acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Data Mining Solves the Mystery of Your Slow Wi-Fi Connection
From ACM TechNews

Data Mining Solves the Mystery of Your Slow Wi-Fi Connection

Researchers at Tsinghua University in China have discovered why slow or failed Wi-Fi connectivity happens and how to avoid it, by measuring the time it took for...

Heartbeat Could Be ­sed as Password to Access Electronic Health Records
From ACM TechNews

Heartbeat Could Be ­sed as Password to Access Electronic Health Records

Binghamton University researchers say they have developed a way to protect personal electronic health records using a patient's own heartbeat.

Secure Quantum Communications
From Communications of the ACM

Secure Quantum Communications

Data locking experiments provide stepping stones to a possible future in quantum cryptography.

Are Computer Chips the New Security Threat?
From Communications of the ACM

Are Computer Chips the New Security Threat?

Security researchers have identified a technique for installing a backdoor on computer chips, a security flaw that could profoundly change the computing industry...

New Smartwatch Application For Accurate Signature Verification Developed
From ACM TechNews

New Smartwatch Application For Accurate Signature Verification Developed

Researchers say they have developed a system that uses smartwatch devices and software to verify handwritten signatures and detect even the most skilled forgeries...

Brainwaves Could Act as Your Password--but Not If You're Drunk
From ACM TechNews

Brainwaves Could Act as Your Password--but Not If You're Drunk

Rochester Institute of Technology have found that although brainwave readings can accurately authenticate someone's identity about 94% of the time, there could...

Will Blockchain-Based Election Systems Make E-Voting Possible?
From ACM TechNews

Will Blockchain-Based Election Systems Make E-Voting Possible?

Determining whether blockchain technology can accurately count votes and ensure the integrity of an electronic voting system was the purpose of a competition among...

New Fingerprinting Techniques Identify ­sers Across Different Browsers on the Same Pc
From ACM TechNews

New Fingerprinting Techniques Identify ­sers Across Different Browsers on the Same Pc

A U.S.-based multi-university research effort has yielded distinct fingerprinting methods to track users when they use different browsers installed on the same...

­sing Mathematics to Hunt For Computer Errors
From ACM TechNews

­sing Mathematics to Hunt For Computer Errors

The Austrian Science Fund FWF is funding the development of methods to apply mathematical analysis to enhancing software and hardware security.

Darpa's Off-Roaders Ditch Windows For a Digital World View
From ACM News

Darpa's Off-Roaders Ditch Windows For a Digital World View

Autonomous warriors may dominate the battlefield of tomorrow, but even those that still require human flesh will take on a robotic sheen. That shift could start...

Who's Winning the Cyber War? The Squirrels, of Course
From ACM News

Who's Winning the Cyber War? The Squirrels, of Course


Teaching Computers to Recognize Sick Guts: Machine-Learning and the Microbiome
From ACM TechNews

Teaching Computers to Recognize Sick Guts: Machine-Learning and the Microbiome

Researchers at the University of California, San Diego have harnessed machine-learning techniques to classify proteins found in healthy and unhealthy gut microbiomes...

11 Predictions For the Future of Programming
From ACM TechNews

11 Predictions For the Future of Programming

Among the expected trends for computer programming in 2017 and beyond is the cloud overtaking Moore's Law, which will require coders to find algorithms that can...

Hackers Trigger Yet Another Power Outage in Ukraine
From ACM News

Hackers Trigger Yet Another Power Outage in Ukraine


Army of 350,000 Star Wars Bots Found Lurking on Twitter
From ACM TechNews

Army of 350,000 Star Wars Bots Found Lurking on Twitter

Researchers at University College London in the U.K. discovered a Twitter botnet that could be comprised of more than 350,000 accounts.

N.s.a. Gets More Latitude to Share Intercepted Communications
From ACM News

N.s.a. Gets More Latitude to Share Intercepted Communications

In its final days, the Obama administration has expanded the power of the National Security Agency to share globally intercepted personal communications with the...

Poker Play Begins in 'brains vs. Ai: Upping the Ante'
From ACM News

Poker Play Begins in 'brains vs. Ai: Upping the Ante'

Play began Jan. 11 for "Brains Vs. Artificial Intelligence: Upping the Ante," a competition at Rivers Casino in Pittsburgh that pits a Carnegie Mellon University...

DARPA Wants to Create Secure Data-Sharing Tech
From ACM TechNews

DARPA Wants to Create Secure Data-Sharing Tech

The U.S. Defense Advanced Research Projects Agency is launching the Secure Handhelds on Assured Resilient networks at the tactical Edge project.

Searching Deep and Dark: Building a Google For the Less Visible Parts of the Web
From ACM TechNews

Searching Deep and Dark: Building a Google For the Less Visible Parts of the Web

Apache Tika could help with the effort to teach computers to recognize, index, and search all the different types of material that is available online.

Utsa Study Shows How Phishing Scams Thrive on Overconfidence
From ACM TechNews

Utsa Study Shows How Phishing Scams Thrive on Overconfidence

University of Texas at San Antonio researchers have examined overconfidence in detecting phishing emails, based on the theory that most people believe they are...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account