acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Do quantum computers threaten global encryption systems?
From ACM News

Do quantum computers threaten global encryption systems?

The modern world is a house of cards built upon encryption.

Tall Boulder Rolls Down Martian Hill, Lands Upright
From ACM News

Tall Boulder Rolls Down Martian Hill, Lands Upright

A track about one-third of a mile (500 meters) long on Mars shows where an irregularly shaped boulder careened downhill to its current upright position, seen in...

Vast Majority of Hackers Believe They're Above the Law—survey
From ACM News

Vast Majority of Hackers Believe They're Above the Law—survey

When most hackers are infiltrating computer systems, the last thing on their mind is getting caught, according to new data.

The Best 'low-Tech' Spycraft Tricks
From ACM News

The Best 'low-Tech' Spycraft Tricks

In the wake of Edward Snowden's revelations about the US National Security Agency’s activities around the globe, authorities in Russia and Germany declared they...

Multiple ­avs Perform Autonomous Formation Flight
From ACM TechNews

Multiple ­avs Perform Autonomous Formation Flight

Research conducted at the Georgia Institute of Technology Research Institute could help improve the capabilities of autonomous systems collaborating as teams, thereby...

The Most Wanted Man in the World
From ACM News

The Most Wanted Man in the World

The message arrives on my "clean machine," a MacBook Air loaded only with a sophisticated encryption package.

Do Quantum Computers Threaten Global Encryption Systems?
From ACM News

Do Quantum Computers Threaten Global Encryption Systems?

Make a mobile phone call and encryption is there to stop eavesdroppers listening in.

Energy Harvested From Body, Environment Could Power Wearables, IoT Devices
From ACM TechNews

Energy Harvested From Body, Environment Could Power Wearables, IoT Devices

Low-power wearable devices may soon stop using batteries and start drawing energy generated by body heat and movement, as well as ambient energy from the environment...

As Data Overflows Online, Researchers Grapple With Ethics
From ACM News

As Data Overflows Online, Researchers Grapple With Ethics

Scholars are exhilarated by the prospect of tapping into the vast troves of personal data collected by Facebook, Google, Amazon, and a host of start-ups, which...

Siri's Inventors Are Building a Radical New AI That Does Anything You Ask
From ACM News

Siri's Inventors Are Building a Radical New AI That Does Anything You Ask

When Apple announced the iPhone 4S on October 4, 2011, the headlines were not about its speedy A5 chip or improved camera.

Can an Armadillo Paper Airplane Fly? Autodesk Says Yes
From ACM News

Can an Armadillo Paper Airplane Fly? Autodesk Says Yes

We've all made the standard paper airplane, that elongated triangle made up of six simple folds.

When Hackers Test For Flaws, They Might Earn Cash—or Threats
From ACM Careers

When Hackers Test For Flaws, They Might Earn Cash—or Threats

To hack or not to hack?

Why One of Cybersecurity's Thought Leaders ­ses a Pager Instead of a Smart Phone
From ACM Opinion

Why One of Cybersecurity's Thought Leaders ­ses a Pager Instead of a Smart Phone

In the computer and network security industry, few people are as well known as Dan Geer.

Google's Big-Data Tool, Mesa, Holds Petabytes of Data Across Multiple Servers
From ACM TechNews

Google's Big-Data Tool, Mesa, Holds Petabytes of Data Across Multiple Servers

Google says its big-data architecture, Mesa, can store petabytes of data, update millions of rows of data per second, and field trillions of queries daily across...

Traffic Light Hackers Could Cause Jams Across the US
From ACM News

Traffic Light Hackers Could Cause Jams Across the US

Branden Ghena pulls his car up under a traffic light in a city in Michigan.

Malware Traffic Spikes Preceded Russian and Israeli Conflicts
From ACM News

Malware Traffic Spikes Preceded Russian and Israeli Conflicts

A study of malware operating on corporate and government networks suggests that the communication patterns of these programs could warn of major conflicts.

Meet the Puzzle Mastermind Who Designs Def Con's Hackable Badges
From ACM Careers

Meet the Puzzle Mastermind Who Designs Def Con's Hackable Badges

Def Con is one of the world's biggest hacker conventions, an annual gathering of security experts, cryptographers and at least a few people who could surreptitiously...

A Room Where Executives Go to Get Help from IBM's Watson
From ACM TechNews

A Room Where Executives Go to Get Help from IBM's Watson

IBM researchers are experimenting with a room where executives can go to discuss business problems with a version of the Watson supercomputing system.

Cassini Prepares For Its Biggest Remaining Burn
From ACM News

Cassini Prepares For Its Biggest Remaining Burn

NASA's Cassini spacecraft will execute the largest planned maneuver of the spacecraft's remaining mission on Saturday, Aug. 9. The maneuver will target Cassini...

Origami Robot Folds Itself ­p, Crawls Away
From ACM News

Origami Robot Folds Itself ­p, Crawls Away

For years, a team of researchers at MIT and Harvard University has been working on origami robots—reconfigurable robots that would be able to fold themselves into...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account