The news archive provides access to past news stories from Communications of the ACM and other sources by date.
The Solar Wi-Fi Energy Efficient Tracking camera system is a prototype device for a solar-powered wireless network of smart cameras.
Google owns a lot of computers—perhaps a million servers stitched together into the fastest, most powerful artificial intelligence on the planet.
There's a debate going on about whether the U.S. government—specifically, the NSA and United States Cyber Command—should stockpile Internet vulnerabilities or disclose and fix them.
Nearly 4.3 billion kilometres from Earth, and most of the way to Pluto, NASA's New Horizons spacecraft is in danger of missing out on half of its mission.
NASA and its international partners now have the go-ahead to begin construction on a new Mars lander, after it completed a successful Mission Critical Design Review on Friday.
Federal Communications Commission chairman Tom Wheeler says the FCC could take action to block the emergence of Internet fast lanes, or "paid prioritization."
Researchers at IBM and Fujifilm are developing a magnetic tape prototype that can store 85.9 billion bits of data per square inch.
Researchers say they have has developed a technology that paves the way for 'electroceutical' devices to treat illness or alleviate pain.
Hitachi engineers say they have created an android robot with a sense of humor.
Researchers have developed a method for creating materials that can store and discharge significant amounts of electricity.
Artificial intelligence is guided by the far-off goal of having software match humans at important tasks.
The SMARTFIRE project, a two-year European Union effort initiated in 2013, aims to develop large-scale experimental facilities for cutting-edge Internet research.
Learn to code. Get a job. Then what?
Is it true that anyone in the EU can have anything removed from Google and other search engines?
Peering into his cabinet of curiosities on a recent spring day, Bob Willett, a scientist at Bell Labs in Murray Hill, N.J., nimbly plucked a tiny black crystal from the shelves and slid it under a microscope.
Scientists at NASA and the University of California, Irvine (UCI), have found that canyons under Greenland's ocean-feeding glaciers are deeper and longer than previously thought, increasing the amount of Greenland's estimated…
The new Stanford Research Computing Center is saving energy through air-driven cooling.
A pair of critical flaws in EMV smart card technology can be exploited to generate cloned cards that are undetectable by normal bank procedures.
College of William & Mary professor Robert Dickerson says there are many reasons to tie a smartphone app to the cloud.
Two large American steel makers, U.S. Steel and Allegheny Technologies, each lost confidential files giving access to their computer networks.
Dozens of microbial species may have accompanied the Curiosity rover to Mars, where it landed in August 2012.
Today Google launched one of its coolest doodles yet: a 3-D interactive Rubik's Cube.
The Internet's eyes turned to the Federal Communications Commission on Thursday, as the panel approved a plan to consider allowing Internet service providers to charge Web sites like Netflix for higher-quality delivery of their…
European researchers are working on a portable Braille device with a tactile display that enables visually impaired users to access digital words and graphics.
Researchers have uncovered a flaw in cryptography security, discrediting several cryptographic systems that were assumed to provide sufficient safeguards.
Researchers have developed a glasses-free, multi-perspective, three-dimensional video screen.
A device developed by Pennsylvania State University electrical engineers could serve as the foundation for non-Boolean computing.
Researchers hope to prove within the next few years that it is possible to use robotic bees to artificially pollinate crops.
The U.S. Office of Management and Budget's Lisa Schlosser thinks a measure along the lines of Title IX may be necessary to close the gender gap in IT.
Researchers say they have taken ideas from nature and applied them to security for software that runs on digital devices.