The news archive provides access to past news stories from Communications of the ACM and other sources by date.
Georgia Tech researchers have conducted a case study on interaction with on-body technology in public. The team's findings suggest that scientists should focus on arms and wrists as they pursue wearable computing.
Internet Engineering Task Force chair Jari Arkko recently spoke about the need for the engineers behind the Internet to push for new standards that would make it more difficult for government intelligence agencies to spy on Internet…
Oxford University has released a study indicating that no significant correlation exists between a scientific academic professional having a Wikipedia entry and being productive in his or her field.
Duke University researchers have developed a power-harvesting device that wirelessly converts a microwave signal to direct current voltage capable of recharging a cellphone battery or other small electronic device.
Intel has called on the tech industry to make Internet of Things (IoT) technology a viable option for mainstream users. Intel has outlined nine key areas in which technology companies and governments can make the IoT a reality…
When technology companies get floated on the stock market, it prompts all kinds of analytical soul searching.
On Stanford University’s sprawling campus, where a long palm-lined drive leads to manicured quads, humanities professors produce highly regarded scholarship on Renaissance French literature and the philosophy of language.
Just when scientists thought they had a tidy theory for how the giant asteroid Vesta formed, a new paper from NASA's Dawn mission suggests the history is more complicated.
Carnegie Mellon University researchers have developed GOTCHA, Generating panOptic Turing Tests to Tell Computers and Humans Apart, a password system based on visual cues that typically only a human can decipher.
The Microsoft- and Facebook-sponsored Internet Bug Bounty program pays as much as $2,500 for a new vulnerability detected in key open source platforms. The program provides an incentive for people to raise the quality of software…
Increasing the scale and decreasing the cost and power of data centers requires greatly boosting the density of computing, storage, and networking within those centers, according to University of California, San Diego researchers…
Vehicle-to-Vehicle (V2V) technologies could provide significant safety benefits if widely deployed. However, several challenges could create problems for the U.S. Transportation Dept. and the auto industry, joint developers…
Virginia Tech researchers say they have developed a better method of summarizing text through the mining or retrieval of key data, which won a Yelp-sponsored contest. The goal was to help guess an online review's rating from…
Researchers are investigating millimeter-wave radio communication in the 60-GHz band, which could increase spectrum for wireless communication by several orders of magnitude.
Rhesus monkeys in a lab are using their brains to move two arms of a virtual primate on a screen, moving researchers one step closer towards outfitting paralyzed humans with with exoskeletons that move like biological limbs.
Consider the tweet.
Smartphones can do a better job measuring the energy you expand during the day than today's wearable activity monitors, according to Amit Pande from the University of California, Davis.
University of Delaware researchers have developed a compact, stretchable wire-shaped supercapacitor based on continuous carbon nanotube fibers.
Bitcoin, the leading online alternative currency, has attracted high-minded entrepreneurs and crooks alike.
Japanese scientists have developed a robot that can choose a hand shape for the rock-paper-scissors game almost at the same time as a human.
Microsoft Research has developed a mobile app designed to make it easier and less expensive to create and print three-dimensional (3-D) content.
Throughout our universe, tucked inside galaxies far, far away, giant black holes are pairing up and merging.
It was 25 years ago Tuesday that The New York Times first named 23-year-old Cornell graduate student Robert Morris as the culprit behind what became known as the Morris Worm, the Internet's first major malware outbreak.
Cambridge University researchers say they have achieved a breakthrough in quantum cryptography by demonstrating that information can be encrypted and then decrypted with complete security using a "sealed envelope" system based…
Lawrence Livermore National Laboratory this month is deploying Catalyst, a new supercomputer that uses solid-state drive storage as an alternative to dynamic random access memory and hard drives, and delivers a peak performance…
The U.S. National Institute of Standards and Technology is formally reviewing its cryptographic standards development processes to address a loss of public confidence following reports that the U.S. National Security Agency weakened…
When Martin Krzywinski took a systems administrator job at Canada’s Michael Smith Genome Center, he didn’t plan on becoming a pioneer of 21st century biological data visualization.
Researchers at the Swiss Federal Institutes of Technology in Lausanne have developed Gimball, a spherical flying robot that is protected by an elastic cage that enables it to absorb and rebound from impacts.
Virginia Tech researchers have developed data management and analysis software for data-intensive scientific applications in the cloud that could help speed up medical research.
Researchers at the Los Alamos National Laboratory are conducting a large-scale field test study of incorrect results on high-performance computing platforms to gain a better understanding of soft errors and silent data corruption…