The computational expense of creating three-dimensional images that can be viewed by all is just one factor holding them back…
From ACM NewsSandrine Ceurstemont Commissioned by CACM Staff| June 1, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
Researchers at the University of Science and Technology of China say they have developed the first optical quantum cryptography network. The quantum communication...Chinese Academy of Sciences From ACM TechNews | May 13, 2009
The Internet is rife with cybercriminals and online eavesdroppers, and countering this threat is the job of cybersleuths. One of the key tools in cybersleuths'...The New York Times From ACM TechNews | May 13, 2009
A new cryptography approach based on the mathematical theory of elliptic curves is considered a leading candidate to replace the widely used RSA public key security...European Science Foundation From ACM TechNews | May 13, 2009
A lost or stolen laptop or notebook computer is replaceable; the stolen data inside it may produce real owner's anxiety. Which makes Fujitsu's newly announced "security...The New York Times From ACM News | May 13, 2009
A leading cyber security specialist said last week that China has developed its own ultra-secure operating system for a strategic edge in its cyber warfare with...WorldTribune.com From ACM News | May 13, 2009
University of Michigan professor Alex Halderman wants to research whether the anti-piracy software built into computer games makes computers more vulnerable to...niversity of Michigan News Service From ACM TechNews | May 11, 2009
Hacking has become an attractive subject for many students. The first day of the Security and Identity Management (SIM) conference in Ahmedabad saw paper presentations...The Times of India From ACM Careers | May 12, 2009
Throughout the U.S. military there is heightened awareness that the threat of a computer attack is just as urgent as a physical attack, and that military units...The New York Times From ACM TechNews | May 11, 2009
The University of California, Berkeley, began notifying students, alumni and others on Friday (May 8) that their personal information may have been stolen after...niversity of California, Berkeley From ACM News | May 11, 2009
University of California-Santa Barbara (UCSB) researchers temporarily commandeered an infamous botnet known for stealing financial data and found that the threat...Dark Reading From ACM TechNews | May 8, 2009
The U.S. Transportation Department's inspector general released a report on May 6 that said the U.S.'s civilian air-traffic computer networks had been breached...The Wall Street Journal From ACM TechNews | May 7, 2009
The U.S. Pentagon is considering establishing a new cyber-command to oversee government efforts to protect military computer networks and to assist in protecting...The Washington Post From ACM TechNews | May 6, 2009
The National Institute of Standards and Technology (NIST), an agency of the U.S. Department of Commerce, has issued for public comment a draft publication describing...Newswise From ACM News | May 7, 2009
Even the best electronic security may not be enough to protect sensitive data from dogged hackers, and researchers have been able to extract information from the...Scientific American From ACM TechNews | May 6, 2009
University of Texas at Austin researchers have found that, combined with readily available data from other online sources, social network data can reveal sensitive... From ACM TechNews | May 6, 2009
Researchers from Toshiba and Cambridge University's Cavendish Laboratory say secure quantum communication is possible with practical components for high-speed photon...Institute of Physics From ACM TechNews | May 4, 2009
Cybercriminals still have the upper hand on the Internet despite nearly two decades of technological advancement, and Carnegie Mellon University professor William...Computerworld From ACM TechNews | May 1, 2009
People around the world are circumventing their governments' censorship of Web content using tools developed and provided by a diverse coalition of political and...The New York Times From ACM TechNews | May 1, 2009
A report based on a three-year study by a panel assembled by the National Academy of Sciences says the United States does not have a clear military policy on how...The New York Times From ACM TechNews | May 1, 2009
In an interview, Rep. James R. Langevin (D-R.I.), the co-founder and co-chair of the House Cybersecurity Caucus, said he promises to do everything he can to prevent...NextGov.com From ACM TechNews | April 30, 2009