acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectPerformance And Reliability
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Terabit/s Optical Data Link Demonstrated for Satellites
From ACM News

Terabit/s Optical Data Link Demonstrated for Satellites

An optical data link was demonstrated over 10km  (more than six miles) of open air in a field experiment in the Netherlands.

Can We Secure Cryptography Against Quantum Attacks?
From ACM News

Can We Secure Cryptography Against Quantum Attacks?

If you want your digital information to be secure, you must implement post-quantum cryptography now, according to some leaders in the field.

Setting the Internet of Things Free -- of Batteries
From ACM News

Setting the Internet of Things Free -- of Batteries

Increasingly, sensors and other Internet of Things devices will be powered by ambient energies.

Samsung Breach Slams Consumers
From ACM News

Samsung Breach Slams Consumers

Including this writer.

ACM Global Technology Policy Council Releases Joint Statement on Principles for Responsible Algorithmic Systems
From ACM TechNews

ACM Global Technology Policy Council Releases Joint Statement on Principles for Responsible Algorithmic Systems

ACM's Technology Policy Council has issued an updated Statement on Principles for Responsible Algorithmic Systems in conjunction with its U.S. and Europe Policy...

Deep Learning is Human, Through and Through
From ACM News

Deep Learning is Human, Through and Through

At the 9th Heidelberg Laureate Forum, a diverse panel of researchers discussed the applications and implications of deep learning.

There is Plenty of Room at The Top (of Supercomputing)
From ACM News

There is Plenty of Room at The Top (of Supercomputing)

Jack Dongarra on the future of high-performance computing.

Securing the Enterprise When Employees are Remote
From ACM News

Securing the Enterprise When Employees are Remote

Managing the security challenges of hybrid work environments.

Bring the Laboratory With You
From ACM News

Bring the Laboratory With You

Microfluidic laboratories on chips proliferate.

Open Source Hardware?
From ACM News

Open Source Hardware?

Hardware design starts to see the attraction of open source.

AI Supports Displaced Peoples, Refugees in Ukraine and Beyond
From ACM News

AI Supports Displaced Peoples, Refugees in Ukraine and Beyond

Artificial intelligence is playing a growing role in refugee relief and resettlement programs.

Software Insecurity
From ACM News

Software Insecurity

Software is more vulnerable than we think.

Pushing the Frontiers of Mathematical Research
From ACM News

Pushing the Frontiers of Mathematical Research

Computer proof assistants are being used to create online libraries of mathematical theorems and proofs.

Ian Foster To Receive ACM-IEEE CS Ken Kennedy Award
From ACM News

Ian Foster To Receive ACM-IEEE CS Ken Kennedy Award

The grid computing pioneer is recognized with one of the high-performance computing field's most prestigious honors.

Protecting Children's Privacy Online
From ACM News

Protecting Children's Privacy Online

Assuring youngsters they can use websites without giving away their personal information is not child's play.

AI In Your Ears
From ACM News

AI In Your Ears

Binaural learning enhances speech while minimizing noise.

No-Code AI: Platforms and Tools
From ACM News

No-Code AI: Platforms and Tools

In the 1990s, tools like Macromedia Dreamweaver made Web development accessible to all. Today, no-code tools aim to do the same for artificial intelligence.

Raising the Ramparts
From ACM News

Raising the Ramparts

Why the enterprise needs military-grade cybersecurity, too.

Found in Space
From ACM News

Found in Space

Using deep learning to identify and classify astronomically distant objects.

Extreme Security for Users Targeted by Cyberattack
From ACM News

Extreme Security for Users Targeted by Cyberattack

Apple's Lockdown Mode provides serious security to individuals personally targeted by sophisticated attackers.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account