acm-header
Sign In

Communications of the ACM

News Archive


Archives

The news archive provides access to past news stories from Communications of the ACM and other sources by date.

June 2019


From ACM News

Software Vendor May Have Opened a Gap for Hackers in 2016 Swing State

Software Vendor May Have Opened a Gap for Hackers in 2016 Swing State

A Florida election software company targeted by Russians in 2016 inadvertently opened a potential pathway for hackers to tamper with voter records in North Carolina on the eve of the presidential election.


From ACM News

Here Are the 40 Companies Computer Science Students Hope Will Hire Them

Here Are the 40 Companies Computer Science Students Hope Will Hire Them

Employer branding specialist Universum has released its annual rankings of the most attractive employers in the U.S. for 2019.


From ACM News

Solving The Tech Industry's Ethics Problem Could Start In The Classroom

Solving The Tech Industry's Ethics Problem Could Start In The Classroom

Abby Everett Jaques at the Massachusetts Institute of Technologym created a class called Ethics of Technology to help future engineers and computer scientists understand the pitfalls of technology.


From ACM TechNews

The Push Towards AI in Africa

The Push Towards AI in Africa

Initiatives are underway to train African computer scientists in artificial intelligence, with major technology companies investing in the cultivation of new AI specialists on that continent.


From ACM TechNews

Apple macOS Security Protections Easily Bypassed With 'Synthetic' Clicks, Researcher Finds

Apple macOS Security Protections Easily Bypassed With 'Synthetic' Clicks, Researcher Finds

A researcher found a zero-day vulnerability in a central Apple macOS safeguard, allowing apps or malware to circumvent permissions and access a user's private data, webcam, or microphone.


From ACM TechNews

Database Partitioning Method Supports High-Performance Data Processing

Database Partitioning Method Supports High-Performance Data Processing

Researchers have developed a core technology that supports fast, efficient large-scale data analysis.


From ACM News

Coding Curriculum in a Box

Coding Curriculum in a Box

CodePath.org, a nonprofit boot camp, offers ready-made, industry-approved coding courses to colleges and trains students to teach them for credit.


From ACM News

Keeping Algorithms Fair

Keeping Algorithms Fair

It's easier to de-bias algorithms than it is to de-bias people.


From ACM News

Overlooked No More: Alan Turing, Condemned Code Breaker and Computer Visionary

Overlooked No More: Alan Turing, Condemned Code Breaker and Computer Visionary

His ideas led to early versions of modern computing and helped win World War II. Yet he died as a criminal for his homosexuality.


From ACM TechNews

Autonomous Boats Can Target, Latch Onto Each Other

Autonomous Boats Can Target, Latch Onto Each Other

Researchers have designed autonomous boats that can automatically target and latch onto each other.


From ACM TechNews

Vulnerability of Cloud Service Hardware ­ncovered

Vulnerability of Cloud Service Hardware ­ncovered

Researchers have found that field programmable gate arrays have vulnerabilities that could be exploited by cyber criminals.


From ACM TechNews

Research Overcomes Key Obstacles to Scaling ­p DNA Data Storage

Research Overcomes Key Obstacles to Scaling ­p DNA Data Storage

North Carolina State University researchers have created new techniques for labeling and retrieving data files in DNA-based information storage systems.


From ACM TechNews

How Quantum Computer Could Break 2,048-Bit RSA Encryption in 8 Hours

How Quantum Computer Could Break 2,048-Bit RSA Encryption in 8 Hours

Researchers have developed a more efficient technique for decryption calculations by quantum computers.


From ACM TechNews

Machine Learning Sniffs Out Its Own Machine-Written Propaganda

Machine Learning Sniffs Out Its Own Machine-Written Propaganda

Researchers have modified a neural network to create a natural language processing algorithm that generates, as well as detects, convincing fake articles.


From ACM TechNews

Automation Could Force Millions of Women to Find New Jobs

Automation Could Force Millions of Women to Find New Jobs

A McKinsey Global Institute analysis warns automation could displace 107 million employed women worldwide by 2030, with the sexes almost equally impacted by technological innovation.


From ACM News

Margaret H. Wright Becomes 5th Woman to Receive SIAM’s Prestigious John von Neumann Prize

Margaret H. Wright Becomes 5th Woman to Receive SIAM’s Prestigious John von Neumann Prize

Wright will deliver this flagship lecture at the International Congress on Industrial and Applied Mathematics in July.


From ACM TechNews

Physicists Can Predict Jumps of Schrodinger's Cat (and Finally Save It)

Physicists Can Predict Jumps of Schrodinger's Cat (and Finally Save It)

Yale University researchers have developed a technique for saving Schrodinger's cat by predicting its jumps and taking real-time actions.


From ACM TechNews

Microsoft Warns ­sers to Patch as Exploits for 'Wormable' BlueKeep Bug Appear

Microsoft Warns ­sers to Patch as Exploits for 'Wormable' BlueKeep Bug Appear

Microsoft has published an advisory calling on users to install a patch for a "wormable" vulnerability that could be exploited to launch attacks similar to WannaCry.


From ACM TechNews

From Viruses to Social Bots, Researchers ­nearth Structure of Attacked Networks

From Viruses to Social Bots, Researchers ­nearth Structure of Attacked Networks

Researchers are using a new statistical machine learning technique to explore how viruses interact with proteins in the body.


From ACM News

Striking First to Beat Hackers at Their Own Game

Striking First to Beat Hackers at Their Own Game

Researchers can use the same covert channels hackers have taken advantage of to protect a vehicle's control systems.


From ACM TechNews

CSL Researchers Add 'Time-Travel' Feature to Solid State Drives to Fight Ransomware Attacks

CSL Researchers Add 'Time-Travel' Feature to Solid State Drives to Fight Ransomware Attacks

Researchers have demonstrated how to use the commodity storage devices already in conventional computers to protect files against ransomware attacks.


From ACM TechNews

Mainstream Autos Get Driver-Monitoring Devices

Mainstream Autos Get Driver-Monitoring Devices

Hyundai and Subaru unveiled distracted driver alert systems for their mainstream models last month at the New York International Auto Show.


From ACM TechNews

Quicker Eye for Robotics to Help in Our Cluttered, Human Environments

Quicker Eye for Robotics to Help in Our Cluttered, Human Environments

A new algorithm permits machines to sense their surroundings faster, which could help assistive robots operate more efficiently in unstructured environments.


From ACM TechNews

Tech Giant Brings Software to a Gun Fight

Tech Giant Brings Software to a Gun Fight

Salesforce.com is pressuring sporting-goods retailers and other customers to stop selling a range of firearms, or be prohibited from using its products.


From ACM TechNews

Model Identifies High-Risk Areas for Lumpy Skin Disease in Cattle

Model Identifies High-Risk Areas for Lumpy Skin Disease in Cattle

An international team of researchers has integrated two computer models to highlight regions at highest risk for lumpy skin disease virus epidemics in cattle.


From ACM TechNews

New York School District's Facial Recognition System Sparks Privacy Fears

New York School District's Facial Recognition System Sparks Privacy Fears

The Lockport, NY, city school district launch of a facial recognition system has resulted in some pushback from privacy advocates.


From ACM News

Justice Department Reportedly Preparing Antitrust Probe of Google

Justice Department Reportedly Preparing Antitrust Probe of Google

Alphabet has faced antitrust probes before, but not from the U.S. Justice Department.


From Communications of the ACM

Neural Net Worth

Neural Net Worth

Yoshua Bengio, Geoffrey Hinton, and Yann LeCun this month will receive the 2018 ACM A.M. Turing Award for conceptual and engineering breakthroughs that have made deep neural networks a critical component of computing.


From Communications of the ACM

And Then, There Were Three

And Then, There Were Three

How long can the silicon foundry sector continue to adapt, as physical limits make further shrinkage virtually impossible?


From Communications of the ACM

Lifelong Learning in Artificial Neural Networks

Lifelong Learning in Artificial Neural Networks

New methods enable systems to rapidly, continuously adapt.