Daniel A. Spielman and colleague Shang-hua Teng solved the mystery of the Simplex Method using a technique called smoothed analysis…
From ACM NewsAllyn Jackson Commissioned by CACM Staff| January 31, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
To reduce conflicts within the Linux development community, the group has adopted a new code of conduct that comes in the form of a Linux patch. ZDNet From ACM TechNews | March 17, 2015
The Chinese Academy of Science plans to unveil a face-recognition payment application with near-perfect accuracy next year. ZDNet From ACM TechNews | September 10, 2014
The algorithm used by Google's Street View team to improve Google Maps also can beat CAPTCHAs with 99.8-percent accuracy. ZDNet From ACM TechNews | April 22, 2014
Women interested in the theory and practice of cybersecurity can now turn to a new scholarship program launched by Hewlett-Packard to support their studies. ZDNet From ACM TechNews | February 28, 2014
A security freelancer has published a proof-of-concept code for exploiting a security flaw in the Dual Elliptic Curve Deterministic Random Bit Generator. ZDNet From ACM TechNews | January 7, 2014
Microsoft has announced plans to launch three bug bounty programs designed to eliminate security vulnerabilities in its software. ZDNet From ACM TechNews | June 21, 2013
Israel is recruiting top students for a new cyberwarfare training program. The program shows how Israel is advancing in the field of cybernetics to develop "high...ZDNet From ACM TechNews | January 3, 2013
It appears that Osama bin Laden didn’t encrypt any of his computer files. If he had, U.S. authorities probably wouldn’t have been able to do much after confiscating...ZDNet From ACM News | May 4, 2012
The mysterious Stuxnet worm took center stage at the Virus Bulletin 2010 conference here with a prominent security researcher dropping a raw hint that Israel may...ZDNet From ACM News | October 1, 2010
There needs to be a global cybersecurity peace treaty to avert the threat of international cyberwar, whose effects would be more devastating than a tsunami, says...ZDNet UK From ACM TechNews | September 8, 2010
The issue of security is holding back its full potential of cloud computing. This was the gist of the keynote message presented Tuesday (March 2) by Art Coviello...ZDNet Asia From ACM News | March 3, 2010
The European Commission has proposed that software companies should be held liable for the security and efficiency of their products. Ovum's David Mitchell says...ZDNet Asia From ACM TechNews | June 12, 2009
Researchers from the Information Security Group (ISG) at Royal Holloway, University of London have discovered an underlying flaw in the OpenSSH encryption protocol...ZDNet K From ACM TechNews | May 21, 2009
A group of pioneers in the security field, whose work in encryption is used to protect Internet data and communications every day, spoke recently about the state...ZDNet Asia From ACM News | April 23, 2009
World Wide Web Consortium director Sir Tim Berners-Lee says the Semantic Web will improve online privacy protection by allowing Internet users to control who can...ZDNet K From ACM TechNews | March 16, 2009