acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


To Stop Cheats, Colleges Learn Their Trickery
From ACM News

To Stop Cheats, Colleges Learn Their Trickery

The frontier in the battle to defeat student cheating may be here at the testing center of the University of Central Florida.

Biometric Atm Gives Cash Via 'finger Vein' Scan
From ACM News

Biometric Atm Gives Cash Via 'finger Vein' Scan

Poland's cooperative BPS bank says it's the first in Europe to install a biometric ATM--allowing customers to withdraw cash simply with the touch of a fingertip...

'paperless Ticketing' Aims to Thwart Scalping at Concerts, Sports Events
From ACM News

'paperless Ticketing' Aims to Thwart Scalping at Concerts, Sports Events

Anyone who's ever chased a hot ticket for a concert or sports event knows the agony of the drill. Wait--online or in line--until the box office opens and then compete...

From ACM News

The Tech Refresher Russia's Spies Needed

From James Bond to Johnny English, the movies give us the impression that spies are top of the tree when it comes to money-no-object espionage technology. But that...

Arrests of Alleged Spies Draws Attention to Steganography
From ACM News

Arrests of Alleged Spies Draws Attention to Steganography

A year ago in April, the government says, the accused operative known as Richard Murphy and his supposed wife, "Cynthia Murphy," booted up a computer in their comfy...

With World Watching, Wikileaks Falls Into Disrepair
From ACM News

With World Watching, Wikileaks Falls Into Disrepair

Would-be whistle-blowers hoping to leak documents to Wikileaks face a potentially frustrating surprise. Wikileaks’ submission process, which had been degraded for...

Nanoscale Random Number Circuit to Secure Future Chips
From ACM TechNews

Nanoscale Random Number Circuit to Secure Future Chips

Intel engineers have created computer processors with circuits capable of random behavior, a development that could lead to secure cryptography keys.

From ACM News

Police Push to Continue Warrantless Cell Tracking

A law requiring police to obtain a search warrant before tracking Americans' cell phones may imperil criminal investigations and endanger children's lives, a law...

China Pushing the Envelope on Science, and Sometimes Ethics
From ACM News

China Pushing the Envelope on Science, and Sometimes Ethics

Last year, Zhao Bowen was part of a team that cracked the genetic code of the cucumber. These days, he's probing the genetic basis for human IQ.

From ACM News

Beyond the Petaflop: DARPA Wants Quintillion-Speed Computers

Not known for taking the demure route, researchers at DARPA this week announced a program aimed at building computers that exceed current peta-scale computers to...

From ACM News

Nist to Lead Nice Cybersecurity Program

NIST has been tapped to coordinate the new interagency program, which aims to promote cybersecurity awareness and know-how across the country and among citizens...

From ACM News

Nsa Gets Geeky After Dark, New Docs Show

It's an agency staffed by some of the government's top hackers, brainiest cryptographers, and most sophisticated network defenders. But when employees at the NSA...

Visions of the Future
From Communications of the ACM

Visions of the Future

ACM joined forces with the British Computer Society to deliver its first academic research conference in Europe.

Eric Brewer: Change Agent
From Communications of the ACM

Eric Brewer: Change Agent

Eric Brewer's latest project involves designing and deploying low-cost wireless infrastructure in developing regions.

Committed to Success
From Communications of the ACM

Committed to Success

Charles P. Thacker talks about the importance of simplicity, reusable tools, thinking broadly, and his practice of Tom Sawyering.

Censored!
From Communications of the ACM

Censored!

Countries use Internet censorship to dominate the political dialogue, but also to create favorable conditions for government-controlled businesses.

Sharing Computational Perspectives
From Communications of the ACM

Sharing Computational Perspectives

Computer scientists are now making intellectual contributions to a wide range of other disciplines, including evolutionary theory, physics, and economics.

From ACM News

Hackers Aren't Only Threat to Privacy

Sophisticated hackers aren't the only ones gaining access to sensitive data on the Internet. A large amount of personal information is being left exposed or poorly...

From ACM News

Wanted: Young Cyberexperts to Defend Internet

The federal government, education officials and giant military contractors are collaborating to recruit a new class of tech professional specifically trained...

From ACM TechNews

Why Can't Johnny Develop Secure Software?

Despite a wealth of security knowledge and developers' access to advanced tools, many software security risks remain. Analysts say that many software developers...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account