The news archive provides access to past news stories from Communications of the ACM and other sources by date.
New York University researchers have built a small surveillance drone able to extend its battery life by attaching itself to a wall and powering down its rotors.
Moxi and other delivery-focused assistants have become even more critical as the Covid-19 pandemic has pushed health care workers to their limits.
Start-up Beagle Technology addresses agricultural labor shortage and cost issues with new automated pruning technology for the wine industry.
The quantum material NNO demonstrates novel quantum properties that enable it to learn throughout its lifetime.
European policymakers reached a deal on the Digital Services Act which would force Silicon Valley companies to more aggressively police harmful content on their platforms, or face large fines.
The company's board and the Tesla CEO hammered out the final details of his $54.20 a share bid.
Using only her own ability to engineer code, Jane Manchun Wong is keeping tech on its toes.
The firm is trying to bridge academia and the crypto industry, an unusual investment in venture capital.
As more nursing home and assisted living facility staff leave the profession, some facilities are turning to robots to fill in the gaps.
Researchers at the U.K.’s University of Oxford found that iOS apps can still track users without explicit permission.
A team of researchers demonstrated that non-invasive respiratory support is more likely to be successful if it relies on significantly reducing patients' efforts to breath.
Researchers at the University of Georgia developed an algorithm for assessing a tract of land's conservation value by factoring in variables excluded from other models.
U.S. drone firm Zipline is delivering medical supplies to pharmacies and hospitals in southwestern Japan via aerial drones.
Columbia University computer scientists developed an algorithm that can block smart devices from spying on users by generating extremely quiet sounds.
With demand exceeding the available workforce, more cybersecurity and risk executives are seeking candidates without degrees or traditional technology backgrounds.
Qing Shi and colleagues at China's Beijing Institute of Technology built a rat-inspired robot that can squeeze through tight spaces, which could be used to assess disaster zones or pipelines.
Expert witness in Lords police tech inquiry welcomes committee's findings but questions whether its recommendations.
Moxi and other delivery-focused assistants have become even more critical as the Covid-19 pandemic has pushed health care workers to their limits.
Quantum device points the way toward an exponential boost in "smart" computing capabilities.
Unlike sectors such as hospitality, the cloud computing industry continued to grow in 2020 and onwards. But it's not stopping there.
Harnessing the body's natural ions can enable secure, wireless low-power transmission of data from bio-implants.
An international team of researchers has developed a three-dimensional printing process for glass microstructures.
Scientists at the U.S. Department of Energy's Brookhaven National Laboratory (BNL) have helped to de-noise synchrotron x-ray experiments computationally.
Researchers are looking to untapped sources—from fertilizer waste to printed circuit boards—to solve the environmental and supply chain problems of rare earth elements.
The research could lead to hack-proof networks.
The Ninth Circuit's decision is a major win for archivists, academics, researchers, and journalists who use tools to collect, or scrape, information that is publicly accessible on the internet.
Proponents of artificial intelligence believe it can be used to predict, and help to prevent, dangerous driving behaviors.
A team of researchers three-dimensionally (3D)-printed a prototype Tamper-Evident Container designed to record attempts to break into it.
Researchers have developed a Techno-tortoise that eventually could help curtail a decline in the desert tortoise population.
A circuit board's power consumption can reveal malicious tampering designed to facilitate Trojan attacks to steal sensitive data or crash a device when triggered.