acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


China's 600-Year-Old Forbidden City Comes Alive Online
From ACM News

China's 600-Year-Old Forbidden City Comes Alive Online

China's 600-year-old Forbidden City is renovating its Web site in a move to improve its offerings of Chinese culture. According to Hu Chui, head of the Palace Museum's...

­ci to Test Earthquake Damage Sensors in Newport
From ACM TechNews

­ci to Test Earthquake Damage Sensors in Newport

Researchers at UC Irvine are using sensor technology to test how water pipes are damaged in an earthquake, and the results could be used to build a public alert...

From ACM News

Defying Experts, Rogue Computer Code Still Lurks

Like a ghost ship, a rogue software program that glided onto the Internet last November has confounded the efforts of top security experts to eradicate the program...

From ACM TechNews

Html 5 Steps ­p

Microsoft Internet Explorer developers recently offered their feedback on the most recent draft of HTML version 5. Despite the fact that the entire Web is built...

From ACM TechNews

Managing Disasters With High-Tech Imaging Could Save Lives

The Information Products Laboratory for Emergency Response, a partnership between the Rochester Institute of Technology (RIT) and the University at Buffalo (UB)...

Online Social Networks Leak Personal Information to Third-Party Tracking Sites
From ACM TechNews

Online Social Networks Leak Personal Information to Third-Party Tracking Sites

A Worcester Polytechnic Institute (WPI) study by professor Craig Wills found that the practices of many popular social networking sites can make personal information...

The Evolution of Retweeting
From ACM TechNews

The Evolution of Retweeting

Twitter has announced that it will establish a set format for retweeting, or reposting another user's message, for use within the micro-blogging service. Retweeting...

Worldwide Battle Rages For Control of the Internet
From ACM TechNews

Worldwide Battle Rages For Control of the Internet

Governments in the Middle East and north Africa routinely block and censor Web sites to control political discussions, according to a new report on the region by...

Computer Science Meets Environmental Science
From Communications of the ACM

Computer Science Meets Environmental Science

Scientists share knowledge and seek collaborators at computational sustainability conference.

Facing an Age-Old Problem
From Communications of the ACM

Facing an Age-Old Problem

Researchers are addressing the computing challenges of older individuals, whose needs are different — and too often disregarded.

Medical Nanobots
From Communications of the ACM

Medical Nanobots

Researchers working in medical nanorobotics are creating technologies that could lead to novel health-care applications, such as new ways of accessing areas of...

Entering a Parallel Universe
From Communications of the ACM

Entering a Parallel Universe

The promise of parallel computing has run afoul of the harsh reality of Amdahl's Law, which puts a ceiling on the benefit of converting sequential code to parallel...

Mining the Web for Feelings, Not Facts
From ACM TechNews

Mining the Web for Feelings, Not Facts

Opinions expressed on the Internet can determine the eventual success or failure of a product, and tools stemming from the emergent field of sentiment analysis...

Web Tools Help Protect Human Rights Activists
From ACM TechNews

Web Tools Help Protect Human Rights Activists

A new generation of Internet privacy tools is being developed to prevent governments from gathering data, such as where users access the Internet from. One tool...

Competitions Aim to Create Interest in Cybersecurity
From ACM News

Competitions Aim to Create Interest in Cybersecurity

U.S. government, industry, and academia are using cybersecurity competitions to interest high school and college students about the career opportunities in cybersecurity...

Wi-Fi via White Spaces
From ACM TechNews

Wi-Fi via White Spaces

The transition from analog to digital broadcasts has opened up radio spectrum that could be used to deliver long-range, low-cost wireless Internet service using...

Computer Scientists Scale 'Layer 2' Data Center Networks to 100,000 Ports and Beyond
From ACM TechNews

Computer Scientists Scale 'Layer 2' Data Center Networks to 100,000 Ports and Beyond

University of California, San Diego (UCSD) researchers have developed software designed to enable data centers to function as single, scalable, plug-and-play networks...

Pay-Per-Email Plan to Beat Spam and Help Charity
From ACM TechNews

Pay-Per-Email Plan to Beat Spam and Help Charity

Yahoo! researchers are testing a scheme in which users pay one cent for each email message they send, with the money going to charity, in an effort to cut back...

Mobile Data Show Friend Networks
From ACM TechNews

Mobile Data Show Friend Networks

A study published in Proceedings of the National Academy of Sciences shows that friendships can be inferred with 95% accuracy by studying cellphone call records...

Making Android More Secure
From ACM TechNews

Making Android More Secure

Google developed a new approach to mobile phone security with its open source Android operating system. Android developer Rich Cannings says there must be a balance...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account