acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Your Broadband Provider Can ­se Your Smart Devices to Spy on You
From ACM News

Your Broadband Provider Can ­se Your Smart Devices to Spy on You

How much of your privacy would you trade for a smarter home? Internet service providers (ISPs) can peek at the internet-connected devices people use in their own...

With the Uss mccain Collision, Even Navy Tech Can't Overcome Human Shortcomings
From ACM News

With the Uss mccain Collision, Even Navy Tech Can't Overcome Human Shortcomings

In the darkness of early morning on August 21, the guided-missile destroyer USS John S. McCain collided with a tanker in the Strait of Malacca off Singapore.

Inside Waymo's Secret World For Training Self-Driving Cars
From ACM Careers

Inside Waymo's Secret World For Training Self-Driving Cars

In a corner of Alphabet's campus, there is a team working on a piece of software that may be the key to self-driving cars.

Time's Running Out to Prevent a Massive Cyberattack on Critical Infrastructure
From ACM TechNews

Time's Running Out to Prevent a Massive Cyberattack on Critical Infrastructure

The U.S. National Infrastructure Advisory Council warns there is a shrinking window of opportunity to fortify critical U.S. infrastructure against a massive "9/11...

Turing Laureates Celebrate Award's 50<sup>th</sup> Anniversary
From Communications of the ACM

Turing Laureates Celebrate Award's 50th Anniversary

ACM recently held a conference in celebration of the first 50 years of the ACM A.M. Turing Award.

Charles W. Bachman
From Communications of the ACM

Charles W. Bachman: 1924-2017

An engineer best known for his work in database management systems, and in techniques of layered architecture that include Bachman diagrams.

A Hunt For Ways to Combat Online Radicalization
From ACM Opinion

A Hunt For Ways to Combat Online Radicalization

Law enforcement officials, technology companies and lawmakers have long tried to limit what they call the "radicalization" of young people over the internet.

Tracing the Sources of Today's Russian cyberthreat
From ACM Opinion

Tracing the Sources of Today's Russian cyberthreat

Beyond carrying all of our phone, text and internet communications, cyberspace is an active battleground, with cybercriminals, government agents and even military...

Google's New AI Learns By Baking Tasty Machine Learning Cookies
From ACM TechNews

Google's New AI Learns By Baking Tasty Machine Learning Cookies

Google Vizier is an artificial intelligence system that automatically tunes other artificial intelligence programs.

Spotting a Social Bot Might Be Harder Than You Think
From ACM TechNews

Spotting a Social Bot Might Be Harder Than You Think

Although savvy Internet users might think they can easily identify a social media bot, there are tricks a "bot army master" can use to make the accounts seem more...

AI Programs Are Learning to Exclude Some African-American Voices
From ACM TechNews

AI Programs Are Learning to Exclude Some African-American Voices

Researchers warn some artificial intelligence programs are inheriting biases against certain dialects, which could lead to automatic discrimination as language-based...

Follow the Bitcoin to Find Victims of Human Trafficking
From ACM TechNews

Follow the Bitcoin to Find Victims of Human Trafficking

Researchers say they have developed the first automated techniques to identify ads potentially tied to human trafficking rings and link them to public information...

Killer Robots: World&#8217;s Top AI and Robotics Companies Urge United Nations to Ban Lethal Autonomous Weapons
From ACM News

Killer Robots: World’s Top AI and Robotics Companies Urge United Nations to Ban Lethal Autonomous Weapons

An open letter by leaders of leading robotics and artificial intelligence companies is released as the United Nations delays meeting to discuss the robot arms race...

Scientists Automate Key Step in Forensic Fingerprint Analysis
From ACM TechNews

Scientists Automate Key Step in Forensic Fingerprint Analysis

Researchers at Michigan State University and the U.S. National Institute of Standards and Technology have developed an algorithm that automates the fingerprint-analysis...

The Imperfect Crime: How the Wannacry Hackers Could Get Nabbed
From ACM News

The Imperfect Crime: How the Wannacry Hackers Could Get Nabbed

When hackers unleashed the WannaCry "ransomware" in mid-May, not only did they wreak havoc on European hospitals, telecoms and railways, they also made off with...

China's Plan For World Domination in AI Isn't So Crazy After All
From ACM Careers

China's Plan For World Domination in AI Isn't So Crazy After All

Xu Li's software scans more faces than maybe any on earth. He has the Chinese police to thank.

A True Random-Number Generator Built From Carbon Nanotubes
From ACM TechNews

A True Random-Number Generator Built From Carbon Nanotubes

Researchers say they have built a true random number generator from a static random-access memory cell printed with a specialized carbon nanotube ink.

Biohackers Encoded Malware in a Strand of Dna
From ACM News

Biohackers Encoded Malware in a Strand of Dna

When biologists synthesize DNA, they take pains not to create or spread a dangerous stretch of genetic code that could be used to create a toxin or, worse, an infectious...

First Evidence That Social Bots Play a Major Role in Spreading Fake News
From ACM News

First Evidence That Social Bots Play a Major Role in Spreading Fake News

Fake news and the way it spreads on social media is emerging as one of the great threats to modern society.

Hacking Cybersecurity to Anticipate Attacks
From ACM TechNews

Hacking Cybersecurity to Anticipate Attacks

The ACM Conference on Security and Privacy in Wireless and Mobile Networks in July highlighted developing a hacking model for anticipating cyberattacks.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account