acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Drug Agents ­se Vast Phone Trove, Eclipsing N.s.a.'s
From ACM News

Drug Agents ­se Vast Phone Trove, Eclipsing N.s.a.'s

For at least six years, law enforcement officials working on a counternarcotics program have had routine access, using subpoenas, to an enormous AT&T database that...

A Robot to Beat Humans at Foosball
From ACM TechNews

A Robot to Beat Humans at Foosball

Students from the Swiss Federal Institute of Technology in Lausanne have developed a foosball-playing robot. The machine uses one computer to control the movement...

The Insane and Exciting Future of the Bionic Body
From ACM News

The Insane and Exciting Future of the Bionic Body

Bertolt Meyer pulls off his left forearm and gives it to me.

How 'cell Tower Dumps' Caught the High Country Bandit—and Why It Matters
From ACM News

How 'cell Tower Dumps' Caught the High Country Bandit—and Why It Matters

On February 18, 2010, the FBI field office in Denver issued a "wanted" notice for two men known as "the High Country Bandits"—a rather grandiose name for a pair...

DARPA Creates Cloud ­sing Smartphones
From ACM TechNews

DARPA Creates Cloud ­sing Smartphones

The U.S. Defense Advanced Research Projects Agency (DARPA) is testing new software-based approaches for creating cloud-like computing networks using smartphones...

Strands Project Develops Robot Security Guards
From ACM TechNews

Strands Project Develops Robot Security Guards

The European Union's Seventh Framework Program is funding the Strands project, which is developing software for robot brains that can be used as security guards...

­.s. Appetite For Internet ­ser Data Not ­nique
From ACM TechNews

­.s. Appetite For Internet ­ser Data Not ­nique

Despite recent concerns about information collection by the United States, law enforcement agencies in Europe and other nations appear to gather equal or greater...

Adept Emphasizes Energy-Efficient Parallelism
From ACM TechNews

Adept Emphasizes Energy-Efficient Parallelism

The European Union-funded ADEPT project is exploring the energy-efficient use of parallel technologies. ADEPT aims to help high-performance computing software...

Vending Machines Get Smart to Accommodate the Cashless
From ACM Careers

Vending Machines Get Smart to Accommodate the Cashless

More than 40 percent of U.S. adults say they can go a week without paying for something with cash, according to a survey conducted by Rasmussen Reports last year...

Inside the Response to the New York Times Attack
From ACM News

Inside the Response to the New York Times Attack

Late Tuesday morning, one of the engineers in CloudFlare's San Francisco office saw a message on Twitter saying that the New York Times Web site was down. Minutes...

The Proof in the Quantum Pudding
From ACM News

The Proof in the Quantum Pudding

In early May, news reports gushed that a quantum computation device had for the first time outperformed classical computers, solving certain problems thousands...

A Camera That Sees Like the Human Eye
From ACM News

A Camera That Sees Like the Human Eye

The retina is an enormously powerful tool. It sorts through massive amounts of data while operating on only a fraction of the power that a conventional digital...

Scientist Creates Solution For Looming Broadband Shortage
From ACM TechNews

Scientist Creates Solution For Looming Broadband Shortage

A new method to solve the approaching broadcast spectrum deficit examines how cell networks could optimize spectrum use. 

'zero Knowledge' May Answer Computer Security Question
From ACM TechNews

'zero Knowledge' May Answer Computer Security Question

A new protocol for the creation of a "zero-knowledge proof" involves answering questions that depend on having a secret bit of knowledge. 

How Syrian Hackers Found the New York Times's Australian Weak Spot
From ACM News

How Syrian Hackers Found the New York Times's Australian Weak Spot

A hacking attack launched by the Syrian Electronic Army may have targeted the New York Timesand other U.S. media companies, but the weak link was Melbourne IT (...

New Tool Enhances the Search For Genetic Mutations
From ACM TechNews

New Tool Enhances the Search For Genetic Mutations

New software uses statistical probabilities to help identify mutations and more accurately pinpoint their source and their possible significance for health. 

Html5 Now Neck and Neck With Native Apps For Developer Love
From ACM TechNews

Html5 Now Neck and Neck With Native Apps For Developer Love

More developers will trade a superior native experience for the lower cost of maintaining a common code base using HTML5 code in a native app container. 

Think You Can Drive a Bulldozer?
From ACM News

Think You Can Drive a Bulldozer?

As he closed the door, leaving me alone at the controls of a 41,000-pound bulldozer with list price of nearly $432,000, a Komatsu Ltd. executive shouted, "No worries...

Here's How One Hacker Is Waging War on the Syrian Government
From ACM Careers

Here's How One Hacker Is Waging War on the Syrian Government

As President Obama weighed U.S. air strikes in Syria this week, a lone American hacker was waging his own attack on the Syrian government.

Moore's Law Dead by 2022, Expert Says
From ACM TechNews

Moore's Law Dead by 2022, Expert Says

Moore's Law could come to an end as soon as 2020 at the seven-nanometer node. 
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account