acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM TechNews

Experts Urge Federal Efforts on Cybersecurity

The U.S. federal government needs to step up its cybersecurity efforts, experts from industry and academia recently told the House Science and Technology Committee's...

'mobilization' For Math and Science Education
From ACM TechNews

'mobilization' For Math and Science Education

Math and science education in the United States needs to improve dramatically if the country wants to stay competitive in the 21st century, concludes a report from...

Robotic Ferret Will Detect Hidden Drugs and Weapons
From ACM TechNews

Robotic Ferret Will Detect Hidden Drugs and Weapons

Engineering & Physical Sciences Research CouncilScientists at the University of Sheffield have developed the first cargo-scanning device that can operate inside...

From ACM TechNews

Software Liability Law Could Divide Open Source

The European Commission has proposed that software companies should be held liable for the security and efficiency of their products. Ovum's David Mitchell says...

Virtual Power Plants Could Tame Coming Grid Chaos
From ACM News

Virtual Power Plants Could Tame Coming Grid Chaos

Fears over energy security and climate change have led to record investment in renewable energy. But a major problem threatens to stall progress towards a more...

Robotics Inspire Students in Computer Science
From ACM TechNews

Robotics Inspire Students in Computer Science

Lamar University's Increasing Student Participation In Research Development (INSPIRED) team hosts computing workshops for middle and high school students in an...

From ACM TechNews

Computing Research That Changed the World

The Computing Community Consortium held a day-long symposium at the Library of Congress in late March titled "Computing Research That Changed the World: Reflections...

Is the Hacking Threat to National Security Overblown?
From ACM TechNews

Is the Hacking Threat to National Security Overblown?

U.S. President Obama recently made cybersecurity a national priority, but at the ACM's Computers, Freedom, and Privacy Conference, Threat Level editor Kevin Poulsen...

Kim Jong-Il's Old School Nurtures Top Scientists
From ACM News

Kim Jong-Il's Old School Nurtures Top Scientists

As North Korea's nuclear tests and missile launches affirm its technological and military prowess, alarming its neighbors and drawing international criticism, a...

China Internet Filter Challenged in Rights ­proar
From ACM News

China Internet Filter Challenged in Rights ­proar

A Chinese lawyer has demanded a public hearing to reconsider a government demand that all new personal computers carry Internet filtering software, adding to uproar...

Data Center Overload
From ACM News

Data Center Overload

Much of the daily material of our lives is now dematerialized and outsourced to a far-flung, unseen network. The stack of letters becomes the e-mail database on...

Opening Doors on the Way to a Personal Robot
From ACM TechNews

Opening Doors on the Way to a Personal Robot

The ability to open doors is a significant step forward for robotics and an important milestone toward a personal robot industry. Such a milestone has been reached...

Supercomputing From Clusters to Clouds
From ACM TechNews

Supercomputing From Clusters to Clouds

The Intrepid supercomputer is the largest installation of IBM's Blue Gene architecture to date. Part of the Argonne Leadership Computing Facility, the $77 million...

University Deploys 'world's Largest' 802.11 Wireless Network
From ACM TechNews

University Deploys 'world's Largest' 802.11 Wireless Network

The University of Queensland (UQ) says it is implementing the biggest 802.11n wireless network in the world to serve as a platform for research, access, and collaboration...

Computer Program Will Detect, Measure Brain Tumors
From ACM TechNews

Computer Program Will Detect, Measure Brain Tumors

University of Central Florida professor Mubarak Shah is using the techniques used to detect suspicious activity in airports, stadiums, and other public places to...

'smart Grid' Power Lines Move Into the Digital Age
From ACM News

'smart Grid' Power Lines Move Into the Digital Age

Thomas Alva Edison, meet the Internet. More than a century after Edison invented a reliable light bulb, the nation's electricity distribution system, an aging spider...

The Bar Code Is Taking a Leap Forward
From ACM News

The Bar Code Is Taking a Leap Forward

Look closely at recent supermarket coupons, and you may see some new markings on them near the traditional bar code: sets of neat black bars stacked in two rows...

From ACM News

China Defends Web-Filtering Software Requirement

China on Tuesday (June 9) defended a new requirement that personal computers sold in the country carry a software that filters online content, saying the program...

Mathematical Model Effectively Screens Airline Passengers
From ACM News

Mathematical Model Effectively Screens Airline Passengers

Passenger screenings at the nation's airports can be conducted more efficiently without compromising aviation security, according to research at Virginia Commonwealth...

Predictive Powers: A Robot That Reads Your Intention?
From ICT Results

Predictive Powers: A Robot That Reads Your Intention?

European researchers in robotics, psychology and cognitive sciences have developed a robot that can predict the intentions of its human partner. This ability to...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account