The news archive provides access to past news stories from Communications of the ACM and other sources by date.
A Canadian startup is working to make monsters, fish, and other creatures seem to come alive inside a tabletop box.
China is weighing a far-reaching counterterrorism law that would require technology firms to hand over encryption keys and install security "backdoors", a potential escalation of what some firms view as the increasingly onerous…
In the field of cryptography, a secretly planted "backdoor" that allows eavesdropping on communications is usually a subject of paranoia and dread.
A new report says United Nations peacekeeping missions should use technology to establish situational awareness, carry out mandates, and protect themselves.
Sixty-six teens are taking part in the My Brother's Keeper Hackathon, a group coding competition spearheaded by Qeyno Labs CEO Kalimah Priforce.
A disproportionate percentage of artificial intelligence systems have female personas, and researchers have struggled to determine why this phenomenon occurs.
Female leaders at the University of Wisconsin are looking for ways to address the inequalities for women in science, technology, engineering, and mathematics fields.
A recent article recounts how a team of artificial intelligence researchers trained a computer to play, and in some cases beat, human players in several arcade games.
Today, the Federal Communications Commission, by a vote of three to two, enacted its strongest-ever rules on net neutrality, preserving an open Internet by prohibiting broadband providers from blocking or slowing content that…
Robots are becoming more of a reality in everyday life, and movies have started to overhaul their depiction of them. They're gentler, friendlier, and often better-looking.
When you don't know how to get to an unfamiliar place, you probably rely on a smart phone or other device with a Global Positioning System (GPS) module for guidance.
Someone who knows things about us has some measure of control over us, and someone who knows everything about us has a lot of control over us.
Hunched over a keyboard, surrounded by computer monitors, Donny Moore, 37, controls the fate of the National Football League.
NASA's Curiosity Mars rover used its drill on Tuesday, Feb. 24 to collect sample powder from inside a rock target called "Telegraph Peak." The target sits in the upper portion of "Pahrump Hills," an outcrop the mission has been…
Microsoft wants to develop software that helps lost languages maintain their relevancy in the modern age.
Code of Jersey City recently held its second all-day Hackathon.
The U.S. Army Research Laboratory is utilizing supercomputing and large-scale analytics to maintain its position as the country's top laboratory for land forces.
Many developers of programming languages are quick to defend the security of their language.
The USA's Office of the Director of National Intelligence (ODNI) is soliciting the involvement of the private and academic sectors in developing a new 'precrime' computer system capable of predicting cyber-incursions before they…
The Dark Web is not so much a place as it is a method of achieving a level of anonymity online.
DeepMind, the Google-owned artificial-intelligence company, has revealed how it created a single computer algorithm that can learn how to play 49 different arcade games, including the 1970s classics Pong and Space Invaders.
During a famous scene in Star Wars, Princess Leia has R2D2 play a holographic video message in midair in which she pleads for help from Obi-Wan Kenobi. In the near future, smartphones and other mobile devices will have the ability…
"What we really need is a Manhattan Project for cybersecurity." It's a sentiment that swells up every few years in the wake of some huge computer intrusion—most recently the Sony and Anthem hacks.
There are four major obstacles facing developers of autonomous vehicles.
Papers Intel plans to share this week are meant to reassure the computer industry about the viability of Moore's Law, at least for the immediate future.
New research calls for increased monitoring of the Dark Web by security researchers and government investigators.
The U.S. Intelligence Advanced Research Projects Activity is working on a new contest aimed at creating a system to predict cyberthreats a network may face ahead of time.
For a long time economists maintained that new technology would not result in a net loss of jobs, but some economists now think the situation is more nuanced than that.
How do you solve a problem like Europa?
The Computer Assisted Neighborhood Visual Assessment System is a Web application that helps accelerate the collection of research data.