The computational expense of creating three-dimensional images that can be viewed by all is just one factor holding them back…
From ACM NewsSandrine Ceurstemont Commissioned by CACM Staff| June 1, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
In the future, specifying a drug target may be like sitting down to ChatGPT. After a few clicks, you'll have your novel therapeutic.
ZDNet From ACM News | March 3, 2023
The NSA's 'Best Practices for Securing Your Home Network' guide provides remote workers with advice on how to protect against online threats.
ZDNet From ACM News | February 24, 2023
Scientists at Cerebras and the U.S. Department of Energy's National Energy Technology Laboratory said they can model extreme weather by accelerating field equations...ZDNet From ACM TechNews | February 10, 2023
Adobe gave permission to the Computer History Museum to release the source code for an early version of its PostScript programming language, first released in 1984...ZDNet From ACM TechNews | December 13, 2022
ACM A.M. Turing award recipient Geoffrey Hinton envisions a "mortal" neuromorphic computer combining hardware and software.
ZDNet From ACM TechNews | December 2, 2022
Semiconductor giant Intel claims its FakeCatcher technology can detect whether videos are genuine or deepfakes with 96% accuracy in real time.
ZDNet From ACM TechNews | November 18, 2022
Singapore and Germany have agreed to mutually recognize their respective smart computer product cybersecurity rating labels.
ZDNet From ACM TechNews | October 27, 2022
The software giant details how hackers are using easily available tools and non-existent job offers to trick developers and IT workers.
ZDNet From ACM News | September 30, 2022
Fundamental problems elude many strains of deep learning, says LeCun, including the mystery of how to measure information.
ZDNet From ACM News | September 28, 2022
Researchers discovered the Syslogk Linux rootkit delivers a backdoor trojan hides on a targeted machine until triggered.
ZDNet From ACM TechNews | June 21, 2022
All individuals transacting in Bitcoin are within six degrees or fewer of separation from a core group, say researchers.
ZDNet From ACM News | June 10, 2022