The October 2022 issue of IEEE Spectrum is here!

Close bar

Ethereum Plans to Cut Its Absurd Energy Consumption by 99 Percent

The cryptocurrency is going on an energy diet to compete with more efficient blockchains

7 min read
Illustration: Blood Bros.
Illustration: Blood Bros.

opening illustrationIllustration: Blood Bros.

Bitcoin soaks up most of the hype and the opprobrium heaped on cryptocurrencies, leaving its younger and smaller sibling Ethereum in the shadows. But Ethereum is anything but small. Its market capitalization was roughly US $10 billion at press time, and it has an equally whopping energy footprint.

Keep reading...Show less

This article is for IEEE members only. Join IEEE to access our full archive.

Join the world’s largest professional organization devoted to engineering and applied sciences and get access to all of Spectrum’s articles, podcasts, and special reports. Learn more →

If you're already an IEEE member, please sign in to continue reading.

Membership includes:

  • Get unlimited access to IEEE Spectrum content
  • Follow your favorite topics to create a personalized feed of IEEE Spectrum content
  • Save Spectrum articles to read later
  • Network with other technology professionals
  • Establish a professional profile
  • Create a group to share and collaborate on projects
  • Discover IEEE events and activities
  • Join and participate in discussions

Protect Yourself and IEEE

October is cybersecurity month. Here are some tips on how to stay safe

1 min read

October is a cybersecurity month, but hackers and scammers are working hard every day. Cyber threats come through websites, emails, texts, and phone calls. The risks are financial loss, reputation damage and loss of intellectual property. We need to make every day a security day by being alert and by following security best practices, including:

  • Change your passwords often
  • Don’t reuse the same passwords
  • Be suspicious of any monetary requests
  • Look out for fraudsters impersonating IEEE leaders
  • Don’t fall for threats nor requests for immediate action
  • Always use a secondary method and contact information to verify a sender’s identity

Contact IEEE IT security team at security@ieee.org to report any suspicious activities or if you have questions or need help.

5 AI Art Generators You Can Use Right Now

Most are free to start, but some are more approachable than others

5 min read
A gallery of images created by the DALL-E 2 AI model.

The front page of DALL-E 2 displays a gallery of the AI model's best work.

OpenAI

2022 could go down in history as the year AI art went mainstream.

An explosion of quality tools from multiple sources, built on different AI models, is making AI art accessible to anyone with a smartphone and an Internet connection. They use an AI model to convert text input, known as a prompt, into an image.

The prompt is key: adding or removing a single word can lead to remarkably different results. “’Prompt engineering’ is quickly becoming a valuable skill and models that are trained on the same data and with the right prompt should produce the same results,” says Pranav Vaidhyanathan, CTO of AI-powered social media marketplace GenerAI. There’s even a growing market for prompts that create specific results.

Here’s five tools to help you get started. To compare them, I gave them all the same prompt: “A person and a robot standing beside a large oak tree on a hill with clouds in the sky.”

Keep Reading ↓Show less
{"imageShortcodeIds":[]}
WIPL-D

Handling various complex simulation scenarios with a single simulation method is a rather challenging task for any software suite. We will show you how our software, based on Method-of-Moments, can analyze several scenarios including complicated and electrically large models (for instance, antenna placement and RCS) using desktop workstations.

Download this free whitepaper now!