acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectCommunications / Networking
authorNew Scientist
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Internet Responsible For 2 Percent of Global Energy ­sage
From ACM TechNews

Internet Responsible For 2 Percent of Global Energy ­sage

The Internet is responsible for 170 to 307 gigawatts of global energy consumption, according to the University of California, Berkeley's Justin Ma and the International...

From ACM News

Quantum Keys Let Submarines Talk Securely

Submarines must be able to talk securely with remote naval bases while remaining submerged. Could quantum communications allow them to pull off this technically...

Revealed
From ACM News

Revealed

As protests against financial power sweep the world, science may have confirmed the protesters' worst fears. An analysis of the relationships between 43,000 transnational...

From ACM News

Light Is Not Fast Enough For High-Speed Stock Trading

Every microsecond counts in stock trading. The New York Stock Exchange handles a third of the world's stock trading—around 22 billion messages a day. But NYSE Euronext...

From ACM News

Cops on the Trail of Crimes that Haven't Happened

The patrol car comes to a stop in a sleepy neighbourhood of small, earth-coloured homes. A woman saunters past pushing a stroller. It is daytime in the artsy beach...

From ACM News

Light Is Not Fast Enough For High-Speed Stock Trading

Every microsecond counts in stock trading. The New York Stock Exchange handles a third of the world's stock trading—around 22 billion messages a day. But NYSE...

Air Traffic System Vulnerable to Cyber Attack
From ACM TechNews

Air Traffic System Vulnerable to Cyber Attack

Automatic Dependent Surveillance-Broadcast (ADS-B) technology uses unencrypted global positioning system signals to broadcast a plane's position to networks. The...

From ACM TechNews

Image Searches 'poisoned' By Cybercriminals

More than 113 million Internet users were redirected to malicious pages due to search engine poisoning in May 2011, according to Trend Micro. 

Face Recognition Technology Fails to Find U.k. Rioters
From ACM News

Face Recognition Technology Fails to Find U.k. Rioters

The response was as aggressive and swift as the riots themselves. Within a few hours of the worst of the looting across London and other English cities, attempts...

From ACM News

Robot 'mission Impossible' Wins Video Prize

You could call it Mission Impossible: Robot Library Heist. An army of flying, rolling, and climbing robots have been taught to work together to find and snatch...

From ACM News

Why Bitcoin Is Not As Anonymous As Most ­sers Think

People who use Bitcoin to ensure their purchases remain anonymous may want to reconsider their reliance on the online peer-to-peer currency, say researchers who...

From ACM News

Welcome to the Age of the Splinternet

Openness is the Internet's great strength—and weakness. With powerful forces carving it up, is its golden age coming to an end?

From ACM News

Robots ­se Kinect to ­nderstand Our World

Picture the scene, a few years from now. "Robot, fetch me that pillow over there," you say to your ever-willing butlerbot. "Certainly sir," it replies. "What's...

From ACM News

How to Be in Two Places at the Same Time

An ambitious experiment to make a glass sphere exist in two places at once could provide the most sensitive test of quantum theory yet.

Interview with Key Lulzsec Hacker
From ACM News

Interview with Key Lulzsec Hacker

It was early May when LulzSec's profile skyrocketed after a hack on the giant Sony corporation. LulzSec's name comes from Lulz, a corruption of LOL, often denoting...

Autopiloted Glider Knows Where to Fly For a Free Ride
From ACM News

Autopiloted Glider Knows Where to Fly For a Free Ride

Hawks and albatrosses soar for hours or even days without having to land. Soon robotic gliders could go one better, soaring on winds and thermals indefinitely...

Botclouds: A Cyberattacker's Dream
From ACM TechNews

Botclouds: A Cyberattacker's Dream

Delft University researchers are studying how botclouds can be used to launch attacks, send spam, and commit fraud. 

From ACM News

Spies Can Send Messages Hidden in a Google Search

The peculiar list of search options that Google suggests as you type in a query could be hijacked to let people communicate secretly.

The Defenders: Inside an Online Siege
From ACM News

The Defenders: Inside an Online Siege

In a quiet, windowless auditorium in Bristol, in the west of England, Lucy Robson and her team hunch over their laptops as the seconds on a giant clock above...

Toughening ­p Vulnerable Networks One Link at a Time
From ACM TechNews

Toughening ­p Vulnerable Networks One Link at a Time

Swiss Federal Institute of Technology researchers have developed a computer model that shows how large technological networks can be significantly improved by making...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account