The news archive provides access to past news stories from Communications of the ACM and other sources by date.
In the wake of the first ever report that scientists have edited the genomes of human embryos, experts cannot agree on whether the work was ethical. They also disagree over how close the methods are to being an option for treating…
City College of New York researchers have developed an unconventional method for increasing data transmission speeds.
Global technology companies quickly responded to the 7.8-magnitude earthquake that struck Nepal on Saturday by helping connect survivors to each other and the world.
Girls Who Code aims to close the gender gap in technology and engineering by teaching girls computing skills and encouraging them to pursue jobs in computer science.
Carnegie Mellon University's Heads-Up, No-Limit Texas Hold ’em poker tournament pits four of the world's best poker players against a CMU-developed program.
Drexel University researchers are studying a new class of materials in an attempt to make computer memory more stable and more energy-conscious.
New research associates online forums with positive well-being and even increased community engagement offline.
Most of us assume that smartphones and laptops will keep getting faster and better.
Somewhere near Iceland, a new NATO member, Berlya is under cyber-attack, most likely launched from its arch-rival Crimsonia, although the Berlyans can’t be completely sure.
Passwords get hacked—a lot.
Imagine a trio of aerobatic aircraft. Over the years they've gotten very good at their routine. But they want to add another five or six or seven members.
The prototype WiFO technology uses light-emitting diodes to transmit information, increasing the bandwidth of Wi-Fi systems by a factor of 10.
Carlos III University of Madrid researchers are developing an interactive autonomous social therapist robot.
Researchers are working to implement a way to thwart criminals from inferring computer data based on the pattern in which the machine accesses its memory.
U.S. Department of Defense Secretary Ashton B. Carter has outlined the circumstances under which the U.S. could use cyberweapons against attackers.
A new report by the National Science Board examines the U.S. science, technology, engineering, and mathematics workforce.
This week marks the 25th anniversary of the launch of NASA's Hubble Space Telescope, the world's first space telescope. Hubble images have revealed a vast and colorful cosmos, showcasing, among many wonders, towering pillars…
People's distress over the privacy of their communications has never been more acute. Whether the fear is over U.S. surveillance or breaches by hackers of unknown origins, many consumers fear that there is no such thing as privacy…
Sometime next summer, you'll be able to watch a horror series that is exactly as scary as you want it to be—no more, no less.
A new Google algorithm would influence search results based on the "trustworthiness" of websites.
Which outfielders take the most efficient routes to a fly ball? Which pitcher's curveball has the highest spin rate? Which batter has the fastest speed to first base?
University of Illinois researchers say they have developed a more effective method for closing gaps in atomically small wires, which could lead to new transistor technology.
A method for switching on the current flow through a single molecule with the help of light could result in being able to store and process information at the molecular level.
Researchers say paying rewards to vulnerability researchers to locate flaws in software initially works, but mature software requires a different strategy.
Apple's Swift language has been embraced by developers because of its unique features.
The White House and U.S. Department of Homeland Security officials support arguments by the nation’s law enforcement and intelligence leaders that encryption technology should be restricted or modified to make it easier for the…
The U.S. Government Accountability Office has launched an investigation into whether gender bias is influencing the awarding of research grants, which would be illegal under U.S. law.
The computer scientist Stuart Russell wants to ensure that our increasingly intelligent machines remain aligned with human values.
Every Morning, Kim Casipong strolls past barbed wire, six dogs, and a watchman in order to get to her job in a pink apartment building decorated with ornate stonework in Lapu-Lapu City.
Earlier this year, the film Blackhat got high marks for realistic scenes in which hackers and information security specialists work at their computers to hunt down perpetrators of a cyberattack.