A pilot program launched by Exxon Mobil Corp. involves powering cryptocurrency-mining operations using excess natural gas that otherwise would be burned off from...Bloomberg From ACM TechNews | April 5, 2022
A growing number of new products allow anyone to apply artificial intelligence without having to write a line of computer code. Proponents believe the "no-code"...The New York Times From ACM News | April 4, 2022
At the recent American Indian Science and Engineering Society, students in a workshop created metadata to train an algorithm to understand an image's cultural significance...The New York Times From ACM TechNews | March 23, 2022
An international team of researchers has created a three-dimensional simulation of small fish swimming that could improve aquatic research robots designed to mimic...Skolkovo Institute of Science and Technology From ACM TechNews | March 17, 2022
Ward Beullens at IBM Research Zurich in Switzerland easily cracked a cryptography algorithm touted as one of three contenders for a global standard against quantum...New Scientist From ACM TechNews | March 11, 2022
Researchers discovered seven vulnerabilities, known collectively as "Access:7," in more than 150 Internet of Things devices made by more than 100 companies.
Dark Reading From ACM TechNews | March 11, 2022
Cornell University researchers have developed a robotic photography system that can automatically rove an indoor space and shoot aesthetically appealing photos....Cornell Chronicle From ACM TechNews | March 4, 2022
Investors give money to pseudonymous developers. Venture capitalists back founders without learning their real names. What happens when they need to know?
The New York Times From ACM News | March 3, 2022