Daniel A. Spielman and colleague Shang-hua Teng solved the mystery of the Simplex Method using a technique called smoothed analysis…
From ACM NewsAllyn Jackson Commissioned by CACM Staff| January 31, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
The world's largest Internet search company and the world's most powerful electronic surveillance organization are teaming up in the name of cybersecurity.
Under...The Washington Post From ACM News | February 4, 2010
While some of the latest government wage data appears to show that Silicon Valley's high-tech workers are making more now than they did in 2000, a closer look at...The Wall Street Journal From ACM News | February 3, 2010
For a company that makes no products, Acacia Research spends a lot of time fighting over patents in court. Acacia has filed at least 337 patent-related lawsuits...BusinessWeek From ACM News | February 2, 2010
In computing, the vision always precedes the reality by a decade or more. The pattern has held true from the personal computer to the Internet, as it takes time...The New York Times From ACM News | February 1, 2010
Think that turning off cookies and turning on private browsing makes you invisible on the web? Think again.
The Electronic Frontier Foundation (EFF) has launched...WebMonkey From ACM News | January 28, 2010
An innovative computational technique that draws on statistics, imaging, and other disciplines has the capability to detect errors in sensitive technological systems...niversity Corporation for Atmospheric Research From ACM News | January 28, 2010
One of the trickiest problems in cyber security is trying to figure who’s really behind an attack. Darpa, the Pentagon agency that created the Internet, is trying...Wired From ACM News | January 26, 2010
On a Monday morning earlier this month, top Pentagon leaders gathered to simulate how they would respond to a sophisticated cyberattack aimed at paralyzing the...The New York Times From ACM News | January 26, 2010
Type systems are moving beyond the realm of data structure and into more complex domains like security and networking.Alex Wright From Communications of the ACM | February 1, 2010
Music lovers may have long forsaken them, but magnetic tapes still reign supreme when it comes to storing vast amounts of digital data. And new research from IBM...Technology Review From ACM News | January 25, 2010
In the late 1990s and early 2000s, the idea of grid computing, a type of distributed computing that harnesses the power of many computers to handle large computational...Enterprise Storage Forum From ACM News | January 22, 2010
Back at the dawn of the Web, the most popular account password was “12345.”
Today, it’s one digit longer but hardly safer: “123456.”
Despite all the reports...The New York Times From ACM News | January 21, 2010
U.S. colleges are adding courses and specialized degrees in the once-exotic field of cybersecurity to try to meet the growing demands for computer security skills...The New York Times From ACM TechNews | January 8, 2010
Las Vegas casinos are incubators of the world's most advanced surveillance tech. Here's how the spy gear that helps Sin City has taught everyone from government...Popular Mechanics From ACM News | January 7, 2010
There probably are just two times when you think about a traffic light.
When one just turned yellow. ("Can I make it?")
When one has been red for too long. ("Come...The Washington Post From ACM News | January 7, 2010
In 2006, the journal Science named the solution to the century-old Poincaré Conjecture as its "breakthrough of the year." Three years later, the Clay Mathematics...By Marina Krakovsky From ACM News | January 4, 2009
Today's stock market has become a world of automated transactions executed at lightning speed. This high-frequency trading could make the financial system more...Technology Review From ACM News | December 23, 2009
Cyberattacks are increasing in frequency and sophistication at a time when the U.S. government is struggling to address a shortage of proficient computer security...The Washington Post From ACM TechNews | December 23, 2009
Nearly seven months after highlighting the vulnerability of banking, energy and communications systems to Internet attacks, the White House on Tuesday is expected...The New York Times From ACM News | December 22, 2009