acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM TechNews

1986 Privacy Law Is Outrun By the Web

Rising use of the Internet has overtaken the main statute governing communication privacy, according to many Web companies and consumer proponents, who say they...

From ACM TechNews

Fcc Challenges App Makers to Protect Open Internet

The U.S. Federal Communications Commission has launched the Open Internet Challenge, which calls on software developers to create applications that will help Internet...

Why Are Health Data Leaking Online? Bad Software, Study Says
From ACM TechNews

Why Are Health Data Leaking Online? Bad Software, Study Says

A recent Dartmouth College study found that sensitive health care data is being leaked online through peer-to-peer (P2P) file-sharing services. In addition, the...

From ACM News

Hackers Find New Way to Cheat on Wall Street

High-frequency trading networks, which complete stock market transactions in microseconds, are vulnerable to manipulation by hackers who can inject tiny amounts...

From ACM News

The New Speed of Money, Reshaping Markets

A substantial part of all stock trading in the United States takes place in a warehouse in a nondescript business park just off the New Jersey Turnpike.

The Power of 'convergence'
From ACM News

The Power of 'convergence'

In white paper, MIT scientists discuss potential for revolutionary advances in biomedicine and other fields.

Network Defense Gone Wrong
From ACM TechNews

Network Defense Gone Wrong

Many companies use content-delivery networks as a defense against distributed denial-of-service (DDoS) attacks, but Michael Rabinovich of Case Western Reserve University...

Utah's $1.5 Billion Cyber-Security Center Under Way
From ACM News

Utah's $1.5 Billion Cyber-Security Center Under Way

Today's groundbreaking for a $1.5 billion National Security Agency data center is being billed as important in the short term for construction jobs and important...

From ACM TechNews

'sms of Death' Could Crash Many Mobile Phones

Low-end mobile phones are vulnerable to hackers using short message service (SMS) communications, according to research presented at a recent conference in Germany...

Nist Publications Recommend Organization-Wide It Security Risk Management
From ACM News

Nist Publications Recommend Organization-Wide It Security Risk Management

Two new draft publications from NIST provide the groundwork for a three-tiered risk-management approach that encompasses computer security risk planning from the...

Beyond Surveillance: Darpa Wants a Thinking Camera
From ACM News

Beyond Surveillance: Darpa Wants a Thinking Camera

It’s tough being an imagery analyst for the U.S. military: you’re drowning in pictures and drone video, with more pouring in endlessly from the tons of sensors...

IPv6 Guide for Secure Deployment of Next-Generation Internet Protocol
From ACM News

IPv6 Guide for Secure Deployment of Next-Generation Internet Protocol

Researchers at the National Institute of Standards and Technology have issued a guide for managers, network engineers, transition teams and others to help them...

The American Wikileaks Hacker
From ACM News

The American Wikileaks Hacker

Jacob Appelbaum fights repressive regimes around the world—including his own.

From ACM News

Graphics Ability Is the New Goal For Chip Makers

In the good old days, it was all about speed.

From ACM News

Computers That See You and Keep Watch Over You

Hundreds of correctional officers from prisons across America descended last spring on a shuttered penitentiary in West Virginia for annual training exercises...

From ACM TechNews

Rules of Engagement For Cyberwars See Slow Progress

Rules of cyberwar engagement are lagging behind world powers' development of their cyberwarfare capabilities.  Meanwhile, cyberwarfare funding continues to rise...

Intel's 2nd-Gen Chip Arrives, with Hollywood in Tow
From ACM News

Intel's 2nd-Gen Chip Arrives, with Hollywood in Tow

Intel is officially announcing its next-generation processor tomorrow—and Hollywood is playing a big role.

Android Programming's ­ps and Downs
From ACM Opinion

Android Programming's ­ps and Downs

As smartphones using Google's Android operating system become mainstream, James Steele and Nelson To are in a pretty good position.

Cheaters Find an Adversary in Technology
From ACM News

Cheaters Find an Adversary in Technology

Mississippi had a problem born of the age of soaring student testing and digital technology. High school students taking the state’s end-of-year exams were using...

Ibm Expects Holographic Phone Calls, Air-Powered Batteries By 2015
From ACM News

Ibm Expects Holographic Phone Calls, Air-Powered Batteries By 2015

By 2015, your mobile phone will project a 3D image of anyone who calls and your laptop will be powered by kinetic energy. At least that’s what International Business...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account