acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM TechNews

Tech Volunteers Aiding Haiti Relief Efforts

Software developers and tech-savvy individuals from around the world are organizing to help with the Haiti relief effort. Projects already underway include the...

From ACM News

Industry Says Gov't Must Regulate 'cloud' to Protect User Privacy

The federal government needs to address electronic security to calm Americans' uncertainty about cloud computing and secure its privacy, according to industry representatives...

From ACM News

If Your Password Is 123456, Just Make It Hackme

Back at the dawn of the Web, the most popular account password was “12345.” Today, it’s one digit longer but hardly safer: “123456.” Despite all the reports...

Security Experts Poke Theoretical Holes in 3g Encryption
From ACM TechNews

Security Experts Poke Theoretical Holes in 3g Encryption

Weizmann Institute of Science researchers recently created a theoretical attack capable of breaking the encryption protocol that is planned for use on 3G telephony...

Web Access Is New Clinton Doctrine
From ACM News

Web Access Is New Clinton Doctrine

The U.S. plans to make unrestricted access to the Internet a top foreign-policy priority, Secretary of State Hillary Clinton plans to announce Thursday (January...

From ACM News

Fearing Hackers Who Leave No Trace

The crown jewels of Google, Cisco Systems or any other technology company are the millions of lines of programming instructions, known as source code, that make...

Middleware Supports Easy-Build Wireless Networks
From ICT Results

Middleware Supports Easy-Build Wireless Networks

Networks that monitor life-threatening situations or improve environmental efficiencies will be easier and cheaper to develop and operate, following the creation...

From ACM News

Today's Threat: Computer Network Terrorism

"A fleet of fighter planes is not necessary to attack a power station; a keyboard is sufficient. And if you don't have the skills, there are enough mercenary hackers...

From ACM TechNews

W3c Posts Draft Standard For Local Database Storage

The World Wide Web Consortium (W3C) has drafted the Indexed Database API, a proposed standard for a set of application programming interfaces (APIs) that could...

Fcc Looks at Ways to Assert Authority Over Web Access
From ACM TechNews

Fcc Looks at Ways to Assert Authority Over Web Access

The U.S. Federal Communications Commission (FCC) is considering aggressive moves to claim its authority over consumer access to the Internet as part of the Obama...

Europe and China Create Intercontinental Research Grid
From ICT Results

Europe and China Create Intercontinental Research Grid

An EU-funded programme that lets European and Chinese computing grids work together has already produced results in aircraft design, drug development and weather...

Group Thinker: Researcher Gets $2.9 Million to Further Develop Swarm Intelligence
From ACM News

Group Thinker: Researcher Gets $2.9 Million to Further Develop Swarm Intelligence

Swarm intelligence is a branch of artificial intelligence that attempts to get computers and robots to mimic the highly efficient behavior of colony insects such...

Web Guru Berners-Lee Highlights Open Data
From ACM TechNews

Web Guru Berners-Lee Highlights Open Data

Linked data will transform the Internet because Web browsing would give way to using programs that automatically seek out and find useful information, according...

From ACM News

How Google Ranks Tweets

To deliver useful search returns from the so-called real-time Web--such as seconds-old Twitter "tweets" reporting traffic jams--Google has adapted its page-ranking...

Social Science Meets Computer Science at Yahoo
From ACM TechNews

Social Science Meets Computer Science at Yahoo

Yahoo Labs is hiring social scientists, including cognitive psychologists, economists, and ethnographers, to help it understand what motivates users to click and...

From ACM TechNews

Hidden Sensor Network Detects Explosives

Researchers at the Fraunhofer Institute for Communications, Information Processing, and Ergonomics have developed Hazardous Material Localization and Person Tracking...

Social Media Campaigns Hint at Widening 'digital Divide'
From ACM News

Social Media Campaigns Hint at Widening 'digital Divide'

Washington and Lee University Associate Professor Claudette Artwick sees evidence of a 'digital divide' in recent social media campaigns to locate missing persons...

Science and Technology Heads to Make Networks Green
From ACM News

Science and Technology Heads to Make Networks Green

Alcatel-Lucent's research division, Bell Labs, spearheaded the launch of a global consortium of academics, operators and vendors on Monday (January 11), tasked...

Now, Electronics That Obey Hand Gestures
From ACM News

Now, Electronics That Obey Hand Gestures

The technology industry is going retro — moving away from remote controls, mice and joysticks to something that arrives without batteries, wires or a user manual...

Wireless Operators Struggle to Deliver Broadband
From ACM News

Wireless Operators Struggle to Deliver Broadband

<!--[if gte mso 9]><xml> <w:WordDocument> <w:View>Normal</w:View> <w:Zoom>0</w:Zoom> <w:PunctuationKerning /> <w:ValidateAgainstSchemas /> <w:SaveIfXMLInvalid>false<...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account