acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Computer Science Teacher Certification 'deeply Flawed,' Report Says
From ACM TechNews

Computer Science Teacher Certification 'deeply Flawed,' Report Says

State systems for certifying computer science teachers are fundamentally flawed, according to a report from the Computer Science Teachers Association. 

How Surveillance Changes Behavior: A Restaurant Workers Case Study
From ACM News

How Surveillance Changes Behavior: A Restaurant Workers Case Study

Surveillance is certainly much in the news lately. Most notably, of course, there is the continuing outcry over the National Security Agency’s call-tracking program...

NASA's Plan to Put a Landsail Rover on Venus
From ACM News

NASA's Plan to Put a Landsail Rover on Venus

Venus is like a reclusive celebrity that gets the public's attention every couple of years, though in the planet's case it's more like every century.

Wearable Robots Are No Longer Science Fiction
From ACM News

Wearable Robots Are No Longer Science Fiction

Exoskeletons will address military, medical, commercial applications.

Why Video Games May Be Good For You
From ACM News

Why Video Games May Be Good For You

Games have long been accused of making players violent, but evidence has been building over the years that they can have positive effects.

How a Look at Your Gmail Reveals the Power of Metadata
From ACM News

How a Look at Your Gmail Reveals the Power of Metadata

Sometimes you have to give up a little privacy in order to find out how much—or how little—privacy you really have.

NIST Study Advances Use of Iris Images as a Long-Term Form of Identification
From ACM TechNews

NIST Study Advances Use of Iris Images as a Long-Term Form of Identification

Biometric researchers studying iris stability have determined that no consistent change occurs in the distinguishing texture of irises for at least a decade. 

New Technology Protects Against Password Theft and Phishing Attacks
From ACM TechNews

New Technology Protects Against Password Theft and Phishing Attacks

Scientists say they can protect Internet users from phishing attacks with a new system called Uni-IDM. 

How Snowden Did It
From ACM News

How Snowden Did It

When Edward Snowden stole the crown jewels of the National Security Agency, he didn't need to use any sophisticated devices or software or go around any computer...

Productivity Tools For Cybercrime
From ACM News

Productivity Tools For Cybercrime

Stealing 10 million dollars a few hundred dollars at a time used to be too labor-intensive to be a great business.

The Walls Have Ears: Princeton Researchers Develop Walls That Can Listen, and Talk
From ACM TechNews

The Walls Have Ears: Princeton Researchers Develop Walls That Can Listen, and Talk

Princeton University researchers have successfully incorporated ultrathin radios on plastic sheets, which can be applied to walls and other structures. 

Kean Computer Science Students in ­nion Travel 'beyond the Grave'
From ACM TechNews

Kean Computer Science Students in ­nion Travel 'beyond the Grave'

A new smartphone app provides access to information on grave markers in the First Presbyterian Church cemetery in Elizabeth, N.J. 

The Pentagon as Silicon Valley's Incubator
From ACM News

The Pentagon as Silicon Valley's Incubator

In the ranks of technology incubator programs, there is AngelPad here in San Francisco and Y Combinator about 40 miles south in Mountain View. And then there is...

NASA's Spitzer Telescope Celebrates 10 Years in Space
From ACM News

NASA's Spitzer Telescope Celebrates 10 Years in Space

Ten years after a Delta II rocket launched NASA's Spitzer Space Telescope, lighting up the night sky over Cape Canaveral, Fla., the fourth of the agency's four...

Nsa Gathered Thousands of Americans' Emails Before Court Ordered It to Revise its Tactics
From ACM TechNews

Nsa Gathered Thousands of Americans' Emails Before Court Ordered It to Revise its Tactics

The U.S. National Security Agency illegally collected up to 56,000 "wholly domestic" communications each year from 2008 to 2011. 

Twitter Hashtags Predict Rising Tension in Egypt
From ACM TechNews

Twitter Hashtags Predict Rising Tension in Egypt

The Political Polarization Index uses Twitter to measure political tension in Egypt. 

These Patterns Move, But It's All an Illusion
From ACM News

These Patterns Move, But It's All an Illusion

Focus on the ball at the center of the image. The scene appears to vibrate. If you move your head slightly forward and backward, the color fields of the rosette...

Computing Researchers Get 'schooled' on Science Policy at Lispi 2013
From ACM TechNews

Computing Researchers Get 'schooled' on Science Policy at Lispi 2013

The Computing Research Association’s Computing Community Consortium recently held its second Leadership in Science Policy Institute (LiSPI) workshop.

Laser Listening: Could You Eavesdrop on the Guardian?
From ACM News

Laser Listening: Could You Eavesdrop on the Guardian?

The U.K. government has warned the Guardian newspaper that foreign agents could use laser technology to eavesdrop on them, in the wake of recent surveillance leaks...

Remembering Douglas Engelbart
From Communications of the ACM

Remembering Douglas Engelbart

"Inspiring," "visionary," "humble," "honest," "impeccable integrity," "passionate and stubborn about his work." Tributes poured in for Douglas Engelbart, inventor...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account