acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Cyberwar in ­kraine Falls Far Short of Russia's Full Powers
From ACM News

Cyberwar in ­kraine Falls Far Short of Russia's Full Powers

The tense on-the-ground standoff in Ukraine has already tipped into open hostilities online, with hackers targeting members of parliament and state agencies.

Since It Can't Sue ­s All, Getty Images Embraces Embedded Photos
From ACM News

Since It Can't Sue ­s All, Getty Images Embraces Embedded Photos

For the past decade or so, the best defense Getty Images could find against the right-click button on your mouse—home of the "copy" and "save" functions—has been...

The ­nlikely Tale of How Arm Came to Rule the World
From ACM News

The ­nlikely Tale of How Arm Came to Rule the World

This is a story about ARM Holdings, the mobile technology company.

Willow Garage's Last Days
From ACM News

Willow Garage's Last Days

In 2006, Scott Hassan, a prolific software engineer, started a research lab dedicated to robotics called Willow Garage.

How Airbus Is Debugging the A350
From ACM Careers

How Airbus Is Debugging the A350

A few times a month, Airbus Flight Test Engineer Patrick du Ché stands up from his desk, takes off his jacket and tie, walks to the coat rack in the corner of his...

The Race to Buy the Human Brains Behind Deep Learning Machines
From ACM Careers

The Race to Buy the Human Brains Behind Deep Learning Machines

Any aspiring science fiction writer looking for a good protagonist could do worse than ripping off the Wikipedia page for Demis Hassabis.

The Inside Story of Tor, the Best Internet Anonymity Tool the Government Ever Built
From ACM News

The Inside Story of Tor, the Best Internet Anonymity Tool the Government Ever Built

Last year, Edward Snowden turned over to the Guardian, a British newspaper, some 58,000 classified U.S. government documents.

The Bitcoin-Mining Arms Race Heats Up
From ACM News

The Bitcoin-Mining Arms Race Heats Up

Joel Flickinger's two-bedroom home in the hills above Oakland, Calif., hums with custom-built computing gear.

Does Bitcoin Have a Future in Politics?
From ACM News

Does Bitcoin Have a Future in Politics?

Representative Steve Stockman (R-Tex.) is no stranger to provocative proposals.

The Hidden Technology That Makes Twitter Huge
From ACM News

The Hidden Technology That Makes Twitter Huge

Consider the tweet.

University of Waterloo: Silicon Valley's Canadian Feeder School
From ACM Careers

University of Waterloo: Silicon Valley's Canadian Feeder School

Recent engineering graduate Mike McCauley is living the dream.

How BlackBerry Finally Found Its Buyer
From ACM News

How BlackBerry Finally Found Its Buyer

The BlackBerry melodrama may finally be coming to a close.

The Nba Will Now Track Every Player's Movements
From ACM News

The Nba Will Now Track Every Player's Movements

The National Basketball Association announced a contract with sports information company Stats to install player-tracking camera systems in every arena beginning...

Nsa Surveillance Makes For Strange Bedfellows
From ACM Opinion

Nsa Surveillance Makes For Strange Bedfellows

The controversy over U.S. government surveillance has produced a king-size collection of strange bedfellows. Beneath the covers one finds both amusing ironies and...

Vending Machines Get Smart to Accommodate the Cashless
From ACM Careers

Vending Machines Get Smart to Accommodate the Cashless

More than 40 percent of U.S. adults say they can go a week without paying for something with cash, according to a survey conducted by Rasmussen Reports last year...

How Syrian Hackers Found the New York Times's Australian Weak Spot
From ACM News

How Syrian Hackers Found the New York Times's Australian Weak Spot

A hacking attack launched by the Syrian Electronic Army may have targeted the New York Timesand other U.S. media companies, but the weak link was Melbourne IT (...

Medical Hacking Poses a Terrifying Threat, in Theory
From ACM News

Medical Hacking Poses a Terrifying Threat, in Theory

In the world of hypothetical cybercrime, not much is scarier than the hacked medical device.

New ATM Designs Imitate Online and Mobile Banking
From ACM News

New ATM Designs Imitate Online and Mobile Banking

Before heading to lunch, Kirsten Keary-Taylor, 29, uses an iPhone app to request $20 from a nearby ATM. Passing the cash machine on her way out, she scans it with...

Privacy Paradox: Americans Happy to Share Personal Data With Big Business
From ACM News

Privacy Paradox: Americans Happy to Share Personal Data With Big Business

It's official: Americans may freak out when government collects their data to track terrorists, but they would happily have banks use it to catch some jerk trying...

Spies Like ­s: How We All Helped Build Prism
From ACM Careers

Spies Like ­s: How We All Helped Build Prism

It used to be that the National Security Agency and its ilk had to pay through the nose for the latest in spying technology.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account