The computational expense of creating three-dimensional images that can be viewed by all is just one factor holding them back…
From ACM NewsSandrine Ceurstemont Commissioned by CACM Staff| June 1, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
Researchers have found vulnerabilities in some solid-state drives that allow hackers to circumvent encryption and access local data without knowing the password...ZDNet From ACM TechNews | November 12, 2018
Researchers discovered a new vulnerability in Intel processors that can allow attackers to leak encrypted data from the internal process of a central processing...ZDNet From ACM TechNews | November 9, 2018
Massachusetts Institute of Technology researchers have developed a method to train semantic parsers by mimicking the way a child learns language.
ZDNet From ACM TechNews | November 7, 2018
Google software engineer Cliff Young explains how the explosion in deep learning algorithms is coinciding with a breakdown in Moore's Law, forcing new computer...ZDNet From ACM News | November 6, 2018
It is now legal in the U.S. for consumers and repair companies to break an electronic device's digital rights management protections in order to to repair it.
ZDNet From ACM TechNews | October 31, 2018
The Chinese government turned to a local ISP for intelligence gathering after it signed the Obama-Xi cyberpact in late 2015, the researchers say.
ZDNet From ACM News | October 29, 2018
A new system can more effectively protect modern PC architectures against vulnerabilities exploited by malware like Meltdown and Spectre, researchers say.
ZDNet From ACM TechNews | October 25, 2018
Researchers have trained a neural network to reconstruct human acrobatics in YouTube video clips and manipulate a simulated humanoid to ape those movements.
ZDNet From ACM TechNews | October 17, 2018
A study found 31% of developer time is wasted on routine maintenance work, draining $300 billion each year from global GDP.
ZDNet From ACM TechNews | September 14, 2018
At its core, cyberwarfare refers the use of digital attacks by one country or nation to disrupt the computer systems of another with the aim of create significant...ZDNet From ACM Opinion | September 7, 2018
Facebook's artificial intelligence laboratory, working with the New York University School of Medicine, generated reliable magnetic resonance imaging scans with...ZDNet From ACM TechNews | August 28, 2018
Harvard University's Stratos Idreos is using what he calls a periodic table of data structures to map those structures and their characteristics and to probe their...ZDNet From ACM TechNews | August 13, 2018
IBM Watson Health has extended its collaboration with the U.S. Department of Veterans Affairs to help treat veterans with cancer using artificial intelligence.
...ZDNet From ACM TechNews | July 23, 2018
Researchers from the Xi'an Jiaotong-Liverpool University in China have developed an authentication method that uses semantically linked images.
ZDNet From ACM TechNews | July 20, 2018
A team of researchers used boron arsenide crystals to cool electronic devices more effectively than current methods.
ZDNet From ACM TechNews | July 13, 2018
The University of California, Berkeley has made available a massive dataset used by engineers in the development of driverless auto technologies.
ZDNet From ACM TechNews | June 7, 2018
Two years ago, an autonomous underwater vehicle from Woods Hole Oceanographic Institute located an underwater wreck containing $17 billion in sunken treasure.
ZDNet From ACM TechNews | May 31, 2018
A coalition of Silicon Valley tech giants has doubled down on its criticism of encryption backdoors following a proposal that would give law enforcement access...ZDNet From ACM News | May 4, 2018