acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectCommunications / Networking
authorThe New York Times
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


The Web's Inventor Regrets One Small Thing
From ACM TechNews

The Web's Inventor Regrets One Small Thing

Governments around the world have put more of their data on the Web this year than previous years, and the United States and Britain have led the way, said Sir...

Training to Climb an Everest of Digital Data
From ACM News

Training to Climb an Everest of Digital Data

It is a rare criticism of elite American university students that they do not think big enough. But that is exactly the complaint from some of the largest technology...

Nobel Awarded For Advances in Harnessing Light
From ACM News

Nobel Awarded For Advances in Harnessing Light

The mastery of light through technology was the theme of this year’s Nobel Prize in Physics as the Royal Swedish Academy of Sciences honored breakthroughs in fiber...

From ACM News

Netflix Awards $1 Million Prize and Starts a New Contest

Netflix, the movie rental company, has decided its million-dollar-prize competition was such a good investment that it is planning another one.  The company’srecommendation...

After the Transistor, a Leap Into the Microcosm
From ACM News

After the Transistor, a Leap Into the Microcosm

Gaze into the electron microscope display in Frances Ross’s laboratory here and it is possible to persuade yourself that Dr. Ross, a 21st-century materials scientist...

From ACM News

Defying Experts, Rogue Computer Code Still Lurks

Like a ghost ship, a rogue software program that glided onto the Internet last November has confounded the efforts of top security experts to eradicate the program...

Mining the Web for Feelings, Not Facts
From ACM TechNews

Mining the Web for Feelings, Not Facts

Opinions expressed on the Internet can determine the eventual success or failure of a product, and tools stemming from the emergent field of sentiment analysis...

Halted '03 Iraq Plan Illustrates ­.s. Fear of Cyberwar Risk
From ACM TechNews

Halted '03 Iraq Plan Illustrates ­.s. Fear of Cyberwar Risk

At the core of the U.S. Obama Administration and its Pentagon leadership's efforts to develop rules governing cyberwarfare is the question of whether offensive...

From ACM TechNews

Researchers Try to Stalk Botnets ­sed By Hackers

To track the spread of botnets, Sandia National Laboratories computer security specialists Rob Minnich and Don Rudish have converted a Dell Thunderbird supercomputer...

Data Center Overload
From ACM News

Data Center Overload

Much of the daily material of our lives is now dematerialized and outsourced to a far-flung, unseen network. The stack of letters becomes the e-mail database on...

From ACM News

The Wars of Words on Wikipedia's Outskirts

It is an interesting twist about Wikipedia that the most controversial, most heavily trafficked articles — on abortion, politics, virgin birth — are often the most...

From ACM TechNews

Obama Outlines Coordinated Cyber-Security Plan

U.S. President Barack Obama announced that the country's disjointed efforts to "deter, prevent, detect, and defend" against cyberattacks will now be run by the...

Pentagon Plans New Arm to Wage Computer Wars
From ACM TechNews

Pentagon Plans New Arm to Wage Computer Wars

The U.S. Pentagon is planning to establish a new cyberwarfare command as a complement to a soon-to-be-announced civilian computer network safety overhaul, according...

Tracking Cyberspies Through the Web Wilderness
From ACM TechNews

Tracking Cyberspies Through the Web Wilderness

The Internet is rife with cybercriminals and online eavesdroppers, and countering this threat is the job of cybersleuths. One of the key tools in cybersleuths'...

From ACM News

'kill Switch' Disables Stolen Laptops

A lost or stolen laptop or notebook computer is replaceable; the stolen data inside it may produce real owner's anxiety. Which makes Fujitsu's newly announced "security...

Cadets Trade the Trenches For Firewalls
From ACM TechNews

Cadets Trade the Trenches For Firewalls

Throughout the U.S. military there is heightened awareness that the threat of a computer attack is just as urgent as a physical attack, and that military units...

From ACM News

In Cellphone, India Reveals an Essence

Sometimes a technology comes along and crystallizes a cultural moment. Not since the automobile and the American in the 1950s, perhaps, have a technology and a...

Iranians and Others Outwit Net Censors
From ACM TechNews

Iranians and Others Outwit Net Censors

People around the world are circumventing their governments' censorship of Web content using tools developed and provided by a diverse coalition of political and...

From ACM TechNews

Panel Advises Clarifying U.S. Plans on Cyberwar

A report based on a three-year study by a panel assembled by the National Academy of Sciences says the United States does not have a clear military policy on how...

Computers Bring Efficiency to the Infrastructure
From ACM News

Computers Bring Efficiency to the Infrastructure

Low-cost sensors, clever software, and computing firepower are key ingredients of an emerging computing trend called smart infrastructure — efficient and environmentally...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account