acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Silicon Valley Tech Workers Earning Less Than in 2000
From ACM News

Silicon Valley Tech Workers Earning Less Than in 2000

While some of the latest government wage data appears to show that Silicon Valley's high-tech workers are making more now than they did in 2000, a closer look at...

From ACM News

Police Want Backdoor to Web Users' Private Data

count likely knows that police can peek inside it if they have a paper search warrant. But cybercrime investigators are frustrated by the speed of traditionalone...

From ACM News

U.S. Cyberwar Strategy: The Pentagon Plans to Attack

The China-U.S. diplomatic spat over cyberattacks on Google has highlighted the growing significance of the Internet as a theater of combat. Deputy Defense Secretary...

What's Inside the Ipad's Chip?
From ACM News

What's Inside the Ipad's Chip?

Despite widespread speculation, nothing beyond what Steve Jobs announced last week is known about the A4 chip at the heart of the Apple iPad. Jobs described the...

Obama Budget Boosts Science, Innovation
From ACM TechNews

Obama Budget Boosts Science, Innovation

U.S. President Barack Obama has proposed spending $3.7 billion on science, technology, engineering, and math education in his 2011 budget, including increasing...

Competition Seeks to Attract More Women Into It
From ACM TechNews

Competition Seeks to Attract More Women Into It

Britain's Women in Technology has teamed up with the National IT Learning Center to introduce the Rise of the Cyberella Competition, which will provide funding...

From ACM TechNews

Best Connected Individuals Are Not the Most Influential Spreaders in Social Networks

Boston University researchers have developed a method for studying and identifying hubs within social networks. The approach emphasizes the location of the individual...

Web Exhibit Tells Story of Laser's Invention
From ACM News

Web Exhibit Tells Story of Laser's Invention

Military agencies wanted a death ray, and they were willing to pay for it. That was one of the forces spurring scientists in a race that ended with the invention...

From ACM News

Trail of Iowa Computer Hack Points to China

Iowa investigators suspect a serious breach of a state government computer database last week originated in China. The hackers gained access to a computer system...

DARPA Develops 4-Legged Robot to Haul Equipment Over Rugged Terrain
From ACM News

DARPA Develops 4-Legged Robot to Haul Equipment Over Rugged Terrain

Looking like a robotic mule, the Legged Squad Support System (LS3) being developed by the Defense Advanced Research Projects Agency will carry 400 pounds of equipment...

From ACM News

Acacia: The Company Tech Loves to Hate

For a company that makes no products, Acacia Research spends a lot of time fighting over patents in court. Acacia has filed at least 337 patent-related lawsuits...

Videogame Glitches Open the World of Computing to Students
From ACM News

Videogame Glitches Open the World of Computing to Students

Why is the National Science Foundation helping Morehouse College pay students to test videogames? The school's Glitch Game Testers program is one of many NSF efforts...

Computer Model Demonstrates That White Roofs May Successfully Cool Cities
From ACM News

Computer Model Demonstrates That White Roofs May Successfully Cool Cities

Painting the roofs of buildings white has the potential to significantly cool cities and mitigate some impacts of global warming, a new study indicates. The research...

From ACM News

Google Attack Highlights 'zero-Day' Black Market

The recent hacking attack that prompted Google's threat to leave China is underscoring the heightened dangers of previously undisclosed computer security flaws...

Hacking For Fun and Profit in China's Underworld
From ACM News

Hacking For Fun and Profit in China's Underworld

With a few quick keystrokes, a computer hacker who goes by the code name Majia calls up a screen displaying his latest victims. He operates secretly and illegally...

The Uncertain Future For Social Robots
From ACM News

The Uncertain Future For Social Robots

Being hacked by a robot requires much less hardware than I expected. There’s no need for virtual-reality goggles or 3D holograms. There are no skullcaps studded...

Survey Reveals Ways to Enhance Teens' Interest in STEM
From ACM TechNews

Survey Reveals Ways to Enhance Teens' Interest in STEM

A recent Lemelson-MIT Invention Index survey found that teens are enthusiastic about science, technology, engineering, and mathematics (STEM), with 77 percent interested...

Game Changers: How Videogames Trained a Generation of Athletes
From ACM News

Game Changers: How Videogames Trained a Generation of Athletes

The situation was desperate for the Denver Broncos. On the first Sunday of the National Football League’s 2009 season, with only 28 seconds left in the game, they...

From ACM News

U.k. Report on Chinese Spying 'unsubstantiated'

A Chinese military expert Sunday (January 31) refuted claims by the U.K.'s national security intelligence agency that China has engaged in commercial espionage,...

Smart Dust? Not Quite, but We
From ACM News

Smart Dust? Not Quite, but We

In computing, the vision always precedes the reality by a decade or more. The pattern has held true from the personal computer to the Internet, as it takes time...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account