acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectPerformance And Reliability
authorKeith Kirkpatrick
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Who Has Access to Your Smartphone Data?
From Communications of the ACM

Who Has Access to Your Smartphone Data?

ISPs, app developers, and even the government may know more about you than you think.

A Speed Bump on the Road to 5G?
From ACM News

A Speed Bump on the Road to 5G?

The impact of the coronavirus lockdown on the buildout of 5G networks appears to have been minimal.

Bolstering Bandwidth with Dual-Channel Wi-Fi
From ACM News

Bolstering Bandwidth with Dual-Channel Wi-Fi

Looking at solutions to handle growing Wi-Fi traffic.

Reducing and Eliminating E-Waste
From Communications of the ACM

Reducing and Eliminating E-Waste

We need to mitigate the environmental impact of disposing of electronics at their end of useful life.

Deceiving the Masses on Social Media
From Communications of the ACM

Deceiving the Masses on Social Media

The social media platforms like their freedom, but information gerrymandering may require legislation to fix.

Keeping Students Educated and Engaged
From ACM News

Keeping Students Educated and Engaged

The use of distance learning has grown quickly in primary education, in response to school closures due to the coronavirus pandemic.

Across the Language Barrier
From Communications of the ACM

Across the Language Barrier

Translation devices are getting better at making speech and text understandable in different languages.

Tracking Shoppers
From Communications of the ACM

Tracking Shoppers

Retailers of all stripes are using technology to follow consumers through their brick-and-mortar stores in order to develop detailed profiles of their shopping...

Protecting Industrial Control Systems
From Communications of the ACM

Protecting Industrial Control Systems

Finding, and plugging, the security holes in SCADA.

Electronics Need Rare Earths
From Communications of the ACM

Electronics Need Rare Earths

Demand is expected to spike over the next few years, leading to higher prices and international trade issues.

Technologizing Agriculture
From Communications of the ACM

Technologizing Agriculture

An array of technologies are making farms more efficient, safer, and profitable.

Borders in the Cloud
From Communications of the ACM

Borders in the Cloud

New data protection laws raise questions about whether certain jurisdictions are trying to thwart the ability of foreign governments to obtain data on their citizens...

Bringing the Internet to the (Developing) World
From Communications of the ACM

Bringing the Internet to the (Developing) World

A growing number of low-cost (and free!) solutions aim to open the Internet to developing regions.

3D Sensors Provide Security, Better Games
From Communications of the ACM

3D Sensors Provide Security, Better Games

A variety of techniques allow sensors to locate and recognize objects in space.

Parallel Computational Thinking
From Communications of the ACM

Parallel Computational Thinking

Applications must be programmed to process instructions in parallel to take full advantage of the new multicore processors.

3D-Printing Human Body Parts
From Communications of the ACM

3D-Printing Human Body Parts

Bioprinting has generated bones, cartilage, and some muscles; hearts and livers are still years away.

Bionics in Competition
From Communications of the ACM

Bionics in Competition

Developers of innovative assistive devices compete as a means of networking with each other.

Financing the Dark Web
From Communications of the ACM

Financing the Dark Web

Cryptocurrencies are enabling illegal or immoral transactions in the dark corners of the Internet.

It's Not the Algorithm, It's the Data
From Communications of the ACM

It's Not the Algorithm, It's the Data

In risk assessment and predictive policing, biased data can yield biased results.

Can We Trust Autonomous Weapons?
From Communications of the ACM

Can We Trust Autonomous Weapons?

Nations consider using defense systems that can make their own lethal decisions.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account