Vector databases, commonly used for similarity search and product recommendations, are a shining light in the era of Artificial…
From ACM NewsEsther Shein Commissioned by CACM Staff| June 8, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
IBM researchers have developed BigSheets, a data analysis tool based on Hadoop designed to help users analyze large Web data sets. BigSheets uses Hadoop to comb...Technology Review From ACM TechNews | March 4, 2010
The National Institute of Standards and Technology (NIST) has shown how the wireless industry could lop hours off the process of testing the capabilities of new...National Institute of Standards and Technology From ACM News | March 4, 2010
U.S. Department of Homeland Security Secretary Janet Napolitano delivered a keynote address which focused on cybersecurity at the RSA Conference in San Francisco...InfoSecurity From ACM News | March 4, 2010
A new report from the Project on Scientific Knowledge and Public Policy's Scientists in Government project concludes that policies regarding the roles and responsibilities...George Washington University From ACM News | March 4, 2010
WenZhan Song, assistant professor in the School of Engineering and Computer Science at WSU Vancouver, has received a prestigious National Science Foundation CAREER...WS Vancouver From ACM News | March 4, 2010
The most common digital security technique used to protect both media copyright and Internet communications has a major weakness, University of Michigan computer...niversity of Michigan From ACM News | March 4, 2010
Forget putting your phone on vibrate. A novel "high-definition" touch-feedback display can give a touch screen the feel of a textured surface. The technology was...Technology Review From ACM News | March 3, 2010
The Obama administration has declassified part of its plan to improve the security of cyberspace in an attempt to cultivate greater collaboration between government...Financial Times From ACM TechNews | March 3, 2010
The fusion of high-performance computing (HPC) and high-performance data could potentially result in the generation of robust systems that are at least one order...UCSD News From ACM TechNews | March 3, 2010
Vienna University of Technology researchers have developed the "deanonymization" attack as a way to reveal the identity of Internet users based on their interactions...Dark Reading From ACM TechNews | March 3, 2010
Information technology (IT) needs to be taught a different way in schools if the industry is to deepen its talent pool, experts in the United Kingdom said during...V3.co.uk From ACM TechNews | March 3, 2010
In a dimly lit chamber festooned with wires and hidden in one of California’s largest data centers, Tim Pozar is changing the shape of the Internet.
He is using...The New York Times From ACM News | March 3, 2010
Karlsruhe Institute of Technology scientists will demonstrate a language-to-language translation device at the upcoming CeBIT conference. The device combines automatic...Karlsruche Institute of Technology From ACM TechNews | March 3, 2010
University of Bath scientists have developed a biometric system for identifying people based on their nose shape. The researchers used a photographic system to...niversity of Bath From ACM TechNews | March 3, 2010
The National Science Foundation has announced a memorandum of understanding with Microsoft Corp. whereby Microsoft will provide NSF supported-researchers access...National Science Foundation From ACM News | March 3, 2010
The final publication of the 93-page Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach (NIST Special...National Institute of Standards and Technology From ACM News | March 3, 2010
A system that can more effectively detect possible cyber security attacks within large organizations—including government agencies—is being developed with the assistance...Oak Ridge National Laboratory From ACM News | March 3, 2010
The first two laboratories have recently completed accreditation to provide testing services for the USGv6 Program. The program provides the basis for expressing...National Institute of Standards and Technology From ACM News | March 3, 2010
Cloud services provided over grid technology are helping to treat cancer patients, thanks to an enormous effort by European researchers working closely with industry... From ICT Results | March 3, 2010
The issue of security is holding back its full potential of cloud computing. This was the gist of the keynote message presented Tuesday (March 2) by Art Coviello...ZDNet Asia From ACM News | March 3, 2010