acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM TechNews

Software Liability Law Could Divide Open Source

The European Commission has proposed that software companies should be held liable for the security and efficiency of their products. Ovum's David Mitchell says...

Virtual Power Plants Could Tame Coming Grid Chaos
From ACM News

Virtual Power Plants Could Tame Coming Grid Chaos

Fears over energy security and climate change have led to record investment in renewable energy. But a major problem threatens to stall progress towards a more...

From ACM TechNews

Computing Research That Changed the World

The Computing Community Consortium held a day-long symposium at the Library of Congress in late March titled "Computing Research That Changed the World: Reflections...

Is the Hacking Threat to National Security Overblown?
From ACM TechNews

Is the Hacking Threat to National Security Overblown?

U.S. President Obama recently made cybersecurity a national priority, but at the ACM's Computers, Freedom, and Privacy Conference, Threat Level editor Kevin Poulsen...

From ACM News

China Dominates Nsa-Backed Coding Contest

Programmers from China and Russia have dominated an international competition on everything from writing algorithms to designing components. Whether the outcome...

From ACM News

China Defends Web-Filtering Software Requirement

China on Tuesday (June 9) defended a new requirement that personal computers sold in the country carry a software that filters online content, saying the program...

Mathematical Model Effectively Screens Airline Passengers
From ACM News

Mathematical Model Effectively Screens Airline Passengers

Passenger screenings at the nation's airports can be conducted more efficiently without compromising aviation security, according to research at Virginia Commonwealth...

From ACM TechNews

Obama Administration Begins Work on Cybersecurity R&d

A major aspect of U.S. President Barack Obama's plan to improve the country's cyberdefenses involves maximizing government investment in cybersecurity research...

From ACM TechNews

Study: Web Trackers Systematically Compromise Users' Privacy

A University of California, Berkeley study found that Web users may be tracked by dozens of sources on a visit to a single site. Within a single month, the researchers...

China Demands New Pcs Have Web Site-Blocking Software
From ACM News

China Demands New Pcs Have Web Site-Blocking Software

China will require that Web filtering software be included with all computers sold in the country, another step up in its efforts to control pornography and other...

Is Internet Voting Safe? Vote Here
From ACM TechNews

Is Internet Voting Safe? Vote Here

Arizona election officials demonstrated their Internet voting system at ACM's recent Computers, Freedom, and Privacy Conference in Washington, D.C. For the 2008...

When Employers Become Watchers
From ACM News

When Employers Become Watchers

Imagine if today at work you were watched for every single minute. Not just when you arrived and left, or when you went for your lunch. But every task, every conversation...

From ACM TechNews

NIST Delivers ­pdated Draft Standards for Electronic Voting Machines

The National Institute of Standards and Technology (NIST) recently provided the Election Assistance Commission (EAC) with a draft revision to the 2005 U.S. federal...

Privacy Study Shows Google's Eyes Are Everywhere
From ACM News

Privacy Study Shows Google's Eyes Are Everywhere

A U.C. Berkeley report shows that most Internet users don't understand Web site privacy policies, and that major online businesses like Google Inc. freely gather...

How a Team of Academic Experts Contributed to Obama's Cyberspace Review
From ACM TechNews

How a Team of Academic Experts Contributed to Obama's Cyberspace Review

The National Security Council's Melissa Hathaway sought the advice of a variety of computer security experts when she conducted the recently completed 60-day review...

From ACM TechNews

Obama Outlines Coordinated Cyber-Security Plan

U.S. President Barack Obama announced that the country's disjointed efforts to "deter, prevent, detect, and defend" against cyberattacks will now be run by the...

Contractors Vie For Plum Work, Hacking For U.s.
From ACM News

Contractors Vie For Plum Work, Hacking For U.s.

The U.S. government’s urgent push into cyberwarfare has set off a rush among the biggest military companies for billions of dollars in new defense contracts. The...

Pentagon Plans New Arm to Wage Computer Wars
From ACM TechNews

Pentagon Plans New Arm to Wage Computer Wars

The U.S. Pentagon is planning to establish a new cyberwarfare command as a complement to a soon-to-be-announced civilian computer network safety overhaul, according...

Craigslist Founder to Keynote Computer Policy Conference
From ACM TechNews

Craigslist Founder to Keynote Computer Policy Conference

Craigslist founder Craig Newmark will give the keynote address at ACM's 2009 Conference on Computers, Freedom and Privacy (CFP), which takes place from June 1-4...

From ACM TechNews

Viral Epidemics Poised to Go Mobile

A research team led by Northeastern University Center for Complex Network Research director Albert-Laszlo Barabasi set out to investigate why smartphone and mobile...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account