The computational expense of creating three-dimensional images that can be viewed by all is just one factor holding them back…
From ACM NewsSandrine Ceurstemont Commissioned by CACM Staff| June 1, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
IBM researchers have demonstrated a quantum-proof encryption method called CRYSTALS that can successfully encrypt a magnetic-tap storage device.
Scientific American From ACM TechNews | October 9, 2019
Sometimes a technology that's been simmering in the laboratory or the clinic for decades makes the leap to mainstream consumption almost overnight.
Scientific American From ACM News | April 5, 2019
You already have a lot to worry about. Climate change, fake news, inequality, the stability of democracy. But I feel obliged to point out yet another threat: soldiers...Scientific American From ACM News | February 12, 2019
For voters around the world, including the millions of Americans who will cast ballots in the midterms up to and on November 6, an election is democracy in action—an...Scientific American From ACM News | October 30, 2018
Imagine standing in an elevator as the doors begin to close and suddenly seeing a couple at the end of the corridor running toward you.
Scientific American From ACM News | August 20, 2018
Cyber criminals shut down parts of the Web in October 2016 by attacking the computers that serve as the internet's switchboard.
Scientific American From ACM News | August 2, 2018
Researchers in the U.S. and China are studying a "misinformation network" related to the 2016 U.S. presidential election.
Scientific American From ACM TechNews | March 28, 2018
Fraudulent images have been around for as long as photography itself. Take the famous hoax photos of the Cottingley fairies or the Loch Ness monster.
Scientific American From ACM News | March 22, 2018
Hundreds of gadget makers and software companies at this week's annual Consumer Electronics Show (CES) in Las Vegas are staking the success of their newest products...Scientific American From ACM Opinion | January 10, 2018
To participate in today's global economy, ordinary people must accept an asymmetrical bargain: their lives are transparent to states, banks and corporations, whereas...Scientific American From ACM News | December 15, 2017
Researchers are experimenting with artificial intelligence-based techniques for automatically generating convincing online reviews, such as bogus restaurant critiques...Scientific American From ACM TechNews | October 16, 2017
When hackers unleashed the WannaCry "ransomware" in mid-May, not only did they wreak havoc on European hospitals, telecoms and railways, they also made off with...Scientific American From ACM News | August 16, 2017
On New Year's Eve in 2015 local and federal agents arrested a 26-year-old man in Rochester, N.Y., for planning to attack people at random later that night using...Scientific American From ACM News | May 26, 2017
The Pentagon has known for years that a significant number of the replacement parts it buys for its missile guidance and satellite systems contain substandard counterfeit...Scientific American From ACM News | April 28, 2017
Watch enough science fiction movies and you'll probably come to the conclusion that humans are living on borrowed time.
Scientific American From ACM Opinion | March 30, 2017
The U.S. government on Tuesday issued rules for addressing cyber vulnerabilities in medical devices, providing manufacturers with guidelines for fixing security...Scientific American From ACM News | December 28, 2016
Late last week Obama administration officials used NBC News to send Moscow a cryptic threat: The U.S. government is "contemplating an unprecedented cyber covert...Scientific American From ACM Opinion | October 19, 2016
Say what you will about cybercriminals, says Angela Sasse, "their victims rave about the customer service".Scientific American From ACM News | May 13, 2016