The news archive provides access to past news stories from Communications of the ACM and other sources by date.
Graphene, an emerging material that could change the way electronic components are made and help computing performance continue to grow, is everywhere in the research world these days.
By wielding a potent legal threat, the U.S. government is often able to force Internet companies to aid its surveillance demands.
The latest drive by NASA's Curiosity Mars rover brought the total distance that the rover has driven on Mars to more than 1 kilometer (about 0.62 mile).
A newly developed model improves the clarity of vehicle-to-vehicle transmissions needed to make intelligent transportation a reality.
Negobot, a "virtual Lolita" robot, poses as a 14-year-old girl and tries to identify pedophiles in online chatrooms.
A new virtual model of the human brain daydreams like people do.
West Virginia University recently announced plans to use vacant broadcast TV channels for wireless broadband services with its TV white space test network.
A new computer game simulates a zombie invasion, in order to gather data on crowd behavior and the impact of stress on decision-making.
Our world is ruled by 1s and 0s.
In a pair of recent papers, researchers at MIT’s Computer Science and Artificial Intelligence Laboratory have demonstrated that, for a few specific tasks, it's possible to write computer programs using ordinary language rather…
"It's extraordinary that we live in this day and age with all our wonderful modern technology, and still we have shoes that give us blisters," says Hugh Herr, with more than a little incredulity and perhaps even fresh anger at…
A thermal-imaging scan for instantaneous face recognition could be the next advance in biometrics.
Researchers have demonstrated incredibly short optical response rates using graphene, which could lead to much faster Internet speeds.
Researchers have developed a low-cost system that could turn a whiteboard, glass window, or a wooden tabletop into a responsive, touch-sensitive surface.
The U.S. government has wanted a nationwide network of unclassified cyberexercise facilities for years, and now that idea is coming to state and local governments.
New mobile apps improve citizen-government communications.
Like dozens of other brick-and-mortar retailers,Nordstrom wanted to learn more about its customers—how many came through the doors, how many were repeat visitors—the kind of information that e-commerce sites like Amazon have…
Since the dawn of the Web and ubiquitous free e-mail services over the past two decades, the need to secure personal information online has been evident but often ignored.
ICANN, the organization in charge of a major overhaul of Internet addresses, said it has signed agreements that will bring Chinese, Russian, and Arabic domain names to the Net.
The Canadian AeroVelo team has done what many thought impossible.
A new app called CrowdShake provides early earthquake warnings by converting a smartphone's accelerometer into a seismometer.
Researchers have used 6,500 live silkworms to create a three-dimensional printed dome, utilizing a hybrid fabrication method called CNSilk.
Researchers are using two scanning techniques to create a detailed three-dimensional digital visualization of King Richard III's grave.
Researchers have developed a one-kilobit rewritable silicon oxide device with diodes that eliminate data-corrupting crosstalk.
Security warnings displayed by Web browsers are much more effective at deterring risky Internet behavior than was previously believed, a recent study found.
A newly developed flexible sensor out of tiny gold particles could be used to create electronic skin.
Researchers have found that people express more positive feelings toward a robot that takes care of them than toward a robot that needs care.
Every day in China, hundreds of messages are sent from government offices to website editors around the country that say things like, "Report on the new provincial budget tomorrow, but do not feature it on the front page, make…
Imagine a camera that allows you to see through a crowd to get a clear view of someone who would otherwise be obscured, a smartphone that matches big-budget lenses for image quality, or a photograph that lets you change your…
Bug bounty programs can be as much as 100 times more cost-effective for finding security vulnerabilities than hiring full-time security researchers to do the same thing.