The news archive provides access to past news stories from Communications of the ACM and other sources by date.
Dartmouth University researchers are updating the grep and diff Unix command line-based text analysis tools available in all Linux and Unix distributions to handle more complex types of data.
A senior parliamentarian underlined Tehran's advanced technological capabilities and possibilities, and said the Iranian Armed Forces intend to simulate the design and reproduce the U.S. RQ-170 Sentinel stealth aircraft they…
In July 2011, a customer at a Chase Bank branch in West Hills, Calif., noticed something odd about the ATM he was using and reported it to police.
The first sign of trouble was a mysterious signal emanating from deep within the U.S. military’s classified computer network.
The 100Kin10 initiative — aims to increase the supply of math and science teachers by preparing 100,000 new ones over the next 10 years. It is based on President Obama's 2011 State of the Union speech, in which he called for…
Unmanned aircraft—or drones—are playing a large role in U.S. military operations in Afghanistan, but they're starting to show up the the skies above the U.S. as well.
Autonomous Exploration for Gathering Increased Science (AEGIS), novel autonomy software that has been operating on the Mars Exploration Rover Opportunity since December 2009, is NASA's 2011 Software of the Year recipient.
Silicon Valley is making one of its biggest lobbying pushes ever, as it fights a proposed law championed by Hollywood called the Stop Online Piracy Act. But whether the tech outcry will be enough to derail the law is far from…
Teachers will be able to design and develop lesson plans using digital technologies as a result of a project funded by the Economic and Social Research Council and the Engineering and Physical Sciences Research Council.
New software will give undersea gliders a greater ability to make decisions on their own when surveying large swaths of the oceans.
Password less authentication is an experimental two-factor authentication method designed to ensure the security of online transactions made via cell phones.
Today's quantum computer researchers have a solid blueprint for a new type of computer that could solve certain problems in seconds that would probably take millennia for conventional computers to solve, writes Massachusetts…
There was a time not so long ago that buying a car was one of the worst shopping experiences. As you drove off the dealer's lot, you couldn't escape the feeling that you hadn't gotten the best deal.
Before he died on Oct. 5, Steve Jobs left clues that he was working on a new product that would revolutionize how we interact with our TVs. "It will have the simplest user interface you could imagine," he said to biographer…
The future of search may look a little like Kirsten Goldenberg, a 14-year-old high-school student in Los Angeles. When she needs help with a homework problem, she no longer turns on her laptop to bring up Google's search box…
IBM has made three breakthroughs that could help chips continue following Moore's Law.
Technical University of Madrid researchers have developed software that estimates the amount of solar radiation reaching streets and buildings, which could help optimize cities' energy consumption.
Several linguists, engineers, and computer scientists are developing computer systems that can recognize signs of emotional speech, such as deception, anger, friendliness, and flirtation. The technology is advancing quicklyView…
The U.S. Intelligence Advanced Research Projects Activity announced that it is looking for new ideas that may become the basis of cutting-edge machine-learning projects.
The U.S. National Science Foundation recently began publishing CS Bits & Bytes, a one-page newsletter highlighting innovative computer science research, in recognition of Computer Science Education Week 2011.
Osaka University professor Hiroshi Ishiguro recently led ATR in developing Elfoid P1, a prototype portable tele-operated android that is designed to convey the human presence that is missing from a phone conversation.
The stealth C.I.A. drone that crashed deep inside Iranian territory last week was part of a stepped-up surveillance program that has frequently sent the United States’ most hard-to-detect drone into the country to map suspected…
The Pentagon has long had a love-hate relationship with computer hackers: On the outside, they can infiltrate vulnerable defense networks. On the inside, they can help stave off dangerous attacks.
Ever wished you could be in two places at once? Now you can share your body with a telepresence robot created by Dzmitry Tsetserukou of Toyohashi University of Technology in Japan and his team while receiving information about…
How will users hack this one? The Kinect is a device that inherently grows and expands: Microsoft itself has come around to acknowledging that the oft-hacked device really belongs to the world. But just because users are building…
A few months ago, scientists at Willow Garage, a robotics company in Menlo Park, Calif., invited a few ordinary people into their labs and gave them an assignment: they were to teach a robot called PR2 how to map out a room…
Computer scientists should be signing up in droves to fight cancer because they may have the best skills to help cure the disease, writes University of California, Berkeley professor David Patterson.
IBM researchers have developed the first prototype of racetrack computer memory, which combines on one chip all of the components needed to read, store, and write data.
College of Charleston researchers have developed Monterey Mirror, an interactive music performance system. When a musician plays a piece of music, Monterey Mirror captures the style and plays something similar back.
The U.S. Department of Health and Human Services recently launched its Health Care Innovation Challenge, with as much as $1 billion in grant funding being offered.