acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Why Teaching Grandmothers to Code Isn't a Crazy Idea
From ACM TechNews

Why Teaching Grandmothers to Code Isn't a Crazy Idea

The same efforts to teach youngsters coding and entrepreneurship should be extended to older workers and retired people, writes Stanford University fellow Vivek...

New Algorithm Gives Credit Where Credit Is Due
From ACM TechNews

New Algorithm Gives Credit Where Credit Is Due

A new algorithm could help determine how to properly allocate credit for science papers that have multiple authors.

Facebook's Sheryl Sandberg on Tech's Diversity Gap
From ACM TechNews

Facebook's Sheryl Sandberg on Tech's Diversity Gap

In an interview, Facebook chief operating officer Sheryl Sandberg says it is crucial for the technology industry to become more diverse. 

Vast Majority of Hackers Believe They're Above the Law—survey
From ACM News

Vast Majority of Hackers Believe They're Above the Law—survey

When most hackers are infiltrating computer systems, the last thing on their mind is getting caught, according to new data.

The Internet's Vulnerable Backbone
From ACM TechNews

The Internet's Vulnerable Backbone

A criminal redirected the online activities of bitcoin mining groups and stole at least $83,000 worth in bitcoins over four months, according to a new report, which...

The Best 'low-Tech' Spycraft Tricks
From ACM News

The Best 'low-Tech' Spycraft Tricks

In the wake of Edward Snowden's revelations about the US National Security Agency’s activities around the globe, authorities in Russia and Germany declared they...

The Most Wanted Man in the World
From ACM News

The Most Wanted Man in the World

The message arrives on my "clean machine," a MacBook Air loaded only with a sophisticated encryption package.

Do Quantum Computers Threaten Global Encryption Systems?
From ACM News

Do Quantum Computers Threaten Global Encryption Systems?

Make a mobile phone call and encryption is there to stop eavesdroppers listening in.

'ambiguous' Warfare Buys Upgrade Time For Russia's Military
From ACM News

'ambiguous' Warfare Buys Upgrade Time For Russia's Military

Unmarked Russian soldiers who seized Ukraine's Crimea region earlier this year gave every appearance of military professionals well equipped with modern body armor...

As Data Overflows Online, Researchers Grapple With Ethics
From ACM TechNews

As Data Overflows Online, Researchers Grapple With Ethics

Researchers say there needs to be ethical guidelines in place for social science studies that use personal data collected by various social media websites.

As Data Overflows Online, Researchers Grapple With Ethics
From ACM News

As Data Overflows Online, Researchers Grapple With Ethics

Scholars are exhilarated by the prospect of tapping into the vast troves of personal data collected by Facebook, Google, Amazon, and a host of start-ups, which...

Okcupid's Co-Founder on Experiments, Data Science and the Myth of the 'unicorn'
From ACM Opinion

Okcupid's Co-Founder on Experiments, Data Science and the Myth of the 'unicorn'

Christian Rudder, co-founder and president of the IAC/InterActiveCorp.'s OkCupid, caused a stir recently when he responded to Facebook's news feed controversy with...

Simplifying the Bull: How Picasso Helps to Teach Apple's Style
From ACM Careers

Simplifying the Bull: How Picasso Helps to Teach Apple's Style

Apple may well be the only tech company on the planet that would dare compare itself to Picasso.

When Hackers Test For Flaws, They Might Earn Cash—or Threats
From ACM Careers

When Hackers Test For Flaws, They Might Earn Cash—or Threats

To hack or not to hack?

Why One of Cybersecurity's Thought Leaders ­ses a Pager Instead of a Smart Phone
From ACM Opinion

Why One of Cybersecurity's Thought Leaders ­ses a Pager Instead of a Smart Phone

In the computer and network security industry, few people are as well known as Dan Geer.

Here's How the Feds Are Teaming Up With Hackers to Save US All from Robocalls
From ACM Careers

Here's How the Feds Are Teaming Up With Hackers to Save US All from Robocalls

The Federal Trade Commission is at one of the world's biggest hacker conferences this weekend, where hackers are competing to help save us all from robocalls.

Traffic Light Hackers Could Cause Jams Across the US
From ACM News

Traffic Light Hackers Could Cause Jams Across the US

Branden Ghena pulls his car up under a traffic light in a city in Michigan.

Malware Traffic Spikes Preceded Russian and Israeli Conflicts
From ACM News

Malware Traffic Spikes Preceded Russian and Israeli Conflicts

A study of malware operating on corporate and government networks suggests that the communication patterns of these programs could warn of major conflicts.

Meet the Puzzle Mastermind Who Designs Def Con's Hackable Badges
From ACM Careers

Meet the Puzzle Mastermind Who Designs Def Con's Hackable Badges

Def Con is one of the world's biggest hacker conventions, an annual gathering of security experts, cryptographers and at least a few people who could surreptitiously...

How Wwi Codebreakers Taught Your Gas Meter to Snitch on You
From ACM Opinion

How Wwi Codebreakers Taught Your Gas Meter to Snitch on You

In the depths of night on August 5th 1914 the British Cable Ship Alert took the first significant action of World War I, severing the five German submarine cables...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account