Internet freedom is eroding on two fronts: the sheer number of efforts to block access to legitimate information, and the level…
From ACM NewsSamuel Greengard Commissioned by CACM Staff| November 23, 2021
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
A study of tools used by law enforcment and intelligence agencies to conduct surveillance on computer and mobile phone users revealed a wide range of functions. ...Wired News From ACM TechNews | June 30, 2014
The B-52 bomber, one of the great stalwarts of America's military arsenal, is getting its first major communications system upgrade since the Kennedy administration...Wired From ACM News | May 23, 2014
Experts say big data can only be leveraged in future scientific endeavors with a combination of science, statistics, computers, mathematics, and leadership. Wired News From ACM TechNews | October 9, 2013
Mechanical fireflies could help create a new kind of 3-D display, say researchers at MIT.
Standing in for the bioluminescent beetles will be LED-fitted, remotely...Wired From ACM News | February 22, 2010
Right now, troops trying to listen in on enemy chatter rely on a convoluted process. They tune into insurgency radio frequencies, then hand the radio over to local...Wired From ACM News | February 17, 2010
Google engineers are working on a translator for Google Android smartphones to convert one language into another quickly enough to allow speakers without a common...Wired From ACM News | February 8, 2010
Almost three decades ago, Richard Feynman — known popularly as much for his bongo drumming and pranks as for his brilliant insights into physics — told an electrified...Wired From ACM News | January 28, 2010
One of the trickiest problems in cyber security is trying to figure who’s really behind an attack. Darpa, the Pentagon agency that created the Internet, is trying...Wired From ACM News | January 26, 2010
Got an e-mail list of customers or readers and want to know more about each — such as their full name, friends, gender, age, interests, location, job and education...Wired From ACM News | January 7, 2010
A scan of the Internet by Columbia University researchers searching for vulnerable embedded devices has found that nearly 21,000 routers, Webcams, and VoIP products...Wired News From ACM TechNews | October 26, 2009