acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Fighting Botnets with Doc Savage
From ACM News

Fighting Botnets with Doc Savage

The poster outside the third-floor office in the University of California, San Diego's computer sciences building depicts Doc Savage, the big-muscled, bald-headed...

From ACM TechNews

­k's Centre For Cyber-Security Opens at Queen's

The Centre for Secure Information Technologies (CSIT) recently opened at Queen's University Belfast. CSIT will create 80 new positions and serve as the United...

From ACM TechNews

How the Netflix Prize Was Won

The secret to the success of BellKor's Pragmatic Chaos and The Ensemble, first- and second-place winners of the Netflix Prize, was teamwork. The Netflix Prize...

From ACM TechNews

Controlling the Language of Security

A security policy specification that guarantees the reliability and availability of home networks has been developed by computer scientists at Kyungpook National...

Shaping the Future
From Communications of the ACM

Shaping the Future

To create shape-shifting robotic ensembles, researchers need to teach micro-machines to work together.

Debating Net Neutrality
From Communications of the ACM

Debating Net Neutrality

Advocates seek to protect users from potential business practices, but defenders of the status quo say that concerns are overblown.

From ACM TechNews

Surveillance Software Solves Security Snag

University of Adelaide researchers have developed software that eliminates the need for security personnel at large public venues to search for suspicious activity...

Eu Funding 'orwellian' AI Plan to Monitor Public For 'abnormal Behavior'
From ACM TechNews

Eu Funding 'orwellian' AI Plan to Monitor Public For 'abnormal Behavior'

The European Union-funded Project Indect is developing software that monitors and processes information collected from Web sites, discussion forums, file servers...

Google Acquires Recaptcha
From ACM News

Google Acquires Recaptcha

ReCAPTCHA Inc., a spin-off of Carnegie Mellon University's Computer Science Department, has been acquired by Google Inc. The Pittsburgh company developed online...

From ACM TechNews

Harris Corp. Funds Tech Internet Pop-­p Security Research

Harris Corp. will fund a Florida Institute of Technology (FIT) study on the decisions people make when they see pop-up messages while Internet browsing. Researchers...

­.s. Air Force Funds Super-Fast, Secure Computing
From ACM TechNews

­.s. Air Force Funds Super-Fast, Secure Computing

The U.S. Air Force Office of Scientific Research (AFOSR) is supporting University of Michigan (UM) physicists' development of components for quantum computers that...

Fly-By-Wireless Set For Take-Off
From ACM TechNews

Fly-By-Wireless Set For Take-Off

Aircraft manufacturers eager to reduce the weight of planes are looking into the replacement of copper wiring with wireless networks. Imbuing fly-by-wireless networks...

From ACM TechNews

Domain-Name Abuse Proliferates; Rogue Registrars Turn a Blind Eye

Domain name abuse continues to be a serious problem, which is too often proliferated by some registrars who are willing to overlook phony registration information...

Chinese Schools Quietly Discard Controversial Web Filter
From ACM News

Chinese Schools Quietly Discard Controversial Web Filter

Schools in Beijing are quietly removing the Green Dam filter, which was required for all school computers in July, due to complaints over problems with the software...

On the Road to Secure Car-to-Car Communications
From ICT Results

On the Road to Secure Car-to-Car Communications

A European research project works out how to keep car-to-car data transmissions private and secure from malicious hackers.

Stimulus Funds to Further Cyber Security Research
From ACM TechNews

Stimulus Funds to Further Cyber Security Research

The American Recovery and Reinvestment Act of 2009 will fund a project designed to protect the privacy and security of business information systems and data centers...

Machines Still Way Behind Humans in Image Recognition
From ACM News

Machines Still Way Behind Humans in Image Recognition

Computers can copy many aspects of human behavior, but they don't yet possess our ability to recognize distorted images, says a team of researchers. "Our goal is...

Still Trying to Crack Nazi Enigma Messages
From ACM TechNews

Still Trying to Crack Nazi Enigma Messages

Enigma@home is attempting to break one of three original messages generated by the Enigma machine, which was intercepted by the Allies in 1942. The Enigma M4 machine...

From ACM TechNews

Dhs Report: It Sector Is Resilient Against Serious Cyberattacks

The U.S. Department of Homeland Security recently released a report that outlines several scenarios in which attacks against vital elements of the U.S.'s IT infrastructure...

Open Source Dna
From ACM TechNews

Open Source Dna

Tel Aviv University professor Eran Halperin and researchers from the University of California, Berkeley have developed a mathematical formula that can be used to...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account