acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Twitter Reluctantly Coughs ­p Occupy Protester's Data
From ACM News

Twitter Reluctantly Coughs ­p Occupy Protester's Data

Twitter on Friday reluctantly complied with a judge's order to divulge the tweets and account information connected to an Occupy protester.

Flame C&c Server Analysis Reveals New Malware in the Wild
From ACM News

Flame C&c Server Analysis Reveals New Malware in the Wild

Forensic analysis of a number of Flame malware toolkit command-and-control servers revealed an additional three unidentified pieces of malicious code are under...

Wired Is the New Wireless: Spreading the Web in China
From ACM News

Wired Is the New Wireless: Spreading the Web in China

It's not easy to give over 1.3 billion people access to the internet—especially if that population is spread across a vast area that ranges from hinterland to sprawling...

Icann's New Ceo Announces Bold Restructure
From ACM TechNews

Icann's New Ceo Announces Bold Restructure

New ICANN CEO Fadi Chehade recently announced his plans to restructure the organization, including the selection of two new senior managers.  

Iphone 5? Yawn. What Will the 'phone' of 2022 Look Like?
From ACM Opinion

Iphone 5? Yawn. What Will the 'phone' of 2022 Look Like?

The near-term future of phones is fairly well-established. The iPhone 5 was released Wednesday and its similarity to every Apple phone since 2007 serves as a reminder...

Software, Not Just Bullets, Puts Military At Odds
From ACM News

Software, Not Just Bullets, Puts Military At Odds

Military commanders, government officials and members of Congress have long wrangled over which weapon systems are needed. Now, there's an argument over what computer...

Arab Spring: Tech As Tinder
From ACM News

Arab Spring: Tech As Tinder

The Internet tools of the Arab Spring have become the weapons of a new Arabian nightmare playing out at American diplomatic missions across North Africa and the...

Nsf’s Cise, Oci Leadership Issue Letter to Community
From ACM TechNews

Nsf’s Cise, Oci Leadership Issue Letter to Community

The U.S. National Science Foundation recently announced an organizational realignment, including plans to integrate the Office of Cyberinfrastructure within the...

Malware Inserted on Pc Production Lines, Says Study
From ACM News

Malware Inserted on Pc Production Lines, Says Study

Cybercriminals have opened a new front in their battle to infect computers with malware—PC production lines.

New York Police Dept. Issues First Rules For ­se of Social Media During Investigations
From ACM News

New York Police Dept. Issues First Rules For ­se of Social Media During Investigations

The NYPD has for the first time laid out rules for using social media during investigations—but critics say the guidelines raise questions about privacy issues.

How Apple Really Invented the Iphone
From ACM News

How Apple Really Invented the Iphone

Like many of Apple's inventions, the iPhone began not with a vision, but with a problem.

Facebook's China Problem
From ACM Opinion

Facebook's China Problem

Last May when Mark Zuckerberg wed his Chinese-American girlfriend, Priscilla Chan, a joke began to make the rounds on China's version of Twitter, a microblog—or...

Tech's New Wave, Driven by Data
From ACM News

Tech's New Wave, Driven by Data

Technology tends to cascade into the marketplace in waves. Think of personal computers in the 1980s, the Internet in the 1990s, and smartphones in the last five...

Anonymous: Behind the Masks of the Cyber Insurgents
From ACM News

Anonymous: Behind the Masks of the Cyber Insurgents

Spalding railway station in Lincolnshire is not a big place. It takes me about two seconds to scan the platform and spot who I'm looking for: Jake Davis, aka Topiary...

From ACM News

Insiders Suspected in Saudi Cyber Attack

One or more insiders with high-level access are suspected of assisting the hackers who damaged some 30,000 computers at Saudi Arabia's national oil company last...

Nokia's Visionary Wants to Out-Design Apple
From ACM News

Nokia's Visionary Wants to Out-Design Apple

Marko Ahtisaari spreads out several models of Nokia's new smartphone with the self-assurance of a Tiffany diamond salesman.

Most Watched Online Ad of 2012 Campaign Is…
From ACM News

Most Watched Online Ad of 2012 Campaign Is…

As we head into the election homestretch, it seems a good time to ask: What is the top watched online ad of the 2012 election cycle so far?

What Do the H-Bomb and the Internet Have in Common? Paul Baran
From ACM News

What Do the H-Bomb and the Internet Have in Common? Paul Baran

Paul Baran set out to build a means of communication that could survive a nuclear war. And he ended up inventing the fundamental networking techniques that underpin...

'degrade, Disrupt, Deceive': ­.s. Talks Openly About Hacking Foes
From ACM News

'degrade, Disrupt, Deceive': ­.s. Talks Openly About Hacking Foes

There was a time, not all that long ago, when the U.S. military wouldn't even whisper about its plans to hack into opponents' networks.

Meet the Man Who's Rewiring Google From the Inside Out
From ACM Opinion

Meet the Man Who's Rewiring Google From the Inside Out

It was a tweet that fired the imagination like few others. On May 10, 2011, at 1:35 in the afternoon, Eric Brewer told the world he was redesigning the most important...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account