acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


How Scholars Hack the World of Academic Publishing Now
From ACM News

How Scholars Hack the World of Academic Publishing Now

If you want to understand the modern academy, it wouldn't hurt to start at "impact factor."

The New York Times Web Site Was Taken Down By Dns Hijacking. Here's What That Means.
From ACM News

The New York Times Web Site Was Taken Down By Dns Hijacking. Here's What That Means.

Just weeks after The Washington Post had our own run-in with the Syrian Electronic Army (SEA), the New York Times is down, and the SEA is claiming responsibility...

Princeton Researchers ­se Mobile Phones to Measure Happiness
From ACM TechNews

Princeton Researchers ­se Mobile Phones to Measure Happiness

Researchers used mobile phones to capture information in a study exploring the connection between environment and happiness. 

A Glimpse Into the Future of Robotic Technology
From ACM TechNews

A Glimpse Into the Future of Robotic Technology

The European Union-funded EYESHOTS project has developed a model robot that can acquire awareness of its surroundings and use its memory to reach for objects. 

Hacked Feature Phone Can Block Other People's Calls
From ACM TechNews

Hacked Feature Phone Can Block Other People's Calls

A few changes to a standard phone can block calls and text messages intended for nearby users of the same GSM cellular network.

Ios and Android Weaknesses Allow Stealthy Pilfering of Website Credentials
From ACM TechNews

Ios and Android Weaknesses Allow Stealthy Pilfering of Website Credentials

A weakness in both the iOS and Android mobile operating systems makes it possible for hackers to steal sensitive user data and login credentials. 

How Surveillance Changes Behavior: A Restaurant Workers Case Study
From ACM News

How Surveillance Changes Behavior: A Restaurant Workers Case Study

Surveillance is certainly much in the news lately. Most notably, of course, there is the continuing outcry over the National Security Agency’s call-tracking program...

NASA's Plan to Put a Landsail Rover on Venus
From ACM News

NASA's Plan to Put a Landsail Rover on Venus

Venus is like a reclusive celebrity that gets the public's attention every couple of years, though in the planet's case it's more like every century.

Why Video Games May Be Good For You
From ACM News

Why Video Games May Be Good For You

Games have long been accused of making players violent, but evidence has been building over the years that they can have positive effects.

How a Look at Your Gmail Reveals the Power of Metadata
From ACM News

How a Look at Your Gmail Reveals the Power of Metadata

Sometimes you have to give up a little privacy in order to find out how much—or how little—privacy you really have.

Google+ Posts Getting Language Translation Services
From ACM TechNews

Google+ Posts Getting Language Translation Services

The Google+ translation feature will enable desktop users to rapidly receive basic translations when other users make posts in languages other than their own. 

New Technology Protects Against Password Theft and Phishing Attacks
From ACM TechNews

New Technology Protects Against Password Theft and Phishing Attacks

Scientists say they can protect Internet users from phishing attacks with a new system called Uni-IDM. 

Twitter 'joke Bots' Shame Human Sense of Humor
From ACM TechNews

Twitter 'joke Bots' Shame Human Sense of Humor

Two Twitter bots generate phrases that are funny by virtue of not being particularly funny, to poke fun at human tweeters' own attempts at humor. 

Wormhole Is Best Bet For Time Machine, Astrophysicist Says
From ACM News

Wormhole Is Best Bet For Time Machine, Astrophysicist Says

The concept of a time machine typically conjures up images of an implausible plot device used in a few too many science-fiction storylines.

How Snowden Did It
From ACM News

How Snowden Did It

When Edward Snowden stole the crown jewels of the National Security Agency, he didn't need to use any sophisticated devices or software or go around any computer...

Productivity Tools For Cybercrime
From ACM News

Productivity Tools For Cybercrime

Stealing 10 million dollars a few hundred dollars at a time used to be too labor-intensive to be a great business.

As Tennis Stats Proliferate, Software Tries to Make Sense of It All
From ACM TechNews

As Tennis Stats Proliferate, Software Tries to Make Sense of It All

SlamTracker software sifts through 20 years of data to predict how tennis players could perform under various circumstances. 

The Walls Have Ears: Princeton Researchers Develop Walls That Can Listen, and Talk
From ACM TechNews

The Walls Have Ears: Princeton Researchers Develop Walls That Can Listen, and Talk

Princeton University researchers have successfully incorporated ultrathin radios on plastic sheets, which can be applied to walls and other structures. 

Researchers Granted Patent For System That Fuses Human and Computer Intelligence
From ACM TechNews

Researchers Granted Patent For System That Fuses Human and Computer Intelligence

The creators of a system that integrates human and computer intelligence to support decision-making in crisis situations have been awarded a U.S. patent. 

Kean Computer Science Students in ­nion Travel 'beyond the Grave'
From ACM TechNews

Kean Computer Science Students in ­nion Travel 'beyond the Grave'

A new smartphone app provides access to information on grave markers in the First Presbyterian Church cemetery in Elizabeth, N.J. 
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account