acm-header
Sign In

Communications of the ACM

News


An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Who Owns the Content You ­pload Online?
From ACM Opinion

Who Owns the Content You ­pload Online?

The outrage over Instagram's announcement that it is changing its terms and conditions has turned the spotlight on the relationship between websites and users who...

Everyone Wants a Slice of Raspberry Pi
From ACM News

Everyone Wants a Slice of Raspberry Pi

It's 9am on a lovely autumn morning at Cern, the European Organisation for Nuclear Research, just outside Geneva.

Google and Microsoft ­nder Threat from the March of the Mobiles
From ACM News

Google and Microsoft ­nder Threat from the March of the Mobiles

We're used to the idea of "peak oil"—that there's only a finite amount of that stuff in the ground. What's the equivalent in the computing field?

Who Controls the Internet?
From ACM News

Who Controls the Internet?

Have you ever noticed that wherever you are in the world, every telephone keypad looks the same? Or wondered why satellites don't crash into each other? Or why...

Scientists Ponder Interstellar Travel at Nasa-Backed Space Summit
From ACM News

Scientists Ponder Interstellar Travel at Nasa-Backed Space Summit

In one room, scientists debated whether the White-Juday Warp Field Interferometer will help find a way to bend the space-time continuum and make interstellar travel...

Anonymous: Behind the Masks of the Cyber Insurgents
From ACM News

Anonymous: Behind the Masks of the Cyber Insurgents

Spalding railway station in Lincolnshire is not a big place. It takes me about two seconds to scan the platform and spot who I'm looking for: Jake Davis, aka Topiary...

­.s. ­rged to Recruit Master Hackers to Wage Cyber War on Al-Qaida
From ACM News

­.s. ­rged to Recruit Master Hackers to Wage Cyber War on Al-Qaida

Instead of prosecuting elite computer hackers, the U.S. government should recruit them to launch cyber-attacks against Islamist terrorists and other foes, according...

'leap Second' Lengthens Weekend
From ACM News

'leap Second' Lengthens Weekend

The world is about to get a well-earned long weekend but don't make big plans because it will only last an extra second. A so-called "leap second" will be added...

What Is an Internet Troll?
From ACM News

What Is an Internet Troll?

I'm sitting waiting for the House of Commons to start debating a Law Against Trolls or, as they would call it, an amendment to the Defamation Act. It would basically...

Cyber-Attack Concerns Raised Over Boeing 787 Chip's 'back Door'
From ACM News

Cyber-Attack Concerns Raised Over Boeing 787 Chip's 'back Door'

Two Cambridge experts have discovered a "back door" in a computer chip used in military systems and aircraft, such as the Boeing 787, that could allow the chip...

From ACM News

The Guardian's Open 20: Fighters For Internet Freedom

From politicians and professors to computer scientists and the first programmer, champions of the open Internet.

Web Freedom Faces Geatest Threat Ever, Warns Google's Sergey Brin
From ACM Opinion

Web Freedom Faces Geatest Threat Ever, Warns Google's Sergey Brin

The principles of openness and universal access that underpinned the creation of the Internet three decades ago are under greater threat than ever, according to...

Xbox at 10 in Europe: How the Console Shaped Gaming History
From ACM Opinion

Xbox at 10 in Europe: How the Console Shaped Gaming History

The games industry was a very different place 10 years ago. Still dominated by Japanese games and Japanese games machines, Microsoft's plans to launch its own dedicated...

Gchq Aims to Recruit Computer Hackers with Code-Cracking Web Site
From ACM Careers

Gchq Aims to Recruit Computer Hackers with Code-Cracking Web Site

Government intelligence service targets "self-taught" hackers with cryptic Web site that features no obvious branding.

From ACM News

Soft Robots Inspired By Nature Could Become Our Flexible Friends

Robbie the Robot in the 1950s movie Forbidden Planet may have been endearing in a clunky, metallic way, but negotiating tricky terrain was never his strong point...

To Stop Cybercrime We Need to Think Like the Criminals
From ACM News

To Stop Cybercrime We Need to Think Like the Criminals

Whenever William Hague, our esteemed foreign secretary, speaks on the subject of cyberspace, what comes to mind is Dr Johnson’s celebrated comment about seeing...

Governments Turn to Hacking Techniques For Surveillance of Citizens
From ACM News

Governments Turn to Hacking Techniques For Surveillance of Citizens

In a luxury Washington, D.C., hotel last month, governments from around the world gathered to discuss surveillance technology they would rather you did not know...

Did Android Copy Ios? We Asked Google's Product Manager...
From ACM Opinion

Did Android Copy Ios? We Asked Google's Product Manager...

Has Android copied elements from Apple's iOS? It's not a matter that Google's senior managers for the Android operating system want to get involved in.

From ACM News

Diginotar Ssl Certificate Hack Amounts to Cyberwar, Says Expert

The Dutch government says hackers who broke into a web security firm in the Netherlands last month issued hundreds of bogus security certificates that could be...

From ACM Opinion

Why Google Had to Have Motorola Mobility

For several years now, Google has been following a vow made by former CEO Eric Schmidt: mobile first. New CEO Larry Page is taking that dictum to a new level...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account