acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectCommunications / Networking
authorTHE New York Times
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


The Human Voice, as Game Changer
From ACM News

The Human Voice, as Game Changer

Vlad Sejnoha is talking to the TV again.

Google Begins Testing Its Augmented-Reality Glasses
From ACM News

Google Begins Testing Its Augmented-Reality Glasses

If you venture into a coffee shop in the coming months and see someone with a pair of futuristic glasses that look like a prop from "Star Trek," don’t worry.

Police Are Using Phone Tracking as a Routine Tool
From ACM News

Police Are Using Phone Tracking as a Routine Tool

Law enforcement tracking of cellphones, once the province mainly of federal agents, has become a powerful and widely used surveillance tool for local police officials...

Just the Facts. Yes, All of Them.
From ACM News

Just the Facts. Yes, All of Them.

AT 7 years old, Gilad Elbaz wrote, "I want to be a rich mathematician and very smart." That, he figured, would help him "discover things like time machines, robots...

The Soul of the New Hacktivist
From ACM News

The Soul of the New Hacktivist

In 1988, a Cornell graduate student, Robert Tappan Morris, let loose a computer worm on the fledgling version of the Internet. He said it was meant to be an experiment...

The Snails of War
From ACM News

The Snails of War

The electric snail is here. There's an electric cockroach too.

New Interest in Hacking as Threat to Security
From ACM News

New Interest in Hacking as Threat to Security

During the five-month period between October and February, there were 86 reported attacks on computer systems in the United States that control critical infrastructure...

The Bright Side of Being Hacked
From ACM News

The Bright Side of Being Hacked

Hackers operating under the banner Anonymous have been poking a finger in the eye of one private company after another for two years now.  

Et Tu, Google? Android Apps Can Also Secretly Copy Photos
From ACM News

Et Tu, Google? Android Apps Can Also Secretly Copy Photos

It's not just Apple. Photos are vulnerable on Android phones, too.

For Impatient Web Users, an Eye Blink Is Just Too Long to Wait
From ACM News

For Impatient Web Users, an Eye Blink Is Just Too Long to Wait

Wait a second. No, that's too long.

Microsoft Ponders Future of Kinect, Tech
From ACM News

Microsoft Ponders Future of Kinect, Tech

When Microsoft thinks about the future of technology, it seems to do so with its stomach.

In Attack on Vatican Web Site, a Glimpse of Hackers' Tactics
From ACM News

In Attack on Vatican Web Site, a Glimpse of Hackers' Tactics

The elusive hacker movement known as Anonymous has carried out Internet attacks on well-known organizations like Sony and PBS. In August, the group went after its...

A Law Apple Would Like to Break
From ACM News

A Law Apple Would Like to Break

These days, it’s hard to find a superlative that adequately describes Apple. But maybe simplest is best: biggest.

Behind the Google Goggles, Virtual Reality
From ACM News

Behind the Google Goggles, Virtual Reality

It wasn't so long ago that legions of people began walking the streets, talking to themselves. On closer inspection, many of them turned out to be wearing tiny...

How Companies Learn Your Secrets
From ACM News

How Companies Learn Your Secrets

Andrew Pole had just started working as a statistician for Target in 2002, when two colleagues from the marketing department stopped by his desk to ask an odd question...

From ACM News

Flaw Found in an Online Encryption Method

A team of European and American mathematicians and cryptographers have discovered an unexpected weakness in the encryption system widely used worldwide for online...

Traveling Light in a Time of Digital Thievery
From ACM News

Traveling Light in a Time of Digital Thievery

When Kenneth G. Lieberthal, a China expert at the Brookings Institution, travels to that country, he follows a routine that seems straight from a spy film.

In Data Deluge, Multitaskers Go to Multiscreens
From ACM News

In Data Deluge, Multitaskers Go to Multiscreens

Workers in the digital era can feel at times as if they are playing a video game, battling the barrage of emails and instant messages, juggling documents, Web sites...

From ACM News

Wolfram, a Search Engine, Finds Answers Within Itself

Stephen Wolfram, a 52-year-old scientist, software designer and entrepreneur, tends to go his own way—often with noteworthy results.

From ACM News

For $2 a Star, an Online Retailer Gets 5-Star Product Reviews

In the brutal world of online commerce, where a competing product is just a click away, retailers need all the juice they can get to close a sale.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account