acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSoftware
authorThe Washington Post
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Who Tracks the Trackers that Track You Online? You Can, with Lightbeam.
From ACM News

Who Tracks the Trackers that Track You Online? You Can, with Lightbeam.

When your browser landed on this article, it didn't just talk to the friendly servers at washingtonpost.com.

Here's Why the Feds Didn't Have More Skilled Programmers For Healthcare.gov
From ACM Opinion

Here's Why the Feds Didn't Have More Skilled Programmers For Healthcare.gov

HealthCare.gov, the Web site at the center of President Obama's federal health insurance exchange, has been plagued with problems since it opened for business Oct...

Here's Everything You Should Know About Nsa Address Book Spying in One Faq
From ACM News

Here's Everything You Should Know About Nsa Address Book Spying in One Faq

A new report from The Washington Post, based on documents provided by whistleblower Edward Snowden, reveals that the National Security Agency is collecting hundreds...

Teens Hone Their Hacking Skills in National Competitions Guided By Federal Officials
From ACM TechNews

Teens Hone Their Hacking Skills in National Competitions Guided By Federal Officials

Federal officials are guiding national cybercontests aimed at helping tech-savvy teenagers prepare for careers in protecting the government and private companies...

Nsa Chief Defends Collecting Americans' Data
From ACM Opinion

Nsa Chief Defends Collecting Americans' Data

The head of the National Security Agency delivered a vigorous defense Wednesday of his agency's collection of Americans' phone records for counterterrorism purposes...

The Skies. The Limits.
From ACM News

The Skies. The Limits.

Long ago, in a dreamier era, space stations were imagined as portals to the heavens.

The Nsa Sponsors 'cyber Operations' Training at ­niversities. Here's What Students Learn.
From ACM News

The Nsa Sponsors 'cyber Operations' Training at ­niversities. Here's What Students Learn.

Last week, Carnegie Mellon University in Pittsburgh became one of the latest—and most prestigious—schools to partner with the National Security Agency on a program...

Here's How One Hacker Is Waging War on the Syrian Government
From ACM Careers

Here's How One Hacker Is Waging War on the Syrian Government

As President Obama weighed U.S. air strikes in Syria this week, a lone American hacker was waging his own attack on the Syrian government.

The New York Times Web Site Was Taken Down By Dns Hijacking. Here's What That Means.
From ACM News

The New York Times Web Site Was Taken Down By Dns Hijacking. Here's What That Means.

Just weeks after The Washington Post had our own run-in with the Syrian Electronic Army (SEA), the New York Times is down, and the SEA is claiming responsibility...

Google Maps Trained ­S to Follow Directions. Now Its Former Developer Wants ­S to Explore.
From ACM Opinion

Google Maps Trained ­S to Follow Directions. Now Its Former Developer Wants ­S to Explore.

It's not evident from the way his hair flops casually down and across, nor from his equally relaxed demeanor, but John Hanke is one of Google's most important idea...

Here's What You Find When You Scan the Entire Internet in an Hour
From ACM News

Here's What You Find When You Scan the Entire Internet in an Hour

Until recently, scanning the entire Internet, with its billions of unique addresses, was a slow and labor-intensive process.

The New York Times Was Losing $5 Per Second Thanks to Its Web Site Outage
From ACM News

The New York Times Was Losing $5 Per Second Thanks to Its Web Site Outage

The New York Times is still reeling from a massive Web outage that took down its homepage, its corporate Web site, and everything in between.

Linkedin Connects Big Data, Human Resources
From ACM Careers

Linkedin Connects Big Data, Human Resources

Every second, more than two more people join LinkedIn's network of 238 million members.

Nsa Growth Fueled By Need to Target Terrorists
From ACM News

Nsa Growth Fueled By Need to Target Terrorists

Twelve years later, the cranes and earthmovers around the National Security Agency are still at work, tearing up pavement and uprooting trees to make room for a...

Court Says Skipping Ads Doesn't Violate Copyright. That's a Big Deal.
From ACM News

Court Says Skipping Ads Doesn't Violate Copyright. That's a Big Deal.

In 1984, the Supreme Court rejected Hollywood's argument that the record button on the Betamax VCR made its manufacturer, Sony, liable for copyright infringement...

For Nsa Chief, Terrorist Threat Drives Passion to 'collect It All,' Observers Say
From ACM News

For Nsa Chief, Terrorist Threat Drives Passion to 'collect It All,' Observers Say

In late 2005, as Iraqi roadside bombings were nearing an all-time peak, the National Security Agency's newly appointed chief began pitching a radical plan for halting...

Nsa Surveillance Program Extended By Court, Intelligence Officials Say
From ACM News

Nsa Surveillance Program Extended By Court, Intelligence Officials Say

A secret court on Friday extended the National Security Agency's authority to collect and store the phone records of tens of millions of American cellphone customers...

The Coming Political Battle Over Bitcoin
From ACM Opinion

The Coming Political Battle Over Bitcoin

Given that Bitcoin first broke into mainstream attention when Gawker explained how to use it to buy drugs, perhaps the surprise is that it took federal regulators...

Linguists Identify 15,000-Year-Old 'ultraconserved Words'
From ACM News

Linguists Identify 15,000-Year-Old 'ultraconserved Words'

You, hear me! Give this fire to that old man. Pull the black worm off the bark and give it to the mother. And no spitting in the ashes!

Little-Known Surveillance Tool Raises Concerns By Judges, Privacy Activists
From ACM News

Little-Known Surveillance Tool Raises Concerns By Judges, Privacy Activists

Federal investigators in Northern California routinely used a sophisticated surveillance system to scoop up data from cellphones and other wireless devices in an...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account