acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM TechNews

Obama Outlines Coordinated Cyber-Security Plan

U.S. President Barack Obama announced that the country's disjointed efforts to "deter, prevent, detect, and defend" against cyberattacks will now be run by the...

Contractors Vie For Plum Work, Hacking For U.s.
From ACM News

Contractors Vie For Plum Work, Hacking For U.s.

The U.S. government’s urgent push into cyberwarfare has set off a rush among the biggest military companies for billions of dollars in new defense contracts. The...

Pentagon Plans New Arm to Wage Computer Wars
From ACM TechNews

Pentagon Plans New Arm to Wage Computer Wars

The U.S. Pentagon is planning to establish a new cyberwarfare command as a complement to a soon-to-be-announced civilian computer network safety overhaul, according...

New Puzzles That Tell Humans From Machines
From ACM News

New Puzzles That Tell Humans From Machines

To stay one jump ahead of fraudsters and their automated rogue programs, researchers are devising more versions of CAPTCHA (Completely Automated Public Turing test...

IBM Unveils Real-Time Software to Find Trends in Vast Data Sets
From ACM TechNews

IBM Unveils Real-Time Software to Find Trends in Vast Data Sets

IBM has unveiled System S, stream processing software capable of receiving huge volumes of data from numerous sources and quickly identifying correlations within...

Tracking Cyberspies Through the Web Wilderness
From ACM TechNews

Tracking Cyberspies Through the Web Wilderness

The Internet is rife with cybercriminals and online eavesdroppers, and countering this threat is the job of cybersleuths. One of the key tools in cybersleuths'...

From ACM News

'kill Switch' Disables Stolen Laptops

A lost or stolen laptop or notebook computer is replaceable; the stolen data inside it may produce real owner's anxiety. Which makes Fujitsu's newly announced "security...

Cadets Trade the Trenches For Firewalls
From ACM TechNews

Cadets Trade the Trenches For Firewalls

Throughout the U.S. military there is heightened awareness that the threat of a computer attack is just as urgent as a physical attack, and that military units...

From ACM News

In Cellphone, India Reveals an Essence

Sometimes a technology comes along and crystallizes a cultural moment. Not since the automobile and the American in the 1950s, perhaps, have a technology and a...

Iranians and Others Outwit Net Censors
From ACM TechNews

Iranians and Others Outwit Net Censors

People around the world are circumventing their governments' censorship of Web content using tools developed and provided by a diverse coalition of political and...

From ACM TechNews

Panel Advises Clarifying U.S. Plans on Cyberwar

A report based on a three-year study by a panel assembled by the National Academy of Sciences says the United States does not have a clear military policy on how...

Computers Bring Efficiency to the Infrastructure
From ACM News

Computers Bring Efficiency to the Infrastructure

Low-cost sensors, clever software, and computing firepower are key ingredients of an emerging computing trend called smart infrastructure — efficient and environmentally...

From ACM TechNews

­U.S. Steps ­Up Effort on Digital Defenses

The United States is engaged in an international race to develop both cyberweapons and cyberdefenses. Thousands of daily attacks on federal and private computer...

G.e.'s Breakthrough Can Put 100 Dvds on a Disc
From ACM TechNews

G.e.'s Breakthrough Can Put 100 Dvds on a Disc

General Electric (GE) holographic researchers have announced a digital storage breakthrough that will enable standard-sized disks to hold the equivalent of 100...

Ibm Computer Program to Take on 'jeopardy!'
From ACM TechNews

Ibm Computer Program to Take on 'jeopardy!'

IBM is developing software designed to compete against human "Jeopardy!" contestants, which, if successful, could mark a major advancement in artificial intelligence...

From ACM TechNews

Experts See Early Activity From the Conficker Worm

An informal group of computer security experts said they have observed early attempts by the Conficker virus to communicate with a control server, but they are...

Rivals Say I.b.m. Stifles Competition to Mainframes
From ACM News

Rivals Say I.b.m. Stifles Competition to Mainframes

I.B.M. has dominated the mainframe computer business since the category was created four decades ago. And it still gets about one-quarter of its $100 billion in...

Scientists Publish Map of Knowledge
From ACM TechNews

Scientists Publish Map of Knowledge

Scientists at the research library of the Los Alamos National Laboratory have developed a map of knowledge that better reflects the actual use of information by...

From ACM TechNews

Fight Over Internet Filtering Has a Test Run in Europe

Europe's influence over technology regulation has led U.S. companies to send lobbyists to try and influence European lawmakers as they debate Internet access policy...

From ACM TechNews

The Real High-Tech Immigrant Problem: They're Leaving

New York TimesLanguage in the U.S. bank bailout legislation that discourages banks from recruiting skilled foreign workers on work visas has re-ignited the controversy...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account