acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectManagement
authorSamuel Greengard
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Hidden Malware Ratchets Up Cybersecurity Risks
From Communications of the ACM

Hidden Malware Ratchets Up Cybersecurity Risks

Cybercriminals could be hiding malware payloads in places where commercial cybersecurity software is unable to detect it.

The Future of the Datacenter
From ACM News

The Future of the Datacenter

Existing and new technologies can help cut datacenters' carbon footprint.

The Eyes Have It
From ACM News

The Eyes Have It

Expanding the use of biometrics in device interfaces.

Will No-Code Crack the Code?
From ACM News

Will No-Code Crack the Code?

No-code platforms help non-coders program, but developers will always be needed.

Digital Technology Fans Firefighting
From ACM News

Digital Technology Fans Firefighting

New tools help firefighters identify the dynamics and characteristics of a fire—and respond more effectively.

Can a Free Internet Survive?
From ACM News

Can a Free Internet Survive?

Internet freedom is eroding on two fronts: the sheer number of efforts to block access to legitimate information, and the level of sophistication used.

What Is the Cost of Living Online?
From Communications of the ACM

What Is the Cost of Living Online?

The cost of powering streaming and other rapidly growing online services will not "take down the Internet."

Making Sense With Biology
From ACM News

Making Sense With Biology

Hybrid systems enhance the capabilities of electronics with biologics.

Will AI Rewrite Coding?
From ACM News

Will AI Rewrite Coding?

There is an emerging effort to tap artificial intelligence to write code based on short text descriptions of what the code should do.

Formal Software Verification Measures Up
From Communications of the ACM

Formal Software Verification Measures Up

Verified coding techniques use mathematical proofs to ensure code is error-free and hacker-resistant. Can the approach revolutionize software?

The Worsening State of Ransomware
From Communications of the ACM

The Worsening State of Ransomware

Sophisticated, dangerous ransomware is the new normal … and there is no simple fix.

The Scramble for Post-Quantum Cryptography
From ACM News

The Scramble for Post-Quantum Cryptography

Quantum computers are expected to undermine today's computer security.

Digital IDs Make Their Mark
From ACM News

Digital IDs Make Their Mark

Encrypted identification data on a smartcard or smartphone can deliver significant benefits while boosting security, but raise concerns about privacy and the potential...

Terahertz Networks Move Closer to Reality
From Communications of the ACM

Terahertz Networks Move Closer to Reality

The desire for faster, higher-frequency wireless networking is a constant. Terahertz technology could deliver large gains.

Virtual Reality Meets the Office
From ACM News

Virtual Reality Meets the Office

"Virtual meeting spaces greatly expand the possibilities for online communication—and, at their best, create an environment that parallels or exceeds real world...

Meet the Uninfectables
From ACM News

Meet the Uninfectables

Hospital wards, grocery stores, and food delivery services are turning to robotic devices to better navigate the pandemic.

Underwater Drones Make Waves
From ACM News

Underwater Drones Make Waves

Underwater drones offer scientists a glimpse into the world's least-known frontier.

Digital Twins Grow Up
From ACM News

Digital Twins Grow Up

The idea of creating digital twins to simulate real-world systems isn't new, but the concept is advancing rapidly.

In Search of a CRISPR Kill Switch
From ACM News

In Search of a CRISPR Kill Switch

The benefits of genetic engineering tool CRISPR have been widely discussed. But what if something goes wrong?

Weighing the Impact of GDPR
From Communications of the ACM

Weighing the Impact of GDPR

The EU data regulation will affect computer, Internet, and technology usage within and outside the EU; how it will play out remains to be seen.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account