The news archive provides access to past news stories from Communications of the ACM and other sources by date.
San Diego County health officials are using smartphones to improve treatment monitoring for tuberculosis patients, as part of a collaboration with the University of California, San Diego and Verizon.
Sixty-five-year-old Ann Linsey was starting to worry about how easily she got distracted from whatever she was doing.
Mick Walters opens a door in his lab and points his computer's camera towards the small, blurry, tan-coloured object he has just revealed. "This is Kaspar Two," he says.
Many people are unaware that metadata accompanying social media posts can be used to "cybercase" their homes.
Cicada Hunt is a smartphone app designed to listen for the call of the endangered New Forest cicada; it also can be trained to detect other animals by their calls.
Although test scores prove that girls have science and math aptitude equal to that of boys, many girls choose not to pursue these fields.
Security researchers have found taht Microsoft Windows 8's picture gesture authentication system is not difficult to crack.
Researchers are studying how much public geospatial data is generated by Twitter users and how that information could be used by third parties.
A new software prototype could make videoconferencing more realistic for home users, by creating the impression of eye contact.
At some point in the coming weeks, users of Apple iPhones and iPads will wake up to an alert that there is a new version of the company's mobile operating system, known as iOS, for them to install.
There is still a significant number of people in the United States who do not own a computer or have home Internet access.
Few people have as much claim as Vint Cerf to the title "Father of the Internet," but as the technologies he helped develop in the 1970s and 1980s become increasingly central to our lives, delighting us in ever more exciting…
Everywhere you go, your phone is sending out signals that can be assembled to form a picture of your movements.
The Curiosity Mars rover recently used autonomous navigation to drive onto ground that could not be confirmed safe before the start of the drive.
Using the Einstein@Home project to analyze archival data from the CSIRO Parkes radio telescope in Australia, researchers have discovered 24 pulsars.
Harvard University professor Jonathan L. Zittrain says recent cyberattacks on media outlets offer lessons on how institutions can guard against future incidents.
For at least six years, law enforcement officials working on a counternarcotics program have had routine access, using subpoenas, to an enormous AT&T database that contains the records of decades of Americans' phone calls—parallel…
"Inspiring," "visionary," "humble," "honest," "impeccable integrity," "passionate and stubborn about his work." Tributes poured in for Douglas Engelbart, inventor of the computer mouse and an Internet pioneer, following his…
'Chameleon processors' could function as programmable logic or nonvolatile memory.
Novel architecture allows programmers to quickly reconfigure network resource usage.
Privacy issues can evaporate when embarrassing content does likewise.