acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectHardware
authorTechnology Review
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


How to Steal Data from Your Neighbor in the Cloud
From ACM News

How to Steal Data from Your Neighbor in the Cloud

Cloud computing teaches people not to worry about physical equipment for hosting data and running software.

Moore's Law Is Becoming Irrelevant
From ACM Opinion

Moore's Law Is Becoming Irrelevant

Companies like Apple and Samsung are the public face of the smartphone and tablet boom, but they all rely on ARM, the British company that licenses the energy-efficient...

Why You Can't Vote Online Tuesday
From ACM News

Why You Can't Vote Online Tuesday

A decade and a half into the Web revolution, we do much of our banking and shopping online. So why can't we vote over the Internet? The answer is that voting presents...

Efficiency Breakthrough Promises Smartphones that Use Half the Power
From ACM News

Efficiency Breakthrough Promises Smartphones that Use Half the Power

Powering cellular base stations around the world will cost $36 billion this year—chewing through nearly 1 percent of all global electricity production. Much of...

The States with the Riskiest Voting Technology
From ACM News

The States with the Riskiest Voting Technology

Next Tuesday's presidential election will likely be extremely close, magnifying the potential impact of vote-counting errors.

Microsoft's Plan to Bring About the Era of Gesture Control
From ACM News

Microsoft's Plan to Bring About the Era of Gesture Control

While most of the headlines about Microsoft this fall will concern its new operating system, Windows 8, and its new Surface tablet, the company is also working...

Computer Viruses Are 'rampant' on Medical Devices in Hospitals
From ACM News

Computer Viruses Are 'rampant' on Medical Devices in Hospitals

Computerized hospital equipment is increasingly vulnerable to malware infections, according to participants in a recent government panel. These infections can clog...

Genome Hunters Go After Martian Dna
From ACM Careers

Genome Hunters Go After Martian Dna

Two high-profile entrepreneurs say they want to put a DNA sequencing machine on the surface of Mars in a bid to prove the existence of extraterrestrial life.

Squeeze Your Phone, and Send a Loved One a Hug
From ACM TechNews

Squeeze Your Phone, and Send a Loved One a Hug

Researchers at the Helsinki Institute of Information Technology and Nokia have developed the ForcePhone, a device that can send vibrations back and forth to users...

Ever Wondered What a Live Botnet Looks Like?
From ACM News

Ever Wondered What a Live Botnet Looks Like?

The idea of a network of malware-infected zombie computers rigged to do the bidding of criminals conjures up a frightening image on its own. A new visualization...

What Comes After the Touch Screen?
From ACM News

What Comes After the Touch Screen?

In a few short years, the technologies found in today's mobile devices—touch screens, gyroscopes, and voice-control software, to name a few—have radically transformed...

The CIA and Jeff Bezos Bet on Quantum Computing
From ACM News

The CIA and Jeff Bezos Bet on Quantum Computing

Inside a blocky building in a Vancouver suburb, across the street from a dowdy McDonald's, is a place chilled colder than anywhere in the known universe.

Intel's Tiny Wi-Fi Chip Could Have a Big Impact
From ACM News

Intel's Tiny Wi-Fi Chip Could Have a Big Impact

This month, Intel unveiled a Wi-Fi radio almost completely made of the same sort of transistors that go into one of its microprocessors.

Stuxnet Tricks Copied By Computer Criminals
From ACM News

Stuxnet Tricks Copied By Computer Criminals

Malicious code apparently used by governments to spy on, harass, and sabotage one another has grabbed headlines in recent years, yet the highly targeted nature...

Review: Raspberry Pi
From ACM Opinion

Review: Raspberry Pi

You can get a lot for $35 these days. It bought me what looks like a credit card-size James Bond gadget prototype but is actually a fully functional computer.

Disney Researchers Add Virtual Touch to the Real World
From ACM News

Disney Researchers Add Virtual Touch to the Real World

Researchers at Disney have demonstrated a computer interface that changes the way ordinary, everyday objects feel using a weak electric signal fed through a user's...

Augmented Reality Is Finally Getting Real
From ACM News

Augmented Reality Is Finally Getting Real

In the summer of 2009, Yelp quietly added a feature to its iPhone app that blurred the line between the real and the virtual. If you held your handset up and looked...

From ACM News

Hey, Hackers: Defense Is Sexy, Too

Pleasing the crowd at the Black Hat and Def Con computer security conferences that took place in Las Vegas last week is relatively easy: simply hop on stage and...

A Computer Infection That Can Never Be Cured
From ACM TechNews

A Computer Infection That Can Never Be Cured

French hacker Jonathan Brossard recently developed Rakshasa, software that can be hidden inside the hardware of a PC, creating a backdoor that would allow secret...

Nsa Boss Wants More Control Over the 'net
From ACM News

Nsa Boss Wants More Control Over the 'net

The U.S. Internet's infrastructure needs to be redesigned to allow the NSA to know instantly when overseas hackers might be attacking public or private infrastructure...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account