The news archive provides access to past news stories from Communications of the ACM and other sources by date.
Armies of entrepreneurs are trying to make money sifting through mountains of data from the Web and other sources, but one of the biggest challenges is simply getting control of the data in the first place.
If you're on an iPhone or iPad using the most recent version of Apple's operating system, click on the "Settings" icon, and then click on "Safari."
As one of the leading manufacturers of the equipment that routes data around the Internet, Cisco Systems is in good position to know just how many 0s and 1s go zipping around all day, every day.
Science, technology, engineering, and math departments at many universities are redesigning the lecture as a style of teaching out of concern that it is driving students away.
Pennsylvania State University researchers have developed Caffeine Zone, an application that can help people determine when caffeine may give them a mental boost and when it could hurt their sleep patterns.
The number of U.S. workers in science and engineering professions fell in the past decade, ending a steady upward trend in the proportion of workers in fields associated with technology.
A functional prototype of the Global Square, a social network collaboration platform for activists, will be available by March.
Andrew Pole had just started working as a statistician for Target in 2002, when two colleagues from the marketing department stopped by his desk to ask an odd question: "If we wanted to figure out if a customer is pregnant, even…
Google and other advertising companies have been following iPhone and Apple users as they browse the Web, even though Apple's Safari Web browser is set to block such tracking by default. How have they been able to do it?
To keep energy consumption under control, future chips may need to move data using light instead of electricity—and the technical expertise to build them may reside in the United States.
The goal is to use the tool to keep on top of breaking events, incidents and emerging threats, the agency said in a recent Request for Information from IT vendors.
A team of European and American mathematicians and cryptographers have discovered an unexpected weakness in the encryption system widely used worldwide for online shopping, banking, email, and other Internet services intended…
On 6 May 2010, shares on U.S. financial markets suddenly dropped on average by around 10% but in over 300 stocks by more than 60%. Moments later the prices recovered.
Modern computing systems owe a sizable debt to Alan Turing, whose breakthrough work set the direction that the future of computing would take by determining that no technique can be developed to ascertain in all cases whether…
A new breed of data scientists is in demand as a result of the rise of big data. Government, universities, and industry are looking for people with a rare mix of expertise in statistics, technology, and business analysis who…
Representatives from Oracle and other participants in the OpenJDK discussion group are advocating for the Graal project, an effort to implement a dynamic compiler in Java to improve code quality and memory usage in the Java Virtual…
MIT researchers have developed a system that enables robots to create and continuously update a three-dimensional map of their environment using a low-cost camera.
When large airliners approach an airport for a landing, a combination of radio signals and high-intensity lighting shows the pilot exactly where the runway is, even at night or in fog. But millions of people a year fly on smaller…
Twitter has admitted copying entire address books from smartphones and storing the data on its servers, often without customers' knowledge.
Dropbox is the most deceptively simple of services.
When Kenneth G. Lieberthal, a China expert at the Brookings Institution, travels to that country, he follows a routine that seems straight from a spy film.
In the summer of 1991, Paul Ginsparg, a researcher at the Los Alamos nuclear laboratory, set up an email system for about 200 string theorists to exchange papers they had written.
More than 25,000 demonstrators recently took part in protests across Europe against the Anti-Counterfeiting Trade Agreement, a controversial international anti-piracy pact.
Researchers at Newcastle, York, and Northumbria universities have developed a way of making quick and easy electronic transfers while retaining the paper check as something physical to be handed to the recipient.
An online encryption technique widely used to safeguard email, e-commerce, and other sensitive Internet transactions is crackable, according to a study by U.S. and European cryptanalysts.
Syrian activists are using Google's Map Maker crowdsourcing software to oppose the Assad regime by renaming streets and landmarks after their revolutionary idols, including protesters who have died during the 11-month uprising…
University of Gothenburg researchers have developed software that can score 150 on a standard IQ test.
Good with numbers? Fascinated by data? The sound you hear is opportunity knocking.
Distributed computing is all the rage these days. The idea is to break down computational tasks into convenient chunks and distribute them across a network to a number of computers.
Head of Iran's civil defense organization General Gholam Reza Jalali stressed that the Iranian experts and engineers are capable of countering the enemies' cyber attacks launched against the country's nuclear facilities and installations…