acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectComputers And Society
authorThe Washington Post
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM News

Facebook Ipo: How Does Facebook Make Its Money?

Facebook's IPO filing shows that the company brought in about $3.7 billion in revenue and made $1 billion in profit in 2011.

From ACM News

The Search For the Right Candidate Just Got More Personal

The 2012 presidential campaign is about to get a lot more personal, at least if Google has any say in it.

Rise of the Drone: From Calif. Garage to Multibillion-Dollar Defense Industry
From ACM News

Rise of the Drone: From Calif. Garage to Multibillion-Dollar Defense Industry

In 1980, Abraham Karem, an engineer who had emigrated from Israel, retreated into his three-car garage in Hacienda Heights outside Los Angeles and, to the bemusement...

From ACM Careers

In Russia, the Lost Generation of Science

For the past decade, Russia has been pouring money into scientific research, trying to make up for the collapse of the 1990s, but innovation is losing out to...

From ACM News

Sopa Hearings Cast Debate as Old Media vs. New Media

The circus atmosphere of the hearing on the Stop Online Piracy Act, introduced by Rep. Lamar Smith (R-Tex.), reflected the high-stakes, emotional nature of the...

Preventing a Pearl Harbor of Cyberspace
From ACM News

Preventing a Pearl Harbor of Cyberspace

At a time when the Internet has been inextricably linked to our national infrastructure, there are understandably serious concerns about the ability of the U.S...

From ACM News

How Many Security Clearances Have Been Issued?

More than 4.2 million people have security clearances for access to classified information, a number that vastly outstrips previous estimates and nearly rivals...

From ACM News

In China, Business Travelers Take Extreme Precautions to Avoid Cyber-Espionage

Packing for business in China? Bring your passport and business cards, but maybe not that laptop loaded with contacts and corporate memos.

From ACM TechNews

Technically, Science Will Be Less Lonely For Women When Girls Are Spurred Early

Girls are being sent a message at a young age that careers in math and science are marked by social isolation and will make them seem less attractive. However,...

From ACM News

A Future For Drones: Automated Killing

One afternoon last fall at Fort Benning, GA, two model-size planes took off, climbed to 800 and 1,000 feet, and began criss-crossing the military base in search...

From ACM News

Chinese Cyberwar Video Goes Missing

Now you see it, now you don’t. A Chinese documentary that showed off the military’s ability to conduct a cyberattack against a U.S.-based site appears to have...

London Riots: Britain Weighs Personal Freedoms Against Need to Keep Order
From ACM TechNews

London Riots: Britain Weighs Personal Freedoms Against Need to Keep Order

The British government is taking aim at social media amid the recent riots, claiming that it is undermining the country's democracy. British and Scottish authorities...

Defcon Opens Its Doors to Pre-Teen and Teen Hackers
From ACM News

Defcon Opens Its Doors to Pre-Teen and Teen Hackers

DefCon, the conference where hackers and the people who monitor them get together to trade the latest in hacking and tracking data, had some new attendees: children...

From ACM News

Little-Known Firms Tracking Data Used in Credit Scores

Atlanta entrepreneur Mike Mondelli has access to more than a billion records detailing consumers’ personal finances—and there is little they can do about it.

From ACM News

­.s. Cyber Approach 'too Predictable' For One Top General

The nation’s second-ranking military official said Thursday that the U.S. approach to protecting its computer systems was "too predictable" and failed to penalize...

Global Race on to Match U.s. Drone Capabilities
From ACM News

Global Race on to Match U.s. Drone Capabilities

At the most recent Zhuhai air show, the premier event for China's aviation industry, crowds swarmed around a model of an armed, jet-propelled drone and marveled...

From ACM News

Maryland Sees Its Moment in Cybersecurity

As Fort Meade increasingly becomes a stronghold for federal cybersecurity, Maryland officials and business advocates are trying to take advantage of what they...

Google Ideas Think Tank Gathering Former Extremists to Battle Radicalization
From ACM TechNews

Google Ideas Think Tank Gathering Former Extremists to Battle Radicalization

The Google Ideas think tank has gathered 80 former radicals, including ex-neo-Nazis, Muslim extremists, and U.S. gang members, to brainstorm ways technology can...

From ACM News

List of Cyber-Weapons Developed By Pentagon to Streamline Computer Warfare

The Pentagon has developed a list of cyber-weapons and -tools, including viruses that can sabotage an adversary’s critical networks, to streamline how the United...

From ACM News

Autocratic Regimes Fight Web-Savvy Opponents with Their Own Tools

For weeks, Syrian democracy activists have used Facebook and Twitter to promote a wave of bold demonstrations. Now, the Syrian government and its supporters are...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account