The news archive provides access to past news stories from Communications of the ACM and other sources by date.
Computer security companies and researchers have dedicated a lot of time and money to testing the virtual padlocks on your online accounts. Some are now focusing on a new threat vector: your car.
As cloud computing spreads data around the globe, a haze of legal and privacy questions follows.
At a time when the Internet has been inextricably linked to our national infrastructure, there are understandably serious concerns about the ability of the U.S. power grid to withstand a coordinated attack from hackers in…
The cloud has a big problem on its hands: Cloud storage is failure-prone, slow, and infinitely quirky.
It took more than three years, but Microsoft has finally learned to stop worrying and love Hadoop.
The United States wants to achieve exaflop speeds for supercomputing, but China, the European Union, India, Japan, and Russia also have set their sights on exascale computing.
Table salt could be used to increase the capacity of hard drives from as much as 4 Tbytes today to more than 21 Tbytes, according to researchers at the Institute of Materials Research and Engineering.
The downward trend in the use of Java continues, according to Tiobe Software's latest monthly assessment of programming languages, and the company's Paul Jansen believes Java is facing a long-term slide.
Just before the American-led strikes against Libya in March, the Obama administration intensely debated whether to open the mission with a new kind of warfare: a cyberoffensive to disrupt and even disable the Qaddafi government’s…
Researchers at MIT's Lincoln Lab have developed new radar technology that provides real-time video of what’s going on behind solid walls.
During 2011's deadly onslaught of earthquakes, floods and tornadoes, countless buildings had to be evacuated while workers checked to make sure they were stable. The events served as a reminder that most structures are still…
Regulators in the United States and overseas are cracking down on computerized high-speed trading that crowds today’s stock exchanges, worried that as it spreads around the globe it is making market swings worse.
The 317 Apple patents that list Steven P. Jobs among the group of inventors offer a glimpse at his legendary say over the minute details of the company's products—from the company's iconic computer cases to the glass staircases…
When David Kirkby and Daniel Margala entered a contest to find out who could most accurately map dark matter in the universe, the first algorithm they submitted failed to crack the top 10 among a field of more than 100 engineers…
Every microsecond counts in stock trading. The New York Stock Exchange handles a third of the world's stock trading—around 22 billion messages a day. But NYSE Euronext, which operates the exchange, wants it to get even faster…
Virginia Tech researchers have created the Virginia Tech Knowledge Networks, a repository of more than 5,000 publications by the College of Engineering faculty, which enables researchers to test ideas and discover different kinds…
In a forthcoming article, "Exploratory Experimentation and Computation," American Mathematical Society researchers will describe how modern computer technology has expanded society's ability to discover new mathematical results…
Researchers at Vanderbilt and Cornell universities have demonstrated that a computer can analyze raw experimental data from a biological system and derive the basic mathematical equations that describe the way the system operates…
The State Office of Criminal Investigations in Berlin is using desCRY, a new system for detecting child-pornographic images in field tests.
The Massachusetts Green High Performance Computer Center aims to capitalize on the huge boost in the amount of computer power available for academic research.
A new report warns that 2012 will feature new and increasingly sophisticated means to capture and exploit user data, as well as escalating battles over the control of online information that threatens to compromise content and…
Oxford University researchers have installed robotic technology in a Wildcat vehicle built by BAE Systems that transforms the vehicle into an autonomous car. The researchers' goals include making roads safer, less congested,…
The deteriorating health of Steve Jobs loomed over Apple’s Oct. 4 press event at the company’s headquarters in Cupertino, Calif. Apple wanted the day to be all about its new iPhone 4S, but the absence of the company’s charismatic…
Researchers at the Harvard-Smithsonian Center for Astrophysics are turning their attention to something even the most advanced telescopes can’t detect: the art in their science.
A new version of the Internet might be the best way to defend against cyberattacks, says Internet co-founder Vint Cerf.
New England Complex Systems Institute researchers have developed a computational model that analyzes census data to identify potential areas of civil violence, based on the premise that community-level violence is a function…
Stanford University's Army High-Performance Computing Research Center has developed a Braille writer that is simpler and less expensive than previous models.
Google announced the launch of a preview version of Dart, an object-oriented Web programming language that has capabilities that resemble those of JavaScript but also addresses some of its scalability and organizational shortcomings…
Tel Aviv University researchers have developed a computer algorithm that could help identify the different sources that contributed to the individual books of the Bible.
The patrol car comes to a stop in a sleepy neighbourhood of small, earth-coloured homes. A woman saunters past pushing a stroller. It is daytime in the artsy beach town of Santa Cruz but I am still a little spooked.