acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM TechNews

U.s. Plan to Make Hacking Harder Revealed

The Obama administration has declassified part of its plan to improve the security of cyberspace in an attempt to cultivate greater collaboration between government...

From ACM TechNews

Attack Unmasks User Behind the Browser

Vienna University of Technology researchers have developed the "deanonymization" attack as a way to reveal the identity of Internet users based on their interactions...

Scientists Strive to Map the Shape-Shifting Net
From ACM News

Scientists Strive to Map the Shape-Shifting Net

In a dimly lit chamber festooned with wires and hidden in one of California’s largest data centers, Tim Pozar is changing the shape of the Internet. He is using...

Ornl Technology May Better Detect Cyber Security Attacks
From ACM News

Ornl Technology May Better Detect Cyber Security Attacks

A system that can more effectively detect possible cyber security attacks within large organizations—including government agencies—is being developed with the assistance...

From ACM News

First Test Labs for Next-Generation Internet Protocol (IPv6) Are Accredited

The first two laboratories have recently completed accreditation to provide testing services for the USGv6 Program. The program provides the basis for expressing...

Cloud Technology to Combat Cancer
From ICT Results

Cloud Technology to Combat Cancer

Cloud services provided over grid technology are helping to treat cancer patients, thanks to an enormous effort by European researchers working closely with industry...

Security Key to Unlocking Cloud Potential
From ACM News

Security Key to Unlocking Cloud Potential

The issue of security is holding back its full potential of cloud computing. This was the gist of the keynote message presented Tuesday (March 2) by Art Coviello...

From ACM News

Study: Google-China Attack Driven by Amateurs

The computer attack which led Google to threaten leaving China and created a firestorm between Washington and Beijing appears to have been deployed by amateurs,...

Architects and Engineers Bridge the Grid Chasm
From ICT Results

Architects and Engineers Bridge the Grid Chasm

In the technology adoption cycle, a chasm separates powerful new technologies from the small and medium enterprises (SMEs) that could most benefit from them. Now...

Sat-Nav Systems ­nder Growing Threat from 'jammers'
From ACM News

Sat-Nav Systems ­nder Growing Threat from 'jammers'

Technology that depends on satellite-navigation signals is increasingly threatened by attack from widely available equipment, experts say. While "jamming" sat-nav...

The Internet Can Make You Smarter, Experts Say
From ACM TechNews

The Internet Can Make You Smarter, Experts Say

A Pew Internet survey of 900 scientists, business leaders, and technology developers found that most thought that the Internet can improve humanity's overall grasp...

From ACM TechNews

Optimization Server Reaches Two Million Milestone

Two million problems have now been submitted to the U.S. Department of Energy's Networked-Enabled Optimization System (NEOS). A decade ago, there were less than...

Larger Threat Is Seen in Google Case
From ACM News

Larger Threat Is Seen in Google Case

Three Google executives were convicted of violating Italian privacy laws on Wednesday, the first case to hold the company’s executives criminally responsible for...

Optical System Promises to Revolutionize ­ndersea Communications
From ACM News

Optical System Promises to Revolutionize ­ndersea Communications

In a technological advance that its developers are likening to the cell phone and wireless Internet access, Woods Hole Oceanographic Institution (WHOI) scientists...

From ACM News

They bring their cell phones to bed with them. They admit to texting while driving. They're almost certain to have a profile on social networking sites like MySpace...

Experts Warn of Catastrophe From Cyberattacks
From ACM TechNews

Experts Warn of Catastrophe From Cyberattacks

A panel of experts told U.S. senators at a recent hearing of the Senate Committee on Commerce, Science, and Transportation that the United States would be defeated...

The ­nused Cellphone App: 'calling'
From ACM News

The ­nused Cellphone App: 'calling'

Harvard University senior Drew Robb is so attached to his cellphone that he keeps it by his bedside at night and in his front jeans pocket every day. He uses the...

Light-Based Computing, Quick as a Thought
From ACM TechNews

Light-Based Computing, Quick as a Thought

A consortium of European research institutions is working on a new, photonic computing model under the aegis of the PHOCUS project. The system envisioned by the...

From ACM TechNews

Stopping Stealthy Downloads

SRI International and Georgia Tech researchers have developed Block All Drive-By Download Exploits (BLADE), free software that can stop Internet attacks brought...

Tracking Garbage
From Communications of the ACM

Tracking Garbage

Researchers are focusing on the so-called "removal chain" in an attempt to save landfill space, improve recycling rates, and trim the flow of toxic materials into...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account