acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


China Adopts New Security Law to Make Networks, Systems 'controllable'
From ACM News

China Adopts New Security Law to Make Networks, Systems 'controllable'

China's legislature adopted a sweeping national security law on Wednesday that covers everything from territorial sovereignty to measures to tighten cyber security...

The Future of Car Keys? Smartphone Apps, Maybe
From ACM News

The Future of Car Keys? Smartphone Apps, Maybe

It' not fun getting into a car when the interior is 130 degrees, but that's a typical problem during the summer for those who live in a city like Phoenix, where...

What Washington Really Knows About the Internet of Things
From ACM News

What Washington Really Knows About the Internet of Things

President Barack Obama wears a FitBit monitor on his wrist to count his steps and calories, and has waxed poetic about the power of wearable technology to "give...

Nasa Explains Why June 30 Will Get Extra Second
From ACM News

Nasa Explains Why June 30 Will Get Extra Second

The day will officially be a bit longer than usual on Tuesday, June 30, 2015, because an extra second, or "leap" second, will be added.

Computers Read the Fossil Record
From ACM News

Computers Read the Fossil Record

For a field whose raison d'être is to chronicle the deep past, palaeontology is remarkably forward-looking when it comes to organizing its data.

The Computer Chip That Never Forgets
From ACM News

The Computer Chip That Never Forgets

In 1945, mathematician John von Neumann wrote down a very simple recipe for a computer.

Making a Better Semiconductor
From ACM TechNews

Making a Better Semiconductor

Researchers at Michigan State University have developed a method for changing the electronic properties of materials that could lead to new, improved semiconductors...

Mit’s Bitcoin-Inspired 'enigma' Lets Computers Mine Encrypted Data
From ACM Careers

Mit’s Bitcoin-Inspired 'enigma' Lets Computers Mine Encrypted Data

The cryptography behind bitcoin solved a paradoxical problem: a currency with no regulator, that nonetheless can't be counterfeited.

Warrantless Phone Tapping, Email Spying Inching to Supreme Court Review
From ACM News

Warrantless Phone Tapping, Email Spying Inching to Supreme Court Review

In 2013, the Supreme Court rejected a challenge to a once-clandestine warrantless surveillance program that gobbles up Americans' electronic communications—a project...

June Will End with a Rare 61-Second Minute
From ACM News

June Will End with a Rare 61-Second Minute

We'll need to wait for July just a shade longer, as the world's timekeepers have added a leap second June 30—to officially keep Earth and our precise, atomic clocks...

Watch: Black Hole Sim Whips Dark Matter Into a Frenzy
From ACM News

Watch: Black Hole Sim Whips Dark Matter Into a Frenzy

Dark matter is to astrophysicists what sex is to kids in junior high school: Everybody is really interested, but nobody really knows what it looks like.

When a Company Is Put ­p For Sale, in Many Cases, Your Personal Data Is, Too
From ACM News

When a Company Is Put ­p For Sale, in Many Cases, Your Personal Data Is, Too

The privacy policy for Hulu, a video-streaming service with about nine million subscribers, opens with a declaration that the company "respects your privacy."

Hospital Icus Mine Big Data in Push For Better Outcomes
From ACM TechNews

Hospital Icus Mine Big Data in Push For Better Outcomes

Some hospitals are using a big-data approach to mine intensive-care unit data to help providers and patients realize improved outcomes. 

Automatic Bug Repair
From ACM News

Automatic Bug Repair

At the Association for Computing Machinery's Programming Language Design and Implementation conference this month, MIT researchers presented a new system that repairs...

A Computer's Heat Could Divulge Top Secrets
From ACM News

A Computer's Heat Could Divulge Top Secrets

The most secure computers in the world can't "Google" a thing—they are disconnected from the Internet and all other networks.

Pluto-Bound Probe Faces Its Toughest Task: Finding Pluto
From ACM News

Pluto-Bound Probe Faces Its Toughest Task: Finding Pluto

Some 4.7 billion kilometres from Earth, the New Horizons spacecraft is heading for a historic rendezvous with Pluto. To achieve this, it will need to hit a very...

Automakers Tackle the Massive Security Challenges of Connected Vehicles
From ACM News

Automakers Tackle the Massive Security Challenges of Connected Vehicles

The National Highway Traffic Safety Administration is accelerating its efforts to mandate vehicle-to-vehicle communications, a step that could help lower the number...

The Secret Codes of British Banknotes
From ACM News

The Secret Codes of British Banknotes

A brand-new Xerox colour photocopier had just arrived at one of Cambridge's industrial labs.

How Machine Vision Solved One of the Great Mysteries of 20th-Century Surrealist Art
From ACM TechNews

How Machine Vision Solved One of the Great Mysteries of 20th-Century Surrealist Art

A pair of identical paintings attributed to Belgian surrealist artist Rene Magritte has long mystified art experts as to which one is the original. 

Iowa State Engineers Develop Micro-Tentacles So Tiny Robots Can Handle Delicate Objects
From ACM TechNews

Iowa State Engineers Develop Micro-Tentacles So Tiny Robots Can Handle Delicate Objects

Iowa State University researchers have developed spiraling microrobotic tentacles which they say will enable robots to handle delicate objects.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account