acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Inside GAO's Plan to Make Congress More Tech-Savvy
From ACM TechNews

Inside GAO's Plan to Make Congress More Tech-Savvy

The U.S. Government Accountability Office has set up a Science and Technology Assessment and Analytics group to help make lawmakers more knowledgeable of emerging...

Flaws in Vendor Security Software Could Leave Some Federal Buildings Vulnerable
From ACM TechNews

Flaws in Vendor Security Software Could Leave Some Federal Buildings Vulnerable

Researchers found previously unknown vulnerabilities in some access control systems used by federal agencies.

Voting Experts: Why the Heck Are People Still Voting Online?
From ACM TechNews

Voting Experts: Why the Heck Are People Still Voting Online?

A new study calls online ballots a key weakness in the securing of U.S. election systems, and estimates at least 100,000 Americans cast online ballots in the 2016...

NIH Partners With Google Cloud to Speed ­p Medical Breakthroughs
From ACM TechNews

NIH Partners With Google Cloud to Speed ­p Medical Breakthroughs

A new U.S. National Institutes of Health program aims to help researchers accelerate biomedical advances by providing access to commercial cloud computing technologies...

The Pentagon Wants to Bring Mind-Controlled Tech to Troops
From ACM TechNews

The Pentagon Wants to Bring Mind-Controlled Tech to Troops

The U.S. Defense Advanced Research Projects Agency  is selecting research teams to develop a neural interface to allow soldiers to link their brains to military...

Code Now, Pay Tuition Later
From ACM TechNews

Code Now, Pay Tuition Later

Organizations are offering free coding programs for Web engineers that include job placement; graduates agree to pay the schools a portion of their salaries once...

HHS Is ­sing Data to Fight Opioid Abuse, Fraud, and Just About Everything Else
From ACM TechNews

HHS Is ­sing Data to Fight Opioid Abuse, Fraud, and Just About Everything Else

The U.S. Department of Health and Human Services' Office of Inspector General is using refined data analytics to combat medical fraud, waste, and abuse.

The Field of AI Research Is About to Get Way Bigger Than Code
From ACM TechNews

The Field of AI Research Is About to Get Way Bigger Than Code

The new AI Now Institute is a cross-disciplinary initiative that will research the impact of artificial intelligence on society.

Internet Rulemaking Is Going to Get More Complicated
From ACM TechNews

Internet Rulemaking Is Going to Get More Complicated

A new report warns of cybersecurity measures undermining personal rights and freedoms through censorship and other means if "multilateral" government policies continue...

Researchers Built an Invisible Backdoor to Hack Ai's Decisions
From ACM TechNews

Researchers Built an Invisible Backdoor to Hack Ai's Decisions

Researchers demonstrated a cyberattack against artificial intelligence that controls driverless cars and image-recognition systems by installing an invisible backdoor...

Time's Running Out to Prevent a Massive Cyberattack on Critical Infrastructure
From ACM TechNews

Time's Running Out to Prevent a Massive Cyberattack on Critical Infrastructure

The U.S. National Infrastructure Advisory Council warns there is a shrinking window of opportunity to fortify critical U.S. infrastructure against a massive "9/11...

International Group Aims to Protect the Core of the Public Internet
From ACM TechNews

International Group Aims to Protect the Core of the Public Internet

The Global Commission on the Stability of Cyberspace has established a research group to protect the public Internet's core and critical infrastructure.

Father of the Internet: 'ai Stands For Artificial Idiot'
From ACM TechNews

Father of the Internet: 'ai Stands For Artificial Idiot'

Google chief Internet evangelist Vint Cerf said modern artificial intelligence systems are only as smart as the people who interact with them.

A Trick That Hides Censored Websites Inside Cat Videos
From ACM TechNews

A Trick That Hides Censored Websites Inside Cat Videos

Slitheen is a new system that uses decoy routing to conceal banned websites inside of innocuous cat videos.

An Algorithm That Hides Your Online Tracks With Random Footsteps
From ACM TechNews

An Algorithm That Hides Your Online Tracks With Random Footsteps

Steven Smith at MIT's Lincoln Laboratory has developed an algorithmic technique to thwart the collection of online users' browsing history. The algorithm conceals...

Microsoft's AI Is Learning to Write Code By Itself, Not Steal It
From ACM TechNews

Microsoft's AI Is Learning to Write Code By Itself, Not Steal It

Researchers at Microsoft and the University of Cambridge in the U.K. have developed an algorithm that can create code to solve simple math problems.

­.s. Lead in Quantum Computing 'under Siege,' Says White House Cyber Adviser
From ACM TechNews

­.s. Lead in Quantum Computing 'under Siege,' Says White House Cyber Adviser

The United States needs to invest more in quantum computing, according to Tim Polk, assistant director of cybersecurity within the U.S. Office of Science and Technology...

Researchers Are Teaching Artificial Intelligence How to Terrify Humans
From ACM TechNews

Researchers Are Teaching Artificial Intelligence How to Terrify Humans

Massachusetts Institute of Technology researchers have trained a computer to produce scary images.

What Iarpa Knows About Your Canceled Dinner Reservation
From ACM TechNews

What Iarpa Knows About Your Canceled Dinner Reservation

The U.S. Intelligence Advanced Research Projects Activity is running several projects examining how crowdsourced data could be used to predict specific events.

Stealing an AI Algorithm and Its ­nderlying Data Is a 'high-School Level Exercise'
From ACM TechNews

Stealing an AI Algorithm and Its ­nderlying Data Is a 'high-School Level Exercise'

Cornell Tech researchers have shown they can reverse-engineer machine-learning algorithms, essentially stealing artificial intelligence products and using them...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account