The news archive provides access to past news stories from Communications of the ACM and other sources by date.
Researchers at Microsoft have made software that can learn the sound of your voice, and then use it to speak a language that you don't.
Case Western Reserve University researchers have developed a technique they say saves power and money in computer processors by using less energy and producing less heat.
University of Buffalo researchers have developed video-analysis software that can analyze eye movements and determine when people are lying with significant accuracy.
A large portion of the Duqu Trojan was written in an unusual programming language, according to malware experts at Kaspersky Lab.
Darpa director Regina Dugan will soon be stepping down from her position atop the Pentagon's premiere research shop to take a job with Google.
The quantum world and the everyday world of human experience are supposed to be two different realms. Quantum effects, as demonstrated in the lab, are usually confined to the tiniest scales.
Sometimes the fastest pathway from point A to point B is not a straight line: for example, if you're underwater and contending with strong and shifting currents.
World Wide Web Consortium CEO Jeff Jaffe says HTML5 will be among the most disruptive elements to hit organizations since the early days of the Internet.
DARPA will launch the Zero Robotics Autonomous Space Capture Challenge on March 28, a contest that asks participants to develop unique algorithms to control small satellites on-board the International Space Station.
To explain how the Egyptian and Libyan governments shut down the Internet in their countries in early 2011, researchers at the University of California, San Diego researchers conducted an analysis based on the drop in a specific…
"This is it—the paradigm shift," archaeologist Chris Fisher told Ars. "Just like the advent of radiocarbon dating, LiDAR will have the same impact."
Think how convenient it would be if you could recharge electronic devices without ever having to plug them in—or even take them out of your briefcase.
When the long arm of the law reached in to arrest members of Anonymous's senior leadership on Tuesday, speculation immediately turned to the identities of the six men behind the Guy Fawkes mask.
The Internet has gained a reputation as somewhere you can say and do anything with impunity, primarily because it is easy to disguise your identity.
In the nearly 20 years since David Ronfeldt and I introduced our concept of cyberwar, this new mode of conflict has become a reality.
Google Executive Chairman Eric Schmidt told a crowd of journalists Wednesday night that there are some things about technology and the Internet that scare him, too.
Robots everywhere, driverless cars, new eco-solutions, screens that "read" feelings, and smart museums and stadiums—just some of the "City of the Future" technologies at this year's Cebit trade fair in Hanover, Germany.
What Einstein's E=mc2 is to relativity theory, Heisenberg's uncertainty principle is to quantum mechanics—not just a profound insight, but also an iconic formula that even non-physicists recognize.
The $25 Raspberry Pi computer could have an impact far beyond the educational sector, with early production runs showing significant demand for the technology.
The U.S. State Department's Tag Challenge will offer a $5,000 prize to anyone who can use Twitter and other social media and online tools to track down five fictional jewel thieves at large in Washington, D.C., New York, London…
As soon as he was caught, an influential computer hacker agreed to become a government informant and "literally worked around the clock" to help federal agents nab an elusive collective of alleged cyber criminals who have launched…
MIT researchers have developed Hornet, a software simulator they say models the performance of multicore chips much more accurately than its predecessors.
The first thing I noticed when I stepped into Recellular's Ann Arbor warehouse was the flags. From the rafters, the flags of the world oversee the processing of more than four million cell phones each year.
Basketball dominates the American sports landscape in March. So perhaps it’s fitting that the sixth annual MIT Sloan Sports Analytics Conference, held last week in Boston, heavily showcased the great strides basketball analytics…
There is a wave of concern—completely justified, to my mind—over the privacy implications of our increasing reliance on Facebook and Google. What most people don’t realize, however, is that these issues are dwarfed by the potential…
A chilling demonstration to a small, packed room at the recent RSA security conference showed how clicking a single bad Web link while using a phone running Google's Android operating system could give an attacker full remote…
Cryptography Research scientists have developed a method for a standard TV antenna, an amplifier, and specialized software to find the secret key being used by an application running on a smartphone to encrypt data.
University of Pittsburgh researchers have demonstrated a physical basis for terahertz bandwidth, which is the portion of the electromagnetic spectrum between infrared and microwave light.
A video on DARPA's Web site shows a four-legged robot reaching a galloping speed of up to 18 miles per hour, which is a new land-speed record for legged robots, according to DARPA.
University of Utah researchers are using the University of Tennessee's Cray XT5 Kraken supercomputer to simulate burning and detonation processes in transportable explosives.