acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectCommunications / Networking
authorTechnology Review
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM News

Sending Data 160 Characters at a Time

In the absence of a good Internet connection, why not use text messages to transmit data?

Study Shows Inequalities in 'White-Spaces' Wireless
From ACM TechNews

Study Shows Inequalities in 'White-Spaces' Wireless

University of California, Berkeley researchers recently published a detailed analysis of the potential for long-distance wireless Internet connectivity using white...

How the Apple Ii Taught Programmers to Economize
From ACM News

How the Apple Ii Taught Programmers to Economize

Imagine trying to program a virtual machine--a software instance that mimics all the characteristics of a physical computer--on a device with 2 kilobytes of RAM...

China: Our Internet Is Free Enough
From ACM News

China: Our Internet Is Free Enough

China, with the most Internet users of any country in the world, has issued its first government whitepaper declaring an overall Internet strategy--one that advocates...

From ACM News

Computing with Secrets, but Keeping them Safe

A novel technique could see future Web services work with sensitive data without ever being able to read it. Several implementations of a mathematical proof unveiled...

High-Wire Robot to Inspect the Grid
From ACM TechNews

High-Wire Robot to Inspect the Grid

Researchers at the Electric Power Research Institute have developed a robot that can crawl along transmission lines to inspect electrical wires without the need...

New Cyber Chief Outlines Strategy
From ACM News

New Cyber Chief Outlines Strategy

Security experts said this week that they were cheered by calls from General Keith Alexander, head of the new U.S. Cyber Command, for global rules of engagement...

Open-Source Could Mean an Open Door For Hackers
From ACM News

Open-Source Could Mean an Open Door For Hackers

The ability to access the code of open-source applications may give attackers an edge in developing exploits for the software, according to a paper analyzing two...

Ranking the Most Powerful Supercomputers
From ACM News

Ranking the Most Powerful Supercomputers

The U.S. still leads in high-performance computing capacity, but China is undergoing explosive growth.

From ACM News

­sing Neural Networks to Classify Music

University of Hong Kong students trained a convolutional neural network built for image recognition to classify music.

Mobile Data: A Gold Mine For Telcos
From ACM News

Mobile Data: A Gold Mine For Telcos

Cell phone companies are finding that they're sitting on a gold mine--in the form of the call records of their subscribers.

Eye Tracking For Mobile Control
From ACM News

Eye Tracking For Mobile Control

It's hard sending a text message with arms full of groceries or while wearing winter gloves. Voice control is one alternative to using your fingers, but researchers...

Commercial Quantum Cryptography System Hacked
From ACM News

Commercial Quantum Cryptography System Hacked

Physicists have mounted the first successful attack of its kind on a commercial quantum cryptography system.

Can Social Networks Be Generated Automatically?
From ACM News

Can Social Networks Be Generated Automatically?

When Google launched Buzz, a microblogging social network, several months ago, the company boasted that the network had been generated automatically, by algorithms...

Patient's Social Network Predicts Drug Outcomes
From ACM News

Patient's Social Network Predicts Drug Outcomes

Earlier this month, the journal Lancet Neurology published a study showing that the generic drug lithium did nothing to slow the course of amyotrophic lateral sclerosis...

Why Twitter Is the Future of News
From ACM News

Why Twitter Is the Future of News

It's basically impossible for a journalist who relies on Twitter to find stories, stalk editors, rack up "whuffie" and beef with rap stars to be objective about...

From ACM TechNews

Peeking Into Users' Web History

In a test of Google's privacy protections, European researchers were able to hijack Google's personalized search suggestions to reconstruct users' Web search histories...

Real-Time Search
From ACM News

Real-Time Search

How do you parse a tweet? Five years ago, that question would have been gibberish. Today, it's perfectly sensible, and it's at the front of Amit Singhal's mind....

From ACM TechNews

Exposing Hackers as an International Deterrent

An international group of computer scientists, law professors, military leaders, and others recently met at Russia's Moscow State University for a conference on...

Follow the Smart Phones
From ACM News

Follow the Smart Phones

A service launched last week by Skyhook Wireless will make it possible for other businesses to predict, with new accuracy, which local bars will be hot at 8 p.m...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account