By knitting together multiple components and data streams, multimodal AI offers the promise of smarter, more human-like systems…
From ACM NewsSamuel Greengard| December 7, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
At the core of the U.S. Obama Administration and its Pentagon leadership's efforts to develop rules governing cyberwarfare is the question of whether offensive...The New York Times From ACM TechNews | August 3, 2009
To track the spread of botnets, Sandia National Laboratories computer security specialists Rob Minnich and Don Rudish have converted a Dell Thunderbird supercomputer...The New York Times From ACM TechNews | July 29, 2009
Netflix's $1 million contest to design a better movie preference-matching algorithm ended on July 26th, with two teams in a near tie and the outcome of the contest...The New York Times From ACM TechNews | July 29, 2009
Advances in artificial intelligence (AI) have spurred a group of computer scientists to consider whether research that might lead to a loss of human control over...The New York Times From ACM TechNews | July 27, 2009
Practitioners of high-frequency trading use powerful computers to transmit millions of orders at incredible speed, and critics warn that the method could be used...The New York Times From ACM TechNews | July 24, 2009
The game of baseball could be significantly affected by a new camera and software system capable of recording the precise speed and location of the ball and every...The New York Times From ACM TechNews | July 10, 2009
A National Security Agency (NSA) operation involving surveillance of American residents' communications, especially domestic email, is fueling debate in the U.S...The New York Times From ACM TechNews | June 17, 2009
Much of the daily material of our lives is now dematerialized and outsourced to a far-flung, unseen network. The stack of letters becomes the e-mail database on...The New York Times From ACM News | June 11, 2009
The ability to open doors is a significant step forward for robotics and an important milestone toward a personal robot industry. Such a milestone has been reached...The New York Times From ACM TechNews | June 10, 2009
Look closely at recent supermarket coupons, and you may see some new markings on them near the traditional bar code: sets of neat black bars stacked in two rows...The New York Times From ACM News | June 9, 2009
It is an interesting twist about Wikipedia that the most controversial, most heavily trafficked articles — on abortion, politics, virgin birth — are often the most...The New York Times From ACM News | June 8, 2009
The U.S. State Department has added workers and developed new procedures in an attempt to speed up the visa process for foreign graduate students and post-doctoral...The New York Times From ACM TechNews | June 3, 2009
The computer industry has a lot riding on your fingers. Companies have dabbled with the touch-screen technology for years. Apple elevated such technology from a...The New York Times From ACM News | June 3, 2009
U.S. President Barack Obama announced that the country's disjointed efforts to "deter, prevent, detect, and defend" against cyberattacks will now be run by the...The New York Times From ACM TechNews | June 1, 2009
The U.S. government’s urgent push into cyberwarfare has set off a rush among the biggest military companies for billions of dollars in new defense contracts. The...The New York Times From ACM News | June 1, 2009
The U.S. Pentagon is planning to establish a new cyberwarfare command as a complement to a soon-to-be-announced civilian computer network safety overhaul, according...The New York Times From ACM TechNews | May 29, 2009
To stay one jump ahead of fraudsters and their automated rogue programs, researchers are devising more versions of CAPTCHA (Completely Automated Public Turing test...The New York Times From ACM News | May 26, 2009
IBM has unveiled System S, stream processing software capable of receiving huge volumes of data from numerous sources and quickly identifying correlations within...The New York Times From ACM TechNews | May 22, 2009
The Internet is rife with cybercriminals and online eavesdroppers, and countering this threat is the job of cybersleuths. One of the key tools in cybersleuths'...The New York Times From ACM TechNews | May 13, 2009
A lost or stolen laptop or notebook computer is replaceable; the stolen data inside it may produce real owner's anxiety. Which makes Fujitsu's newly announced "security...The New York Times From ACM News | May 13, 2009