acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM TechNews

Government Cyberattacks Militarize the Web

Distributed denial of service (DDOS) attacks are now being used by governments as another way to counter opposition, warns Arbor Networks senior security researcher...

From ACM TechNews

Berners-Lee: Semantic Web Will Have Privacy Built-In

World Wide Web Consortium director Sir Tim Berners-Lee says the Semantic Web will improve online privacy protection by allowing Internet users to control who can...

From ACM TechNews

Web Founder Issues 'snooping' Warning

Web pioneer and Massachusetts Institute of Technology professor Sir Tim Berners-Lee says more protection is needed to prevent Internet snooping and ensure that...

From ACM TechNews

IBM Looks to Secure Internet Banking With Usb Stick

A USB memory stick that can guarantee secure banking transactions even if a PC is tainted by malware has been developed by IBM's Zurich research laboratory.

The Grill: Jeannette M. Wing on the Hot Seat
From ACM TechNews

The Grill: Jeannette M. Wing on the Hot Seat

Carnegie Mellon University professor Jeannette M. Wing is an expert on computational thinking, the discipline of applying computer science's problem-solving methods...

Digital Revolutionaries Discuss Past, Future of Technology
From ACM TechNews

Digital Revolutionaries Discuss Past, Future of Technology

Microsoft technical fellow Butler Lampson, Google chief Internet evangelist Vinton Cerf, and Qualcomm chairman Irwin Jacobs discussed the past, present, and potential...

From ACM TechNews

Researchers Mine Millions of Metaphors Through Computer-Based Techniques

San Jose Mercury News (CA)A digital humanities project that started at Stanford University is teaching computers how to analyze text and extract metaphors to build...

From ACM TechNews

Oak Ridge Explores Cybots

Government Computer NewsThe Ubiquitous Network Transient Autonomous Mission Entities (UNTAME) program at Oak Ridge National Laboratory is working to develop technology...

From ACM TechNews

This Internet Fix Is No Pipe Dream

InfoWorldThe Internet's security problems could be corrected by exploiting existing standards and protocols for Web services, security, identity, and authentication...

From ACM TechNews

Cards on the Table: Low-Cost Tool Spots Software Security Flaws During Development Process

NCSU NewsNorth Carolina State University (NCSU) computer security experts have developed Protection Poker, a new risk management tool that helps software developers...

From ACM TechNews

Report From Dartmouth's Institute For Information Infrastructure Protection (i3p) Makes Cyber Security Research Recommendations

Dartmouth College's Institute for Information Infrastructure Protection (I3P) has given the U.S. Senate Committee on Homeland Security and Governmental Affairs...

From Communications of the ACM

A Difficult, Unforgettable Idea

On the 40th anniversary of Douglas C. Engelbart's "The Mother of All Demos," computer scientists discuss the event's influence — and imagine what could have been...

The Evolution of Virtualization
From Communications of the ACM

The Evolution of Virtualization

Virtualization is moving out of the data center and making inroads with mobile computing, security, and software delivery.

Crowd Control
From Communications of the ACM

Crowd Control

Researchers are turning to computers to help us take advantage of our own cognitive abilities and of the wisdom of crowds.

From ACM TechNews

Improved Sensor Technology Could Someday Keep Tabs on Terrorists By Remote Control

Rochester Institute of Technology (RIT) scientists are developing new optical sensors for use in unmanned air vehicles and surveillance drones that could track...

From ACM TechNews

Does Better Security Depend on a Better Internet?

The New York Times' recent article, "Do We Need a New Internet?," by John Markoff, has sparked debate in the research community over whether creating a secure Internet...

From ACM News

Chinese It Firm Accused of Links to Cyberwarfare

Beijing-based Venus Info Tech, a provider of IT network security to the Chinese military, has been accused of providing hacker services that help the Chinese government...

From ACM TechNews

Proposed Law Might Make Wi-Fi ­Users Help Cops

Congressional Republicans have introduced the Internet Security Act, legislation in the U.S. House and Senate that would require Internet service providers (ISPs)...

Does Drm Have a Future?
From ACM News

Does Drm Have a Future?

Digital rights management (DRM)  has emerged as a widespread tool to combat piracy. So far, however, DRM systems have proved highly inconvenient to consumers who...

From ACM TechNews

Stealthier Mac Attacks

A security expert at the recent Black Hat DC computer security conference demonstrated a technique for attacking the Mac operating system OS X without leaving any...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account