acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM TechNews

A New Internet?

There is a growing belief among engineers and security experts that the only way to fix Internet security is to recreate the Internet from scratch. What a new...

From ACM TechNews

The Cybercrime Wave

The online crime business has never been better and the rising threat of cybercrime stems from criminals' realization that the Internet offers a more profitable...

From ACM TechNews

Fingerprints and Faces Can Be Faked, But Not Brain Patterns

The European Union-funded HUMABIO project is combining new types of biometric recognition systems with the latest sensor technologies to develop better security...

From ACM TechNews

Wi-Fi Networks Offer Rich Environment For Spread of Worms

Malicious software code could infect an entire city in a period of several weeks by traveling over Wi-Fi networks that overlap each other, concludes a study by...

From ACM TechNews

Obama ­Unveils Cybersecurity Agenda

U.S. President Barack Obama has laid out a number of goals for improving the security of the nation's information networks. For instance, he has promised to declare...

The First Internet President
From Communications of the ACM

The First Internet President

Barack Obama's presidential campaign utilized the Internet and information technology unlike any previous political campaign. How politicians and the public interact...

USACM's Policy Role
From Communications of the ACM

USACM's Policy Role

ACM members have a professional duty to ensure that the public comprehends and benefits from advances in computing.

From ACM TechNews

Let the Cracking Begin

Analysts have started the process of testing new Secure Hash Algorithm (SHA) candidates for flaws as part of the first round of the National Institute of Standards...

From ACM TechNews

Group Details 25 Most Dangerous Coding Errors Hackers Exploit

A group of 35 high-profile organizations, including the U.S. Department of Homeland Security and the National Security Agency's Information Assurance Division,...

From ACM TechNews

Nsf Looking For Wicked Cool Visual and Data Analysis Algorithms

The National Science Foundation (NSF) wants to develop highly interpretive mathematical and computational algorithms and techniques to help the U.S. government...

The Long Road to 64 Bits
From Communications of the ACM

The Long Road to 64 Bits

The sometimes contentious development of 64-bit systems shows how technology decisions can have unexpected, enduring consequences.

ACM's Annual Report
From Communications of the ACM

ACM's Annual Report

I would be hard-pressed to recall in my four decades as an ACM member a time as eventful and exceptional as recorded by ACM in FY08.

A Pioneer Woman
From Communications of the ACM

A Pioneer Woman

Programmer Jean Bartik is inducted into the Computer History Museum's Hall of Fellows.

Calculating the Future
From Communications of the ACM

Calculating the Future

Climate researchers have no shortage of scientific issues on which to expend computer power. The biggest problem is choosing which one to tackle first.

From ACM TechNews

A New Web of Trust

A year after security researchers exposed a flaw in the Domain Name System (DNS), a permanent solution is finally being implemented. The DNSSEC protocol, which...

From ACM TechNews

The 9 Hottest Skills For '09

Even with a struggling economy and record unemployment, certain IT skills will be in high demand in the coming year. Programming and application development will...

From ACM TechNews

Stimulus Could Boost It Job Prospects

The overall outlook for IT employment in 2009 is mixed, but some analysts say the U.S. federal economic stimulus package could add IT positions. Compared to jobs...

From ACM TechNews

­U.S. Not Ready For Cyber Attack

The results of a two-day cyberwar simulation involving 230 representatives from U.S. government defense and security agencies, private companies, and civil groups...

From ACM TechNews

Mobile Phones to Be Primary Internet Device By 2020, Experts Predict

Mobile phones will become the primary Internet device for most people by 2020, largely due to their increasing computing power, predicts the "Future of the Internet...

From ACM TechNews

Carnegie Mellon Cylab Survey ­Unveils Major Gap in the Way ­U.S. Boards and CEOs Manage Cyber Risks

Carnegie Mellon University's CyLab has surveyed 703 corporate board directors and found that only 36 percent of the respondents said their board was directly involved...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account