The computational expense of creating three-dimensional images that can be viewed by all is just one factor holding them back…
From ACM NewsSandrine Ceurstemont Commissioned by CACM Staff| June 1, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
A programmer behind the popular open-source npm program node-ipc poisoned it with malware that erased the hard drives of computers located in Russia or Belarus....ZDNet From ACM News | March 28, 2022
The European Union was expected to finalize the Digital Markets Act, the most sweeping legislation to regulate tech since a European privacy law was passed in 2018...The New York Times From ACM News | March 24, 2022
Authentication services provider Okta reported a hacker breach that may have impacted some of its customers.
Reuters From ACM TechNews | March 24, 2022
It may have found a new standard for penalizing tech companies that violate privacy and use deceptive data practices: algorithmic destruction.
Protocol From ACM News | March 23, 2022
At the recent American Indian Science and Engineering Society, students in a workshop created metadata to train an algorithm to understand an image's cultural significance...The New York Times From ACM TechNews | March 23, 2022
Specialized techniques may make it possible to induce selective 'amnesia' in machine learning models.
Samuel Greengard From Communications of the ACM | April 1, 2022
Leading technologists and thinkers are concerned about technology's impact on our ethical thinking.
Logan Kugler From Communications of the ACM | April 1, 2022
Members of the hacker gang may act in Russia's interest, but their links to the FSB and Cozy Bear hackers appear ad hoc.
Wired From ACM News | March 18, 2022
Twitter has launched a version of its service that can circumvent Russia's attempts to block and censor the flow of information about its Ukraine invasion.
Associated Press From ACM TechNews | March 15, 2022
Ward Beullens at IBM Research Zurich in Switzerland easily cracked a cryptography algorithm touted as one of three contenders for a global standard against quantum...New Scientist From ACM TechNews | March 11, 2022
Researchers discovered seven vulnerabilities, known collectively as "Access:7," in more than 150 Internet of Things devices made by more than 100 companies.
Dark Reading From ACM TechNews | March 11, 2022
Researchers are looking to artificial intelligence as a way to potentially identify and predict problem gambling.
The New York Time From ACM TechNews | March 11, 2022
War in Ukraine and Western sanctions against Russia have made cryptocurrency a hot potato for international politics.
Wired From ACM News | March 10, 2022