acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


How to Invent a Person Online
From ACM Opinion

How to Invent a Person Online

On April 8, 2013, I received an envelope in the mail from a nonexistent return address in Toledo, Ohio.

Digging Through Big Data to Find Alien Life
From ACM News

Digging Through Big Data to Find Alien Life

Back in the 1970s, scientists at Ohio State University began searching for signs of intelligent alien life using a radio telescope the size of three football fields...

Google's New Moonshot Project: The Human Body
From ACM News

Google's New Moonshot Project: The Human Body

Google Inc. has embarked on what may be its most ambitious and difficult science project ever: a quest inside the human body.

U.s. Government Chatbot Gets You to Tell All
From ACM News

U.s. Government Chatbot Gets You to Tell All

Want access to the U.S. government's secrets? Talk to the robot.

For Half, STEM Degrees Lead to Other Jobs
From ACM News

For Half, STEM Degrees Lead to Other Jobs

A recent U.S. Census Bureau report says only about 26 percent of those who graduate with a four-year degree in a science, technology, engineering, or math (STEM)...

Built For Speed: Designing Exascale Computers
From ACM TechNews

Built For Speed: Designing Exascale Computers

Researchers at Harvard University are focused on developing the hardware and software for exascale computers, while others are planning to apply exascale computing...

Surface Impressions of Rosetta's Comet
From ACM News

Surface Impressions of Rosetta's Comet

Surface structures are becoming visible in new images of comet 67P/Churyumov-Gerasimenko taken by the scientific imaging system OSIRIS onboard the European Space...

How Hackers Hid a Money-Mining Botnet in Amazon's Cloud
From ACM News

How Hackers Hid a Money-Mining Botnet in Amazon's Cloud

Hackers have long used malware to enslave armies of unwitting PCs, but security researchers Rob Ragan and Oscar Salazar had a different thought: Why steal computing...

Scientists Enlist Big Data to Guide Conservation Efforts
From ACM TechNews

Scientists Enlist Big Data to Guide Conservation Efforts

Researchers have developed a model that uses big data to help  biologists understand the evolutionary history of life on Earth. 

More Eyes on the Skies
From ACM News

More Eyes on the Skies

The future, it is often said, belongs to those who plan for it.

Harold Edgerton: The Man Who Froze Time
From ACM News

Harold Edgerton: The Man Who Froze Time

Every time you use the flash on your smartphone or camera, you should give silent praise to Harold Eugene Edgerton.

Hello, My Name Is . . .
From Communications of the ACM

Hello, My Name Is . . .

Facial recognition and privacy concerns.

Researchers Probe Security Through Obscurity
From Communications of the ACM

Researchers Probe Security Through Obscurity

Obfuscation protects code by making it so impenetrable that access to it won't help a hacker understand how it works.

Epsrc Calls For Partners to Develop Alan Turing Institute
From ACM TechNews

Epsrc Calls For Partners to Develop Alan Turing Institute

The U.K. Engineering and Physical Sciences Research Council wants to partner with U.K. universities to establish the Alan Turing Institute. 

Indonesian Techies Crowdsource Election Results
From ACM TechNews

Indonesian Techies Crowdsource Election Results

A trio of Indonesians working for international tech companies have used crowdsourcing to calculate a result for Indonesia's contested presidential election. 

How Technology Is Unraveling the Clues of Flight Mh17
From ACM News

How Technology Is Unraveling the Clues of Flight Mh17

Over the weekend, the Malaysia Airlines Flight MH17 tragedy turned into a "Law and Order" episode on the international stage with Secretary of State John Kerrymake...

The Growing Threat of Network-Based Steganography
From ACM TechNews

The Growing Threat of Network-Based Steganography

Researchers have uncovered Duqu, an unusual form of steganography-based malware that embeds itself in Microsoft Windows machines.

Talk on Cracking Internet Anonymity Service Tor Canceled
From ACM News

Talk on Cracking Internet Anonymity Service Tor Canceled

A highly anticipated talk on how to identify users of the Internet privacy service Tor was withdrawn from the upcoming Black Hat security conference, a spokeswoman...

In Defense of Science
From ACM News

In Defense of Science

Steady, sufficient investments in basic research are necessary to ensure the continued success of the U.S. in the future, four expert witnesses testified to Congress...

New Dimension in Scoreboard Watching
From ACM News

New Dimension in Scoreboard Watching

The seemingly endless prairie that blankets this part of the United States would seem to be an unlikely place for one of the largest makers of sports video displays...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account