The news archive provides access to past news stories from Communications of the ACM and other sources by date.
Homeland Security's Bruce McConnell on the government's role in helping companies fight online attacks.
The most critical challenge for practitioners of agile software development is learning how to become a self-organizing, cross-functional agile team.
Learning a language can be difficult for some, but for babies it seems quite easy. With support from the National Science Foundation, linguist Jeffrey Heinz and mechanical engineer Bert Tanner have taken some cues from the…
MIT and Google have devised a method of transferring tasks between your smartphone and your computer by merely pointing the cell-phone camera at your PC's screen.
The U.S. Department of Homeland Security will release a new system of guidelines intended to increase security in the software in many Web-based services. The guidelines include a list of the top 25 programming errors that lead…
The Google Ideas think tank has gathered 80 former radicals, including ex-neo-Nazis, Muslim extremists, and U.S. gang members, to brainstorm ways technology can counter radicalization around the world in collaboration with 120…
U.S. National Institute of Standards and Technology researchers have developed the System, Component, and Operationally Relevant Evaluations framework, which is designed to judge the performance of a system and its components…
CERN researchers generate a petabyte of data every second as they work to discover the origins of the universe by smashing particles together at close to the speed of light. However, the researchers, led by Francois Briard,…
Ohio State University researchers have developed eShadow, a smartphone application that helps people locate their friends in a crowd using nearby wireless networks to alert users that a friend is in the area.
Your computer, your phone, and your other digital devices hold vast amounts of personal information about you and your family. Can police officers enter your home to search your laptop? Do you have to give law enforcement…
Although the stories told by Pixar Animation Studios take place in richly realized fantasy realms, the science and technology required to create those worlds have distinctly real-world origins.
In the annals of great oxymorons, "non-invasive brain implant" would surely rank up there. Misnomer or not, the University of Michigan is touting just such a device, one that it says could have a range of applications—the…
A small group of Internet security specialists gathered in Singapore last week to start up a global system to make email and e-commerce more secure, end the proliferation of passwords, and raise the bar significantly for Internet…
Video games can be mesmerizing, even for a rhesus monkey. Which may explain, in part, why six-year-old Jasper has been sitting transfixed at a computer screen in a Washington University lab for nearly an hour, his gaze trained…
Hewlett-Packard's Indian research lab is building applications designed to simplify human-computer interaction for enterprises in sectors such as health care and financial services.
University of Southern California scientists have developed a machine-translation technique that treats translation as a cryptographic challenge rather than a matter of analyzing the statistical characteristics of the same text…
The use of tactics to strengthen botnets, such as fast-flux networks and Conficker-like dynamic domain generation, can tip off their activities, according to research from the Georgia Institute of Technology.
Google on Friday staked out its position in what could be a long antitrust battle over how the company conducts its core business.
University of Exeter researchers recently concluded a study involving the first-ever demonstration of simultaneous information processing and storage using phase-change materials. The new technique could revolutionize computing…
A new program from Princeton University stands to give data center administrators far greater control over what end users can and cannot access on a computer.
The Federal Trade Commission is poised to serve Google Inc. with civil subpoenas, according to people familiar with the matter, signaling the start of a wide-ranging, formal investigation into whether the Internet-search giant…
Does D-Wave's first big sale disprove the quantum computing naysayers?
Last August, a bunch of Star Wars fans pestered NASA about a timetable for building a hyperdrive engine. Maybe someone was listening. In May, the Defense Advanced Research Projects Agency opened up the discussion by soliciting…
Intel's Larrabee GPU will finally go into commercial production next year, but not as a graphics processor. Instead, it will make its debut in a 50-core incarnation fabbed on Intel's 22nm and aimed squarely at one of the fastest…
NASA's Dawn spacecraft is on track to begin the first extended visit to a large asteroid. The mission expects to go into orbit around Vesta on July 16 and begin gathering science data in early August.
With an innovative camera due out later this year from a company called Lytro, photographers will have one less excuse for having missed that perfect shot.
Today marks the 99th anniversary of the birth of Alan Turing, a noted polymath and cryptanalyst who is regarded by many as being the grandfather of modern computing.
Monash University researchers are developing wireless sensor networks based on insects' neural systems that could revolutionize how environmental systems, building infrastructures, and health-care patients are monitored.
Delft University researchers are studying how botclouds can be used to launch attacks, send spam, and commit fraud.
Many information technology leaders say the importance of a single type of device, such as the computer, tablet, or smartphone, is waning as more data moves to the cloud.