acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Cadets Trade the Trenches For Firewalls
From ACM TechNews

Cadets Trade the Trenches For Firewalls

Throughout the U.S. military there is heightened awareness that the threat of a computer attack is just as urgent as a physical attack, and that military units...

From ACM TechNews

EC Wants Software Makers Held Liable for Code

The European Commission is proposing that the European Union's consumer protections for physical products also cover software. Commissioners Viviane Reding and...

A Nimbus Rises in the World of Cloud Computing
From ACM News

A Nimbus Rises in the World of Cloud Computing

Cloud computing is a hot topic in the technology world these days, called by television and business magazines the way of the future. While it's difficult to predict...

From ACM TechNews

Examining Social Networking to Find People Behind Terrorist Attacks

Inderscience PublishersSocial Design Group's Yoshiharu Maeno and University of Tokyo professor Yukio Ohsawa have developed a new approach to analyzing social networks...

From ACM TechNews

Researchers Take Over Dangerous Botnet

University of California-Santa Barbara (UCSB) researchers temporarily commandeered an infamous botnet known for stealing financial data and found that the threat...

From ACM News

Videoconferencing Technology Possible For Cell Phones, Pdas

A new low-bandwidth, high-frame-rate videoconferencing technology that creates the appearance of three-dimensionality and a strong sense of co-presence without...

From ACM News

In Cellphone, India Reveals an Essence

Sometimes a technology comes along and crystallizes a cultural moment. Not since the automobile and the American in the 1950s, perhaps, have a technology and a...

From ACM TechNews

Faa's Air-Traffic Networks Breached By Hackers

The U.S. Transportation Department's inspector general released a report on May 6 that said the U.S.'s civilian air-traffic computer networks had been breached...

From ACM TechNews

Cyber-Command May Help Protect Civilian Networks

The U.S. Pentagon is considering establishing a new cyber-command to oversee government efforts to protect military computer networks and to assist in protecting...

From ICT Results

Project Turns Netizens Into Social Change Agents

One European project wants to make average technoids the writers, directors and stars of their own community-conscious show, online and on an IPTV screen near you...

­nmasking Social-Network ­sers
From ACM TechNews

­nmasking Social-Network ­sers

University of Texas at Austin researchers have found that, combined with readily available data from other online sources, social network data can reveal sensitive...

From ACM TechNews

When Really Big Numbers Aren't Nearly Enough

Unallocated Internet Protocol (IP) addresses are expected to be depleted by some time in 2012, according to IPv6 Forum fellow Tony Hain. He and others advocate...

Could the Net Become Self-Aware?
From ACM TechNews

Could the Net Become Self-Aware?

The Internet is similar to the human brain in that it has a complex network of nodes for holding, processing, recalling, and transmitting information. The Web...

Eu ­rges Icann Independence
From ACM TechNews

Eu ­rges Icann Independence

ICANN should become completely independent of the U.S. government, says EU Information Society commissioner Viviane Reding. In a statement regarding the Oct. 1...

From ACM News

Simple Technology Links Students With Peers Overseas

A growing number of East Carolina University undergraduates are having international experiences without ever leaving the Greenville, N.C., campus. The university's...

Web Tool 'as Important as Google'
From ACM TechNews

Web Tool 'as Important as Google'

Physicist Stephen Wolfram says the goal of his free Wolfram Alpha program, which will be available to the public starting in the middle of May, is to "make expert...

Quantum Cryptography: Hackers' R.i.p.?
From ACM TechNews

Quantum Cryptography: Hackers' R.i.p.?

Researchers from Toshiba and Cambridge University's Cavendish Laboratory say secure quantum communication is possible with practical components for high-speed photon...

From ACM TechNews

Sending Cell Phones Into the Cloud

Intel Research Berkeley scientists Byung-Gon Chun and Petros Maniatis have developed CloneCloud, a cloud computing-based clone of smartphones that can handle large...

Consortium Lights the Way for Photonics Research Community
From ICT Results

Consortium Lights the Way for Photonics Research Community

An umbrella group set up to give direction to Europe's emerging photonics community has proposed a program of strategic research and is calling for action to address...

Rfid Wristband Becomes a Theme Park Essential
From ACM News

Rfid Wristband Becomes a Theme Park Essential

In a nondescript manufacturing plant on a quiet cul-de-sac in San Fernando, Calif., a khaki-green machine the size of a buffet table sucks in bright pink ribbon...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account