acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM News

Computing with Secrets, but Keeping them Safe

A novel technique could see future Web services work with sensitive data without ever being able to read it. Several implementations of a mathematical proof unveiled...

From ACM News

AI That Picks Stocks Better Than the Pros

A computer science professor uses textual analysis of articles from Yahoo Finance to beat the market.

High-Wire Robot to Inspect the Grid
From ACM TechNews

High-Wire Robot to Inspect the Grid

Researchers at the Electric Power Research Institute have developed a robot that can crawl along transmission lines to inspect electrical wires without the need...

New Cyber Chief Outlines Strategy
From ACM News

New Cyber Chief Outlines Strategy

Security experts said this week that they were cheered by calls from General Keith Alexander, head of the new U.S. Cyber Command, for global rules of engagement...

From ACM News

Mobile Chips Threaten High-Performance Manufacturers

At the end of 2009, Intel was shipping about 80 percent of all x86 processors--the type of chip that powers, for example, Windows-based personal computers. AMD...

Open-Source Could Mean an Open Door For Hackers
From ACM News

Open-Source Could Mean an Open Door For Hackers

The ability to access the code of open-source applications may give attackers an edge in developing exploits for the software, according to a paper analyzing two...

Ranking the Most Powerful Supercomputers
From ACM News

Ranking the Most Powerful Supercomputers

The U.S. still leads in high-performance computing capacity, but China is undergoing explosive growth.

From ACM News

­sing Neural Networks to Classify Music

University of Hong Kong students trained a convolutional neural network built for image recognition to classify music.

Surveillance Software Knows What a Camera Sees
From ACM TechNews

Surveillance Software Knows What a Camera Sees

UCLA researchers have developed Image to Text (I2T), a computer vision system that can generate a real-time text description of what is happening in a surveillance...

Google Gives Away Video Software to Lure Developers
From ACM TechNews

Google Gives Away Video Software to Lure Developers

Google recently gave away a piece of intellectual property the company gained after its $120 million acquisition of On2 three months ago.

Mobile Data: A Gold Mine For Telcos
From ACM News

Mobile Data: A Gold Mine For Telcos

Cell phone companies are finding that they're sitting on a gold mine--in the form of the call records of their subscribers.

An Invisible Touch For Mobile Devices
From ACM News

An Invisible Touch For Mobile Devices

A simple gesture-sensing interface could add new meaning to mobile-phone conversations.

Eye Tracking For Mobile Control
From ACM News

Eye Tracking For Mobile Control

It's hard sending a text message with arms full of groceries or while wearing winter gloves. Voice control is one alternative to using your fingers, but researchers...

Synthetic Genome Reboots Cell
From ACM News

Synthetic Genome Reboots Cell

In the culmination of a project spanning 15 years, scientists at the J. Craig Venter Institute have engineered the first cell controlled by a synthetic genome.

Commercial Quantum Cryptography System Hacked
From ACM News

Commercial Quantum Cryptography System Hacked

Physicists have mounted the first successful attack of its kind on a commercial quantum cryptography system.

Software that Learns By Watching
From ACM News

Software that Learns By Watching

Overworked and much in demand, IT support staff can't be in two places at once. But software designed to watch and learn as they carry out common tasks could soon...

Physicists ­se Location to Guarantee Security of Quantum Messages
From ACM TechNews

Physicists ­se Location to Guarantee Security of Quantum Messages

UCLA researchers have developed a type of quantum cryptography, which guarantees that only a person at a certain location can read an encrypted message. 

Can Social Networks Be Generated Automatically?
From ACM News

Can Social Networks Be Generated Automatically?

When Google launched Buzz, a microblogging social network, several months ago, the company boasted that the network had been generated automatically, by algorithms...

Lining Up 'nanodot' Memory
From ACM TechNews

Lining Up 'nanodot' Memory

North Carolina State University researchers have developed a method for growing magnetic nanoparticles that could lead to much more dense computer memory devices...

Patient's Social Network Predicts Drug Outcomes
From ACM News

Patient's Social Network Predicts Drug Outcomes

Earlier this month, the journal Lancet Neurology published a study showing that the generic drug lithium did nothing to slow the course of amyotrophic lateral sclerosis...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account