The October 2022 issue of IEEE Spectrum is here!

Close bar

The Ridiculous Amount of Energy It Takes to Run Bitcoin

Running Bitcoin uses a small city’s worth of electricity. Intel and others want to make a more sustainable blockchain

6 min read
Illustration by Greg Mably

This article is for IEEE members only. Join IEEE to access our full archive.

Join the world’s largest professional organization devoted to engineering and applied sciences and get access to all of Spectrum’s articles, podcasts, and special reports. Learn more →

If you're already an IEEE member, please sign in to continue reading.

Membership includes:

  • Get unlimited access to IEEE Spectrum content
  • Follow your favorite topics to create a personalized feed of IEEE Spectrum content
  • Save Spectrum articles to read later
  • Network with other technology professionals
  • Establish a professional profile
  • Create a group to share and collaborate on projects
  • Discover IEEE events and activities
  • Join and participate in discussions

Protect Yourself and IEEE

October is cybersecurity month. Here are some tips on how to stay safe

1 min read

October is a cybersecurity month, but hackers and scammers are working hard every day. Cyber threats come through websites, emails, texts, and phone calls. The risks are financial loss, reputation damage and loss of intellectual property. We need to make every day a security day by being alert and by following security best practices, including:

  • Change your passwords often
  • Don’t reuse the same passwords
  • Be suspicious of any monetary requests
  • Look out for fraudsters impersonating IEEE leaders
  • Don’t fall for threats nor requests for immediate action
  • Always use a secondary method and contact information to verify a sender’s identity

Contact IEEE IT security team at to report any suspicious activities or if you have questions or need help.

5 AI Art Generators You Can Use Right Now

Most are free to start, but some are more approachable than others

5 min read
A gallery of images created by the DALL-E 2 AI model.

The front page of DALL-E 2 displays a gallery of the AI model's best work.


2022 could go down in history as the year AI art went mainstream.

An explosion of quality tools from multiple sources, built on different AI models, is making AI art accessible to anyone with a smartphone and an Internet connection. They use an AI model to convert text input, known as a prompt, into an image.

The prompt is key: adding or removing a single word can lead to remarkably different results. “’Prompt engineering’ is quickly becoming a valuable skill and models that are trained on the same data and with the right prompt should produce the same results,” says Pranav Vaidhyanathan, CTO of AI-powered social media marketplace GenerAI. There’s even a growing market for prompts that create specific results.

Here’s five tools to help you get started. To compare them, I gave them all the same prompt: “A person and a robot standing beside a large oak tree on a hill with clouds in the sky.”

Keep Reading ↓Show less

Exploring the Value of Power Modules

Learn how power modules can reduce power supply size, EMI, design time, and solution cost

1 min read
Texas Instruments

In this training series, we will discuss the high level of integration of DC/DC power modules and the significant implications that this has on power supply design.

Watch this free webinar now!

In addition to high power density and small solution size, modules can also simplify EMI mitigation and reduce power supply design time. And thanks to improved process and packaging technology, a power module may even provide all of these benefits with a lower overall solution cost as well.

Keep Reading ↓Show less