acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


The Nsa Sponsors 'cyber Operations' Training at ­niversities. Here's What Students Learn.
From ACM News

The Nsa Sponsors 'cyber Operations' Training at ­niversities. Here's What Students Learn.

Last week, Carnegie Mellon University in Pittsburgh became one of the latest—and most prestigious—schools to partner with the National Security Agency on a program...

Mapping the Bitcoin Economy Could Reveal Users' Identities
From ACM TechNews

Mapping the Bitcoin Economy Could Reveal Users' Identities

An analysis of the public log of Bitcoin digital currency transactions could enable law enforcement to pinpoint user identities. 

Calling For Proposals: Creating Visions For Computing Research
From ACM TechNews

Calling For Proposals: Creating Visions For Computing Research

The Computing Research Association's Computing Community Consortium has issued a call for proposals for workshops on research at the frontiers of computing. 

Imagining a Cyberattack on the Power Grid
From ACM Opinion

Imagining a Cyberattack on the Power Grid

It's electrifying.

Artificial-Intelligence Research Revives Its Old Ambitions
From ACM News

Artificial-Intelligence Research Revives Its Old Ambitions

The birth of artificial-intelligence research as an autonomous discipline is generally thought to have been the monthlong Dartmouth Summer Research Project on Artificial...

Grassroots Groups Work to Inspire Women To Code
From ACM News

Grassroots Groups Work to Inspire Women To Code

New organizations aim to introduce women to computing at the local level.

iSpy: How the NSA Accesses Smartphone Data
From ACM News

iSpy: How the NSA Accesses Smartphone Data

Michael Hayden has an interesting story to tell about the iPhone.

Sudoku Saves Photographers From Copyright Theft
From ACM TechNews

Sudoku Saves Photographers From Copyright Theft

Computer scientists in Malaysia have developed a watermarking technology based on a system similar to the rules used to solve the puzzles known as Sudoku. 

In The World: Mapping the Logistics of Megacities
From ACM TechNews

In The World: Mapping the Logistics of Megacities

Logistics data on neighborhoods in several world cities is available online in an open-access pool of information that is graphically represented on city maps. 

Open Source Career Opportunities Continue to Abound
From ACM TechNews

Open Source Career Opportunities Continue to Abound

Open source jobs remain a consistent source of career growth for technology professionals, according to Dice.com statistics from August 2012 to August 2013. 

Beyond Passwords: New Tools to Identify Humans
From ACM News

Beyond Passwords: New Tools to Identify Humans

As everything around us becomes connected to the Internet, from cars to thermometers to the stuff inside our mobile phones, technologists are confronting a tough...

Nsa Surveillance Makes For Strange Bedfellows
From ACM Opinion

Nsa Surveillance Makes For Strange Bedfellows

The controversy over U.S. government surveillance has produced a king-size collection of strange bedfellows. Beneath the covers one finds both amusing ironies and...

Can You Beat This Machine at Angry Birds?
From ACM TechNews

Can You Beat This Machine at Angry Birds?

A new artificial intelligence agent is capable of playing Angry Birds independently.

Teens Are Losing Interest in Science, Survey Finds
From ACM TechNews

Teens Are Losing Interest in Science, Survey Finds

A new survey found the number of teenagers interested in careers in science, technology, engineering, and mathematics dropped 15 percent this year. 

How the N.S.A Cracked the Web
From ACM News

How the N.S.A Cracked the Web

It's been nearly three months since Edward Snowden started telling the world about the National Security Agency's mass surveillance of global communications.

Huge Botnet Found ­sing Tor Network For Communications
From ACM News

Huge Botnet Found ­sing Tor Network For Communications

In the wake of the revelations surrounding the NSA's domestic surveillance and intelligence-gathering operations, security experts said there would likely be a...

Nsa Able to Foil Basic Safeguards of Privacy on Web
From ACM TechNews

Nsa Able to Foil Basic Safeguards of Privacy on Web

The National Security Agency uses a variety of means to overcome encryption technologies, such as supercomputers, technical strategies, court orders, and persuasion...

Older Brains Benefit From Video Game
From ACM TechNews

Older Brains Benefit From Video Game

University of California, San Francisco scientists found that people between the ages of 60 and 85 who played a videogame showed improved cognitive controls and...

New Remote-Sensing Development Could Aid Disaster Relief
From ACM TechNews

New Remote-Sensing Development Could Aid Disaster Relief

Michigan Technological University researchers have developed BACKBOnE, a system that uses crowdsourcing to quickly and more accurately assess the damage from natural...

Smartphones Provide Video Monitoring of Tb Patients
From ACM TechNews

Smartphones Provide Video Monitoring of Tb Patients

San Diego County health officials are using smartphones to improve treatment monitoring for tuberculosis patients, as part of a collaboration with the University...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account