acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectComputers And Society
authorThe Washington Post
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Tor ­sage in Turkey Surges During Twitter Ban
From ACM News

Tor ­sage in Turkey Surges During Twitter Ban

Since Turkish Prime Minister Recep Tayyip Erdogan implemented a ban on Twitter late last week, Tor usage in the country has surged—with connections nearly doubling...

Google's Project Loon: The Gamble That's So Crazy It Might Work
From ACM TechNews

Google's Project Loon: The Gamble That's So Crazy It Might Work

Google recently launched Project Loon, which provides Wi-Fi connectivity to remote locations using high-altitude balloons, wind currents, and solar power. 

Federal Agencies Embrace New Technology and Strategies to Find the Enemy Within
From ACM News

Federal Agencies Embrace New Technology and Strategies to Find the Enemy Within

After years of focusing on outside threats, the federal government and its contractors are turning inward, aiming a range of new technologies and counterintelligence...

Hackers Allegedly Stole $400 Million in Bitcoins. Here's How to Catch Them.
From ACM Opinion

Hackers Allegedly Stole $400 Million in Bitcoins. Here's How to Catch Them.

On Friday, what had been the world's leading Bitcoin exchange declared bankrutpcy, claiming that hackers had exploited a technical issue called "transaction malleability...

The Six Types of Conversations on Twitter
From ACM News

The Six Types of Conversations on Twitter

A new report from the Pew Research Center and the Social Media Research Foundation says that Twitter conversations have distinct shapes—at least six of them with...

Keeping Women in High-Tech Fields Is Big Challenge, Report Finds
From ACM TechNews

Keeping Women in High-Tech Fields Is Big Challenge, Report Finds

A report found U.S. women in science, technology, engineering, and math fields are 45 percent more likely than their male peers to leave the industry within a year...

Obama's Big Plan to Protect Businesses from Cyberattack
From ACM News

Obama's Big Plan to Protect Businesses from Cyberattack

It's been a long time coming, and some experts say it isn't enough.

New Surveillance Technology Can Track Everyone in an Area for Several Hours at a Time
From ACM News

New Surveillance Technology Can Track Everyone in an Area for Several Hours at a Time

Shooter and victim were just a pair of pixels, dark specks on a gray streetscape. 

One Day an Elevator Might Ask—are You Getting On?
From ACM News

One Day an Elevator Might Ask—are You Getting On?

Microsoft researchers have enabled elevators in a company building to detect the likelihood that a person walking by will want to board it.

Feeling Mad? New Devices Can Sense Your Mood and Tell--or Even Text--Others
From ACM TechNews

Feeling Mad? New Devices Can Sense Your Mood and Tell--or Even Text--Others

Microsoft Research cognitive psychologist Mary Czerwinski is an affective computing expert who creates technology that monitors a person's mood and stress level...

'a Fema-Level Fail': The Law Professor Who Coined 'net Neutrality' Lashes Out at the Fcc's Legal Strategy
From ACM Opinion

'a Fema-Level Fail': The Law Professor Who Coined 'net Neutrality' Lashes Out at the Fcc's Legal Strategy

Back in 2003, when he was a law professor at the University of Virginia, Tim Wu wrote the definitive paper on net neutrality.

­.s. Innovation Boosted By Silicon Valley-Detroit Team-up
From ACM TechNews

­.s. Innovation Boosted By Silicon Valley-Detroit Team-up

Rising consumer demand for more technology in cars has sparked a convergence between the auto and computer industries.

Tech Women Are Busy Building Their Own Networks
From ACM TechNews

Tech Women Are Busy Building Their Own Networks

Despite their under-representation in technology careers, women are present in the field and increasingly network with one another to expand their opportunities...

Dogecoins and Litecoins and Peercoins Oh My: What You Need to Know About Bitcoin Alternatives
From ACM News

Dogecoins and Litecoins and Peercoins Oh My: What You Need to Know About Bitcoin Alternatives

By now, most people have heard of Bitcoin, the peer-to-peer currency whose value has soared over the past couple of years.

Edward Snowden, After Months of Nsa Rvelations, Says His Mission's Accomplished
From ACM Opinion

Edward Snowden, After Months of Nsa Rvelations, Says His Mission's Accomplished

The familiar voice on the hotel room phone did not waste words.

How One Publisher Is Stopping Academics from Sharing Their Research
From ACM News

How One Publisher Is Stopping Academics from Sharing Their Research

One of the world's largest academic publishers has launched a wide-ranging takedown spree, demanding that several different universities take down their own scholars'...

Judge: Nsa’s Collecting of Phone Records Is Probably Unconstitutional
From ACM TechNews

Judge: Nsa’s Collecting of Phone Records Is Probably Unconstitutional

A district court judge has ruled the U.S. National Security Agency's daily collection of virtually all Americans' phone records is almost certainly unconstitutional...

By Cracking Cellphone Code, Nsa Has Capacity For Decoding Private Conversations
From ACM TechNews

By Cracking Cellphone Code, Nsa Has Capacity For Decoding Private Conversations

The U.S. National Security Agency is able to crack the A5/1 encryption technology used on most cellphones worldwide. 

President Obama Talks About Teaching Everyone to Code. This Professor Does It.
From ACM Opinion

President Obama Talks About Teaching Everyone to Code. This Professor Does It.

On Monday, President Obama kicked off computer science education week, encouraging every young person to acquire computer programming skills, even if they have...

Nsa ­ses Google Cookies to Pinpoint Targets For Hacking
From ACM TechNews

Nsa ­ses Google Cookies to Pinpoint Targets For Hacking

Documents released by former U.S. National Security Agency contractor Edward Snowden indicate the agency uses Internet cookies to hack indivuals' computers. 
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account