By knitting together multiple components and data streams, multimodal AI offers the promise of smarter, more human-like systems…
From ACM NewsSamuel Greengard| December 7, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
Google said Wednesday that it would offer ultrahigh-speed Internet access in some communities in a test that could showcase the kinds of things that would be possible...The New York Times From ACM News | February 11, 2010
The National Science Foundation and the Microsoft Corporation have agreed to offer American scientific researchers free access to the company’s new cloud computing...The New York Times From ACM News | February 5, 2010
With a few quick keystrokes, a computer hacker who goes by the code name Majia calls up a screen displaying his latest victims. He operates secretly and illegally...The New York Times From ACM News | February 2, 2010
In computing, the vision always precedes the reality by a decade or more. The pattern has held true from the personal computer to the Internet, as it takes time...The New York Times From ACM News | February 1, 2010
On a Monday morning earlier this month, top Pentagon leaders gathered to simulate how they would respond to a sophisticated cyberattack aimed at paralyzing the...The New York Times From ACM News | January 26, 2010
Back at the dawn of the Web, the most popular account password was “12345.”
Today, it’s one digit longer but hardly safer: “123456.”
Despite all the reports...The New York Times From ACM News | January 21, 2010
The crown jewels of Google, Cisco Systems or any other technology company are the millions of lines of programming instructions, known as source code, that make...The New York Times From ACM News | January 20, 2010
U.S. colleges are adding courses and specialized degrees in the once-exotic field of cybersecurity to try to meet the growing demands for computer security skills...The New York Times From ACM TechNews | January 8, 2010
For over a decade now, health care experts have been promoting telemedicine, or the use of satellite technology, video conferencing and data transfer through phones...The New York Times From ACM News | January 8, 2010
Nearly seven months after highlighting the vulnerability of banking, energy and communications systems to Internet attacks, the White House on Tuesday is expected...The New York Times From ACM News | December 22, 2009
MOUNTAIN VIEW, Calif. — Google began lifting the veil on its planned Chrome operating system on Thursday, but it said that computers powered by the software would...The New York Times From ACM News | November 20, 2009
Like a ghost ship, a rogue software program that glided onto the Internet last November has confounded the efforts of top security experts to eradicate the program...The New York Times From ACM News | August 27, 2009
At the core of the U.S. Obama Administration and its Pentagon leadership's efforts to develop rules governing cyberwarfare is the question of whether offensive...The New York Times From ACM TechNews | August 3, 2009
To track the spread of botnets, Sandia National Laboratories computer security specialists Rob Minnich and Don Rudish have converted a Dell Thunderbird supercomputer...The New York Times From ACM TechNews | July 29, 2009
A National Security Agency (NSA) operation involving surveillance of American residents' communications, especially domestic email, is fueling debate in the U.S...The New York Times From ACM TechNews | June 17, 2009
U.S. President Barack Obama announced that the country's disjointed efforts to "deter, prevent, detect, and defend" against cyberattacks will now be run by the...The New York Times From ACM TechNews | June 1, 2009
The U.S. government’s urgent push into cyberwarfare has set off a rush among the biggest military companies for billions of dollars in new defense contracts. The...The New York Times From ACM News | June 1, 2009
The U.S. Pentagon is planning to establish a new cyberwarfare command as a complement to a soon-to-be-announced civilian computer network safety overhaul, according...The New York Times From ACM TechNews | May 29, 2009
To stay one jump ahead of fraudsters and their automated rogue programs, researchers are devising more versions of CAPTCHA (Completely Automated Public Turing test...The New York Times From ACM News | May 26, 2009
The Internet is rife with cybercriminals and online eavesdroppers, and countering this threat is the job of cybersleuths. One of the key tools in cybersleuths'...The New York Times From ACM TechNews | May 13, 2009