acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectComputer Systems
authorBloomberg
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


As China Stalks Satellites, ­.S. and Japan Prepare to Defend Them
From ACM News

As China Stalks Satellites, ­.S. and Japan Prepare to Defend Them

In May 2013 the Chinese government conducted what it called a science space mission from the Xichang Satellite Launch Center in southwest China.

How Russian Hackers Stole the Nasdaq
From ACM News

How Russian Hackers Stole the Nasdaq

In October 2010, a Federal Bureau of Investigation system monitoring U.S. Internet traffic picked up an alert.

Robots' Best Teachers Are Other Robots (in Cloud Networks)
From ACM News

Robots' Best Teachers Are Other Robots (in Cloud Networks)

Earlier this year, a vaguely humanoid robot served juice to a researcher lying on a hospital bed.

Google's Sundar Pichai Is the Most Powerful Man in Mobile
From ACM Opinion

Google's Sundar Pichai Is the Most Powerful Man in Mobile

At the Consumer Electronics Show in Las Vegas in January, Samsung introduced new software for its tablets, called the Magazine UX.

Can Hp Build the Computer of the Future?
From ACM News

Can Hp Build the Computer of the Future?

On June 11, Hewlett-Packard revealed plans to make a new kind of computer that it's playfully calling The Machine.

With 'the Machine,' Hp May Have Invented a New Kind of Computer
From ACM News

With 'the Machine,' Hp May Have Invented a New Kind of Computer

If Hewlett-Packard founders Bill Hewlett and Dave Packard are spinning in their graves, they may be due for a break.

The Trouble With IBM
From ACM News

The Trouble With IBM

In the summer of 2012, five American technology companies bid on a project for a demanding new client: the CIA.

Hackers Devise Wireless Methods For Stealing Atm Users' Pins
From ACM News

Hackers Devise Wireless Methods For Stealing Atm Users' Pins

Pilfering the personal identification numbers of financial accounts, a potential jackpot for hackers, is tougher to pull off thanks to data encryption and other...

The U.s. Government Wants 6,000 New 'cyber Warriors' By 2016
From ACM Careers

The U.s. Government Wants 6,000 New 'cyber Warriors' By 2016

The Pentagon plans to triple its cybersecurity staff by 2016, U.S. Secretary of Defense Chuck Hagel announced recently.

The ­nlikely Tale of How Arm Came to Rule the World
From ACM News

The ­nlikely Tale of How Arm Came to Rule the World

This is a story about ARM Holdings, the mobile technology company.

How Airbus Is Debugging the A350
From ACM Careers

How Airbus Is Debugging the A350

A few times a month, Airbus Flight Test Engineer Patrick du Ché stands up from his desk, takes off his jacket and tie, walks to the coat rack in the corner of his...

The Inside Story of Tor, the Best Internet Anonymity Tool the Government Ever Built
From ACM News

The Inside Story of Tor, the Best Internet Anonymity Tool the Government Ever Built

Last year, Edward Snowden turned over to the Guardian, a British newspaper, some 58,000 classified U.S. government documents.

Nsa Surveillance Makes For Strange Bedfellows
From ACM Opinion

Nsa Surveillance Makes For Strange Bedfellows

The controversy over U.S. government surveillance has produced a king-size collection of strange bedfellows. Beneath the covers one finds both amusing ironies and...

How Syrian Hackers Found the New York Times's Australian Weak Spot
From ACM News

How Syrian Hackers Found the New York Times's Australian Weak Spot

A hacking attack launched by the Syrian Electronic Army may have targeted the New York Timesand other U.S. media companies, but the weak link was Melbourne IT (...

Privacy Paradox: Americans Happy to Share Personal Data With Big Business
From ACM News

Privacy Paradox: Americans Happy to Share Personal Data With Big Business

It's official: Americans may freak out when government collects their data to track terrorists, but they would happily have banks use it to catch some jerk trying...

Fixing America's Patent Problem Means Going Beyond Trolls
From ACM News

Fixing America's Patent Problem Means Going Beyond Trolls

The so-called patent troll has become one of the tech industry’s favorite monsters in recent years, and on Tuesday the Obama administration announced it would ...

Inside Google's Secret Lab
From ACM Careers

Inside Google's Secret Lab

Last February, Astro Teller, the director of Google's secretive research lab, Google X, went to seek approval from Chief Executive Officer Larry Page for an unlikely...

Revealed: The 1962 CIA Paper That Predicts the Big Deal With Big Data
From ACM News

Revealed: The 1962 CIA Paper That Predicts the Big Deal With Big Data

The Central Intelligence Agency has published for the first time "Some Far-Out Thoughts on Computers," a 1962 internal document that shows how eager the agency...

Israel Ramps ­p Its Cyberdefense Training
From ACM Careers

Israel Ramps ­p Its Cyberdefense Training

Twice a week about 200 Israeli high school students in seven separate locations meet after school for six hours of extra classes.

Behind the Iron Dome: How Israel Stops Missiles
From ACM News

Behind the Iron Dome: How Israel Stops Missiles

The success of Israel's Iron Dome in shooting down missiles fired from Gaza has a lot to do with a company you've probably never heard of: MPrest Systems.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account