The computational expense of creating three-dimensional images that can be viewed by all is just one factor holding them back…
From ACM NewsSandrine Ceurstemont Commissioned by CACM Staff| June 1, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
Researchers have developed technology, known as a digital monkey, that can detect and counter fraudulent advertisements on a large scale. Technology Review From ACM TechNews | April 2, 2014
Anyone with an iPhone 5 can use its fingerprint reader to unlock the device and pay for apps or music in Apple's iTunes store.Technology Review From ACM News | April 2, 2014
Although the bulk of content on Facebook is shared only a few times, some can be reshared millions of times.Technology Review From ACM TechNews | March 28, 2014
An algorithm developed by IBM researchers exploits anyone's last 200 Twitter postings to reveal their home city location with nearly 70-percent accuracy.Technology Review From ACM TechNews | March 24, 2014
When people in the chip industry talk about the thermal problems in computer processors, they get dramatic.Technology Review From ACM News | March 21, 2014
Computational social scientists have studied the Facebook interactions of more than 1 million people to examine the spread of misinformation on the Internet. Technology Review From ACM TechNews | March 21, 2014
This year's winner of the Turing Award—often referred to as the Nobel Prize of computing—was announced yesterday as Leslie Lamport, a computer scientist whose research...Technology Review From ACM Opinion | March 19, 2014
Asked whether two unfamiliar photos of faces show the same person, a human being will get it right 97.53 percent of the time.Technology Review From ACM News | March 18, 2014
It's been almost 30 years since the computer scientist Jaron Lanier formed VPL Research, the first company to sell the high-tech goggles and gloves that once defined...Technology Review From ACM Careers | March 10, 2014
One of the common myths about the Internet is that it was originally designed during the Cold War to survive nuclear attack.Technology Review From ACM News | March 7, 2014
Igor Spetic's hand was in a fist when it was severed by a forging hammer three years ago as he made an aluminum jet part at his job.Technology Review From ACM News | February 27, 2014
Bitcoin, a purely digital currency, is backed by no commodity and governed by no central bank, but it exists because a small number of humans have chosen to believe...Technology Review From ACM News | February 24, 2014
University of California, Berkeley professor David Messerschmitt is studying the design of end-to-end communications between stellar systems. Technology Review From ACM TechNews | February 18, 2014
There are many conflicting opinions about what troubled Web giant Yahoo must do to turn itself around, but critics and company leaders at least agree on one thing...Technology Review From ACM Careers | February 11, 2014
A Dutch man who lost his left hand in a fireworks accident nine years ago is now able to feel different kinds of pressure on three fingers of a prosthetic, robotic...Technology Review From ACM News | February 6, 2014
Researchers have developed an approach to cryptography that makes it difficult for hackers to determine when they have correctly deciphered a password.Technology Review From ACM TechNews | February 3, 2014
Ari Juels, an independent researcher who was previously chief scientist at computer security company RSA, thinks something important is missing from the cryptography...Technology Review From ACM News | January 31, 2014