acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


The Grill: Jeannette M. Wing on the Hot Seat
From ACM TechNews

The Grill: Jeannette M. Wing on the Hot Seat

Carnegie Mellon University professor Jeannette M. Wing is an expert on computational thinking, the discipline of applying computer science's problem-solving methods...

Digital Revolutionaries Discuss Past, Future of Technology
From ACM TechNews

Digital Revolutionaries Discuss Past, Future of Technology

Microsoft technical fellow Butler Lampson, Google chief Internet evangelist Vinton Cerf, and Qualcomm chairman Irwin Jacobs discussed the past, present, and potential...

From ACM TechNews

Researchers Mine Millions of Metaphors Through Computer-Based Techniques

San Jose Mercury News (CA)A digital humanities project that started at Stanford University is teaching computers how to analyze text and extract metaphors to build...

From ACM TechNews

Oak Ridge Explores Cybots

Government Computer NewsThe Ubiquitous Network Transient Autonomous Mission Entities (UNTAME) program at Oak Ridge National Laboratory is working to develop technology...

From ACM TechNews

This Internet Fix Is No Pipe Dream

InfoWorldThe Internet's security problems could be corrected by exploiting existing standards and protocols for Web services, security, identity, and authentication...

From ACM TechNews

Cards on the Table: Low-Cost Tool Spots Software Security Flaws During Development Process

NCSU NewsNorth Carolina State University (NCSU) computer security experts have developed Protection Poker, a new risk management tool that helps software developers...

From ACM TechNews

Report From Dartmouth's Institute For Information Infrastructure Protection (i3p) Makes Cyber Security Research Recommendations

Dartmouth College's Institute for Information Infrastructure Protection (I3P) has given the U.S. Senate Committee on Homeland Security and Governmental Affairs...

From Communications of the ACM

A Difficult, Unforgettable Idea

On the 40th anniversary of Douglas C. Engelbart's "The Mother of All Demos," computer scientists discuss the event's influence — and imagine what could have been...

The Evolution of Virtualization
From Communications of the ACM

The Evolution of Virtualization

Virtualization is moving out of the data center and making inroads with mobile computing, security, and software delivery.

Crowd Control
From Communications of the ACM

Crowd Control

Researchers are turning to computers to help us take advantage of our own cognitive abilities and of the wisdom of crowds.

From ACM TechNews

Improved Sensor Technology Could Someday Keep Tabs on Terrorists By Remote Control

Rochester Institute of Technology (RIT) scientists are developing new optical sensors for use in unmanned air vehicles and surveillance drones that could track...

From ACM TechNews

Does Better Security Depend on a Better Internet?

The New York Times' recent article, "Do We Need a New Internet?," by John Markoff, has sparked debate in the research community over whether creating a secure Internet...

From ACM News

Chinese It Firm Accused of Links to Cyberwarfare

Beijing-based Venus Info Tech, a provider of IT network security to the Chinese military, has been accused of providing hacker services that help the Chinese government...

From ACM TechNews

Proposed Law Might Make Wi-Fi ­Users Help Cops

Congressional Republicans have introduced the Internet Security Act, legislation in the U.S. House and Senate that would require Internet service providers (ISPs)...

Does Drm Have a Future?
From ACM News

Does Drm Have a Future?

Digital rights management (DRM)  has emerged as a widespread tool to combat piracy. So far, however, DRM systems have proved highly inconvenient to consumers who...

From ACM TechNews

Stealthier Mac Attacks

A security expert at the recent Black Hat DC computer security conference demonstrated a technique for attacking the Mac operating system OS X without leaving any...

From ACM TechNews

A New Internet?

There is a growing belief among engineers and security experts that the only way to fix Internet security is to recreate the Internet from scratch. What a new...

From ACM TechNews

The Cybercrime Wave

The online crime business has never been better and the rising threat of cybercrime stems from criminals' realization that the Internet offers a more profitable...

From ACM TechNews

Fingerprints and Faces Can Be Faked, But Not Brain Patterns

The European Union-funded HUMABIO project is combining new types of biometric recognition systems with the latest sensor technologies to develop better security...

From ACM TechNews

Wi-Fi Networks Offer Rich Environment For Spread of Worms

Malicious software code could infect an entire city in a period of several weeks by traveling over Wi-Fi networks that overlap each other, concludes a study by...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account