acm-header
Sign In

Communications of the ACM

Careers


Featured Job
bg-corner

Securing the Cloud
From ACM Careers

Securing the Cloud

A new algorithm solves a major problem with homomorphic encryption, which would let Web servers process data without decrypting it.

How You and I Could Become Nodes in the Internet of Things
From ACM News

How You and I Could Become Nodes in the Internet of Things

Ever wonder what the network infrastructure of the future will be? Try looking in the mirror.

As Facebook Grows ­p, Grand Ambitions Get Reality Check
From ACM Opinion

As Facebook Grows ­p, Grand Ambitions Get Reality Check

Facebook, which once seemed poised to take over the Internet, is showing its limitations: a host of newer services are gaining ground among trend-setting youth;...

Let's Play: Making Travel a Game
From ACM News

Let's Play: Making Travel a Game

It was a Sunday afternoon in SoHo and while most New Yorkers were having brunch, Makeda Peters and her boyfriend were on a street corner craning their necks at...

­ssr's Old Domain Name Attracts Cybercriminals
From ACM News

­ssr's Old Domain Name Attracts Cybercriminals

The Soviet Union disappeared from the map more than two decades ago. But online an 'e-vil empire' is thriving.

New ­niversity of ­tah Program Prepares Students to Work at New Nsa Center
From ACM Careers

New ­niversity of ­tah Program Prepares Students to Work at New Nsa Center

A few years ago, the National Security Agency, the country's top electronic spy agency, pondered a question with national security implications.

Wanted For the Internet of Things: Ant-Size Computers
From ACM News

Wanted For the Internet of Things: Ant-Size Computers

If the Internet is to reach everywhere—from the pills you swallow to the shoes on your feet—then computers will need to get a whole lot smaller.

The Robot Revolution Is For the Birds
From ACM News

The Robot Revolution Is For the Birds

Human flight has become boring.

This Pentagon Project Makes Cyberwar as Easy as Angry Birds
From ACM News

This Pentagon Project Makes Cyberwar as Easy as Angry Birds

The target computer is picked. The order to strike has been given. All it takes is a finger swipe and a few taps of the touchscreen, and the cyberattack is prepped...

Government Plan to Build 'back Doors' For Online Surveillance Could Create Dangerous Vulnerabilities
From ACM Opinion

Government Plan to Build 'back Doors' For Online Surveillance Could Create Dangerous Vulnerabilities

Recently, the FBI has been attacking the "going dark" problem—that is, its inability to read all electronic communications—from both legal and technological angles...

Inside Google's Secret Lab
From ACM Careers

Inside Google's Secret Lab

Last February, Astro Teller, the director of Google's secretive research lab, Google X, went to seek approval from Chief Executive Officer Larry Page for an unlikely...

German Railways to Test Anti-Graffiti Drones
From ACM News

German Railways to Test Anti-Graffiti Drones

The idea is to use airborne infra-red cameras to collect evidence, which could then be used to prosecute vandals who deface property at night.

Meet the Man Who Sold a Month-Old App to Dropbox For $100m
From ACM Opinion

Meet the Man Who Sold a Month-Old App to Dropbox For $100m

When Mailbox sold itself to Dropbox for a reported $100 million or so this March, the month-old iPhone app wasn’t even available to the public.

Hackers Find China Is Land of Opportunity
From ACM Careers

Hackers Find China Is Land of Opportunity

Name a target anywhere in China, an official at a state-owned company boasted recently, and his crack staff will break into that person's computer, download the...

What Will Hackers Do with the New Kinect?
From ACM Careers

What Will Hackers Do with the New Kinect?

Microsoft announced a new version of the Xbox One earlier this week, and with it an improved and essentially reinvented version of Kinect, the company's body- and...

One Day Your Phone Will Know If You're Happy or Sad
From ACM Careers

One Day Your Phone Will Know If You're Happy or Sad

As much time as we spend with our cell phones and laptops and tablets, it's still pretty much a one-way relationship.

Making Quantum Encryption Practical
From ACM News

Making Quantum Encryption Practical

One of the many promising applications of quantum mechanics in the information sciences is quantum key distribution (QKD) in which the counterintuitive behavior...

Researchers Find New Channels to Trigger Mobile Malware
From ACM Careers

Researchers Find New Channels to Trigger Mobile Malware

Researchers at the University of Alabama at Birmingham have uncovered new hard-to-detect methods that criminals may use to trigger mobile device malware. Such attacks...

Why Google and the Pentagon Want 'quantum Computers'
From ACM News

Why Google and the Pentagon Want 'quantum Computers'

Imagine a computer that can teach your mobile phone to recognize any object it sees, or one that can instantly find optimal travel routes for thousands of planes...

Treading Carefully, Google Encourages Developers to Hack Glass
From ACM Careers

Treading Carefully, Google Encourages Developers to Hack Glass

Google has set plenty of restrictions on the functionality of apps for Glass, the head-mounted display it is now shipping out to early adopters.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account