acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectHuman Computer Interaction
authorWired
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


What's a 'computer Vision Specialist' and Why Does Apple Need One?
From ACM News

What's a 'computer Vision Specialist' and Why Does Apple Need One?

When Apple posted a job listing last week for a "Computer Vision specialist," the tech-obsessed echo chamber began speculating which Apple product line would be...

Going With the Flow: Google's Secret Switch to the Next Wave of Networking
From ACM News

Going With the Flow: Google's Secret Switch to the Next Wave of Networking

In early 1999, an associate computer science professor at UC Santa Barbara climbed the steps to the second floor headquarters of a small startup in Palo Alto, and...

Artificial Intelligence Could Be on Brink of Passing Turing Test
From ACM News

Artificial Intelligence Could Be on Brink of Passing Turing Test

One hundred years after Alan Turing was born, his eponymous test remains an elusive benchmark for artificial intelligence. Now, for the first time in decades, it's...

Israel's Rocket-Hunting Ace Got His Start Playing Warcraft
From ACM News

Israel's Rocket-Hunting Ace Got His Start Playing Warcraft

While many of the boys in Idan Yahya's high school class were buffing up and preparing themselves for selection into elite combat units, this gawky teenager was...

Humans vs. Robots: Who Should Dominate Space Exploration?
From ACM News

Humans vs. Robots: Who Should Dominate Space Exploration?

The most recent footprints on the moon are 40 years old, and the next artificial mark on the lunar surface will probably be made by a robot’s wheels rather than...

Check Your Mac For Malware
From ACM News

Check Your Mac For Malware

Mac fans recently got a little taste of what it's like to be a Windows user.

Researchers Release New Exploits to Hijack Critical Infrastructure
From ACM News

Researchers Release New Exploits to Hijack Critical Infrastructure

Researchers have released two new exploits that attack common design vulnerabilities in a computer component used to control critical infrastructure, such as refineries...

Hacktivists Out-Stole Cybercriminals in 2011
From ACM News

Hacktivists Out-Stole Cybercriminals in 2011

Just two years ago, cybercriminal gangs were behind record-breaking data breaches that resulted in the theft of millions of customer records. But the year 2011...

The NSA Is Building the Country's Biggest Spy Center (Watch What You Say)
From ACM News

The NSA Is Building the Country's Biggest Spy Center (Watch What You Say)

The spring air in the small, sand-dusted town has a soft haze to it, and clumps of green-gray sagebrush rustle in the breeze.

Arm Wants to Put the Internet in Your ­mbrella
From ACM News

Arm Wants to Put the Internet in Your ­mbrella

Chip designer ARM wants to put the internet in your fridge. And it insists this cliche of tech prognostication is no longer just talk. Really.

From ACM Careers

Hackers Vie For More Than $1 Million to Take Down Browsers

As alleged hackers from LulzSec and Anonymous contemplate the possibility of a life behind bars, other hackers are limbering up in Canada this week to vie for more...

Number 1 on Army's Shopping List: Wireless Broadband
From ACM News

Number 1 on Army's Shopping List: Wireless Broadband

The most important element of the Army's effort to modernize itself doesn't shoot. You can't ride in it. You can't wear it for protection against homemade bombs...

The Little White Box That Can Hack Your Network
From ACM News

The Little White Box That Can Hack Your Network

When Jayson E. Street broke into the branch office of a national bank in May of last year, the branch manager could not have been more helpful.

Dhs, Not Nsa, Should Lead Cybersecurity, Pentagon Official Says
From ACM News

Dhs, Not Nsa, Should Lead Cybersecurity, Pentagon Official Says

In the midst of an ongoing turf battle over how big a role the National Security Agency should play in securing the nation’s critical infrastructure, a Defense...

­.s. Wants You to Hunt Fugitives With Twitter
From ACM News

­.s. Wants You to Hunt Fugitives With Twitter

A worldwide manhunt kicks off at the end of March—a search across America and Europe for five fugitives, identifiable only by their mugshots.

From ACM News

DARPA Warns: Your Iphone Is a Military Threat

There’s a growing threat to the U.S. military, according to the Pentagon's premier research wing. No, it's not Iran’s nukes or China's missiles. It's the iPads,...

Facebook: The Wimps Will Inherit the Data Center
From ACM News

Facebook: The Wimps Will Inherit the Data Center

Unlike Google, Facebook believes the wimps have a future in the data center. As variousacademics and free-thinking startups seek to reinvent the server using ultra...

In Back Alleys and Basements, Video Arcades Quietly Survive
From ACM News

In Back Alleys and Basements, Video Arcades Quietly Survive

The Stockton Tunnel, excavated in 1914, lets San Francisco drivers get between downtown and Fisherman’s Wharf without having to ascend the scarily steep grades...

Darpa Dodges Obama Budget Death Ray, Keeps Its $2.8 Billion
From ACM News

Darpa Dodges Obama Budget Death Ray, Keeps Its $2.8 Billion

For most of the U.S. military's far-flung community of scientists and engineers, Monday was a day to pop a Xanax.

Texas Jury Strikes Down Patent Troll
From ACM News

Texas Jury Strikes Down Patent Troll

After threatening web companies for more than a decade, Michael Doyle and his patent-holding company Eolas Technologies—named after the Irish word for knowledge—may...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account