Vector databases, commonly used for similarity search and product recommendations, are a shining light in the era of Artificial…
From ACM NewsEsther Shein Commissioned by CACM Staff| June 8, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
One or more insiders with high-level access are suspected of assisting the hackers who damaged some 30,000 computers at Saudi Arabia's national oil company last...Reuters From ACM News | September 10, 2012
This view of the calibration target for the Mars Hand Lens Imager (MAHLI) aboard NASA's Mars rover Curiosity combines two images taken by that camera during the...Jet Propulsion Laboratory/NASA From ACM News | September 10, 2012
When Libyan rebels finally wrested control of the country last year away from its mercurial dictator, they discovered the Qaddafi regime had received an unusual...ArsTechnica From ACM News | September 7, 2012
Marko Ahtisaari spreads out several models of Nokia's new smartphone with the self-assurance of a Tiffany diamond salesman.Wired From ACM News | September 7, 2012
It's been a month since Curiosity’s remarkable soft landing on the surface of Mars. Remember the massive, supersonic parachute that slowed the spacecraft’s descent...Smithsonian magazine From ACM Opinion | September 7, 2012
You can get a lot for $35 these days. It bought me what looks like a credit card-size James Bond gadget prototype but is actually a fully functional computer.Technology Review From ACM Opinion | September 6, 2012
Paul Baran set out to build a means of communication that could survive a nuclear war. And he ended up inventing the fundamental networking techniques that underpin...Wired From ACM News | September 6, 2012
When a pilot in a Eurofighter Typhoon jet glances down, he doesn't see a steel-grey floor. Instead he sees clouds, and maybe sheep and cows in green fields below...BBC News From ACM News | September 5, 2012
There was a time, not all that long ago, when the U.S. military wouldn't even whisper about its plans to hack into opponents' networks.Wired From ACM News | September 5, 2012
Technical University of Braunschweig researchers have found that smartphones can be joined together in a network, which when connected via Wi-Fi, can carry out...New Scientist From ACM TechNews | September 5, 2012
University of Bristol researchers say they have developed a quantum chip that will lead to the creation of completely secure mobile phones and super-fast computers...Financial Times From ACM TechNews | September 5, 2012
It was a tweet that fired the imagination like few others. On May 10, 2011, at 1:35 in the afternoon, Eric Brewer told the world he was redesigning the most important...Wired From ACM Opinion | September 5, 2012
Most major Websites these days maintain huge databases: Shopping sites have databases of inventory and customer ratings, travel sites have databases of seat availability...MIT News Office From ACM News | September 5, 2012
Imagine if, in addition to all the things your smartphone does now, it could also act as your keys to the real world.Time From ACM News | September 4, 2012
For a center of cutting-edge scientific research, Caltech's Jet Propulsion Lab seems to be a pretty wacky place. Luke Johnson, a graphic designer at the lab, set...The Atlantic From ACM Opinion | September 4, 2012
Smarphone owners carry around more processing power in their pocket than a 1970s-era supercomputer, but most of the time it languishes unused.New Scientist From ACM News | September 4, 2012
Don't you dare even think about your banking account password when you slap on those fancy new brainwave headsets.Wired From ACM News | August 31, 2012