There is a growing belief among engineers and security experts that the only way to fix Internet security is to recreate the Internet from scratch. What a new...The New York Times From ACM TechNews | February 18, 2009
The online crime business has never been better and the rising threat of cybercrime stems from criminals' realization that the Internet offers a more profitable...National Journal From ACM TechNews | February 9, 2009
The European Union-funded HUMABIO project is combining new types of biometric recognition systems with the latest sensor technologies to develop better security...ICT Results From ACM TechNews | February 6, 2009
Malicious software code could infect an entire city in a period of several weeks by traveling over Wi-Fi networks that overlap each other, concludes a study by...Government Computer News From ACM TechNews | February 6, 2009
U.S. President Barack Obama has laid out a number of goals for improving the security of the nation's information networks. For instance, he has promised to declare...NextGov.com From ACM TechNews | January 30, 2009
Barack Obama's presidential campaign utilized the Internet and information technology unlike any previous political campaign. How politicians and the public interact...Samuel Greengard From Communications of the ACM | February 1, 2009
ACM members have a professional duty to ensure that the public comprehends and benefits from advances in computing.
Eugene H. Spafford From Communications of the ACM | February 1, 2009
Analysts have started the process of testing new Secure Hash Algorithm (SHA) candidates for flaws as part of the first round of the National Institute of Standards...Government Computer News From ACM TechNews | January 16, 2009
A group of 35 high-profile organizations, including the U.S. Department of Homeland Security and the National Security Agency's Information Assurance Division,...Computerworld From ACM TechNews | January 14, 2009
The National Science Foundation (NSF) wants to develop highly interpretive mathematical and computational algorithms and techniques to help the U.S. government...Network World From ACM TechNews | January 12, 2009
The sometimes contentious development of 64-bit systems shows how technology decisions can have unexpected, enduring consequences.John Mashey From Communications of the ACM | January 1, 2009
I would be hard-pressed to recall in my four decades as an ACM member a time as eventful and exceptional as recorded by ACM in FY08.
Stuart I. Feldman From Communications of the ACM | January 1, 2009
Climate researchers have no shortage of scientific issues on which to expend computer power. The biggest problem is choosing which one to tackle first.David Lindley From Communications of the ACM | January 1, 2009
A year after security researchers exposed a flaw in the Domain Name System (DNS), a permanent solution is finally being implemented. The DNSSEC protocol, which...Technology Review From ACM TechNews | January 7, 2009
Even with a struggling economy and record unemployment, certain IT skills will be in high demand in the coming year. Programming and application development will...Computerworld From ACM TechNews | December 31, 2008
The overall outlook for IT employment in 2009 is mixed, but some analysts say the U.S. federal economic stimulus package could add IT positions. Compared to jobs...Computerworld From ACM TechNews | December 29, 2008
The results of a two-day cyberwar simulation involving 230 representatives from U.S. government defense and security agencies, private companies, and civil groups...Reuters From ACM TechNews | December 22, 2008
Mobile phones will become the primary Internet device for most people by 2020, largely due to their increasing computing power, predicts the "Future of the Internet...Network World From ACM TechNews | December 17, 2008
Carnegie Mellon University's CyLab has surveyed 703 corporate board directors and found that only 36 percent of the respondents said their board was directly involved...Carnegie Mellon News From ACM TechNews | December 12, 2008