The news archive provides access to past news stories from Communications of the ACM and other sources by date.
Benoît B. Mandelbrot, a maverick mathematician who developed an innovative theory of roughness and applied it to physics, biology, finance and many other fields, died on Thursday in Cambridge, Mass. He was 85.
Tokyo Tech's TSUBAME 2.0 will officially be named the fastest Japanese supercomputer next month, with a raw performance of 2.4 petaflops that surpasses the total floating point operations per second capability of all other supercomputers…
Massachusetts Institute of Technology researchers have developed TxCache, a database caching system that eliminates certain types of asymmetric data retrieval while making database caches easier to program.
Researchers have launched a project to develop a Deterministic Parallel Java implementation, and say it would be the first implementation to guarantee deterministic semantics without run-time checks for general-purpose, object…
The Swiss Federal Office for the Environment is working with Empa's Acoustics and Noise Control Laboratory to develop a computer model to simulate noise levels along the Swiss rail network.
An Australian program allowing Internet service providers to alert customers if their computers are commandeered by hackers and restrict online access if they do not correct the problem is being considered by the U.S. government…
If you want a smartphone powered by Google's Android software, you could get Motorola's Droid 2 or its cousin, the Droid X. Then there is the Droid Incredible from HTC, the Fascinate from Samsung and the Ally from LG.
The U.S. Department of Defense has awarded a $5 million grant to The Feinstein Institute for Medical Research and the University of Cincinnati to further develop a "lab-on-a-chip" device used for monitoring patients suffering…
The long-held dream of creating atomically precise three-dimensional structures in a manufacturing environment is approaching reality, according to the top scientist at a Texas company making tools aimed at that ambitious goal…
In a world of data-obsessed number-crunching engineers, Google's John Boyd is the people person.
A U.K. campaign to build a truck-sized, prototype computer first envisaged in 1837 is gathering steam.
Researchers at NIST have demonstrated for the first time the conversion of single photons produced by a true quantum source to a near-visible wavelength, which may aid the development of hybrid quantum systems.
Top-ranked applications transmit personal IDs, a Journal investigation finds.
NIST has released the 2009 technology transfer report, an annual report summarizing the technology transfer activities and achievements of the U.S. Department of Commerce's scientific research agencies.
Huang Kexue, federal authorities say, is a new kind of spy. For five years, Mr. Huang was a scientist at a Dow Chemical lab in Indiana, studying ways to improve insecticides. But before he was fired in 2008, Mr. Huang began…
Actions speak louder than words, particularly if you are a robot. At least that is the theory proposed by the PACO-PLUS project, which aims to develop a new approach to robotic cognition based on the actions they can perform…
A new lawsuit alleges that Predator drone targeting software was pirated, and emails suggest the CIA knew it was sub-par.
Researchers in California are aiming to create some of the tiniest batteries on Earth, the largest of which would be no bigger than a grain of salt. These tiny energy storage devices could one day be used to power the electronics…
Financial services and professional services are the most vulnerable to information theft, with four out of 10 companies reporting some sort of loss or attack in the past 12 months, the Kroll annual survey of corporate fraud…
In 1983, Steve Jobs wooed Pepsi executive John Sculley to Apple with one of the most famous lines in business: "Do you want to spend the rest of your life selling sugared water or do you want a chance to change the world?"
A recent Dice report found that the number of full-time U.S. technology jobs has increased 46 percent since last year, while contractors' hourly rates are rising. The total number of tech jobs rose from 51,439 to 70,798 in the…
A new biometric technique developed by computer scientists at the University of Southampton can automatically identify people by their ears. The technique uses light rays to highlight circular and tubular structures.
The White House's failure to designate roles and responsibilities to federal agencies has impeded efforts to carry out President Obama's strategy for securing computer networks, according to a U.S. Government Accountability Office…
Ten years after the U.S. National Science Foundation began funding the Graduate STEM Fellows in K-12 Education Program, NSF has formally recognized that improving STEM education is a legitimate research activity for a graduate…
U.S. consumers crave their gadgets, but the cell phone rules them all, according to a new Pew Internet study.
The U.S. Defense Advanced Research Projects Agency has launched an initiative to increase the number of computer science graduates by using a variety of online tools and educational strategies to guide interested middle and high…
India plans to develop its own operating system for sensitive applications. V.K. Saraswat of India's Defense Research and Development Organization says the development of India's own OS source code is key to securing the country's…
A research paper predicts a new generation of malware that will target and extract information about relationships and record patterns of behavior in real-world social networks, a technique more dangerous and harder to detect…
Can location-based games for smart phones boost foot traffic at stores?
Cyber attacks of various sorts have been around for decades. University at Buffalo military ethicist Randall R. Dipert says we have good reason to worry, because cyber attacks are almost entirely unaddressed by traditional morality…