The news archive provides access to past news stories from Communications of the ACM and other sources by date.
Researchers in Denmark are using data mining techniques to uncover new connections between health problems as seemingly unrelated as migraines and hair loss.
Almost a century after the first pilot-less plane was test launched from the back of a truck in the English village of Upavon, unmanned aircraft vehicles, or drones, are smarter, more lethal... and seeking new growth drivers…
The Stuxnet worm may be the most famous piece of malicious software ever written. When it was first detected, a little over a year ago, the worm sounded a warning to nations around the world that critical infrastructure systems…
German cybersecurity expert Ralph Langner warns that U.S. utility companies are not yet prepared to deal with the threat presented by the Stuxnet computer worm, which he says the U.S. developed.
University of Hertfordshire computer scientist Daoud Clarke has developed a mathematical model based on a theory of meaning that could revolutionize artificial intelligence technologies and enable Web searches to interpret the…
The University of Texas at Austin's Texas Advanced Computing Center announced that it will deploy and support Stampede, a new supercomputer that will offer data-intensive computing and visualization capabilities for the open…
The FCC has finally officially published long-delayed rules prohibiting cable, DSL, and wireless internet companies from blocking Web sites and requiring them to disclose how they slow down or throttle their networks.
University of Wisconsin, Madison researchers have developed Airshark, software that enables wireless access points to automatically detect radio-frequency interference and make adjustments to preserve the quality of Wi-Fi connections…
Watchful European privacy regulators are wielding increasing influence beyond the Continent’s borders.
Virginia Tech researchers have developed a computational approach that can predict several human proteins that the human immunodeficiency virus requires to replicate itself.
The University of California, San Diego's San Diego Supercomputer Center recently launched an academic-based cloud storage system designed specifically for researchers, students, academics, and industry users who need to store…
Earlier this year, Daniel Ek, the CEO of the music service Spotify, was in a car with Mark Zuckerberg. Ek was visiting the Facebook founder in California while the two companies were working together on what eventually would…
Cyberlockers are the next frontier for storing music, movies, and other personal files on the Internet, but the entertainment industry wants lawmakers to ensure this digital storage landscape is made safe for copyright enforcement…
A combination of two algorithms developed at MIT allows autonomous robots to execute tasks much more efficiently—and move more predictably.
For more than a year, federal authorities pursued a man they called simply "the Hacker." Only after using a little known cellphone-tracking device—a stingray—were they able to zero in on a California home and make the arrest…
Traction for the free-network movement is growing as activists, scholars, and entrepreneurs pursue efforts to repurpose existing online networks or create parallel networks to fight corporate or governmental repression.
Imagine tapping into the mind of a coma patient, or watching one’s own dream on YouTube. With a cutting-edge blend of brain imaging and computer simulation, scientists at the University of California, Berkeley, are bringing…
You have to wonder what's going on in the DNA of Harvard genetics professor George Church. What extra bit of code does he have that the rest of us don't? If genes tell the story of a person's life, then some altered sequence…
The antidepressant Paxil was approved for sale in 1992, the cholesterol-lowering drug Pravachol in 1996. Company studies proved that each drug, on its own, works and is safe. But what about when they are taken together?
The Fraunhofer Institute for Algorithms and Scientific Computing recently completed a pilot Chinese text mining project.
The University of Maryland at College Park has launched a phased rollout of a smartphone app that can provide students, faculty, and staff with a direct and instantaneous line of communication to campus police and dispatch.
Girls are being sent a message at a young age that careers in math and science are marked by social isolation and will make them seem less attractive. However, peer pressure and cultural expectations of femininity can be overcome…
How Japan's AKB48 has created a new level of artificial human—and what it tells us about the infamous Uncanny Valley.
Late last month, after a drawn-out battle dating back to November, Houston finally turned off its 70 red-light cameras. City residents voted them down in a referendum during the midterm elections, then a federal judge deemed…
If anyone can preview the future of computing, it should be Alfred Spector, Google's director of research. Spector's team focuses on the most challenging areas of computer science research with the intention of shaping Google's…
The White House's National Strategy for Trusted Identities in Cyberspace encourages the private-sector creation and public adoption of online user authentication systems.
Security researchers Juliano Rizzo and Thai Duong will demonstrate an attack that compromises Transport Layer Security 1.0 at the Ekoparty conference in Argentina.
Intel recently demonstrated Claremont, an experimental low-power processor the size of a postage stamp that could run PCs using solar power by dropping energy consumption to under 10 milliwatts.
New communication tools such as text messaging and social networks my not be as uniformly beneficial or as robust as suggested by the media, which portrays them as powerful ways to enhance freedom, according to Penn State University…
Researchers are utilizing digital medical records to conduct wide-ranging studies on the effects of certain drugs and how they relate to different populations.