acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Mental Health Alerts via Facebook?
From ACM TechNews

Mental Health Alerts via Facebook?

Social media data could be used to detect and track at-risk youth and mental health patients.

Checklist of Worst-Case Scenarios Could Help Prepare For Evil AI
From ACM TechNews

Checklist of Worst-Case Scenarios Could Help Prepare For Evil AI

University of Louisville researcher Roman Yampolskiy and hacktivist Federico Pistono are examining worst-case scenarios for a potential malevolent artificial intelligence...

How the Constant Threat of War Shaped Israel's Tech Industry
From ACM Careers

How the Constant Threat of War Shaped Israel's Tech Industry

Unit 8200 is Israel's most mysterious agency. No one outside knows exactly how it operates, who works there, or how they learn.

Face Recognition App Taking Russia By Storm May Bring End to Public Anonymity
From ACM News

Face Recognition App Taking Russia By Storm May Bring End to Public Anonymity

If the founders of a new face recognition app get their way, anonymity in public could soon be a thing of the past.

1,500 Scientists Lift the Lid on Reproducibility
From ACM News

1,500 Scientists Lift the Lid on Reproducibility

More than 70% of researchers have tried and failed to reproduce another scientist's experiments, and more than half have failed to reproduce their own experiments...

China's Scary Lesson to the World: Censoring the Internet Works.
From ACM News

China's Scary Lesson to the World: Censoring the Internet Works.

First there was the Berlin Wall. Now there is the Great Firewall of China, not a physical barrier preventing people from leaving, but a virtual one, preventing...

The Oracle-Google Case Will Decide the Future of Software
From ACM News

The Oracle-Google Case Will Decide the Future of Software

The legal battle between Oracle and Google is about to come to an end, and nothing less is as stake than the future of programming.

The Key to Privacy
From Communications of the ACM

The Key to Privacy

40 years ago, Whitfield Diffie and Martin E. Hellman introduced the public key cryptography used to secure today's online transactions.

China Quietly Targets ­.s. Tech Companies in Security Reviews
From ACM Careers

China Quietly Targets ­.s. Tech Companies in Security Reviews

Chinese authorities are quietly scrutinizing technology products sold in China by Apple and other big foreign companies, focusing on whether they pose potential...

Largest Study of Online Tracking Proves Google Really Is Watching ­S All
From ACM TechNews

Largest Study of Online Tracking Proves Google Really Is Watching ­S All

Researchers at Princeton University say they have conducted the largest study yet on the technology that tracks people's movements around the Web. 

Silicon Valley's Tech Workforce Diversity Has Long Way to Go, Say Feds
From ACM TechNews

Silicon Valley's Tech Workforce Diversity Has Long Way to Go, Say Feds

Much progress remains before Silicon Valley's technology industry has a truly diverse workforce, says an analysis by the U.S. Equal Employment Opportunity Commission...

Want to Buy a Self-Driving Car? Big-Rig Trucks May Come First
From ACM News

Want to Buy a Self-Driving Car? Big-Rig Trucks May Come First

Imagine you are driving on a highway late at night when a big-rig truck closes in behind you.

Abstinence May Not Be the Best Policy For Avoiding Online Risk
From ACM TechNews

Abstinence May Not Be the Best Policy For Avoiding Online Risk

A recent study found permitting teenagers to develop their own strategies for coping with risky online situations may be a better strategy than banning Internet...

America Is 'Dropping Cyberbombs'—But How Do They Work?
From ACM News

America Is 'Dropping Cyberbombs'—But How Do They Work?

Recently, United States Deputy Defense Secretary Robert Work publicly confirmed that the Pentagon’s Cyber Command was "dropping cyberbombs," taking its ongoing...

We Know Where You Live
From ACM TechNews

We Know Where You Live

Researchers have demonstrated that snoopers armed with little sophisticated technology can expose the home and workplace addresses of Twitter users. 

You Start 'doing' Diversity By ­sing the Data
From ACM TechNews

You Start 'doing' Diversity By ­sing the Data

The key to instilling true workplace diversity within an organization is data, according to Intel CEO Brian Krzanich. 

More Than 30 States Offer Online Voting, but Experts Warn It Isn't Secure
From ACM TechNews

More Than 30 States Offer Online Voting, but Experts Warn It Isn't Secure

More than 30 states will be hosting online voting systems by the time of the U.S. presidential election in November, but experts warn such systems are still insecure...

Nsa Can Legally Access Metadata of 25,000 Callers Based on a Single Suspect's Phone
From ACM News

Nsa Can Legally Access Metadata of 25,000 Callers Based on a Single Suspect's Phone

Despite changes to the law, the U.S. National Security Agency can still request metadata from tens of thousands of private phones if they are indirectly connected...

Scientists Hold Secret Meeting to Consider Creating a Synthetic Human Genome
From ACM News

Scientists Hold Secret Meeting to Consider Creating a Synthetic Human Genome

Scientists are now contemplating the creation of a synthetic human genome, meaning they would use chemicals to manufacture all the DNA contained in human chromosomes...

How to Make Passwords That Cannot Be Compromised By Torture or Coercion
From ACM TechNews

How to Make Passwords That Cannot Be Compromised By Torture or Coercion

Researchers have hypothesized a method to measure an individual's stress levels and determine whether they are being coerced into revealing a password. 
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account