The news archive provides access to past news stories from Communications of the ACM and other sources by date.
Dozens of countries are pushing aggressively for the establishment of international control over the Internet via the United Nations' International Telecommunication Union (ITU), which U.S. Federal Communications Commission commissioner…
In a book to be published later this year, University of Chicago mathematician Robert Soare proposes that Alan Turing's design for the modern computer was an artistic as well as a scientific achievement.
These days, it’s hard to find a superlative that adequately describes Apple. But maybe simplest is best: biggest.
The Stockton Tunnel, excavated in 1914, lets San Francisco drivers get between downtown and Fisherman’s Wharf without having to ascend the scarily steep grades of Nob Hill.
It's cool to have rabbit ears again.
Matt Sullivan, a retired soldier, still has trouble explaining his right leg to strangers.
It is something of a fluke that copyright law has become so intertwined with our online lives. For most people, the first things that were easy to create and distribute online—articles, pictures, music, movies—also happened to…
With just 2% of the Smithsonian's archive of 137 million items available to the public at any one time, an effort is under way at the world's largest museum and research institution to adopt 3D tools to expand its reach around…
A new Web standard proposal authored by Google, Microsoft, and Netflix seeks to bring copy protection mechanisms to the Web.
Twenty-one years after he set foot in the United States, Facebook engineer Wei Zhu was overjoyed to take his oath of citizenship Wednesday at a special Silicon Valley immigration summit.
Intel is working to extend its experimental solar-powered processor technology to hardware such as graphics processors, memory, and floating point units.
Large sections of the transportation and military infrastructure, some modern businesses, and computer programmers still use technology that has not been updated for decades.
Alongside the news that the White House will announce voluntary privacy guidelines for Web companies comes the announcement from major online advertisers that they will implement "do not track" technology into Web browsers.
It wasn't so long ago that legions of people began walking the streets, talking to themselves. On closer inspection, many of them turned out to be wearing tiny earpieces that connected wirelessly to their smartphones.
Twitter has a reputation for linking people through interests rather than geography. But while the little blue bird lets us connect with people all around the world, the networks we form on Twitter look a lot like the airplane…
When it launched in 2010, NuCaptcha touted its proprietary technology as being able to "provide the highest level of security available" by using video streams to display those distorted letters you type in to prove you're really…
The alarm rings. You glance at the clock. The time is 6.30 am. You haven't even got out of bed, and already at least six mathematical equations have influenced your life.
There is growing evidence that information gleaned from online social networks can be processed and used in ways to gain an accurate profile of an individual.
Tomorrow's computers will constantly improve their understanding of the data they work with, which will help them provide users with more appropriate information, predicts IBM fellow David Ferrucci.
A dramatic shift in how robots are made and perceived is leading to their widespread adoption and use.
John Nash's mind is even more exquisite than we thought. The Nobel laureate, famous for both his work in game theory and his schizophrenia—as portrayed in the book and film A Beautiful Mind—had ideas about cryptography and complexity…
A new security report warns of malware networks ("malnets") lurking within Google and other search engines, driving unsuspecting Web surfers to sites where they might share their personal or financial information to unintended…
Avi Rubin is the technical director of the Information Security Institute at Johns Hopkins University, and in this talk from the TEDxMidAtlantic conference in November he discusses the history of hacks on various devices, including…
President Obama's fiscal 2013 budget request prioritizes basic research and development in cybersecurity at the Department of Defense, the Department of Homeland Security, the National Science Foundation, and the National Institute…
University of Central Florida computer engineers used a computer program to analyze the subunits that make up ribonucleic acid.
Computational ecology students at the University of Illinois at Chicago recently traveled to Kenya to conduct experiments using computer technology to collect wildlife data, and made 3D images and video footage to create Mpala…
A NASA-led science team has created an accurate, high-resolution map of the height of Earth's forests.
Researchers at Intel have come up with a way to make WiFi faster and more energy efficient.
Two-hour sessions with female Google software engineers are convincing many female high-school students in Israel to change their majors to computer science and to consider it as a career.
Australian and American physicists have built a working transistor from a single phosphorus atom embedded in a silicon crystal.