Vector databases, commonly used for similarity search and product recommendations, are a shining light in the era of Artificial…
From ACM NewsEsther Shein Commissioned by CACM Staff| June 8, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
Researchers at Japan's University of Tokyo trained algorithms on self-blended images to better spot deepfake images and video.
University of Tokyo (Japan) From ACM TechNews | May 20, 2022
Labor shortages have many companies turning to automation technology, but with mixed outcomes.
Logan Kugler From Communications of the ACM | June 1, 2022
Depending on climate conditions, the availability of renewables and other factors, immersion cooling can make a profound difference in both energy consumption and...Samuel Greengard From Communications of the ACM | June 1, 2022
Ohio State University researchers used artificial intelligence to predict how cancer could elevate the probability of spinal fractures by creating digital twins...Ohio State News From ACM TechNews | May 19, 2022
Engineering researchers have come up with a new technique that can detect ransomware faster than previous systems.
NC State University News From ACM TechNews | May 18, 2022
Two former officials said the hackers were able to gain access to taxpayers' information and interrupt Costa Rica's tax collection process.
The New York Times From ACM News | May 18, 2022
The European Union is planning new legislation aimed at curbing the worst harms associated with artificial intelligence.
MIT Technology Review From ACM News | May 17, 2022
Experts say the cybersecurity executive order has improved the nation's security posture, but more work is to be done.
CSO From ACM News | May 17, 2022
Researchers analyzed the top 100,000 websites and found a significant number record some or all of visitors' typewritten data.
Ars Technica From ACM TechNews | May 16, 2022
A 2018 letter from the bureau to the Israeli government is the clearest documentary evidence to date that the agency weighed using the spyware for law enforcement...The New York Times From ACM News | May 13, 2022
Renegade staff theoretically could insert undetectable backdoors in third-party artificial intelligence (AI) algorithms, enabling hackers to commandeer the AIs...New Scientist From ACM TechNews | May 12, 2022
New York University researchers found labeling the credibility of information sources may improve the online news consumption to a limited degree.
NYU News From ACM TechNews | May 12, 2022
The attack focused on a system run by Viasat, a California company that provides high-speed satellite communication services — and was used heavily by the Ukrainian...The New York Times From ACM News | May 11, 2022
The attack crippled the country's customs and taxes platforms alongside several other government agencies, even bringing down one Costa Rican town's energy supplier...The Record From ACM News | May 10, 2022
Researchers at cybersecurity software company SentinelOne reported two high-severity bugs in Avast and AVG antivirus products that have gone undetected for a decade...ZDNet From ACM TechNews | May 9, 2022
The facial recognition software maker is largely prohibited from selling its database of photos to private companies.
The New York Times From ACM News | May 10, 2022
Apple, Google, and Microsoft are launching a "joint effort" to "expand support for a common password-less sign-in standard created by the FIDO Alliance and the...Ars Technica From ACM TechNews | May 9, 2022
A tremendous surge in VPN downloads represents a challenge to Putin and his version of the Ukraine war.
The Washington Post From ACM News | May 6, 2022
Researchers at security firm Nozomi Networks identified an unpatched vulnerability in third-party code libraries used by 200 hardware and software vendors.
Ars Technica From ACM TechNews | May 6, 2022