acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectComputers And Society
authorZDNet
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


E­ to Fund Bug Bounty Programs for 14 Open Source Projects
From ACM TechNews

E­ to Fund Bug Bounty Programs for 14 Open Source Projects

The European Union will cover the costs of bug bounty programs for 14 open source projects.

RFID Tag Arrays Can Be ­sed to Track a Person's Movement
From ACM TechNews

RFID Tag Arrays Can Be ­sed to Track a Person's Movement

Radio-frequency identification tags may be used to track movement.

Hyundai Develops Fingerprint Tech to Unlock and Start Cars
From ACM TechNews

Hyundai Develops Fingerprint Tech to Unlock and Start Cars

Hyundai Motor has developed a system that will allow drivers to unlock and start their vehicles using only their fingerprints.

Nurse Robot Moxi Gets Schooled by Texas Nurses
From ACM TechNews

Nurse Robot Moxi Gets Schooled by Texas Nurses

A robot designed to test collaborative automation integration in a working medical facility recently concluded its first real-world trial in a Texas hospital.

Walmart Leads the Way...in Floor Scrubbing Robots?
From ACM TechNews

Walmart Leads the Way...in Floor Scrubbing Robots?

By the end of next month, Walmart will deploy floor-scrubbing robots in its stores.

Playing With Molecules in Virtual Reality
From ACM TechNews

Playing With Molecules in Virtual Reality

A growing number of companies are using virtual reality to enable scientists to view, design, and manipulate molecular structures.

Flaws in Self-Encrypting SSDs Let Attackers Bypass Disk Encryption
From ACM TechNews

Flaws in Self-Encrypting SSDs Let Attackers Bypass Disk Encryption

Researchers have found vulnerabilities in some solid-state drives that allow hackers to circumvent encryption and access local data without knowing the password...

Intel CP­s Impacted by New PortSmash Side-Channel Vulnerability
From ACM TechNews

Intel CP­s Impacted by New PortSmash Side-Channel Vulnerability

Researchers discovered a new vulnerability in Intel processors that can allow attackers to leak encrypted data from the internal process of a central processing...

Can a Robot Learn a Language the Way a Child Does?
From ACM TechNews

Can a Robot Learn a Language the Way a Child Does?

Massachusetts Institute of Technology researchers have developed a method to train semantic parsers by mimicking the way a child learns language.

Need to Fix an iPhone or Android Device? You Can Now Break DRM ­nder New ­.S. Rules
From ACM TechNews

Need to Fix an iPhone or Android Device? You Can Now Break DRM ­nder New ­.S. Rules

It is now legal in the U.S. for consumers and repair companies to break an electronic device's digital rights management protections in order to to repair it.

China Has Been "Hijacking the Vital Internet Backbone of Western Countries"
From ACM News

China Has Been "Hijacking the Vital Internet Backbone of Western Countries"

The Chinese government turned to a local ISP for intelligence gathering after it signed the Obama-Xi cyberpact in late 2015, the researchers say.

MIT Invention Builds Memory Walls to Protect Against Meltdown, Spectre Attacks
From ACM TechNews

MIT Invention Builds Memory Walls to Protect Against Meltdown, Spectre Attacks

A new system can more effectively protect modern PC architectures against vulnerabilities exploited by malware like Meltdown and Spectre, researchers say.

Watching YouTube Videos May Someday Let Robots Copy Humans
From ACM TechNews

Watching YouTube Videos May Someday Let Robots Copy Humans

Researchers have trained a neural network to reconstruct human acrobatics in YouTube video clips and manipulate a simulated humanoid to ape those movements.

Developers, Despair: Half Your Time Is Wasted on Bad Code
From ACM TechNews

Developers, Despair: Half Your Time Is Wasted on Bad Code

A study found 31% of developer time is wasted on routine maintenance work, draining $300 billion each year from global GDP.

What is Cyberwar?
From ACM Opinion

What is Cyberwar?

At its core, cyberwarfare refers the use of digital attacks by one country or nation to disrupt the computer systems of another with the aim of create significant...

Facebook, NY­ Aim to ­se AI to Speed ­p MRI Scans
From ACM TechNews

Facebook, NY­ Aim to ­se AI to Speed ­p MRI Scans

Facebook's artificial intelligence laboratory, working with the New York University School of Medicine, generated reliable magnetic resonance imaging scans with...

Zen and the Art of Data Structures: From Self-Tuning to Self-Designing Data Systems
From ACM TechNews

Zen and the Art of Data Structures: From Self-Tuning to Self-Designing Data Systems

Harvard University's Stratos Idreos is using what he calls a periodic table of data structures to map those structures and their characteristics and to probe their...

Exoskeletons Debut at Ford Factories
From ACM TechNews

Exoskeletons Debut at Ford Factories

Ford plans to offer exoskeleton technology to its factory employees worldwide.

IBM Watson Health Extends Partnership With ­.S. to Help Vets With Cancer
From ACM TechNews

IBM Watson Health Extends Partnership With ­.S. to Help Vets With Cancer

IBM Watson Health has extended its collaboration with the U.S. Department of Veterans Affairs to help treat veterans with cancer using artificial intelligence. ...

Can Graphical Passwords Keep ­s Secure Online?
From ACM TechNews

Can Graphical Passwords Keep ­s Secure Online?

Researchers from the Xi'an Jiaotong-Liverpool University in China have developed an authentication method that uses semantically linked images.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account