acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Digital Cloud Plan For City Skies
From ACM News

Digital Cloud Plan For City Skies

A giant "digital cloud" that would "float" above London's skyline has been outlined by an international team of architects, artists and engineers. The construction...

From ACM News

Wi-Fi Certification Might Be Tweaked For Smart Grids

The Wi-Fi Alliance has formed a task group to determine what standards need to be modified to ensure Wi-Fi is the tool of choice for smart-grid applications. The...

Netbook Apps Demand Dedicated Development Techniques
From ACM News

Netbook Apps Demand Dedicated Development Techniques

Netbooks have grown in popularity and with them a demand for software. But developers who assume there's no need to create applications differently when they enter...

What Happens When Good Robots Go 'bad'?
From ACM TechNews

What Happens When Good Robots Go 'bad'?

A study by University of Washington researchers led by doctoral student Tamara Denning calls attention to the possibility of household robots being hacked by malevolent...

From ACM TechNews

Social Tags Complement the Learning Resource Metadata, Researcher Finds

Social tagging can help people find educational resources in digital repositories that are filled with millions of learning materials, says Open University of the...

Nasa Showcases 'green' Missions at Sc09 Conference
From ACM TechNews

Nasa Showcases 'green' Missions at Sc09 Conference

Milestones by five NASA research centers in the fields of science, engineering, and technology will be showcased at the ACM-sponsored SC09 supercomputing conference...

Web Security Tool Copies Apps' Moves
From ACM TechNews

Web Security Tool Copies Apps' Moves

Scientists at Microsoft research have unveiled Ripley, a new way to secure complex Web applications by effectively cloning the user's browser and running it remotely...

Metagenomics and the Computing Challenges of Microbial Communities
From ACM TechNews

Metagenomics and the Computing Challenges of Microbial Communities

New technologies are enabling researchers to sequence samples of microorganisms taken from their environment, but the relatively new field of metagenomics still...

From ACM News

Terrorism in the Age of Technology: Biothreats And?cyber Warfare

While once considered unconventional, cyber attacks and biological warfare have become an increasing threat to security and a tactic of rising concern. Spanning...

From ACM News

Now We Know Where We Stand, and It's About Time

America has seen its last Lost Generation. Thanks to an invisible armada of incessantly broadcasting satellites, collectively called the Global Positioning System...

Rutgers Computer Scientists Work to Strengthen Online Security
From ACM TechNews

Rutgers Computer Scientists Work to Strengthen Online Security

Rutgers University computer scientists are developing an alternative to online security questions that is designed to be easier for legitimate users and more secure...

China Plans For Humanoid Olympics
From ACM TechNews

China Plans For Humanoid Olympics

China has announced plans to hold a robot Olympics in 2010, in which humanoid robots will compete in 16 different events ranging from athletics to machine-related...

Grant Will Improve Mobile Device, Cellular Network Security
From ACM News

Grant Will Improve Mobile Device, Cellular Network Security

Smart phones have become indispensable to today's highly mobile workforce and tech-savvy youngsters, but they pose new security and privacy risks. Two assistant...

From ACM TechNews

­nlimited Compute Capacity Coming, IBM Says

IBM Canada Lab director Martin Wildberger predicts that unlimited computing capacity will become a reality in the near future, putting the power of modern mainframes...

ACM Names 84 Distinguished Members for Advances in Computing Technology
From ACM TechNews

ACM Names 84 Distinguished Members for Advances in Computing Technology

ACM has recognized 84 members as 2009 Distinguished Members. The number of honorees has more than doubled from a year ago, and ACM says the increase is a reflection...

Is Aes Encryption Crackable?
From ACM TechNews

Is Aes Encryption Crackable?

The Advanced Encryption Standard (AES) system was long believed to be invulnerable to attack, but a group of researchers recently demonstrated that there may be...

Splitting ­p Search
From ACM TechNews

Splitting ­p Search

Researchers at Yahoo!'s Labs in Barcelona, Spain, have developed a distributed search approach that spreads the search index and additional data out over a larger...

Labor Shortage in It Industry Despite Recession
From ACM TechNews

Labor Shortage in It Industry Despite Recession

A new survey by New Zealand's Ministry of Economic Development found a significant shortage of skilled labor in the information technology (IT) industry, despite...

Triple Shadows and Fake Reflections: Future Graphics
From ACM TechNews

Triple Shadows and Fake Reflections: Future Graphics

At the second annual ACM SIGGRAPH Asia conference, which takes place December 16-19 in Yokohama, Japan, computer graphics professionals and researchers will demonstrate...

From ACM TechNews

Validity of Software Patents Goes on Trial at ­.s. Supreme Court

The U.S. Supreme Court will consider what types of inventions should be eligible for a patent as part of a case that could undermine legal protections for software...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account