acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Study Finds Support For Presidential Net 'kill Switch'
From ACM TechNews

Study Finds Support For Presidential Net 'kill Switch'

Sixty-one percent of U.S. citizens believe the president should be authorized to control or even shut down portions of the Internet in the event key U.S. systems...

A New Search Engine, Where Less Is More
From ACM News

A New Search Engine, Where Less Is More

Start-ups and big companies alike have tried to take on Google by building a better search engine. That they have failed has not stopped brave new entrants.

From ACM News

Amid Criticism, Wikileaks Shifts Focus

When WikiLeaks launched with little fanfare in early 2007, its founders touted it as a unique collaboration that would rely on the same anyone-can-edit software...

From ACM News

Limewire Told to Shut

Popular file-sharing website LimeWire has been ordered to permanently shut down six months after a federal judge found it liable for copyright infringement on...

From ACM News

Tools For Maintaining Privacy on the Web

Virtually everything you do online is scrutinized by search engines and advertising networks that evaluate you as a potential customer based on what you search...

Career Opportunities
From Communications of the ACM

Career Opportunities

What are the job prospects for today's—and tomorrow's—graduates?

Security in the Cloud
From Communications of the ACM

Security in the Cloud

Cloud computing offers many advantages, but also involves security risks. Fortunately, researchers are devising some ingenious solutions.

Turning Data Into Knowledge
From Communications of the ACM

Turning Data Into Knowledge

Today's data deluge is leading to new approaches to visualize, analyze, and catalog enormous datasets.

From ACM News

What Is Wikileaks?

Months after releasing some 90,000 secret records of U.S. military incident and intelligence reports about the war in Afghanistan, Wikileaks has posted online...

From ACM News

Air Force Manual Describes Shadowy Cyberwar World

A new Air Force manual for cyberwarfare describes a shadowy, fast-changing world where anonymous enemies can carry out devastating attacks in seconds and where...

A Web Pioneer Profiles ­sers By Name
From ACM News

A Web Pioneer Profiles ­sers By Name

In the weeks before the New Hampshire primary last month, Linda Twombly of Nashua says she was peppered with online ads for Republican Senate hopeful Jim Bender...

India Plans to Cut Internet Services in Case of Cyber Attacks
From ACM News

India Plans to Cut Internet Services in Case of Cyber Attacks

Indian law enforcement and national security officials are drawing up plans that will give them technology capabilities to cut off all Internet services during...

From ACM News

FCC Wants Broadcasters' Unused Spectrum to Help Meet Growing Wireless Demand

Federal Communications Commission Chairman Julius Genachowski said he plans to encourage broadcasters to give up unused spectrum for auction to wireless carriers...

From ACM TechNews

Officials Push to Bolster Law on Wiretapping

U.S. law enforcement and counterterrorism officials are urging the revamping of a federal statute requiring phone and broadband carriers to guarantee that their...

Microsoft's Top Visionary To Leave as Ranks Shift
From ACM News

Microsoft's Top Visionary To Leave as Ranks Shift

Ray Ozzie, the executive who became Microsoft Corp.'s top technical visionary after the retirement of cofounder Bill Gates, plans to leave the software company...

The Business Of Burying Internet Search Results
From ACM News

The Business Of Burying Internet Search Results

Unseen battles are waged every day on the Internet to protect and destroy brands and reputations. The Internet can be a hostile place, with powerful companies paying...

Facebook in Privacy Breach
From ACM News

Facebook in Privacy Breach

Top-ranked applications transmit personal IDs, a Journal investigation finds.

From ACM News

­.s. Companies Are at Risk of Spying By Their Own Workers

Huang Kexue, federal authorities say, is a new kind of spy. For five years, Mr. Huang was a scientist at a Dow Chemical lab in Indiana, studying ways to improve...

'scrapers' Dig Deep For Data on Web
From ACM News

'scrapers' Dig Deep For Data on Web

At 1 a.m. on May 7, the website PatientsLikeMe.com noticed suspicious activity on its "Mood" discussion board. There, people exchange highly personal stories...

Call to Define Rules of Cyber War
From ACM News

Call to Define Rules of Cyber War

Nations need to define the rules of engagement for acts of cyber terror.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account