Internet freedom is eroding on two fronts: the sheer number of efforts to block access to legitimate information, and the level…
From ACM NewsSamuel Greengard Commissioned by CACM Staff| November 23, 2021
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
Researchers have developed a semiautomated system that could have identified in seconds malicious chips reportedly inserted into computer systems by the Chinese...IEEE Spectrum From ACM TechNews | October 5, 2018
Protection Assistant for Wildlife Security is an artificial intelligence program that uses machine learning algorithms to predict where poaching is likely to occur...IEEE Spectrum From ACM TechNews | January 11, 2018
The security of the Internet of Things could depend on its constituent hardware being "patchable" so it can adapt to future threats, write several experts.
IEEE Spectrum From ACM TechNews | October 31, 2017
Keeping bitcoin running via the process of "mining" consumes a staggering amount of electricity, and experts are investigating energy-saving solutions.
IEEE Spectrum From ACM TechNews | October 2, 2017
Researchers hypothesize that robots that understand ethical issues would be able to observe interactions between patients and caregivers, and intervene when needed...IEEE Spectrum From ACM TechNews | August 3, 2017
The argument that consciousness is computable--and instillable within machines--cannot be verified or refuted until a measurable theory of consciousness becomes...IEEE Spectrum From ACM TechNews | June 2, 2017
I stand firm in the opinion that it's my basic, human right to binge-watch six hours of trashy detective shows on a Friday night with a silent phone in my lap and...IEEE Spectrum From ACM News | April 14, 2017
As artificial intelligence technologies increasingly are deployed to meet industrial and personal needs, the field will need to address its lack of ethnic and gender...IEEE Spectrum From ACM TechNews | October 26, 2016
Despite changes to the law, the U.S. National Security Agency can still request metadata from tens of thousands of private phones if they are indirectly connected...IEEE Spectrum From ACM News | May 17, 2016
A special session at the IEEE International Conference on Intelligence Transportation Systems dealt with intelligent pedestrian traffic and evacuation dynamics.IEEE Spectrum From ACM TechNews | September 21, 2015
In the 1966 film Fantastic Voyage, scientists at a U.S. laboratory shrink a submarine called Proteus and its human crew to microscopic size and then inject the...IEEE Spectrum From ACM News | June 2, 2015
Hitachi and Fujitsu have pioneered a new technique in which a person's vein configurations are scanned as proof of identity, and the technology is being integrated...IEEE Spectrum From ACM TechNews | June 7, 2012
When Microsoft was developing its Kinect 3D sensor, a critical task was to calibrate its algorithms to rapidly and accurately recognize parts of the human body,...IEEE Spectrum From ACM Opinion | January 17, 2012
On 6 August, peaceful protests over the police shooting of a local man in London's Tottenham district exploded into full-blown riots. During four days of assaults...IEEE Spectrum From ACM News | November 2, 2011
The use of fingerprints, shoeprints, handwriting, and other forensic evidence may seem like good science—but often it's not, as it relies heavily on humans for...IEEE Spectrum From ACM News | November 29, 2010