The computational expense of creating three-dimensional images that can be viewed by all is just one factor holding them back…
From ACM NewsSandrine Ceurstemont Commissioned by CACM Staff| June 1, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
Companies market to you according to your shopping habits, your age, your salary, and your social-media activities. In the future, they may be able to advertise...Technology Review From ACM News | May 24, 2013
Microsoft announced a new version of the Xbox One earlier this week, and with it an improved and essentially reinvented version of Kinect, the company's body- and...Technology Review From ACM Careers | May 23, 2013
Driverless cars haven’t hit the roads yet, but computers are already helping to slow down or stop a car in situations when a crash is imminent.Technology Review From ACM News | May 6, 2013
Wireless operators have access to an unprecedented volume of information about users' real-world activities, but for years these massive data troves were put to...Technology Review From ACM News | April 18, 2013
Brain Research through Advancing Innovative Neurotechnologies (BRAIN) project, which President Obama announced in his State of the Union address in February, will...Technology Review From ACM Opinion | April 16, 2013
The fact that smartphones and tablets don't need antivirus software or regular software updates is a major reason for their popularity.Technology Review From ACM News | March 12, 2013
Friendster is a social network that was founded in 2002, a year before Myspace and two years before Facebook.Technology Review From ACM Careers | February 28, 2013
A beige office block in Shanghai's suburbs belonging to the Chinese army became world famous on Tuesday after Mandiant, a Washington-based computer security company...Technology Review From ACM News | February 21, 2013
Every summer, computer security experts get together in Las Vegas for Black Hat and DEFCON, conferences that have earned notoriety for presentations demonstrating...Technology Review From ACM News | February 14, 2013
If China's ultimate aim in the sphere of technology is to become completely self-sufficient, it is well on the way to achieving this ambitious goal.Technology Review From ACM Opinion | December 26, 2012
Samsung Electronics is a company at the top of its game, having become the world’s leading smartphone manufacturer in the last year.Technology Review From ACM Opinion | December 20, 2012
Cloud computing teaches people not to worry about physical equipment for hosting data and running software.Technology Review From ACM News | November 16, 2012
A decade and a half into the Web revolution, we do much of our banking and shopping online. So why can't we vote over the Internet? The answer is that voting presents...Technology Review From ACM News | November 5, 2012
Next Tuesday's presidential election will likely be extremely close, magnifying the potential impact of vote-counting errors.Technology Review From ACM News | November 2, 2012
Computerized hospital equipment is increasingly vulnerable to malware infections, according to participants in a recent government panel. These infections can clog...Technology Review From ACM News | October 18, 2012
The idea of a network of malware-infected zombie computers rigged to do the bidding of criminals conjures up a frightening image on its own. A new visualization...Technology Review From ACM News | October 16, 2012
Malicious code apparently used by governments to spy on, harass, and sabotage one another has grabbed headlines in recent years, yet the highly targeted nature...Technology Review From ACM News | September 19, 2012
Pleasing the crowd at the Black Hat and Def Con computer security conferences that took place in Las Vegas last week is relatively easy: simply hop on stage and...Technology Review From ACM News | August 3, 2012
The U.S. Internet's infrastructure needs to be redesigned to allow the NSA to know instantly when overseas hackers might be attacking public or private infrastructure...Technology Review From ACM News | July 31, 2012
Weaknesses in the technology that allows smartphone users to pinpoint themselves on a map, or check into restaurants and bars using apps such as Foursquare, could...Technology Review From ACM News | July 27, 2012