Verified coding techniques use mathematical proofs to ensure code is error-free and hacker-resistant. Can the approach revolutionize software?
Samuel Greengard From Communications of the ACM | July 1, 2021
Charles M. Geschke helped create the modern world of computing, where beautiful typography and expressive, artistic graphics are as integral to most users' experience...Simson Garfinkel, Eugene H. Spafford From Communications of the ACM | July 1, 2021
Canada's Office of the Privacy Commissioner has cited the Royal Canadian Mounted Police for illegally using facial recognition software from Clearview AI.
The Wall Street Journal From ACM TechNews | June 18, 2021
Scientists have unveiled a provably secure computing environment that employs users' device communications to grant them immunity from compromised components.
Carnegie Mellon University CyLab Security and Privacy Institute From ACM TechNews | June 16, 2021
A spokesperson for video game publisher Electronic Arts verified that hackers have compromised the company's systems and stolen game source code and other assets...CNN From ACM TechNews | June 11, 2021
People in the U.S. and China who think others are being deceived by online misinformation on COVID-19 are more likely to back corporate and political countermeasures...NC State University News From ACM TechNews | June 10, 2021