Type systems are moving beyond the realm of data structure and into more complex domains like security and networking.Alex Wright From Communications of the ACM | February 1, 2010
Recent academic research is advancing the development of secure multi-party computation (SMC), an security technique aimed at protecting data for various online...By Bob Violino From ACM News | January 22, 2010
In the late 1990s and early 2000s, the idea of grid computing, a type of distributed computing that harnesses the power of many computers to handle large computational...Enterprise Storage Forum From ACM News | January 22, 2010
The federal government needs to address electronic security to calm Americans' uncertainty about cloud computing and secure its privacy, according to industry representatives...infoZine From ACM News | January 22, 2010
Back at the dawn of the Web, the most popular account password was “12345.”
Today, it’s one digit longer but hardly safer: “123456.”
Despite all the reports...The New York Times From ACM News | January 21, 2010
Weizmann Institute of Science researchers recently created a theoretical attack capable of breaking the encryption protocol that is planned for use on 3G telephony...Telecoms.com From ACM TechNews | January 21, 2010
Is there a recipe a scientist might follow to spur creativity and cook up new discoveries? Cyber security expert Kevin Fu of the University of Massachusetts Amherst...niversity of Massachusetts Amherst From ACM News | January 21, 2010
Google has received a patent for the technique known as MapReduce. The patent, number 7,650,331, applied for in 2004, is entitled "System and method for efficient...The H From ACM News | January 20, 2010
The crown jewels of Google, Cisco Systems or any other technology company are the millions of lines of programming instructions, known as source code, that make...The New York Times From ACM News | January 20, 2010
The earthquake in Haiti has motivated many people to make contributions to help. "Unfortunately, these events also bring out the con artists and scammers who are...Purdue University News From ACM News | January 19, 2010
"A fleet of fighter planes is not necessary to attack a power station; a keyboard is sufficient. And if you don't have the skills, there are enough mercenary hackers...University of Haifa From ACM News | January 19, 2010
Sure, we’re all plugged in and online 24/7. But fewer American kids are growing up to be bona fide computer geeks. And that poses a serious security risk for the...Wired From ACM News | January 15, 2010
The U.S. National Institute of Standards and Technology (NIST) has completed round one of its open competition to create a new Secure Hash Algorithm (SHA). The...Government Computer News From ACM TechNews | January 13, 2010
Maryland's leaders want the state to take a lead role in the cyber security field in an effort to land thousands of jobs as the federal government and high-tech...The Daily Record From ACM News | January 12, 2010
A new White House report says the U.S. government needs better information technology (IT) to counter potential terrorist attacks, such as the recent attempt to...Computerworld From ACM TechNews | January 11, 2010
The U.S. Department of Homeland Security's (DHS's) Science and Technology Directorate is seeking proposals for conducting research in a wide range of technology...Federal Computer Week From ACM TechNews | January 11, 2010
U.S. colleges are adding courses and specialized degrees in the once-exotic field of cybersecurity to try to meet the growing demands for computer security skills...The New York Times From ACM TechNews | January 8, 2010
For over a decade now, health care experts have been promoting telemedicine, or the use of satellite technology, video conferencing and data transfer through phones...The New York Times From ACM News | January 8, 2010
SanDisk Corp. and Verbatim Corp. have joined Kingston Technology Inc. in warning customers about a potential security threat posed by a flaw in the hardware-based...ComputerWorld From ACM News | January 8, 2010
Las Vegas casinos are incubators of the world's most advanced surveillance tech. Here's how the spy gear that helps Sin City has taught everyone from government...Popular Mechanics From ACM News | January 7, 2010