By knitting together multiple components and data streams, multimodal AI offers the promise of smarter, more human-like systems…
From ACM NewsSamuel Greengard| December 7, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
In 1942, the science fiction author Isaac Asimov published a short story called Runaround in which he introduced three laws that governed the behaviour of robots...Technology Review From ACM News | May 16, 2014
The Moscow-based computer security firm Kaspersky Lab has analyzed major new kinds of malware, including Stuxnet, which four years ago was revealed to have damaged...Technology Review From ACM Opinion | April 11, 2014
Anyone with an iPhone 5 can use its fingerprint reader to unlock the device and pay for apps or music in Apple's iTunes store.Technology Review From ACM News | April 2, 2014
Asked whether two unfamiliar photos of faces show the same person, a human being will get it right 97.53 percent of the time.Technology Review From ACM News | March 18, 2014
Bitcoin, a purely digital currency, is backed by no commodity and governed by no central bank, but it exists because a small number of humans have chosen to believe...Technology Review From ACM News | February 24, 2014
Ari Juels, an independent researcher who was previously chief scientist at computer security company RSA, thinks something important is missing from the cryptography...Technology Review From ACM News | January 31, 2014
PlaceAvoider is software that uses computer-vision techniques to identify potentially confidential or embarrassing pictures taken with new devices such as Google...Technology Review From ACM TechNews | January 30, 2014
Eight former pro football players learned this year that they have signs of a degenerative brain disorder called chronic traumatic encephalopathy (CTE), a condition...Technology Review From ACM News | December 6, 2013
The recent leaks of U.S. National Security Agency (NSA) surveillance programs could inspire authoritarian governments in developing economies to boost NSA-style...Technology Review From ACM TechNews | November 15, 2013
Trying to derive a person's wants and needs—conscious or otherwise—from online browsing and buying habits has become crucial to companies of all kinds.Technology Review From ACM News | November 11, 2013
A silver BMW 5 Series is weaving through traffic at roughly 120 kilometers per hour (75 mph) on a freeway that cuts northeast through Bavaria between Munich and...Technology Review From ACM Opinion | October 30, 2013
Computer hardware into which secret backdoors have been inserted by the U.S. National Security Agency and its adversaries is a tremendous security problem. Technology Review From ACM TechNews | October 10, 2013
Last week, I visited the MIT computer science department looking for a very famous cryptographer.Technology Review From ACM Opinion | September 17, 2013