Vector databases, commonly used for similarity search and product recommendations, are a shining light in the era of Artificial…
From ACM NewsEsther Shein Commissioned by CACM Staff| June 8, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
Google has built a half-trillion-dollar business out of divining what people want based on a few words they type into a search field.Wired From ACM News | September 9, 2016
Apple's refusal to comply with a court order to help the FBI crack an iPhone highlighted the pressure tech companies face to include backdoors in their software...Wired From ACM News | August 15, 2016
In 2013, when University of Birmingham computer scientist Flavio Garcia and a team of researchers were preparing to reveal a vulnerability that allowed them todelayed...Wired From ACM News | August 12, 2016
History will note that the guy who discovered liquid water on Mars was an undergraduate at the University of Arizona, a 20-year-old who played guitar in a death...Wired From ACM News | August 10, 2016
When cybersecurity researchers showed in recent years that they could hack a Chevy Impala or a Jeep Cherokee to disable the vehicles' brakes or hijack their steering...Wired From ACM News | August 3, 2016
This week, GOP presidential candidate Donald Trump openly speculated that this election would be "rigged." Last month, Russia decided to take an active role in...Wired From ACM News | August 2, 2016
When Edward Snowden met with reporters in a Hong Kong hotel room to spill the NSA's secrets, he famously asked them put their phones in the fridge to block any...Wired From ACM News | July 21, 2016
Microsoft pulled the strings. At least, that’s what Google and so many business and tech journalists said when the search giant first faced antitrust complaints...Wired From ACM News | July 15, 2016
Apple's new Swift Playgrounds iPad application is designed to teach novices how to code, using the Swift programming language with their mobile devices. Wired From ACM TechNews | July 15, 2016
Car-hacking demonstrations tend to get all the glory in the security research community—remotely paralyzing a Jeep on the highway or cutting a Corvette’s brakes...Wired From ACM News | July 14, 2016
For anyone who cares about Internet security and encryption, the advent of practical quantum computing looms like the Y2K bug in the 1990s: a countdown to an unpredictable...Wired From ACM News | July 7, 2016
In the age of big data analytics, the proprietary algorithms web sites use to determine what data to display to visitors have the potential to illegally discriminate...Wired From ACM News | June 29, 2016
In the past two years a group of researchers in Israel has become highly adept at stealing data from air-gapped computers—those machines prized by hackers that,...Wired From ACM News | June 29, 2016