Vector databases, commonly used for similarity search and product recommendations, are a shining light in the era of Artificial…
From ACM NewsEsther Shein Commissioned by CACM Staff| June 8, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
The elusive hacker movement known as Anonymous has carried out Internet attacks on well-known organizations like Sony and PBS. In August, the group went after its...The New York Times From ACM News | February 28, 2012
These days, it’s hard to find a superlative that adequately describes Apple. But maybe simplest is best: biggest.The New York Times From ACM News | February 24, 2012
It wasn't so long ago that legions of people began walking the streets, talking to themselves. On closer inspection, many of them turned out to be wearing tiny...The New York Times From ACM News | February 23, 2012
Andrew Pole had just started working as a statistician for Target in 2002, when two colleagues from the marketing department stopped by his desk to ask an odd question...The New York Times From ACM News | February 17, 2012
A team of European and American mathematicians and cryptographers have discovered an unexpected weakness in the encryption system widely used worldwide for online...The New York Times From ACM News | February 16, 2012
When Kenneth G. Lieberthal, a China expert at the Brookings Institution, travels to that country, he follows a routine that seems straight from a spy film.The New York Times From ACM News | February 15, 2012
Workers in the digital era can feel at times as if they are playing a video game, battling the barrage of emails and instant messages, juggling documents, Web sites...The New York Times From ACM News | February 9, 2012
Stephen Wolfram, a 52-year-old scientist, software designer and entrepreneur, tends to go his own way—often with noteworthy results.The New York Times From ACM News | February 7, 2012
In the brutal world of online commerce, where a competing product is just a click away, retailers need all the juice they can get to close a sale.The New York Times From ACM News | February 1, 2012
Chuck Bokath would be terrifying if he were not such a nice guy. A jovial senior engineer at the Georgia Tech Research Institute in Atlanta, Mr. Bokath can hack...The New York Times From ACM News | January 30, 2012
As crime-solving tools go, it may not have the same pedigree as, say, the oversize magnifying glass.The New York Times From ACM News | January 30, 2012
The push to move the nation from paper to electronic health records is serious business. That's why a first look at the campus of Epic Systems comes as something...The New York Times From ACM News | January 23, 2012
When Barack Obama joined Silicon Valley's top luminaries for dinner in California last February, each guest was asked to come with a question for the president.The New York Times From ACM News | January 23, 2012
The vast data centers that process information for the Facebooks and Amazons of the Web work at a brisk clip. But even so, they can't always keep up.The New York Times From ACM News | January 17, 2012
"Gorgeous," raves The Huffington Post. "Best-looking smartphone operating system in the industry," gushes Slate. "Far superior to most if not all the Android...The New York Times From ACM News | January 9, 2012
The TouchPad tablet from Hewlett-Packard was one of the most closely watched new gadgets of 2011—and quickly turned out to be the year’s biggest flop.The New York Times From ACM News | January 6, 2012
Ann Rosenbaum, a former military police officer in the Marines, does not shrink from a fight, having even survived a close encounter with a car bomb in Iraq.The New York Times From ACM News | January 5, 2012
Passwords are a pain to remember. What if a quick wiggle of five fingers on a screen could log you in instead? Or speaking a simple phrase?The New York Times From ACM News | December 26, 2011