Sign In

Communications of the ACM

News


An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


New Deep Learning Techniques Analyze Athletes' Decision-Making
From ACM TechNews

New Deep Learning Techniques Analyze Athletes' Decision-Making

A new automated method based on deep-learning techniques will provide coaches and teams with a tool to help assess defensive athletic performance in all game situations...

Researchers Can Predict Terrorist Behaviors With More Than 90 Percent Accuracy
From ACM TechNews

Researchers Can Predict Terrorist Behaviors With More Than 90 Percent Accuracy

The Networked Pattern Recognition Framework works to predict future terrorist behaviors by defining past attack patterns.

Researchers Store Computer Operating System and Short Movie on DNA
From ACM TechNews

Researchers Store Computer Operating System and Short Movie on DNA

Researchers have found an algorithm designed for streaming video on a cellphone can unlock DNA's storage potential by squeezing more data into its four base nucleotides...

Predicting Lawsuits
From ACM News

Predicting Lawsuits

Deep learning yields the ability to forecast the potential for litigation.

Robots Could Look, Feel 'Human' on the Outside
From ACM TechNews

Robots Could Look, Feel 'Human' on the Outside

Researchers say technology is available to enable robots to "wear" human tendons, muscle, and skin.

Magnetic Hard Drives Go Atomic
From ACM News

Magnetic Hard Drives Go Atomic

Chop a magnet in two, and it becomes two smaller magnets.

How the CIA's Hacking Hoard Makes Everyone Less Secure
From ACM News

How the CIA's Hacking Hoard Makes Everyone Less Secure

When Wikileaks yesterday released a trove of documents purporting to show how the CIA hacks everything from smartphones to PCs to smart televisions, the agency's...

Top Obstacles for Women in Technology
From ACM TechNews

Top Obstacles for Women in Technology

Women face major barriers when working in technology fields, including wage inequality compared to male colleagues, workplace gender bias, a shortage of female...

The Darknet Protects Itself by Being More Robust Against Attacks
From ACM TechNews

The Darknet Protects Itself by Being More Robust Against Attacks

Researchers have found the darknet is especially good at protecting users' privacy and anonymity because it can counter large cyberattacks on its own by spontaneously...

Steering a Turtle With Your Thoughts
From ACM TechNews

Steering a Turtle With Your Thoughts

Researchers have developed a brain-computer interface that can control a turtle using human thought.

Aging Faces Could Increase Security Risks
From ACM TechNews

Aging Faces Could Increase Security Risks

Researchers are studying how facial aging affects the performance of automatic facial-recognition systems and what implications this could have on identifying criminals...

Language Learning Robot Could Advance Autonomous Vehicles, Help Emergency Responders in the Future
From ACM TechNews

Language Learning Robot Could Advance Autonomous Vehicles, Help Emergency Responders in the Future

Researchers have developed algorithms that enable a wheeled robot to learn the meanings of words from sentences that describe example paths taken by the robot,...

Quantum Microscope Offers MRI for Molecules
From ACM News

Quantum Microscope Offers MRI for Molecules

A quantum microscope that uses a sensor built from diamonds could allow researchers to study such nanoscale mysteries as how DNA folds in a cell, why drugs work...

Wikileaks: The CIA Is Using Popular TVs, Smartphones and Cars to Spy on Their Owners
From ACM News

Wikileaks: The CIA Is Using Popular TVs, Smartphones and Cars to Spy on Their Owners

The latest revelations about U.S. government's powerful hacking tools potentially takes surveillance right into the homes and hip pockets of billions of users worldwide...

Mathematician Breaks Down How to Defend Against Quantum Computing Attacks
From ACM TechNews

Mathematician Breaks Down How to Defend Against Quantum Computing Attacks

A mathematician has created and released software that could protect encrypted code from hackers armed with next-generation quantum computers.

Tracking the Movement of Cyborg Cockroaches
From ACM TechNews

Tracking the Movement of Cyborg Cockroaches

North Carolina State University's cyborg cockroaches can be remotely controlled to carry technology that could scan disaster areas and identify survivors in the...

Google Computers Trained to Detect Cancer
From ACM TechNews

Google Computers Trained to Detect Cancer

Google has developed a new breast cancer detection technique that utilizes machine learning, predictive analytics, and pattern recognition to train a computer to...

How Hard Is It to Get an Intelligence Wiretap? Pretty Hard. 
From ACM News

How Hard Is It to Get an Intelligence Wiretap? Pretty Hard. 

Wiretaps on Americans in foreign intelligence investigations are not easy to get. And if you're a candidate for president, it's even harder. 

Modeling Gun Violence as a Contagion
From ACM News

Modeling Gun Violence as a Contagion

Using data to try to keep people from getting shot.

Using Game Theory to Predict Cyberattacks on Elections and Voting Machines
From ACM TechNews

Using Game Theory to Predict Cyberattacks on Elections and Voting Machines

An algorithm based on game theory can be used to protect against efforts to tamper with election results.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo