The news archive provides access to past news stories from Communications of the ACM and other sources by date.
The University of Colorado Boulder PetaLibrary storage system has been deployed to address challenges regarding large-scale data storage and data management.
A team of researchers is developing a system to estimate the dynamics of animal populations by using sound recordings, statistics, and scientific computing.
.
New research shows no statistically significant difference in earnings between male and female engineers who have the same credentials.
Often, when there's talk about algorithms and journalism, the focus is on how to use algorithms to help publishers share content better and make more money.
As diplomatic efforts are stepped up to ease tensions in Ukraine, security experts have warned that Kiev and Moscow are locked in a cyber stand-off.
A dedicated mission to Jupiter's icy moon Europa, one of the best bets for life beyond Earth in our solar system, has inched a little closer to reality today.
Researchers have developed co-factorization machines that utilize mathematical analysis to study the interaction between social media users and tweets.
White House counselor John Podesta is leading a 90-day study examining the intersection of big data and privacy.
Women from 32 countries attended the womENcourage conference Saturday at Manchester University to encourage women in the field of computer science.
Mitsubishi Electric recently demonstrated prototype technology that predicts in-car operations.
A new ACM report urges states to provide more opportunities for students to gain the skills and knowledge needed to compete for high-wage computing positions.
Rsearchers have developed AIDA, software that enables accurate disambiguation of named entities by analyzing them with the help of Wikipedia.
Gen. Keith B. Alexander, the director of the National Security Agency, said Tuesday that the leaks by the former agency contractor Edward J. Snowden had slowed the effort to protect the country against cyberattacks on Wall Street…
If you think the crisis in the Ukraine is limited just to being on the ground, think again.
When Radia Perlman attended MIT in the late '60s and '70s, she was one of just a few dozen women (about 50) out of a class of 1,000.
Researchers working with the European Safety Bureau have developed the Navitas online food safety management system.
Researchers have proposed a modular architecture that offers scalability to address the challenge of physically implementing a full-scale universal quantum computer.
An automated analysis of soccer team formations shows visiting teams are less successful than home teams only because they play conservatively.
Shortly after Tim Cook succeeded Steve Jobs as CEO of Apple in August 2011, he told a confidant that he got up every morning reminding himself just to do the right thing—and not to think about what Steve would have done.
Technologies demonstrated in motion pictures are coming to life for advertisers.
On the outskirts of Pisa in a back room of a modern block, a machine is waiting for its operator.
I once ran into a friend and her husband at the playground in our neighborhood in Manhattan.
Security people are, by nature, cautious and methodical, and that is even more true of cryptographers.
In a nondescript industrial estate in El Segundo, a boxy suburb in south-west Los Angeles just a mile or two from LAX international airport, 20 people wait in a windowless canteen for a ceremony to begin.
On Friday, what had been the world's leading Bitcoin exchange declared bankrutpcy, claiming that hackers had exploited a technical issue called "transaction malleability" to steal 750,000 bitcoins.
Rice University researchers have designed a mobile voting system optimized for use on smartphones and have tested it against traditional voting platforms.
A new app turns a smartphone into a wireless SOS beacon that could help rescuers find people who have been trapped in collapsed buildings.
A new gesture-recognition system runs without batteries and enables gesture control for electronic devices that are hidden from sight.
The U.S. National Institute of Standards and Technology has released new guidance on cryptographic standards.