acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Standards to Secure the Sensors That Power IoT
From Communications of the ACM

Standards to Secure the Sensors That Power IoT

Existing security standards do not always offer sufficient protection to secure the Internet of Things.

Locking Down Secure Open Source Software
From Communications of the ACM

Locking Down Secure Open Source Software

Can even secure open source software ever be considered truly safe?

. . . And the Computer Plays Along
From Communications of the ACM

. . . And the Computer Plays Along

Software can improvise on the spot to accompany the performance of live musicians.

Neural Networks for Drug Discovery and Design
From Communications of the ACM

Neural Networks for Drug Discovery and Design

Architectures suited for molecules streamline the identification of pharmaceutical candidates.

Adding Smarts to Vending Machines Drives Convenience, Efficiency
From Communications of the ACM

Adding Smarts to Vending Machines Drives Convenience, Efficiency

Advanced feature sets and functionality are projected to drive the market for connected vending to nearly nine million units by 2024.

Virtual Influencers in the Real World
From Communications of the ACM

Virtual Influencers in the Real World

We are increasingly engaging with these digital personalities, online and offline.

How Brain Chips Can Change You
From ACM News

How Brain Chips Can Change You

Studies show Elon Musk's new tech can bend your mind in strange and troubling ways.

Computational Linguistics Finds Its Voice
From Communications of the ACM

Computational Linguistics Finds Its Voice

Advances in artificial intelligence permit computers to converse with humans in seemingly realistic ways.

Can AI Demonstrate Creativity?
From Communications of the ACM

Can AI Demonstrate Creativity?

When fed a sufficient amount of training data, artificial intelligence techniques can be used to generate new ideas in several different ways. Is that creativity...

Making Traffic a Thing of the Past
From Communications of the ACM

Making Traffic a Thing of the Past

New AI technologies are making it possible to autonomously reduce traffic.

Preserving the Past with Immersive Technologies
From Communications of the ACM

Preserving the Past with Immersive Technologies

Digital technologies such as virtual reality, augmented reality, and holograms allow museums and other institutions to preserve historical events and tell stories...

The Impact of Virtual Meetings
From Communications of the ACM

The Impact of Virtual Meetings

Virtual meetings have mixed effects on employee productivity, creativity, and relationships.

Applying the Metaverse
From Communications of the ACM

Applying the Metaverse

Business, entertainment, and fashion companies already are staking their claims in this enhanced virtual world.

Stealthy Hackers Target Military, Weapons Contractors
From ACM News

Stealthy Hackers Target Military, Weapons Contractors

Analysts at Securonix discovered the attacks but couldn't attribute the campaign to any known threat actors, despite some similarities to past APT37 (Konni) attacks...

Applied AI Teaches Handwriting
From Communications of the ACM

Applied AI Teaches Handwriting

In an increasingly digital world, how do you teach students cursive handwriting?

An Apple Watch for Your Five-Year-Old?
From ACM TechNews

An Apple Watch for Your Five-Year-Old?

Parents in the U.S. are increasingly buying Apple Watches for children as young as five years old as a short-term substitute for cellphones.

Competition Makes Big Datasets the Winners
From Communications of the ACM

Competition Makes Big Datasets the Winners

Measurement has driven research groups to home in on the most popular datasets, but that may change as metrics shift to real-world quality.

The Road to 6G
From Communications of the ACM

The Road to 6G

Looking past 5G to sixth-generation wireless technology.

Thinking Like a Cyber-Attacker to Protect User Data
From ACM TechNews

Thinking Like a Cyber-Attacker to Protect User Data

Researchers exploit computer processor's on-chip interconnect to launch side-channel attacks.

AI Model Recommends Personalized Fonts to Improve Reading, Accessibility
From ACM TechNews

AI Model Recommends Personalized Fonts to Improve Reading, Accessibility

Model matches reader characteristics, such as font familiarity and age, with specific font characteristics, such as heavier weight.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account