acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


The Smartphone's Shape-Shifting Future
From ACM News

The Smartphone's Shape-Shifting Future

The smartphone of the future might lose its sleek, solid shell to become a shape-shifter, able to alter its appearance to signal an alert in situations where...

From ACM News

An Operating System to Run It All

Intel's MeeGo will let apps span tablets, phones, and TVs.

From ACM News

Linkedin Mines Twitter Streams

The LinkedIn social network has launched in limited beta a service that lets users glean relevant information from the massive volume of Twitter streams. Called...

From ACM News

Body Organs Can Send Status ­pdates to Your Cellphone

For cardiac patients such as myself, too much excitement can be a shocking experience. If my heart rate gets too high the implanted defibrillator in my chest can...

From ACM News

Ornl Has Key Role in Doe Cybersecurity For Energy Effort

With the transition to a smart grid comes new opportunities for hackers, but researchers at the U.S. Department of Energy's Oak Ridge National Laboratory are working...

From ACM News

Ban Naughty Countries From the Net: Former Intelligence Chief

Countries in Eastern Europe and Africa that harbor cyber criminals should be locked out of the global Internet until their governments do something to reduce...

Sick PCs Should Be Banned From the Net Says Microsoft
From ACM TechNews

Sick PCs Should Be Banned From the Net Says Microsoft

Microsoft researcher Scott Charney recently presented an Internet security proposal that requires users to present a "health certificate" to prove that their PCs...

Android Invasion
From ACM News

Android Invasion

How a tiny piece of software created by a few Google engineers is ushering in the mobile revolution and reshaping the fortunes of the world's biggest tech companies...

From ACM News

Now Your App Knows Where You Are

Geolocation analytics could help companies to improve their apps—and make more money from them.

From ACM News

Georgia Tech Releases Cyber Threats Forecast for 2011

The Georgia Tech Information Security Center (GTISC) has released the GTISC Emerging Cyber Threats Report for 2011, outlining the top three areas of security risk...

From ACM TechNews

Mit Researchers Tout Network Intrusion Recovery System

Massachusetts Institute of Technology researchers are developing RETRO, a system designed to make it easier for organizations to recover from security breaches. ...

Researchers Argue For Smarter Traffic Lights
From ACM TechNews

Researchers Argue For Smarter Traffic Lights

Swiss Federal Institute of Technology Zurich's Dirk Helbing and Dresden University of Technology's Stefan Lammer have proposed using a combination of sensing technology...

From ACM News

Blade Software Eliminates 'drive-By Downloads' from Malicious Websites

Researchers have developed a new tool that eliminates so-called 'drive-by download' threats. BLADE is browser-independent and when tested, it blocked all drive-by...

Power Hackers: The U.s. Smart Grid Is Shaping Up to Be Dangerously Insecure
From ACM News

Power Hackers: The U.s. Smart Grid Is Shaping Up to Be Dangerously Insecure

Achieving greater efficiency and control of the electricity grid requires hooking almost every aspect of it up to the Internet, making it more vulnerable to cyber...

Tapping the Powers of Persuasion
From ACM News

Tapping the Powers of Persuasion

B.J. Fogg's lab at Stanford focuses on the ways technology can influence behavior.

From ACM News

Digital 'fingerprints' to Stop Phone Phishing Scams

Phishing scams are making the leap from email to the world's voice systems, and a team of researchers in the Georgia Tech College of Computing has found a way to...

Stuxnet: Fact vs. Theory
From ACM News

Stuxnet: Fact vs. Theory

The Stuxnet worm has taken the computer security world by storm, inspiring talk of  a government-sponsored cyberwar, and of a software program laden with obscure...

Gtri Creates Cyber Technology and Information Security Laboratory
From ACM News

Gtri Creates Cyber Technology and Information Security Laboratory

The Georgia Tech Research Institute (GTRI) has created a new Cyber Technology and Information Security Laboratory to apply GTRI's broad expertise and systems engineering...

From ACM TechNews

Eu Seeks to Boost Defenses Against Cyber Attacks

The European Commission has made several proposals designed to counter large-scale cyberattacks that could paralyze the computer networks of European Union nations...

Professor Wendy Hall Speaks
From ACM TechNews

Professor Wendy Hall Speaks

Dame Wendy Hall of the University of Southampton says she is interested in "what makes the Web what it is, how it evolves and will evolve, what are the scenarios...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account