acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Business Groups Hail China Web Software Delay
From ACM News

Business Groups Hail China Web Software Delay

The American and European chambers of commerce in China have welcomed a decision by Beijing to delay an order that new computers sold in the country be equipped...

Liskov's Creative Joy
From Communications of the ACM

Liskov's Creative Joy

Barbara Liskov muses about the creative process of problem solving, finding the perfect design point, and pursuing a research path.

Are We Losing Our Ability to Think Critically?
From Communications of the ACM

Are We Losing Our Ability to Think Critically?

Computer technology has enhanced lives in countless ways, but some experts believe it might be affecting people's ability to think deeply.

Toward Native Web Execution
From Communications of the ACM

Toward Native Web Execution

Several software projects are narrowing the performance gap between browser-based applications and their desktop counterparts. In the process, they're creating...

Contemporary Approaches to Fault Tolerance
From Communications of the ACM

Contemporary Approaches to Fault Tolerance

Thanks to computer scientists like Barbara Liskov, researchers are making major progress with cost-efficient fault tolerance for Web-based systems.

From ACM TechNews

Cifellows Status Report

The Computing Innovation Fellows (CIFellows) Project has received 526 applications for CIFellowships from 145 distinct colleges and universities. The applications...

­nderwater Robots Identify Potential Threats in Murky Waters
From ACM News

­nderwater Robots Identify Potential Threats in Murky Waters

Harbor Branch Oceanographic Institute at Florida Atlantic University has received $2 million from the U.S. Department of Defense, Office of Naval Research, to continue...

From ACM TechNews

IBM Claims Privacy Breakthrough For Cloud, Data

A lattice approach could be used to develop fully homomorphic encryption solutions, says IBM researcher Craig Gentry, a Stanford University Ph.D. candidate. Gentry's...

Iranian Protesters Avoid Censorship With Navy Technology
From ACM TechNews

Iranian Protesters Avoid Censorship With Navy Technology

Some Iranian protestors dissatisfied with their government's response to the disputed election are using The Onion Router (TOR), an Internet encryption program...

Community Colleges Mobilize to Train Cybersecurity Workers
From ACM TechNews

Community Colleges Mobilize to Train Cybersecurity Workers

Some experts project that the Obama administration's cybersecurity push will expand two-year colleges' role in supplying cybersecurity workers to government agencies...

From ACM News

­k Looks to Young Geeks to Secure Cyberspace

Britain is hiring former computer hackers to join a new security unit aimed at protecting cyberspace from foreign spies, thieves and terrorists, the country's terrorism...

From ACM TechNews

'secret' Questions Leave Accounts Vulnerable

The secret questions some Web sites ask new users to answer for verification purposes in case a password is forgotten are actually far less secure and far easier...

U.s. Creates Military Command For Cyber Battlefield
From ACM News

U.s. Creates Military Command For Cyber Battlefield

The U.S. military announced a new "cyber command" designed to wage digital warfare and to bolster defenses against mounting threats to its computer networks. Defense...

China Linked to 70 Percent of World's Spam, Expert Says
From ACM News

China Linked to 70 Percent of World's Spam, Expert Says

Nearly three-quarters of the Web sites advertised in computer spam studied by the University of Alabama at Birmingham (UAB) Spam Data Mine so far in 2009 are tied...

From ACM TechNews

­csd Scientists Receive Innovation Research Awards From Hp Labs

University of California, San Diego (UCSD) computer scientists Amin Vahdat and Geoffrey Voelker are two of the 60 professors that will receive awards as part of...

Twitter Message Could Be Cyber Criminal at Work
From ACM News

Twitter Message Could Be Cyber Criminal at Work

Cyber criminals are setting snares that move at the speed of news. Panda Security, a Spain-based antivirus maker, has been monitoring an onslaught of links with...

From ACM TechNews

Futurephile: Knowledge Embedded in Everything

The day will come when everyone will wear glasses with a computer overlay capable of processing the faces of passersby and tell wearers if they have met someone...

From ACM TechNews

Administration Plans to Scale Back Real Id Law

U.S. Secretary of Homeland Security Janet Napolitano is calling on lawmakers to change the Real ID Act to make it more palatable to states. Eleven states have refused...

From ACM TechNews

E-Mail Surveillance Renews Concerns in Congress

A National Security Agency (NSA) operation involving surveillance of American residents' communications, especially domestic email, is fueling debate in the U.S...

Vinton Cerf: Outer Space Could be Next Frontier for Cybersecurity
From ACM TechNews

Vinton Cerf: Outer Space Could be Next Frontier for Cybersecurity

NASA and Google Internet evangelist Vinton Cerf are currently testing an extraterrestrial Internet that could lead to technology for use in securing ad hoc networks...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account