acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectManagement
authorWired
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Report: Efforts to Secure Nation
From ACM News

Report: Efforts to Secure Nation

The official government cybersecurity standards for the electric power grid fall far short of even the most basic security standards observed by noncritical industries...

War for Tech Talent Hits 'White Hot' New York Startup Scene
From ACM News

War for Tech Talent Hits 'White Hot' New York Startup Scene

It's a good time to be a software programmer in New York City.

­npublished Iraq War Logs Trigger Internal Wikileaks Revolt
From ACM News

­npublished Iraq War Logs Trigger Internal Wikileaks Revolt

A domino chain of resignations at the secret-spilling site WikiLeaks followed a unilateral decision by autocratic founder Julian Assange to schedule an October...

Apple Answers Questions About App Rejections, Raises Others
From ACM News

Apple Answers Questions About App Rejections, Raises Others

Apple on Thursday published a set of rules about the types of content that aren't allowed in the iOS App Store, answering questions that have been bugging software...

Domain Name Czar Seeks .online ­nity
From ACM TechNews

Domain Name Czar Seeks .online ­nity

ICANN CEO Rod Beckstrom continues to work toward net neutrality, but ICANN now faces new challenges as countries such as China seek more control over what Internet...

From ACM News

Pentagon Searches For

One of the trickiest problems in cyber security is trying to figure who’s really behind an attack. Darpa, the Pentagon agency that created the Internet, is trying...

Scan of Internet ­ncovers Thousands of Vulnerable Embedded Devices
From ACM TechNews

Scan of Internet ­ncovers Thousands of Vulnerable Embedded Devices

A scan of the Internet by Columbia University researchers searching for vulnerable embedded devices has found that nearly 21,000 routers, Webcams, and VoIP products...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account