acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


What Big Media Can Learn From the New York Public Library
From ACM News

What Big Media Can Learn From the New York Public Library

Despite looming budget cuts, the library is flourishing and putting out some of the most innovative online projects in the country.

New Technology Revs Up Pixar's 'cars 2'
From ACM News

New Technology Revs Up Pixar's 'cars 2'

We all know what the reflections off cars or the roiling of the ocean are supposed to look like. So if you are tempted to believe that what you'll see in "Cars...

Seven Questions For Iridium Ceo Matthew Desch
From ACM Opinion

Seven Questions For Iridium Ceo Matthew Desch

More often than not, the Iridium satellite phone system is remembered as one of the great telecom flameouts of the 1990s. It almost became a literal one: At one...

War Evolves With Drones, Some Tiny as Bugs
From ACM News

War Evolves With Drones, Some Tiny as Bugs

Two miles from the cow pasture where the Wright Brothers learned to fly the first airplanes, military researchers are at work on another revolution in the air...

From ACM News

Legislation Criminalizing Creation of Computer Viruses Enacted

Japan's parliament enacted legislation Friday criminalizing the creation or distribution of computer viruses to crack down on the growing problem of cybercrimes...

Firms Adjust to Hacks
From ACM News

Firms Adjust to Hacks

When email-marketing firm Epsilon Data Management discovered in March that hackers had stolen consumer email addresses it maintains for major banks and retailers...

From ACM News

Internet Braces For New Addresses Beyond '.com,' Including '.bank,' '.eco' and '.canon.'

The organization that oversees the Internet address system is preparing to open the floodgates to a nearly limitless selection of new Web-site suffixes, including...

From ACM News

Full-Field Implementation of a Perfect Eavesdropper on a Quantum Cryptography System

Quantum key distribution allows two remote parties to grow a shared secret key. Its security is founded on the principles of quantum mechanics, but in reality...

From ACM News

All Your Bitcoins Are Ours

Malware authors move fast. Following on from the previous blog post on Bitcoin botnet mining, we have seen a recent Trojan in the wild targeting Bitcoin wallets...

From ACM News

Can Wireless Networks Support the Promise of the 'cloud'?

Google, Apple, and Amazon are pushing more and more of your entertainment, your data—heck, your life—into the cloud. But what's it mean for the wireless network...

Protecting Medical Implants from Attack
From ACM News

Protecting Medical Implants from Attack

Millions of Americans have implantable medical devices, from pacemakers and defibrillators to brain stimulators and drug pumps; worldwide, 300,000 more people...

From ACM News

Government in Cyber Fight but Can't Keep Up

The Pentagon is about to roll out an expanded effort to safeguard its contractors from hackers and is building a virtual firing range in cyberspace to test new...

From ACM News

Google Voice Search Offers Natural User Input

Google Voice Search for desktop computers isn't much more than the company porting a technology that's been on mobile phones for a while to PCs. But don't write...

'smart Cars' That Are Actually, Well, Smart
From ACM TechNews

'smart Cars' That Are Actually, Well, Smart

MIT researchers are developing an intelligent transportation system algorithm that factors in models of human driving behavior to warn drivers of potential collisions...

IBM at 100: From Typewriters to the Cloud
From ACM News

IBM at 100: From Typewriters to the Cloud

Say IBM—and you probably still think of computers. But today, the firm that was once all about hardware, makes its living from more intangible technology.

F.b.i. Agents Get Leeway to Push Privacy Bounds
From ACM News

F.b.i. Agents Get Leeway to Push Privacy Bounds

The Federal Bureau of Investigation is giving significant new powers to its roughly 14,000 agents, allowing them more leeway to search databases, go through household...

Bitcoin: The Hacker Currency That's Taking Over the Web
From ACM News

Bitcoin: The Hacker Currency That's Taking Over the Web

Global, private and untraceable, it's the monetary system of choice for libertarians, geeks, businesspeople, and, apparently, drug kingpins.

Has Facebook Peaked?
From ACM News

Has Facebook Peaked?

Facebook's active user base grew by only 1.7% in May. That's about half its usual growth rate, and it came after similarly slow growth in April. According to Inside...

From ACM News

Who Is Behind the Hacks?

Every day there's another report of a computer hack. Yesterday it was a video game company and a U.S. Senate database. And today it could be the Federal Reserve...

Thieves Found Citigroup Site an Easy Entry
From ACM News

Thieves Found Citigroup Site an Easy Entry

Think of it as a mansion with a high-tech security system—but the front door wasn’t locked tight.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account