acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


A Mathematical Proof Takes 200 Terabytes To State
From ACM News

A Mathematical Proof Takes 200 Terabytes To State

The latest example of proof by computer enters a new realm: a proof 200 terabytes in size.

Nsa Can Legally Access Metadata of 25,000 Callers Based on a Single Suspect's Phone
From ACM News

Nsa Can Legally Access Metadata of 25,000 Callers Based on a Single Suspect's Phone

Despite changes to the law, the U.S. National Security Agency can still request metadata from tens of thousands of private phones if they are indirectly connected...

Scientists Hold Secret Meeting to Consider Creating a Synthetic Human Genome
From ACM News

Scientists Hold Secret Meeting to Consider Creating a Synthetic Human Genome

Scientists are now contemplating the creation of a synthetic human genome, meaning they would use chemicals to manufacture all the DNA contained in human chromosomes...

Second Cycle of Martian Seasons Completing For Curiosity Rover
From ACM News

Second Cycle of Martian Seasons Completing For Curiosity Rover

NASA's Curiosity Mars rover completed its second Martian year since landing inside Gale Crater nearly four Earth years ago, which means it has recorded environmental...

How to Make Passwords That Cannot Be Compromised By Torture or Coercion
From ACM TechNews

How to Make Passwords That Cannot Be Compromised By Torture or Coercion

Researchers have hypothesized a method to measure an individual's stress levels and determine whether they are being coerced into revealing a password. 

Phones at the Dinner Table: ­-M Study Explores Attitudes
From ACM TechNews

Phones at the Dinner Table: ­-M Study Explores Attitudes

A new study investigates how people use mobile phones at the dinner table and their attitudes toward other people doing so. 

'cardboardizer' Allows ­sers to Create Robotic Models in Minutes
From ACM TechNews

'cardboardizer' Allows ­sers to Create Robotic Models in Minutes

The CardBoardiZer system developed at Purdue University allows even beginning designers to transform static three-dimensional objects into moving robotic versions...

7 Cities Head For Smart City Transportation Challenge Finals
From ACM News

7 Cities Head For Smart City Transportation Challenge Finals

The cities continue to compete for as much as $50 million to improve safety, enhance mobility, boost economies, and address climate change.

Genome Reveals Why Giraffes Have Long Necks
From ACM News

Genome Reveals Why Giraffes Have Long Necks

Call it a tall task: researchers have decoded the genomes of the giraffe and its closest relative, the okapi.

New Electrical Energy Transmission System Makes Distance Wireless Charging a Reality
From ACM TechNews

New Electrical Energy Transmission System Makes Distance Wireless Charging a Reality

It may soon be possible to charge mobile devices without even taking them out of one's pocket. 

When Websites Won't Take No for an Answer
From ACM News

When Websites Won't Take No for an Answer

Harry Brignull, a user-experience consultant in Britain who helps websites and apps develop consumer-friendly features, has a professional bone to pick with sites...

A Few Controversial Numbers May Be Illegal to Share
From ACM News

A Few Controversial Numbers May Be Illegal to Share

Jon Johansen's program worked. The Norwegian teenager watched as it downloaded 200 megabytes of a recently released movie, The Matrix, from a DVD onto his computer...

Cybersecurity Sleuths Learn to Think Like Hackers
From ACM Careers

Cybersecurity Sleuths Learn to Think Like Hackers

About 35 high-school students sit at neatly arranged rows of tables in the university's gym. Another 115 college-level contestants surround the high schoolers.

4 Big Plans to Fix Internet Security
From ACM TechNews

4 Big Plans to Fix Internet Security

Inadequate security is endemic to the Internet, and solving this problem will require effective trust and security mechanisms. 

Moore's Law Is Dead. Now What?
From ACM TechNews

Moore's Law Is Dead. Now What?

The looming obsolescence of Moore's Law is forcing scientists to look for other ways to improve computer performance and innovation. 

System Harnesses Thousands of Network Cameras For Public Safety
From ACM TechNews

System Harnesses Thousands of Network Cameras For Public Safety

Purdue University researchers have developed a prototype system that can tap into thousands of cameras located in numerous venues. 

How Toy Street Lamps Are Shedding New Light on Quantum Computing
From ACM TechNews

How Toy Street Lamps Are Shedding New Light on Quantum Computing

The bulbs from toy street lamps, among other things, are helping to reveal new insights into quantum computing. 

Your Smartphone and Tablet May Be Making You Adhd-Like
From ACM TechNews

Your Smartphone and Tablet May Be Making You Adhd-Like

Smartphones and other digital technology may be inducing attention-deficit/hyperactivity disorder-like symptoms, according to a new study.

How to Hack the Hackers: The Human Side of Cyber Crime
From ACM News

How to Hack the Hackers: The Human Side of Cyber Crime

Say what you will about cybercriminals, says Angela Sasse, "their victims rave about the customer service".

How Typography Can Save Your Life
From ACM News

How Typography Can Save Your Life

After decades of silently shouting at the top of its lungs, the National Weather Service recently announced that it's going to stop publishing its forecasts and...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account