Daniel A. Spielman and colleague Shang-hua Teng solved the mystery of the Simplex Method using a technique called smoothed analysis…
From ACM NewsAllyn Jackson Commissioned by CACM Staff| January 31, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
Military bureaucracies around the world are likely to see offensive capabilities as increasingly attractive in any cyberwar, suggests the head of the computer...Technology Review From ACM News | December 19, 2011
In recent months, I've met at least three people who have been the victim of hackers who've taken over their Gmail accounts and sent out emails to everyone in...Technology Review From ACM News | December 15, 2011
Documents point to a huge industry that provides online surveillance tools to governments and police agencies.Technology Review From ACM News | December 13, 2011
How will users hack this one? The Kinect is a device that inherently grows and expands: Microsoft itself has come around to acknowledging that the oft-hackedreally...Technology Review From ACM News | December 8, 2011
"Carrier IQ" is a company that sells software to wireless companies that reports how well networks are performing in real-time, by sending performance data from...Technology Review From ACM News | December 5, 2011
A consortium providing the technology for a large-scale smart grid project says the software is nearly complete. Technology Review From ACM TechNews | October 28, 2011
The buzz starts low and quickly gets louder as a toy quadricopter flies in low over the buildings. It might look like flight enthusiasts having fun, but it could...Technology Review From ACM News | September 9, 2011
Researchers hope a new system could automatically scan the hours of CCTV footage police have to comb through to identify suspects without invading privacy.Technology Review From ACM News | August 31, 2011
Researchers have developed a laptop-sized device that emits a jamming signal whenever it detects an unauthorized wireless link being established between a medical...Technology Review From ACM TechNews | August 25, 2011
Microsoft researchers have developed a prototype data security system designed to ensure that information can only escape in an encrypted form that would be nearly...Technology Review From ACM TechNews | August 8, 2011
Ever since Google announced that its Android phones would be equipped with a "digital wallet" that allows users to pay for things simply by touching their phone...Technology Review From ACM News | August 5, 2011
The Mozilla Foundation recently released BrowserID, an experimental tool designed to change the way users identify themselves online by storing identity information...Technology Review From ACM TechNews | July 21, 2011
A pilot prediction market that can forecast major information security incidents before they occur is under development by information security researchers from...Technology Review From ACM TechNews | July 11, 2011
The Department of Homeland Security has announced an initiative to shore up security by squashing software bugs. This follows a slew of high-profile attacks on...Technology Review From ACM News | June 30, 2011
Users of online social media reveal more about themselves than they realize, and participation involves a great deal more trust than they think, suggests new research...Technology Review From ACM TechNews | June 22, 2011
Researchers have found that most personal computers that get infected with malware were targeted by pay-per-install services, which charge hacking gangs up to $180...Technology Review From ACM TechNews | June 10, 2011
Major corporations have made serious mistakes with information security recently, resulting in spectacular failures to protect business and customer records....Technology Review From ACM News | June 3, 2011
Recent weeks have been exciting for a relatively new kind of currency speculator. In just three weeks, the total value of a unique new digital currency called...Technology Review From ACM News | May 27, 2011
Third-party apps are the weakest link in user privacy on smart phones. They often get access to large quantities of user data, and there are few rules covering...Technology Review From ACM News | May 23, 2011