The computational expense of creating three-dimensional images that can be viewed by all is just one factor holding them back…
From ACM NewsSandrine Ceurstemont Commissioned by CACM Staff| June 1, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
The Hyena code is able to handle amounts of data that make GPT-style technology run out of memory and fail.
ZDNet/Innovation From ACM News | April 20, 2023
In the future, specifying a drug target may be like sitting down to ChatGPT. After a few clicks, you'll have your novel therapeutic.
ZDNet From ACM News | March 3, 2023
The NSA's 'Best Practices for Securing Your Home Network' guide provides remote workers with advice on how to protect against online threats.
ZDNet From ACM News | February 24, 2023
Scientists at Cerebras and the U.S. Department of Energy's National Energy Technology Laboratory said they can model extreme weather by accelerating field equations...ZDNet From ACM TechNews | February 10, 2023
Adobe gave permission to the Computer History Museum to release the source code for an early version of its PostScript programming language, first released in 1984...ZDNet From ACM TechNews | December 13, 2022
ACM A.M. Turing award recipient Geoffrey Hinton envisions a "mortal" neuromorphic computer combining hardware and software.
ZDNet From ACM TechNews | December 2, 2022
Semiconductor giant Intel claims its FakeCatcher technology can detect whether videos are genuine or deepfakes with 96% accuracy in real time.
ZDNet From ACM TechNews | November 18, 2022
Singapore and Germany have agreed to mutually recognize their respective smart computer product cybersecurity rating labels.
ZDNet From ACM TechNews | October 27, 2022
The software giant details how hackers are using easily available tools and non-existent job offers to trick developers and IT workers.
ZDNet From ACM News | September 30, 2022
Fundamental problems elude many strains of deep learning, says LeCun, including the mystery of how to measure information.
ZDNet From ACM News | September 28, 2022
Researchers discovered the Syslogk Linux rootkit delivers a backdoor trojan hides on a targeted machine until triggered.
ZDNet From ACM TechNews | June 21, 2022
All individuals transacting in Bitcoin are within six degrees or fewer of separation from a core group, say researchers.
ZDNet From ACM News | June 10, 2022
A study of 164 government-endorsed education technology products found 146 endangered children's privacy by collecting and selling their data to ad tech companies...ZDNet From ACM TechNews | June 1, 2022
Computer science is a broad and rewarding field. Find out the computer science degree salary you can expect depending on your chosen career path.
ZDNet From ACM News | May 27, 2022
Researchers found that a bug in Zyxel firewalls that could enable unauthenticated remote attackers to execute code.
ZDNet From ACM TechNews | May 24, 2022