Vector databases, commonly used for similarity search and product recommendations, are a shining light in the era of Artificial…
From ACM NewsEsther Shein Commissioned by CACM Staff| June 8, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
NCSU NewsNorth Carolina State University (NCSU) computer security experts have developed Protection Poker, a new risk management tool that helps software developers...NCSU News From ACM TechNews | March 4, 2009
Dartmouth College's Institute for Information Infrastructure Protection (I3P) has given the U.S. Senate Committee on Homeland Security and Governmental Affairs...Dartmouth News From ACM TechNews | February 27, 2009
On the 40th anniversary of Douglas C. Engelbart's "The Mother of All Demos," computer scientists discuss the event's influence — and imagine what could have been...Karen A. Frenkel From Communications of the ACM | March 1, 2009
Virtualization is moving out of the data center and making inroads with mobile computing, security, and software delivery.Kirk L. Kroeker From Communications of the ACM | March 1, 2009
Researchers are turning to computers to help us take advantage of our own cognitive abilities and of the wisdom of crowds.Leah Hoffmann From Communications of the ACM | March 1, 2009
Rochester Institute of Technology (RIT) scientists are developing new optical sensors for use in unmanned air vehicles and surveillance drones that could track...Rochester Institute of Technology From ACM TechNews | February 23, 2009
The New York Times' recent article, "Do We Need a New Internet?," by John Markoff, has sparked debate in the research community over whether creating a secure Internet...CCC Blog From ACM TechNews | February 23, 2009
Beijing-based Venus Info Tech, a provider of IT network security to the Chinese military, has been accused of providing hacker services that help the Chinese government... From ACM News | February 23, 2009
Congressional Republicans have introduced the Internet Security Act, legislation in the U.S. House and Senate that would require Internet service providers (ISPs)...IDG News Service From ACM TechNews | February 23, 2009
Digital rights management (DRM) has emerged as a widespread tool to combat piracy. So far, however, DRM systems have proved highly inconvenient to consumers who...Samuel Greengard From ACM News | February 20, 2009
A security expert at the recent Black Hat DC computer security conference demonstrated a technique for attacking the Mac operating system OS X without leaving any...Technology Review From ACM TechNews | February 19, 2009
There is a growing belief among engineers and security experts that the only way to fix Internet security is to recreate the Internet from scratch. What a new...The New York Times From ACM TechNews | February 18, 2009
The online crime business has never been better and the rising threat of cybercrime stems from criminals' realization that the Internet offers a more profitable...National Journal From ACM TechNews | February 9, 2009
The European Union-funded HUMABIO project is combining new types of biometric recognition systems with the latest sensor technologies to develop better security...ICT Results From ACM TechNews | February 6, 2009
Malicious software code could infect an entire city in a period of several weeks by traveling over Wi-Fi networks that overlap each other, concludes a study by...Government Computer News From ACM TechNews | February 6, 2009
U.S. President Barack Obama has laid out a number of goals for improving the security of the nation's information networks. For instance, he has promised to declare...NextGov.com From ACM TechNews | January 30, 2009
Barack Obama's presidential campaign utilized the Internet and information technology unlike any previous political campaign. How politicians and the public interact...Samuel Greengard From Communications of the ACM | February 1, 2009
ACM members have a professional duty to ensure that the public comprehends and benefits from advances in computing.
Eugene H. Spafford From Communications of the ACM | February 1, 2009
Analysts have started the process of testing new Secure Hash Algorithm (SHA) candidates for flaws as part of the first round of the National Institute of Standards...Government Computer News From ACM TechNews | January 16, 2009
A group of 35 high-profile organizations, including the U.S. Department of Homeland Security and the National Security Agency's Information Assurance Division,...Computerworld From ACM TechNews | January 14, 2009