The news archive provides access to past news stories from Communications of the ACM and other sources by date.
University of North Carolina at Chapel Hill researchers have developed a system that aims to measure Web-driven scholarly interactions, such as how often research is tweeted, blogged about, or bookmarked. The goal is to track…
The average annual earnings of H-1B workers are about 10 percent higher than the average annual earnings of U.S. workers, after adjustments for age, occupation, and education, according to a Public Policy Institute of California…
During this Sunday's Super Bowl, a record five million viewers are expected to tweet or make other social media comments—not just about the game, but also about the many beer, snack, and car ads that are integral to the annual…
A*STAR Institution for Infocomm Research scientists have developed and algorithm which they say can quickly scan through large databases of facial images. They say the algorithm should make it easier to build facial age-classification…
A tool tells users what the company infers about your interests and age.
After waiting for so long to see the numbers inside Facebook's success, it's easy to be overwhelmed by all the new data we have about the social network and company. But there is one number that matters more than all the others…
Consider the tech it takes to back the search box on Google's home page: behind the algorithms, the cached search terms, and the other features that spring to life as you type in a query sits a data store that essentially contains…
University of Bristol computer scientists are working with students from a local U.K. secondary school as part of a project to expose them to robotics. The goal of the project is to introduce robotic concepts to the students…
The first logic circuits made using atom-thick sheets of molybdenite suggest the material could be an alternative to graphene as a possible solution to the problem of getting more power out of silicon-based computer components…
A worm infected with a virus could be more dangerous than either alone and more difficult to detect with traditional software programs, say Softwin researchers, who have found 40,000 instances of such mutated malware out of a…
A self-guiding bullet that can steer itself towards its target is being developed for use by the U.S. military.
Phase-change materials (PCMs) could thwart the limits of digital memory and enable a massive increase in storage density. PCM's biggest advantage is that it can store more than a single bit per cell.
Anticipation over Facebook Inc.'s initial public offering has fueled a recent surge in stock prices of social media companies in China, where Facebook is blocked.
Facebook's IPO filing shows that the company brought in about $3.7 billion in revenue and made $1 billion in profit in 2011.
As the cloud becomes more pervasive—driving everything from social networking to mobile apps—the computers that power it must guzzle more and more energy.
The power required to increase computing performance, especially in embedded or sensor systems has become a serious constraint and is restricting the potential of future systems.
A fighter pilot heads back to base after a long mission, feeling spent. A warning light flashes on the control panel.
Casio recently unveiled a prototype for a smartphone that can transmit data using light. The phone's screen flickers with varying intensity to transmit data. The flickering is imperceptible to the human eye, but can be sensed…
A U.S. Defense Advanced Research Projects Agency researcher has developed the Falling or Ballistically-launched Object that Makes Backdoors (F-BOMB), a sensor-equipped surveillance-capable computer that can be assembled for less…
When you read this sentence to yourself, it's likely that you hear the words in your head. Now, in what amounts to technological telepathy, others are on the verge of being able to hear your inner dialogue too.
The White House Office of Science and Technology Policy has assigned senior policy analyst Constance Steinkuehler to study video games for 18 months to determine if they have significant value as educational tools.
Researchers have developed a system designed to rate passwords relative to those already stored in a Web site's database. The password checker can tell users if their password is among the weakest on a site and encourage them…
Real-world political borders are hindering the defense of cyberspace, according to McAfee's new Cyber Defense Report. A dearth of common standards of behavior, objectives, and language hamper discussion of the challenges of…
Silicon Valley companies are in the midst of a hiring boom not seen since the late 1990s as nearly 50 U.S. technology companies with a market value of more than $100 million increased employment by more than 50 percent in the…
In the brutal world of online commerce, where a competing product is just a click away, retailers need all the juice they can get to close a sale.
Researchers are trying to build robots capable of working together with minimal human supervision. But will they ever learn to get along?
Forty-six men and women are recognized as 2011 ACM Fellows.
Increasingly sophisticated botnets have emerged during the last several years. However, security researchers, businesses, and governments are attacking botnets from a number of different angles — and sometimes winning.
Researchers are exploring networked computational analysis, formal classification, and topic modeling to better identify relevant scientists, ideas, and trends.