acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectInformation Systems
authorNetwork World
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Mind-Reading Computer Moves Closer to Reality
From ACM TechNews

Mind-Reading Computer Moves Closer to Reality

Researchers at the Chinese Academy of Sciences have developed a mind-reading program that deciphers symbols that people have viewed.

5 Burning Questions With New Ietf Chair and Cisco Fellow Alissa Cooper
From ACM TechNews

5 Burning Questions With New Ietf Chair and Cisco Fellow Alissa Cooper

New Internet Engineering Task Force chair and Cisco Fellow Alissa Cooper lauds the organization as "a very special place because of the standards work it has done...

DARPA Wants to Cultivate the ­ltimate Transistor of the Future
From ACM TechNews

DARPA Wants to Cultivate the ­ltimate Transistor of the Future

The U.S. Defense Advanced Research Projects Agency this month will present the Dynamic Range-enhanced Electronics and Materials program, which aims to develop a...

Intelligence Agency Opens $325,000 Advanced, Automated Fingerprint Gathering Competition
From ACM TechNews

Intelligence Agency Opens $325,000 Advanced, Automated Fingerprint Gathering Competition

The U.S. Intelligence Advanced Research Projects Activity's newest contest challenges participants to build an automated fingerprint collection system that matches...

DARPA Wants to Simulate How Social Media Spreads Info Like Wildfire
From ACM TechNews

DARPA Wants to Simulate How Social Media Spreads Info Like Wildfire

A new program from the U.S. Defense Advanced Research Projects Agency aims to better understand the spread and evolution of information online.

Researchers Create 3D Faces From Online Photos to Defeat Face Authentication Systems
From ACM TechNews

Researchers Create 3D Faces From Online Photos to Defeat Face Authentication Systems

Researchers say they have developed a virtual reality-based cyberattack that can reproduce the human face well enough to trick face-authentication systems.

Headaches Likely to Grow Over Auto Cybersecurity Concerns
From ACM TechNews

Headaches Likely to Grow Over Auto Cybersecurity Concerns

Issues related to automobile cybersecurity are likely to increase, but U.S. auto cybersecurity standards are not expected until at least 2018. 

DARPA $2m Contest Looks to Bring AI to Wireless Spectrum Provisioning
From ACM TechNews

DARPA $2m Contest Looks to Bring AI to Wireless Spectrum Provisioning

The U.S. Defense Advanced Research Projects Agency recently announced the $2-million Spectrum Collaboration Challenge.

Internet2 at 20: Alive and Kicking
From ACM TechNews

Internet2 at 20: Alive and Kicking

Nearly two decades since its launch, Internet2 continues to run on U.S. university campuses. 

How the Open Compute Project's Telco Project Could Transform the Iot, Driverless Cars
From ACM TechNews

How the Open Compute Project's Telco Project Could Transform the Iot, Driverless Cars

The Open Compute Project recently announced the Telco Project, which is focused on data center technologies for telecommunications companies.

Eye-Opening Optical Research Projects That Could Supercharge the Internet
From ACM TechNews

Eye-Opening Optical Research Projects That Could Supercharge the Internet

Several research teams around the world are investigating optical technologies that have the potential to make networks--and the Internet--faster and more efficient...

Algorithm Developed to Predict Future Botnet Attacks
From ACM TechNews

Algorithm Developed to Predict Future Botnet Attacks

Researchers from Ben-Gurion University in Israel have developed an algorithm that can trace botnets back to their perpetrators. 

Machine Learning, Social Media Data Help Spot Flooded Areas
From ACM TechNews

Machine Learning, Social Media Data Help Spot Flooded Areas

Researchers analyzed 2013 flooding in Colorado and found 150,000 tweets from people affected by the disaster. 

British Voice Encryption Protocol Has Massive Weakness, Researcher Says
From ACM TechNews

British Voice Encryption Protocol Has Massive Weakness, Researcher Says

A researcher charges the protocol created by a U.K. governmental group to encrypt voice calls has a weakness built into it by design that could enable mass surveillance...

Image Too Good to Be True? DARPA Program Targets Image Doctoring
From ACM TechNews

Image Too Good to Be True? DARPA Program Targets Image Doctoring

The U.S. Defense Advanced Research Projects Agency wants to develop an easy-to-use toolset to detect altered images.

How Keystroking Style Could Replace Passwords For Authentication
From ACM TechNews

How Keystroking Style Could Replace Passwords For Authentication

Researchers at Jeppiaar Engineering College in Chennai, India, have developed a biometric keystroke algorithm that learns how the user types.

NASA Algorithms Keep Unmanned Aircraft Away From Commercial Aviation
From ACM TechNews

NASA Algorithms Keep Unmanned Aircraft Away From Commercial Aviation

New algorithms could enable large unmanned aircraft to remain "well clear" of commercial airliners in flight and prevent a disaster. 

DARPA Accelerates ­ltimate Automated Pilot Software
From ACM TechNews

DARPA Accelerates ­ltimate Automated Pilot Software

The U.S. Defense Advanced Research Projects Agency has awarded its first contracts to vendors to build an automated system designed to reduce pilot fatigue. 

Can Drones Hunt With Wolf Pack-Like Success? DARPA Thinks So
From ACM TechNews

Can Drones Hunt With Wolf Pack-Like Success? DARPA Thinks So

The U.S. Defense Advanced Research Projects Agency wants to enable groups of drones to operate collaboratively under the supervision of a single human commander...

10 Cool Network and Computing Research Projects
From ACM News

10 Cool Network and Computing Research Projects

If you think the latest enterprise and consumer network and computer technologies rolling into your data center and being snuck into your offices by end users are...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account