Sign In

Communications of the ACM

News


An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Glove-Like Device Mimics Sense of Touch
From ACM TechNews

Glove-Like Device Mimics Sense of Touch

A soft wearable device developed by engineers at the University of New South Wales Sydney in Australia recreates the sense of touch using haptic technology.

Woman Becomes First Healthcare Cyberattack Death
From ACM TechNews

Woman Becomes First Healthcare Cyberattack Death

A woman in Germany suffering a life-threatening illness was the first person to die from a cyberattack on a healthcare system.

Huang’s Law Is the New Moore’s Law, and Explains Why Nvidia Wants Arm
From ACM News

Huang’s Law Is the New Moore’s Law, and Explains Why Nvidia Wants Arm

The rule that the same dollar buys twice the computing power every 18 months is no longer true, but a new law—which we named for the CEO of Nvidia, the company...

Data Processing Module Makes Deep Neural Networks Smarter
From ACM TechNews

Data Processing Module Makes Deep Neural Networks Smarter

Researchers have enhanced deep neural network performance by integrating feature normalization and feature attention modules into a hybrid attentive normalization...

Automated Mobility District 'Digital Twin' Provides Insights for Urban Transportation Systems
From ACM TechNews

Automated Mobility District 'Digital Twin' Provides Insights for Urban Transportation Systems

Researchers have developed a modeling and simulation toolkit to help researchers and city planners determine the specific advantages and disadvantages of urban...

Smart Transportation Systems Need to Reckon with Rogues
From ACM TechNews

Smart Transportation Systems Need to Reckon with Rogues

Arizona State University engineers have come up with an algorithm that manages autonomous vehicle traffic through intersections safely, under real-life conditions...

Police Drones Take to U.K. Skies
From ACM TechNews

Police Drones Take to U.K. Skies

U.K. police agencies are trying out the use of aerial drones to support ground-based forces in scenarios where helicopter or aircraft deployments may be less practical...

The Phish Scale: NIST-Developed Method Helps IT Staff See Why Users Click on Fraudulent Emails
From ACM TechNews

The Phish Scale: NIST-Developed Method Helps IT Staff See Why Users Click on Fraudulent Emails

The Phish Scale could help organizations better train their employees to avoid being deceived by seemingly trustworthy emails.

Walmart Launches On-Demand Drone Delivery Pilot
From ACM TechNews

Walmart Launches On-Demand Drone Delivery Pilot

Walmart said it has partnered with end-to-end drone delivery company Flytrex to roll out an on-demand drone delivery pilot program in Fayetteville, NC.

Genetic Analysis Method Could Advance Personal Genomics
From ACM TechNews

Genetic Analysis Method Could Advance Personal Genomics

The laboratory ofJohns Hopkins University's Alexis Battle developed software that could help identify more causes of genetic disorders, especially when used with...

Millions of WordPress Sites Are Being Probed, Attacked With Recent Plugin Bug
From ACM TechNews

Millions of WordPress Sites Are Being Probed, Attacked With Recent Plugin Bug

Defiant Inc. reports millions of WordPress sites have been attacked by hackers exploiting a zero-day vulnerability in the "File Manager" WordPress plugin.

Insights Into Dreams and What They Say About Us
From ACM TechNews

Insights Into Dreams and What They Say About Us

Computer scientists are using artificial intelligence and digital databases to examine dreams and potentially identify mental issues.

Smartphones Can Predict Brain Function Associated with Anxiety, Depression
From ACM TechNews

Smartphones Can Predict Brain Function Associated with Anxiety, Depression

A study from Dartmouth College found information from smartphones can predict connectivity between brain regions that govern emotion, and anticipate neural functions...

AI Tech to Spot Dangerous Drivers
From ACM TechNews

AI Tech to Spot Dangerous Drivers

An automated system for vehicle license plate recognition could help identify dangerous drivers in real time before an incident occurs.

Malware Gang Uses .NET Library to Generate Excel Docs That Bypass Security Checks
From ACM TechNews

Malware Gang Uses .NET Library to Generate Excel Docs That Bypass Security Checks

Security researchers at NVISO Labs discovered a malware gang is using a .NET library to create malicious Excel files.

Computational Model Stands to Make NMR an Even More Powerful Tool for Researchers
From ACM TechNews

Computational Model Stands to Make NMR an Even More Powerful Tool for Researchers

A computational model developed at the U.S. Department of Energy's Ames Laboratory could make Nuclear Magnetic Resonance spectroscopy a more powerful research tool...

Cities Tap AI to Regulate Short-Term Rentals as Travel Picks Up
From ACM TechNews

Cities Tap AI to Regulate Short-Term Rentals as Travel Picks Up

U.S. cities and towns are using artificial intelligence to monitor and regulate short-term rentals, with some hoping to spot tax-revenue opportunities during the...

Privacy, Blockchain, and IoT--Can We Keep Control of Our Own Identities?
From ACM TechNews

Privacy, Blockchain, and IoT--Can We Keep Control of Our Own Identities?

Research has found privacy issues innate to current blockchain platforms, suggesting the technology requires further refinement for consideration of privacy rights...

Can AI Detect Dyslexia?
From ACM News

Can AI Detect Dyslexia?

Researchers try to fill the void of simple, inexpensive dyslexia detection tools with a game, and with handwriting analysis, both supported by artificial intelligence...

Secretive Pentagon Research Program Looks to Replace Human Hackers with AI
From ACM News

Secretive Pentagon Research Program Looks to Replace Human Hackers with AI

Project IKE tracks every keystroke made by 200 fighters working on computers, and churns out predictions about the possibility of success on individual cyber missions...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account