acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


How Fbi Technology Woes Let Fort Hood Shooter Slip By
From ACM News

How Fbi Technology Woes Let Fort Hood Shooter Slip By

On November 5, 2009, an Army psychiatrist stationed at Fort Hood, Texas shot and killed 12 fellow soldiers and a civilian Defense Department employee while wounding...

Public Can Explore Time-Lapse Videos of Earth With New Tool From Carnegie Mellon and Google
From ACM TechNews

Public Can Explore Time-Lapse Videos of Earth With New Tool From Carnegie Mellon and Google

Researchers at Carnegie Mellon University and the U.S. Geological Survey have developed a tool for Google's Earth Engine that enables users to access 13 years of...

U.s. Sports Fans Using Proxy Servers to Watch Olympics on Bbc
From ACM News

U.s. Sports Fans Using Proxy Servers to Watch Olympics on Bbc

The American network NBC has come in for a lot of flak since the weekend when its Olympics coverage began. The Twitter hadtag of #NBCfail began trending soon after...

Computers Can Predict Effects of HIV Policies
From ACM TechNews

Computers Can Predict Effects of HIV Policies

Brown University researchers have developed software that can model the spread of HIV in New York City over several years to make specific predictions about the...

Inside the Quest to Put the World's Libraries Online
From ACM TechNews

Inside the Quest to Put the World's Libraries Online

Making a vast, open, distributed network of books, records, and images available to anyone with an Internet link is the goal of the Digital Public Library of America...

Nsa Boss Wants More Control Over the 'net
From ACM News

Nsa Boss Wants More Control Over the 'net

The U.S. Internet's infrastructure needs to be redesigned to allow the NSA to know instantly when overseas hackers might be attacking public or private infrastructure...

Talk to Me, One Machine Said to the Other
From ACM News

Talk to Me, One Machine Said to the Other

Ocado, an online grocery store in England, prides itself on its delivery of refrigerated foods: When the company says the goods will arrive at a certain temperature...

Declarations of Cyberwar
From ACM TechNews

Declarations of Cyberwar

Debate continues to be focused on how cyberattacks relate to war and foreign policy and what the international community's appropriate response to such incidents...

Lack of Minority Representation in Science and Engineering Endangering ­.s. Economic Health
From ACM TechNews

Lack of Minority Representation in Science and Engineering Endangering ­.s. Economic Health

Many of the "precious few" minority students pursuing science, technology, engineering, or mathematics degrees are either dropping out or changing majors, says...

Deborah Estrin Calls For CS Research on Sustainability
From ACM News

Deborah Estrin Calls For CS Research on Sustainability

The old adage, “You can’t manage what you can’t measure,” applies to how both networking and sensor technology can help address problems of sustainability, says...

The Frightening Things You Hear at a Black Hat Conference
From ACM Opinion

The Frightening Things You Hear at a Black Hat Conference

Here is a look at some of the highlights and scarier happenings taking place at the annual Black Hat hacker conference in Las Vegas last week.

An App That Could Stop Traffic
From ACM TechNews

An App That Could Stop Traffic

German researchers have developed Greenway, a Windows phone application designed to help people avoid traffic jams and get drivers from one point to another in...

Tagging and Tracking Espionage Botnets
From ACM Opinion

Tagging and Tracking Espionage Botnets

A security researcher who's spent 18 months cataloging and tracking malicious software that was developed and deployed specifically for spying on governments, activists...

Meet 'rakshasa,' The Malware Infection Designed To Be ­ndetectable And Incurable
From ACM News

Meet 'rakshasa,' The Malware Infection Designed To Be ­ndetectable And Incurable

Malicious software, like all software, gets smarter all the time. In recent years it’s learned to destroy physical infrastructure, install itself through Microsoft...

So, Who Really Did Invent the Internet?
From ACM TechNews

So, Who Really Did Invent the Internet?

The Wall Street Journal's Gordon Crovitz recently reopened the debate about who invented the Internet, arguing that giving the U.S. government credit is an "urban...

Angry Birds Meets Bioinformatics
From ACM TechNews

Angry Birds Meets Bioinformatics

UAB researchers have developed ImageJS, a free smartphone application system that enables pathologists to drag a digitized pathology slide into a Web app and analyze...

From ACM News

Rise Is Seen in Cyberattacks Targeting ­.s. Infrastructure

The top American military official responsible for defending the United States against cyberattacks said Thursday that there had been a 17-fold increase in computer...

Microsoft's Lost Decade
From ACM News

Microsoft's Lost Decade

To the saccharine rhythm of a Muzak clip, Steve Ballmer crouched into a tackling stance and dashed across a ballroom stage at the Venetian Las Vegas.

Want To Find Jay-Z's Or Bill Gates' Private Jets? Openbarr Tracks 'untrackable' Flights
From ACM News

Want To Find Jay-Z's Or Bill Gates' Private Jets? Openbarr Tracks 'untrackable' Flights

Good news for paparazzi, stalkers, and corporate spies: "Private" jets are about to become significantly less private.

DARPA-Funded Researcher Can Take Over Android And Nokia Phones By Merely Waving Another Device Near Them
From ACM News

DARPA-Funded Researcher Can Take Over Android And Nokia Phones By Merely Waving Another Device Near Them

Smartphones' growing adoption of so-called "near field communications" promises to let the device in your pocket wirelessly make payments, beam info to other phones...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account