Daniel A. Spielman and colleague Shang-hua Teng solved the mystery of the Simplex Method using a technique called smoothed analysis…
From ACM NewsAllyn Jackson Commissioned by CACM Staff| January 31, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
You've heard the hype: The quantum computer revolution is coming. Physicists say these devices will be fast enough to break every encryption method banks use today...Wired From ACM News | March 15, 2017
When Wikileaks yesterday released a trove of documents purporting to show how the CIA hacks everything from smartphones to PCs to smart televisions, the agency's...Wired From ACM News | March 8, 2017
A few hours after dark one evening earlier this month, a small quadcopter drone lifted off from the parking lot of Ben-Gurion University in Beersheba, Israel.
Wired From ACM News | February 23, 2017
The VUSec team at the Free University of Amsterdam in the Netherlands has demonstrated an exploit that undercuts a basic safeguard used in all modern operating...Wired From ACM TechNews | February 15, 2017
Autonomous warriors may dominate the battlefield of tomorrow, but even those that still require human flesh will take on a robotic sheen. That shift could start...Wired From ACM News | January 17, 2017
Between the revelations of mega-hacks of Yahoo and others, Russia's meddling in the US electoral system, and the recent spike in ransomware, it's easy to look at...Wired From ACM News | December 23, 2016
Cynthia Dwork is best known for inventing "differential privacy," a set of techniques that safeguard the privacy of individuals in a large database.
Wired From ACM News | November 28, 2016
Dystopian corporte surveillance threats today come at us from all directions. Companies offer "always-on" devices that listen for our voice commands, and marketers...Wired From ACM News | November 4, 2016
Last week ended with a mid-level internet catastrophe. You may have noticed that for most of Friday popular sites like Netflix, Twitter, Spotify (and yes, WIRED)...Wired From ACM News | October 27, 2016
Amid a seemingly incessant deluge of leaks and hacks, Washington, DC staffers have learned to imagine how even the most benign email would look a week later on...Wired From ACM News | October 18, 2016
In the burgeoning field of computer science known as machine learning, engineers often refer to the artificial intelligences they create as "black box" systems:...Wired From ACM News | October 4, 2016
Online forums and social media platforms are havens for trolls and bullies who launch campaigns of harassment can lead to the self-censorship of the people they...Wired From ACM TechNews | September 21, 2016
A cellphone makes a convenient detonator for an improvised explosive device. But it's also one of the most conveniently trackable devices under the eye of American...Wired From ACM News | September 19, 2016
More than six months have passed since the FBI first ordered Apple to help the agency bypass the encryption on the iPhone 5c of Rizwan Syed Farook, an ISIS supporter...Wired From ACM News | September 19, 2016