ACM News | March 22, 2012
A chilling demonstration to a small, packed room at the recent RSA security conference showed how clicking a single bad Web link while using a phone running Google's...Technology Review From ACM News | March 8, 2012