R. Colin Johnson
Intel, IBM, and others stake their claims to the future technology path for semiconductors.
New hardware and services are aimed at identifying malware before it has the chance to execute.
Knowledge Graphs Pick Needles from the Haystack
Using machine learning to wade through massive amounts of data.
Computational Learning Techniques Becoming Mainstream
Applying support vector machines to predictive analytics.
Anomaly Detectors Catch Zero-Day Hackers
Faster than signature scanners, detectors spot anomalies before malware can be identified.
Visualization Streams For ltimate Scalability
In this era of big data, the world needs tools that can visualize the most important aspects of data without having to hold it all in memory.
Designing Interactive Memory Joggers
Texts, photos, and videos are the fodder of memories, which require appropriate cues to materialize those memories from custom-designed hardware, says one researcher.
Glasses Foil Facial Recognition
The PrivacyVisor prevents facial detection/identification programs based on Haar-like feature recognition.
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get Involved