acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Security in the Cloud
From Communications of the ACM

Security in the Cloud

Cloud computing offers many advantages, but also involves security risks. Fortunately, researchers are devising some ingenious solutions.

Turning Data Into Knowledge
From Communications of the ACM

Turning Data Into Knowledge

Today's data deluge is leading to new approaches to visualize, analyze, and catalog enormous datasets.

Get Ready For the Decade of Gamification
From ACM News

Get Ready For the Decade of Gamification

The popularity of video games and the explosion of social networking are intersecting to redefine how we will experience the Web over the next decade.

From ACM News

What Is Wikileaks?

Months after releasing some 90,000 secret records of U.S. military incident and intelligence reports about the war in Afghanistan, Wikileaks has posted online...

From ACM News

Air Force Manual Describes Shadowy Cyberwar World

A new Air Force manual for cyberwarfare describes a shadowy, fast-changing world where anonymous enemies can carry out devastating attacks in seconds and where...

Building The Next Big Thing: 25 Years of Mit's Media Lab
From ACM News

Building The Next Big Thing: 25 Years of Mit's Media Lab

MIT’s Media Lab recently hosted a series of talks to celebrate its 25th anniversary. Anyone who has paid attention to technology news over that period has undoubtedly...

From ACM News

Psychologist Explores Motivations Behind 2007 Cyberattack on Estonia

Angry ethnic Russians throughout the world launched a cyberattack on Estonia in April 2007, crippling its cyber infrastructure for four days. Researchers analyzing...

From ACM TechNews

Pentagon Will Help Homeland Security Department Fight Domestic Cyberattacks

The Obama administration has adopted new rules whereby the president would sanction the use of the military's cyberwarfare capabilities, guided by the Department...

Supercomputer Digests Twitter in Real-Time
From ACM News

Supercomputer Digests Twitter in Real-Time

Specialized hardware and software could provide new insights into the social Web.

India Plans to Cut Internet Services in Case of Cyber Attacks
From ACM News

India Plans to Cut Internet Services in Case of Cyber Attacks

Indian law enforcement and national security officials are drawing up plans that will give them technology capabilities to cut off all Internet services during...

From ACM News

AP to Form News Group to Make Money from Mobile

The Associated Press is overseeing the creation of an organization to help newspapers and broadcasters make more money as more people get their news from mobile...

Researcher Reveals Gps Vulnerabilities
From ACM TechNews

Researcher Reveals Gps Vulnerabilities

University of Texas professor Todd Humphreys says the smart electric grid is susceptible to spoofing attacks that target global positioning system (GPS) timing...

From ACM TechNews

Ipv4 Addresses Will Run Out Within Months, Nro Warns

The NRO, which is responsible for allocating IPv4 Internet addresses, predicts that it will hand out the final 12 regional blocks of addresses in early 2011. "Allocation...

From ACM News

FCC Wants Broadcasters' Unused Spectrum to Help Meet Growing Wireless Demand

Federal Communications Commission Chairman Julius Genachowski said he plans to encourage broadcasters to give up unused spectrum for auction to wireless carriers...

Pentagon Seeks Tight Ties With Cyber Contractors
From ACM News

Pentagon Seeks Tight Ties With Cyber Contractors

The U.S. Department of Defense aims to tighten ties with its cyber security contractors in an effort to better protect sensitive computer networks against growing...

From ACM News

Britain's Biggest Security Threat

Cyberwarfare, not conventional armed conflict, is the country’s No. 1 national-security concern, says a new report from the U.K.'s National Security Council.

Drivel on Facebook More Valuable Than We Think
From ACM TechNews

Drivel on Facebook More Valuable Than We Think

The seemingly meaningless comments and updates that appear on Facebook are valuable to users because they serve as constant reminders of a highly useful network...

From ACM TechNews

3-D Maps Without the Glasses

Students at Washington University in St. Louis' Media and Machines Lab have developed Project Live3D, an Internet application that uses webcams from around the...

Spambot Wants to Be Your Friend
From ACM TechNews

Spambot Wants to Be Your Friend

Vienna University of Technology researchers, studying security issues related to social networking websites, were able to match more than 1.2 million social network...

From ACM TechNews

Officials Push to Bolster Law on Wiretapping

U.S. law enforcement and counterterrorism officials are urging the revamping of a federal statute requiring phone and broadband carriers to guarantee that their...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account