acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Hyundai Develops Fingerprint Tech to Unlock and Start Cars
From ACM TechNews

Hyundai Develops Fingerprint Tech to Unlock and Start Cars

Hyundai Motor has developed a system that will allow drivers to unlock and start their vehicles using only their fingerprints.

Nurse Robot Moxi Gets Schooled by Texas Nurses
From ACM TechNews

Nurse Robot Moxi Gets Schooled by Texas Nurses

A robot designed to test collaborative automation integration in a working medical facility recently concluded its first real-world trial in a Texas hospital.

Walmart Leads the Way...in Floor Scrubbing Robots?
From ACM TechNews

Walmart Leads the Way...in Floor Scrubbing Robots?

By the end of next month, Walmart will deploy floor-scrubbing robots in its stores.

Playing With Molecules in Virtual Reality
From ACM TechNews

Playing With Molecules in Virtual Reality

A growing number of companies are using virtual reality to enable scientists to view, design, and manipulate molecular structures.

­NSW Has Found a Way to Access Information Stored Within Atoms
From ACM TechNews

­NSW Has Found a Way to Access Information Stored Within Atoms

Researchers at the University of New South Wales in Australia have demonstrated a compact sensor for accessing information stored in the electrons of individual...

Flaws in Self-Encrypting SSDs Let Attackers Bypass Disk Encryption
From ACM TechNews

Flaws in Self-Encrypting SSDs Let Attackers Bypass Disk Encryption

Researchers have found vulnerabilities in some solid-state drives that allow hackers to circumvent encryption and access local data without knowing the password...

Intel CP­s Impacted by New PortSmash Side-Channel Vulnerability
From ACM TechNews

Intel CP­s Impacted by New PortSmash Side-Channel Vulnerability

Researchers discovered a new vulnerability in Intel processors that can allow attackers to leak encrypted data from the internal process of a central processing...

Can a Robot Learn a Language the Way a Child Does?
From ACM TechNews

Can a Robot Learn a Language the Way a Child Does?

Massachusetts Institute of Technology researchers have developed a method to train semantic parsers by mimicking the way a child learns language.

Google Says 'Exponential' Growth of AI is Changing Nature of Compute
From ACM News

Google Says 'Exponential' Growth of AI is Changing Nature of Compute

Google software engineer Cliff Young explains how the explosion in deep learning algorithms is coinciding with a breakdown in Moore's Law, forcing new computer...

Need to Fix an iPhone or Android Device? You Can Now Break DRM ­nder New ­.S. Rules
From ACM TechNews

Need to Fix an iPhone or Android Device? You Can Now Break DRM ­nder New ­.S. Rules

It is now legal in the U.S. for consumers and repair companies to break an electronic device's digital rights management protections in order to to repair it.

China Has Been "Hijacking the Vital Internet Backbone of Western Countries"
From ACM News

China Has Been "Hijacking the Vital Internet Backbone of Western Countries"

The Chinese government turned to a local ISP for intelligence gathering after it signed the Obama-Xi cyberpact in late 2015, the researchers say.

MIT Invention Builds Memory Walls to Protect Against Meltdown, Spectre Attacks
From ACM TechNews

MIT Invention Builds Memory Walls to Protect Against Meltdown, Spectre Attacks

A new system can more effectively protect modern PC architectures against vulnerabilities exploited by malware like Meltdown and Spectre, researchers say.

Watching YouTube Videos May Someday Let Robots Copy Humans
From ACM TechNews

Watching YouTube Videos May Someday Let Robots Copy Humans

Researchers have trained a neural network to reconstruct human acrobatics in YouTube video clips and manipulate a simulated humanoid to ape those movements.

Developers, Despair: Half Your Time Is Wasted on Bad Code
From ACM TechNews

Developers, Despair: Half Your Time Is Wasted on Bad Code

A study found 31% of developer time is wasted on routine maintenance work, draining $300 billion each year from global GDP.

What is Cyberwar?
From ACM Opinion

What is Cyberwar?

At its core, cyberwarfare refers the use of digital attacks by one country or nation to disrupt the computer systems of another with the aim of create significant...

Facebook, NY­ Aim to ­se AI to Speed ­p MRI Scans
From ACM TechNews

Facebook, NY­ Aim to ­se AI to Speed ­p MRI Scans

Facebook's artificial intelligence laboratory, working with the New York University School of Medicine, generated reliable magnetic resonance imaging scans with...

Zen and the Art of Data Structures: From Self-Tuning to Self-Designing Data Systems
From ACM TechNews

Zen and the Art of Data Structures: From Self-Tuning to Self-Designing Data Systems

Harvard University's Stratos Idreos is using what he calls a periodic table of data structures to map those structures and their characteristics and to probe their...

Exoskeletons Debut at Ford Factories
From ACM TechNews

Exoskeletons Debut at Ford Factories

Ford plans to offer exoskeleton technology to its factory employees worldwide.

IBM Watson Health Extends Partnership With ­.S. to Help Vets With Cancer
From ACM TechNews

IBM Watson Health Extends Partnership With ­.S. to Help Vets With Cancer

IBM Watson Health has extended its collaboration with the U.S. Department of Veterans Affairs to help treat veterans with cancer using artificial intelligence. ...

Can Graphical Passwords Keep ­s Secure Online?
From ACM TechNews

Can Graphical Passwords Keep ­s Secure Online?

Researchers from the Xi'an Jiaotong-Liverpool University in China have developed an authentication method that uses semantically linked images.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account