acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectCommunications / Networking
authorThe Washington Post
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM News

Facebook Ipo: How Does Facebook Make Its Money?

Facebook's IPO filing shows that the company brought in about $3.7 billion in revenue and made $1 billion in profit in 2011.

Rise of the Drone: From Calif. Garage to Multibillion-Dollar Defense Industry
From ACM News

Rise of the Drone: From Calif. Garage to Multibillion-Dollar Defense Industry

In 1980, Abraham Karem, an engineer who had emigrated from Israel, retreated into his three-car garage in Hacienda Heights outside Los Angeles and, to the bemusement...

From ACM News

Sopa Hearings Cast Debate as Old Media vs. New Media

The circus atmosphere of the hearing on the Stop Online Piracy Act, introduced by Rep. Lamar Smith (R-Tex.), reflected the high-stakes, emotional nature of the...

From ACM News

Cyber-Intruder Sparks Massive Federal Response

The first sign of trouble was a mysterious signal emanating from deep within the U.S. military’s classified computer network.

A Deeper Look Into Space
From ACM News

A Deeper Look Into Space

NASA hopes the James Webb Space Telescope, which can detect ancient light that its predecessors can’t, will reveal more information about the origins of the universe...

Preventing a Pearl Harbor of Cyberspace
From ACM News

Preventing a Pearl Harbor of Cyberspace

At a time when the Internet has been inextricably linked to our national infrastructure, there are understandably serious concerns about the ability of the U.S...

From ACM News

How Many Security Clearances Have Been Issued?

More than 4.2 million people have security clearances for access to classified information, a number that vastly outstrips previous estimates and nearly rivals...

From ACM News

In China, Business Travelers Take Extreme Precautions to Avoid Cyber-Espionage

Packing for business in China? Bring your passport and business cards, but maybe not that laptop loaded with contacts and corporate memos.

From ACM News

A Future For Drones: Automated Killing

One afternoon last fall at Fort Benning, GA, two model-size planes took off, climbed to 800 and 1,000 feet, and began criss-crossing the military base in search...

From ACM News

Chinese Cyberwar Video Goes Missing

Now you see it, now you don’t. A Chinese documentary that showed off the military’s ability to conduct a cyberattack against a U.S.-based site appears to have...

London Riots: Britain Weighs Personal Freedoms Against Need to Keep Order
From ACM TechNews

London Riots: Britain Weighs Personal Freedoms Against Need to Keep Order

The British government is taking aim at social media amid the recent riots, claiming that it is undermining the country's democracy. British and Scottish authorities...

Defcon Opens Its Doors to Pre-Teen and Teen Hackers
From ACM News

Defcon Opens Its Doors to Pre-Teen and Teen Hackers

DefCon, the conference where hackers and the people who monitor them get together to trade the latest in hacking and tracking data, had some new attendees: children...

From ACM News

Little-Known Firms Tracking Data Used in Credit Scores

Atlanta entrepreneur Mike Mondelli has access to more than a billion records detailing consumers’ personal finances—and there is little they can do about it.

From ACM News

­.s. Cyber Approach 'too Predictable' For One Top General

The nation’s second-ranking military official said Thursday that the U.S. approach to protecting its computer systems was "too predictable" and failed to penalize...

Global Race on to Match U.s. Drone Capabilities
From ACM News

Global Race on to Match U.s. Drone Capabilities

At the most recent Zhuhai air show, the premier event for China's aviation industry, crowds swarmed around a model of an armed, jet-propelled drone and marveled...

From ACM News

As Smartphones Proliferate, Some ­sers Cut the Computer Cord

A third of all American adults own a smartphone and for many minority and low-income users, those mobile devices have replaced computers for Internet access. The...

From ACM News

Maryland Sees Its Moment in Cybersecurity

As Fort Meade increasingly becomes a stronghold for federal cybersecurity, Maryland officials and business advocates are trying to take advantage of what they...

From ACM News

List of Cyber-Weapons Developed By Pentagon to Streamline Computer Warfare

The Pentagon has developed a list of cyber-weapons and -tools, including viruses that can sabotage an adversary’s critical networks, to streamline how the United...

From ACM News

Autocratic Regimes Fight Web-Savvy Opponents with Their Own Tools

For weeks, Syrian democracy activists have used Facebook and Twitter to promote a wave of bold demonstrations. Now, the Syrian government and its supporters are...

From ACM News

Netflix Biggest Driver of U.s. Internet Traffic, Puts Spotlight on Broadband Pricing

Netflix streaming videos drove nearly 30% of all North American broadband Internet traffic during peak hours, with consumers continuing their voracious appetite...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account