acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Digital Forensics: From the Crime Lab to the Library
From ACM News

Digital Forensics: From the Crime Lab to the Library

When archivists at California's Stanford University received the collected papers of the late palaeontologist Stephen Jay Gould in 2004, they knew right away they...

Study of 1 Million Sites Shows Just How Closely We're Watched
From ACM News

Study of 1 Million Sites Shows Just How Closely We're Watched

The web is watching you. Chunks of code hide inside every website, tracking your online behaviour.

The White House Is Finally Prepping For an AI-Powered Future
From ACM TechNews

The White House Is Finally Prepping For an AI-Powered Future

The White House is adamant the government must determine how to regulate and utilize artificial intelligence technology before it gets out of control. 

Push For Encryption Law Falters Despite Apple Case Spotlight
From ACM News

Push For Encryption Law Falters Despite Apple Case Spotlight

After a rampage that left 14 people dead in San Bernardino, key U.S. lawmakers pledged to seek a law requiring technology companies to give law enforcement agencies...

Artificial Intelligence Is Far From Matching Humans, Panel Says
From ACM News

Artificial Intelligence Is Far From Matching Humans, Panel Says

Never mind Terminator-like killer robots. Artificial intelligence researchers are grappling with more realistic questions like whether their creations will take...

Shortened ­rls May Open a Window on Your Life
From ACM TechNews

Shortened ­rls May Open a Window on Your Life

The trend of using shortened URLs offers a new opportunity for hackers to invade users' privacy, according to Cornell Tech researchers. 

Checklist of Worst-Case Scenarios Could Help Prepare For Evil AI
From ACM TechNews

Checklist of Worst-Case Scenarios Could Help Prepare For Evil AI

University of Louisville researcher Roman Yampolskiy and hacktivist Federico Pistono are examining worst-case scenarios for a potential malevolent artificial intelligence...

How the Constant Threat of War Shaped Israel's Tech Industry
From ACM Careers

How the Constant Threat of War Shaped Israel's Tech Industry

Unit 8200 is Israel's most mysterious agency. No one outside knows exactly how it operates, who works there, or how they learn.

Face Recognition App Taking Russia By Storm May Bring End to Public Anonymity
From ACM News

Face Recognition App Taking Russia By Storm May Bring End to Public Anonymity

If the founders of a new face recognition app get their way, anonymity in public could soon be a thing of the past.

Computing a Secret, ­nbreakable Key
From ACM TechNews

Computing a Secret, ­nbreakable Key

Researchers say they have developed the first available software to evaluate the security protocol for Quantum Key Distribution.

Study Reveals Only 1 in 6 Drivers Want Fully-Autonomous Vehicles
From ACM TechNews

Study Reveals Only 1 in 6 Drivers Want Fully-Autonomous Vehicles

Most U.S. drivers do not want to own a fully self-driving car in the future, according to a University of Michigan survey. 

China's Scary Lesson to the World: Censoring the Internet Works.
From ACM News

China's Scary Lesson to the World: Censoring the Internet Works.

First there was the Berlin Wall. Now there is the Great Firewall of China, not a physical barrier preventing people from leaving, but a virtual one, preventing...

Physicists Discover a New Form of Light
From ACM News

Physicists Discover a New Form of Light

Physicists from Trinity College Dublin's School of Physics and the CRANN Institute, Trinity College, have discovered a new form of light, which will impact our...

The Key to Privacy
From Communications of the ACM

The Key to Privacy

40 years ago, Whitfield Diffie and Martin E. Hellman introduced the public key cryptography used to secure today's online transactions.

How to Create a Malevolent Artificial Intelligence
From ACM TechNews

How to Create a Malevolent Artificial Intelligence

University of Louisville researchers are studying how malevolent artificial intelligenes might be designed, and the conditions in which they might be create.

China Quietly Targets ­.s. Tech Companies in Security Reviews
From ACM Careers

China Quietly Targets ­.s. Tech Companies in Security Reviews

Chinese authorities are quietly scrutinizing technology products sold in China by Apple and other big foreign companies, focusing on whether they pose potential...

Largest Study of Online Tracking Proves Google Really Is Watching ­S All
From ACM TechNews

Largest Study of Online Tracking Proves Google Really Is Watching ­S All

Researchers at Princeton University say they have conducted the largest study yet on the technology that tracks people's movements around the Web. 

How to Create a Malevolent Artificial Intelligence
From ACM News

How to Create a Malevolent Artificial Intelligence

The possibility that a malevolent artificial intelligence might pose a serious threat to humankind has become a hotly debated issue.

Technique Makes Holograms Highly Efficient, Secure
From ACM TechNews

Technique Makes Holograms Highly Efficient, Secure

Harvard University researchers have programmed polarization into compact holograms.

America Is 'Dropping Cyberbombs'—But How Do They Work?
From ACM News

America Is 'Dropping Cyberbombs'—But How Do They Work?

Recently, United States Deputy Defense Secretary Robert Work publicly confirmed that the Pentagon’s Cyber Command was "dropping cyberbombs," taking its ongoing...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account