acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorChris Edwards
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Tales of Topological Qubits
From Communications of the ACM

Tales of Topological Qubits

Emulating the behavior of exotic quantum states may give quantum computing a better way of squeezing out troublesome noise and errors.

Accelerating Optical Communications with AI
From Communications of the ACM

Accelerating Optical Communications with AI

Communications efficiency helps bring photonics to artificial intelligence.

AlphaFold Spreads through Protein Science
From Communications of the ACM

AlphaFold Spreads through Protein Science

Based on machine learning, DeepMind's code now lies at the heart of a variety of protein-structure tools and workflows. It may ultimately be replaced by models...

Error Control Begins to Shape Quantum Architectures
From Communications of the ACM

Error Control Begins to Shape Quantum Architectures

The overhead of error correction presents a serious challenge to scaling up quantum computing and may produce unexpected winners.

Go Backward, Save Energy
From Communications of the ACM

Go Backward, Save Energy

Reversible computing principles point a way toward more efficient computers.

Shrinking Artificial Intelligence
From Communications of the ACM

Shrinking Artificial Intelligence

Energy concerns push AI optimizations to the edge.

Holograms on the Horizon?
From Communications of the ACM

Holograms on the Horizon?

Machine learning drives toward 3D imaging on the move.

A Switch in Time
From Communications of the ACM

A Switch in Time

The introduction of the nanosheet transistor is just one step in the continuing attempt to stick to the spirit of Moore's Law.

Better Security Through Obfuscation
From Communications of the ACM

Better Security Through Obfuscation

The quest to find greater security through obscurity.

Let the Algorithm Decide?
From Communications of the ACM

Let the Algorithm Decide?

Algorithms fail their first test to replace student exams.

Moore's Law: What Comes Next?
From Communications of the ACM

Moore's Law: What Comes Next?

Moore's Law challenges point to changes in software.

Thwarting Side-Channel Attacks
From Communications of the ACM

Thwarting Side-Channel Attacks

Deep learning challenges chip security.

Learning to Trust Quantum Computers
From Communications of the ACM

Learning to Trust Quantum Computers

They need to show us they can solve the biggest problems.

Questioning Quantum
From Communications of the ACM

Questioning Quantum

Researchers hunt for ways to keep quantum computing honest.

Quantum Technology Forgoes Unconditional Security to Extend its Reach
From Communications of the ACM

Quantum Technology Forgoes Unconditional Security to Extend its Reach

Two projects in China demonstrate the possibility of global quantum key distribution networks.

Portable Device Fears Show Power of Social Development
From Communications of the ACM

Portable Device Fears Show Power of Social Development

How do small screens impact young minds?

Secure Quantum Communications
From Communications of the ACM

Secure Quantum Communications

Data locking experiments provide stepping stones to a possible future in quantum cryptography.

Containers Push Toward the Mayfly Server
From Communications of the ACM

Containers Push Toward the Mayfly Server

The container revolution represents a large-scale shift in thinking about multitasking systems.

Reconciling Quantum Physics with Math
From Communications of the ACM

Reconciling Quantum Physics with Math

Mathematicians explore the root of many problems in developing a proof for the Kadison-Singer problem.

Secure-System Designers Strive to STEM Data Leaks
From Communications of the ACM

Secure-System Designers Strive to STEM Data Leaks

Attackers using side-channel analysis require little knowledge of how an implementation operates.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account