acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectPerformance And Reliability
authorZDNet
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Canberra Gives AU$32m for Autonomous Decision-Making Research
From ACM TechNews

Canberra Gives AU$32m for Autonomous Decision-Making Research

The Australian government is allocating AU$31.8 million (about US$21.5 million) to the Australian Research Council to study responsible, ethical, and inclusive...

COBOL Turns 60: Why It Will Outlive Us All
From ACM News

COBOL Turns 60: Why It Will Outlive Us All

In the beginning, there was machine languages and assembler. Neither was easy to use, but then along came COBOL, and everything changed.

Mobile Malware Attacks are Booming in 2019: These are the Most Common Threats
From ACM TechNews

Mobile Malware Attacks are Booming in 2019: These are the Most Common Threats

Malware attacks against mobile devices, especially Android handsets, have ballooned this year.

Hackers Breach Greece's Top-Level Domain Registrar
From ACM TechNews

Hackers Breach Greece's Top-Level Domain Registrar

Researchers said Greece's top-level domain registrar has suffered a hacker breach, and identified the state-sponsored "Sea Turtle" hacker group as the perpetrator...

Google's Language Techniques Help O2 Czech Republic Reveal Network Secrets
From ACM TechNews

Google's Language Techniques Help O2 Czech Republic Reveal Network Secrets

Word2vec, a neural network technique developed to understand human languages, also can interpret raw cell tower data.

Petaflop Systems Dominate the Supercomputer Landscape
From ACM TechNews

Petaflop Systems Dominate the Supercomputer Landscape

For the first time, every entry in this year's TOP500 list delivers petaflop-level capabilities.

HSM Vulnerabilities Impact Banks, Cloud Providers, Governments
From ACM TechNews

HSM Vulnerabilities Impact Banks, Cloud Providers, Governments

Researchers have discovered vulnerabilities that can be exploited remotely to retrieve sensitive data stored inside Hardware Security Modules .

Python Predicted to Overtake C and Java in Next 4 Years
From ACM TechNews

Python Predicted to Overtake C and Java in Next 4 Years

Tiobe analysts believe Python probably will become the most popular programming language in the world within three or four years.

Machine Learning Sniffs Out Its Own Machine-Written Propaganda
From ACM TechNews

Machine Learning Sniffs Out Its Own Machine-Written Propaganda

Researchers have modified a neural network to create a natural language processing algorithm that generates, as well as detects, convincing fake articles.

Could TypeScript Replace JavaScript? ­Use of Programming Language Spin-Off Soars
From ACM TechNews

Could TypeScript Replace JavaScript? ­Use of Programming Language Spin-Off Soars

In a recent survey of developers who use npm, 62% of respondents said they used Microsoft's TypeScript to build native mobile and desktop apps, up from 46% in last...

Researchers Warn Open Sky Drone Policy Poses Cybercriminal Risk
From ACM TechNews

Researchers Warn Open Sky Drone Policy Poses Cybercriminal Risk

Researchers warn of the potential for unregulated aerial drones to threaten citizens.

­NSW, Sydney ­ni Join Quantum Powers to Prove Qubit Theory
From ACM TechNews

­NSW, Sydney ­ni Join Quantum Powers to Prove Qubit Theory

Researchers in Australia are combining their quantum computing powers, uniting methods designed by researchers at each university to prove their feasibility.

Your Bionic Hand Is Now at Risk From Hackers
From ACM TechNews

Your Bionic Hand Is Now at Risk From Hackers

Kaspersky Lab researchers revealed at Mobile World Congress 2019 in Spain that bionic hand prostheses from Moscow-based Motorica are vulnerable to hacking.

Security Conference Will Let You Hack Tesla Car, Earn Cash Prizes
From ACM TechNews

Security Conference Will Let You Hack Tesla Car, Earn Cash Prizes

Security researchers attending the Pwn2Own CanSecWest security conference this March in Vancouver, Canada, will be incentivized to hack a Tesla Model 3 car.

Data Breaches, Cyberattacks Top Global Risks Alongside Natural Disasters, Climate Change
From ACM TechNews

Data Breaches, Cyberattacks Top Global Risks Alongside Natural Disasters, Climate Change

The World Economic Forum has listed large-scale cyberattacks and massive data breaches among the five most probable risks facing the world today.

E­ to Fund Bug Bounty Programs for 14 Open Source Projects
From ACM TechNews

E­ to Fund Bug Bounty Programs for 14 Open Source Projects

The European Union will cover the costs of bug bounty programs for 14 open source projects.

Hyundai Develops Fingerprint Tech to Unlock and Start Cars
From ACM TechNews

Hyundai Develops Fingerprint Tech to Unlock and Start Cars

Hyundai Motor has developed a system that will allow drivers to unlock and start their vehicles using only their fingerprints.

Nurse Robot Moxi Gets Schooled by Texas Nurses
From ACM TechNews

Nurse Robot Moxi Gets Schooled by Texas Nurses

A robot designed to test collaborative automation integration in a working medical facility recently concluded its first real-world trial in a Texas hospital.

Walmart Leads the Way...in Floor Scrubbing Robots?
From ACM TechNews

Walmart Leads the Way...in Floor Scrubbing Robots?

By the end of next month, Walmart will deploy floor-scrubbing robots in its stores.

­NSW Has Found a Way to Access Information Stored Within Atoms
From ACM TechNews

­NSW Has Found a Way to Access Information Stored Within Atoms

Researchers at the University of New South Wales in Australia have demonstrated a compact sensor for accessing information stored in the electrons of individual...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account