The news archive provides access to past news stories from Communications of the ACM and other sources by date.
Geoffrey Hinton was in high school when a friend convinced him that the brain worked like a hologram.
Two University of Michigan professors have written a mathematical model that could help predict the timing of cyberattacks.
Google researchers are developing a smart contact lens that uses tiny chips, sensors, and antennas to continuously test diabetics' blood sugar levels.
Researchers are developing new materials to be used for 3D printing, and are working on a technique for building multiple materials into the same product.
The friendship paradox applies to happiness and wealth, according to researchers at the University of Toulouse and Aalto University.
Microsoft Research cognitive psychologist Mary Czerwinski is an affective computing expert who creates technology that monitors a person's mood and stress level.
In an effort to preserve an important piece of computing history, hobbyists are recreating the renowned Cray-1 supercomputer on a desktop scale.
The team behind the OpenBCI project hopes to release the third iteration of the OpenBCI board sometime around April.
The malicious program used to compromise Target and other companies was part of a widespread operation using a Trojan tool known as Trojan.POSRAM, according to a new report released Thursday about an operation that investigators…
Those of us who came of age in the Internet era may not know that they owe their ability to go online to a court decision 30 years ago today about a mechanically intricate analog tape recorder.
They might not seem at all stable as they batter into light bulbs but moths have inspired an autopilot for drones.
Researchers re developing autonomous robotic planes that could eventually think, or at least react, for themselves.
In 1976, famed computer architect Seymour Cray released one of the most successful supercomputers ever made: the Cray-1, a stylish 5.5-ton C-shaped tower that was quickly embraced by laboratories all over the world.
Fujitsu Laboratories has developed a fast method to perform secret searches of data that is encrypted.
A doctoral student has developed a sound-based assistive technology system designed to improve the autonomy of people with visual impairments.
Technology based on quantum physics could be used to make a memory device whose contents could only be read a single time.
Doctors will attempt to reanimate a patient’s paralyzed arm with a pioneering surgery that involves capturing signals from his brain and restoring movement through a fine network of electronics linked to arm muscles.
IBM's zEnterprise Academic Initiative is using a contest to spark student interest in coding for mainframes.
Space scientists are used to moments of high tension.
Back in 2003, when he was a law professor at the University of Virginia, Tim Wu wrote the definitive paper on net neutrality.
The U.S. Court of Appeals for the District of Columbia Circuit on Tuesday struck down rules adopted by the Federal Communications Commission in 2010 meant to protect the openness of the Internet.
Rising consumer demand for more technology in cars has sparked a convergence between the auto and computer industries.
Metamaterials, which can alter the properties of light waves often to render an object invisible, also could carry out mathematical operations.
Rowan University professor Jennifer Kay this year won a $34,000 grant from Google to teach robotics in a new massive open online course.
The RoboEarth platform, described as a kind of Wikipedia for robots, connects robots to the Internet so they can flexibly deal with new situations and conditions.
Miguel Freitas is building a decentralized social network called Twister, which no single entity should be able to shut down.
CloudFridge is a prototype smart refrigerator system designed to study and improve the user experience.
Fan Zhang, the owner of Happy Child, a trendy Asian restaurant in downtown Toronto, knows that 170 of his customers went clubbing in November.
The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks…