acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Mathematical Modeling For Better Designs and Simulations
From ACM TechNews

Mathematical Modeling For Better Designs and Simulations

Dublin City University professor Patricia Moore in Ireland says she tries "to make it easier for computers to solve simulation problems as efficiently and accurately...

The Female Code Breakers Who Helped Defeat the Nazis
From ACM TechNews

The Female Code Breakers Who Helped Defeat the Nazis

More than 10,000 female "cryptoanalysts" were enlisted by the U.S. Army and Navy to help crack Nazi codes and ensure the Allies' victory in World War II.

Two Computer Scientists Among 2017 Macarthur 'genius' Grant Winners
From ACM News

Two Computer Scientists Among 2017 Macarthur 'genius' Grant Winners

Two computer scientists are recognized for pushing the boundaries of machine learning and cybersecurity.

The Scientist Who Spots Fake Videos
From ACM Opinion

The Scientist Who Spots Fake Videos

Hany Farid, a computer scientist at Dartmouth College in Hanover, New Hampshire, specialises in detecting manipulated images and videos. Farid, who provides his...

The Race to Secure Voting Tech Gets an ­rgent Jumpstart
From ACM TechNews

The Race to Secure Voting Tech Gets an ­rgent Jumpstart

There is an urgent need to secure U.S. voting systems ahead of the 2018 midterm elections, according to a report by the Atlantic Council think tank and hacking...

How Israel Caught Russian Hackers Scouring the World For ­.s. Secrets
From ACM News

How Israel Caught Russian Hackers Scouring the World For ­.s. Secrets

It was a case of spies watching spies watching spies: Israeli intelligence officers looked on in real time as Russian government hackers searched computers around...

Building the Blockchain to End All Blockchains
From ACM TechNews

Building the Blockchain to End All Blockchains

Despite the potential benefits of blockchain technology, it needs to overcome challenges in scalability, speed, and flexibility.

Google, Facebook and Twitter scramble to Hold Washington at Bay
From ACM Careers

Google, Facebook and Twitter scramble to Hold Washington at Bay

Google summoned about 200 policy staff from around the world last month for a debate on whether the company's size has made it too attractive as a target for government...

Warning: This Algorithm Will Self-Destruct After It's ­sed
From ACM TechNews

Warning: This Algorithm Will Self-Destruct After It's ­sed

Two researchers say they have built a proof-of-principle algorithm that destroys itself after use.

Russians Took a Page from Corporate America By ­sing Facebook Tool to Id and Influence Voters
From ACM News

Russians Took a Page from Corporate America By ­sing Facebook Tool to Id and Influence Voters

Russian operatives set up an array of misleading Web sites and social media pages to identify American voters susceptible to propaganda, then used a powerful Facebook...

China Demonstrates Quantum Encryption By Hosting a Video Call
From ACM News

China Demonstrates Quantum Encryption By Hosting a Video Call

Chinese researchers have completed a practical demonstration of quantum key distribution, showing that it's possible to encrypt and send data between two locations...

Scientists in Mexico Scramble to Deploy Seismic Sensors
From ACM News

Scientists in Mexico Scramble to Deploy Seismic Sensors

Late one night in September, Victor Cruz, a geophysicist at Mexico's National Autonomous University, submitted an article to a scientific journal describing progress...

­Understanding Ethereum, Bitcoin's Virtual Cousin
From ACM Careers

­Understanding Ethereum, Bitcoin's Virtual Cousin

Bitcoin has many cousins and competitors. None have grown more popular than Ethereum, a global computer network with its own virtual currency, called Ether.

The Coming Software Apocalypse
From ACM TechNews

The Coming Software Apocalypse

A group of coders is trying to work past the abstract approach to programming.

As N. Korea Threatens Nuclear Missile Test, Are ­.s. Ballistic Defenses Ready?
From ACM News

As N. Korea Threatens Nuclear Missile Test, Are ­.s. Ballistic Defenses Ready?

After suffering yet another round of sanctions, as well as a provocative UN speech and further sanctions from President Donald Trump, North Korea's leaders have...

Goodbye, Login. Hello, Heart Scan
From ACM TechNews

Goodbye, Login. Hello, Heart Scan

A new computer security system uses heart dimensions for identification.

The Coming Software Apocalypse
From ACM News

The Coming Software Apocalypse

There were six hours during the night of April 10, 2014, when the entire population of Washington State had no 911 service.

The Growing Cybersecurity Risk of 'smart' Homes
From ACM TechNews

The Growing Cybersecurity Risk of 'smart' Homes

Carnegie Mellon University professor Jason Hong warns the connectivity of smart homes via Internet of Things technologies could raise cybersecurity risks for homeowners...

Internet Rulemaking Is Going to Get More Complicated
From ACM TechNews

Internet Rulemaking Is Going to Get More Complicated

A new report warns of cybersecurity measures undermining personal rights and freedoms through censorship and other means if "multilateral" government policies continue...

Real or Fake? Creating Fingers to Protect Identities
From ACM TechNews

Real or Fake? Creating Fingers to Protect Identities

Michigan State University researchers have designed and created a fake finger containing multiple properties of human skin.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account