acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Committed to Success
From Communications of the ACM

Committed to Success

Charles P. Thacker talks about the importance of simplicity, reusable tools, thinking broadly, and his practice of Tom Sawyering.

Mainstreaming Augmented Reality
From Communications of the ACM

Mainstreaming Augmented Reality

Advancements in computer vision, object recognition, and related technologies are leading to new levels of sophistication in augmented-reality applications and...

Censored!
From Communications of the ACM

Censored!

Countries use Internet censorship to dominate the political dialogue, but also to create favorable conditions for government-controlled businesses.

Sharing Computational Perspectives
From Communications of the ACM

Sharing Computational Perspectives

Computer scientists are now making intellectual contributions to a wide range of other disciplines, including evolutionary theory, physics, and economics.

From ACM News

Wanted: Young Cyberexperts to Defend Internet

The federal government, education officials and giant military contractors are collaborating to recruit a new class of tech professional specifically trained...

FCC Moves to Expand Role in Broadband
From ACM TechNews

FCC Moves to Expand Role in Broadband

The U.S. Federal Communications Commission wants to overturn a 2002 commission ruling that designated broadband transmission as a lightly regulated service and...

From ACM TechNews

In Debate, Audience Finds that the Cyberwar Threat Is Not Exaggerated

A panel of four leading security experts recently held a debate about the threat of cyberwarfare. The discussion emphasized that the threat is indeed very serious...

Study Shows Inequalities in 'White-Spaces' Wireless
From ACM TechNews

Study Shows Inequalities in 'White-Spaces' Wireless

University of California, Berkeley researchers recently published a detailed analysis of the potential for long-distance wireless Internet connectivity using white...

From ACM News

Kaminsky Issues Developer Tool To Kill Injection Bugs

Renowned security researcher Dan Kaminsky today went public with the launch of a new venture as well as its first deliverable--a tool for application developers...

From ACM News

New Tech Moves Beyond the Mouse, Keyboard and Screen

Goodbye computer mouse, keyboard and monitor. Say hello to a new, simpler era of human-computer interaction--this time, with no clunky hardware standing between...

From ACM TechNews

'email Triage' Technology Helps Manage ­rgent Issues on Mobiles

IBM has unveiled research on how people handle email differently when using mobile devices.  

Cyber-War a Growing Threat Warn Experts
From ACM News

Cyber-War a Growing Threat Warn Experts

In 2007, Estonia was the subject of a series of cyber attacks which crippled the Internet across the country. Banks, government departments and the national media...

Behind the Scenes of Windows Phone 7
From ACM News

Behind the Scenes of Windows Phone 7

The first Windows Phone 7 devices won't hit the market until the holidays. But in various conference rooms here on this Thursday in late May, it's already crunch...

Children's Book Apps Get Curiouser and Curiouser
From ACM News

Children's Book Apps Get Curiouser and Curiouser

I prefer the old-fashioned experience of reading in the printed form, though I'm intrigued by the idea that the iPad, and eventually other tablet devices will give...

10 R&d Cybersecurity Initiatives Congress Seeks
From ACM TechNews

10 R&d Cybersecurity Initiatives Congress Seeks

The Protecting Cyberspace as a National Asset Act of 2010, which was recently introduced in the U.S. Senate, lists 10 R&D initiatives the government would support...

From ACM TechNews

Get Smart: Targeting Phone Security Flaws

Data from the National Vulnerability Database shows that last year security experts identified 30 security flaws in the software and operating systems of smartphones...

How the Apple Ii Taught Programmers to Economize
From ACM News

How the Apple Ii Taught Programmers to Economize

Imagine trying to program a virtual machine--a software instance that mimics all the characteristics of a physical computer--on a device with 2 kilobytes of RAM...

China: Our Internet Is Free Enough
From ACM News

China: Our Internet Is Free Enough

China, with the most Internet users of any country in the world, has issued its first government whitepaper declaring an overall Internet strategy--one that advocates...

From ACM News

Technology Milestone Heralds a More Secure Internet

Moves to make the web's address system more secure will take a major step forward next month. In the planning for a decade, the Domain Name System Security Extentions...

From ACM News

Singapore Gets Wired For Speed

This island city-state, thanks to its small size and a big public investment, could soon be the first country blanketed with a fiber optic infrastructure so fast...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account