Vector databases, commonly used for similarity search and product recommendations, are a shining light in the era of Artificial…
From ACM NewsEsther Shein Commissioned by CACM Staff| June 8, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
It has now been 2.5 years since the first Snowden revelations were published. And in 2015, government surveillance marched on in both large (the National Security...Ars Technica From ACM Opinion | January 7, 2016
The Dutch government has released a statement in which it says that "it is currently not desirable to take restricting legal measures concerning the development...Ars Technica From ACM News | January 6, 2016
Quantum systems are inherently fragile as any interactions with the outside world can change their state.Ars Technica From ACM News | December 17, 2015
When riot police descended on protesters in Ferguson, Missouri, last year sporting assault rifles and armored vehicles, the images sparked an awareness of the military...Ars Technica From ACM Careers | December 11, 2015
MIT's Computer Science and Artificial Intelligence Lab is developing a device that uses wireless signals to identify human figures through walls.Ars Technica From ACM News | October 28, 2015
In August, National Security Agency officials advised US agencies and businesses to prepare for a not-too-distant time when the cryptography protecting virtually...Ars Technica From ACM News | October 23, 2015
For years, privacy advocates have pushed developers of websites, virtual private network apps, and other cryptographic software to adopt the Diffie-Hellman cryptographic...Ars Technica From ACM News | October 19, 2015
A National Security Agency memo that recently resurfaced a few years after it was first published contains a detailed analysis of what very possibly was the world's...Ars Technica From ACM News | October 14, 2015
Europe's top court, the Court of Justice of the European Union (CJEU), has struck down the 15-year-old Safe Harbour agreement that allowed the free flow of information...Ars Technica From ACM News | October 6, 2015
As guards were going so far as to check inside NFL fans' wallets as part of routine security measures before a recent preseason game at Levi's Stadium, a different...Ars Technica From ACM News | September 15, 2015
Quantum key distribution is regularly touted as the encryption of the future. While the keys are exchanged on an insecure channel, the laws of physics provide a...Ars Technica From ACM News | August 25, 2015
A new technology called "RoboKiller" has won a $25,000 grand prize from the Federal Trade Commission in the agency's "Robocalls: Humanity Strikes Back" contest...Ars Technica From ACM Careers | August 24, 2015
The U.K.'s Information Commissioner's Office (ICO) has ordered Google to remove links from its search results that point to news stories reporting on earlier removals...Ars Technica From ACM News | August 24, 2015
The National Security Agency is advising U.S. agencies and businesses to prepare for a time in the not-too-distant future when the cryptography protecting virtually...Ars Technica From ACM News | August 21, 2015
For better or for worse, augmented reality (AR) is charging forward in the consumer space—but there's a place for AR in the industrial world as well.Ars Technica From ACM Careers | July 9, 2015
In 2013, the Supreme Court rejected a challenge to a once-clandestine warrantless surveillance program that gobbles up Americans' electronic communications—a project...Ars Technica From ACM News | June 30, 2015