acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Should Law Enforcement Have the Ability to Access Encrypted Communications?
From ACM Opinion

Should Law Enforcement Have the Ability to Access Encrypted Communications?

People's distress over the privacy of their communications has never been more acute. Whether the fear is over U.S. surveillance or breaches by hackers of unknown...

Is 'Good Enough' Computing Good Enough?
From Communications of the ACM

Is 'Good Enough' Computing Good Enough?

The energy-accuracy trade-off in approximate computing.

Putting the Data Science Into Journalism
From Communications of the ACM

Putting the Data Science Into Journalism

News organizations increasingly use techniques like data mining, Web scraping, and data visualization to uncover information that would be impossible to identify...

Computers That Know How You Feel Will Soon Be Everywhere
From ACM News

Computers That Know How You Feel Will Soon Be Everywhere

Sometime next summer, you'll be able to watch a horror series that is exactly as scary as you want it to be—no more, no less.

Statcast Arrives, Offering Way to Quantify Nearly Every Move in Game
From ACM News

Statcast Arrives, Offering Way to Quantify Nearly Every Move in Game

Which outfielders take the most efficient routes to a fly ball? Which pitcher's curveball has the highest spin rate? Which batter has the fastest speed to first...

White House and Department of Homeland Security Want a Way Around Encryption
From ACM News

White House and Department of Homeland Security Want a Way Around Encryption

The White House and U.S. Department of Homeland Security officials support arguments by the nation’s law enforcement and intelligence leaders that encryption technology...

Security Professionals Stymied By Outdated Visualization Tools
From ACM Careers

Security Professionals Stymied By Outdated Visualization Tools

Earlier this year, the film Blackhat got high marks for realistic scenes in which hackers and information security specialists work at their computers to hunt down...

How Benford's Law Reveals Suspicious Activity on Twitter
From ACM News

How Benford's Law Reveals Suspicious Activity on Twitter

Back in the 1880s, the American astronomer Simon Newcomb noticed something strange about the book of logarithmic tables in his library—the earlier pages were much...

Nasa's Nexss Coalition to Lead Search For Life on Distant Worlds
From ACM News

Nasa's Nexss Coalition to Lead Search For Life on Distant Worlds

NASA is bringing together experts spanning a variety of scientific fields for an unprecedented initiative dedicated to the search for life on planets outside our...

Researchers Hack Sony Headset to Simulate Autism
From ACM TechNews

Researchers Hack Sony Headset to Simulate Autism

Japanese researchers have used an experimental headset to simulate the vision and hearing of people with autism spectrum disorder. 

Smart City Technology May Be Vulnerable to Hackers
From ACM TechNews

Smart City Technology May Be Vulnerable to Hackers

Cesar Cerrudo, chief technology officer at IOActive Labs, says "smart city" technologies are vulnerable to cyberattacks. 

How Click Farms Have Inflated Social Media Currency
From ACM Careers

How Click Farms Have Inflated Social Media Currency

Every Morning, Kim Casipong strolls past barbed wire, six dogs, and a watchman in order to get to her job in a pink apartment building decorated with ornate stonework...

3D Simulations of Colliding Black Holes Hailed As Most Realistic Yet
From ACM News

3D Simulations of Colliding Black Holes Hailed As Most Realistic Yet

When astronomers try to simulate colliding giant black holes, they usually rely on simplified approximations to model the swirling disks of matter that surround...

On Time-Lapse Rocket Ride to Trade Center's Top, Glimpse of Doomed Tower
From ACM News

On Time-Lapse Rocket Ride to Trade Center's Top, Glimpse of Doomed Tower

An imposingly realistic vision of the old 1 World Trade Center, the ultimately doomed north tower, will begin appearing next month in a most unlikely place: the...

How Factory Workers Learned to Love Their Robot Colleagues
From ACM News

How Factory Workers Learned to Love Their Robot Colleagues

Workers at a Navistar truck plant in Ohio weren't eager to make friends when a new colleague showed up on the factory floor nearly 40 years ago.

Google's Project Loon Close to Launching Thousands of Balloons
From ACM TechNews

Google's Project Loon Close to Launching Thousands of Balloons

Google is close to launching thousands of balloons in an effort to provide Internet access from the sky. 

N-Zero Envisions 'asleep-Yet-Aware' Electronics That Could Revolutionize Remote Wireless Sensors
From ACM TechNews

N-Zero Envisions 'asleep-Yet-Aware' Electronics That Could Revolutionize Remote Wireless Sensors

The U.S. Defense Advanced Research Projects Agency's Near Zero Power and Sensor Operations program is working to develop wireless, event-driven sensing capabilities...

Technology That Prods You to Take Action, Not Just Collect Data
From ACM News

Technology That Prods You to Take Action, Not Just Collect Data

The bookshelves in Natasha Dow Schüll’s office at the Massachusetts Institute of Technology are punctuated here and there with kitchen timers: a windup orange plastic...

Hackers ­sing Startling New Ways to Steal Your Passwords
From ACM TechNews

Hackers ­sing Startling New Ways to Steal Your Passwords

Rsearchers have found hackers can speculate PINs by interpreting video of people tapping their smartphone screens even when the display is not visible. 

Google's Search ­pdated Will Remake the Web in Its Own Image
From ACM News

Google's Search ­pdated Will Remake the Web in Its Own Image

Some people are calling it Mobilegeddon.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account