The news archive provides access to past news stories from Communications of the ACM and other sources by date.
Computer science techniques have enabled archaeologists to discover about 9,000 possible early human settlements across 23,000 square miles in northeastern Syria.
Android is gradually slipping down mobile programmers' priority list, with Web apps stepping in as an answer to development difficulties, according to a recent Appcelerator survey.
AT 7 years old, Gilad Elbaz wrote, "I want to be a rich mathematician and very smart." That, he figured, would help him "discover things like time machines, robots and machines that can answer any question."
Earlier this year, the Supreme Court said police had overstepped their legal authority by planting a GPS tracker on the car of a suspected drug dealer without getting a search warrant.
A heartbreaking, out-of-the-gate failure of Russia's sample return mission early this year created a wide circle of disappointment.
A pair of rare Enigma machines used in the Spanish Civil War have been given to the head of GCHQ, Britain's communications intelligence agency.
When Jeff Rae was arrested last October with hundreds of other Occupy Wall Street protesters during a march on the Brooklyn Bridge, he decided to fight the charges, believing he had been entrapped.
His saga is the entrepreneurial creation myth writ large: Steve Jobs cofounded Apple in his parents' garage in 1976, was ousted in 1985, returned to rescue it from near bankruptcy in 1997, and by the time he died, in October…
Kaspersky Lab researchers have determined the programming language used to generate the code for the DuQu virus' communications functions.
EPFL professor Babak Falsafi recently presented "Clearing the Clouds: A Study of Emerging Workloads on Modern Hardware," which received the best paper award at ASPLOS 2012.
A report furnished by a U.S. task force warned that unless the American educational system improves, national security and economic prosperity will be threatened.
The conviction of Dharun Ravi in the Rutgers webcam spying trial last week raises difficult questions for universities when it comes to protecting students online and ensuring their policies keep up with the realities of campus…
Mining personal data to discover what people care about has become big business for companies such as Facebook and Google. Now a project from Microsoft Research is trying to bring that kind of data mining back home to help people…
In 1988, a Cornell graduate student, Robert Tappan Morris, let loose a computer worm on the fledgling version of the Internet. He said it was meant to be an experiment, but the code he wrote spun out of his control, affecting…
Just two years ago, cybercriminal gangs were behind record-breaking data breaches that resulted in the theft of millions of customer records. But the year 2011 will be remembered as the year hacktivists out-stole cybercriminals…
IEEE's Erico Guizzo and Hizook.com founder Travis Deyle make several predictions regarding what will be big news in robotics this year.
University of California, Merced professor Shawn Newsam is researching the viability of using multimedia collections as volunteered geographic information for mapping purposes.
Carnegie Mellon University researchers have developed SafeSlinger, a mobile application that helps users establish trusted relationships with others for spur-of-the-moment digital transactions.
The electric snail is here. There's an electric cockroach too.
The new iPad costs about $364.35 for its bill of materials, according to a teardown analysis by IHS iSuppli.
Free versions of Android apps use up to 75 percent of their energy serving ads or tracking and uploading user data, says Purdue University's Abhinav Pathak. Free apps can drain a smartphone's battery in approximately 90 minutes…
Former and current U.S. officials say the Pentagon is ramping up projects to develop next-generation cyberweapons that can disrupt enemy military networks even when they have no Internet connection.
Massachusetts Institute of Technology researchers have developed a system that can produce recognizable three-dimensional images of objects located around corners and outside of the camera's line of sight.
The U.S. Defense Advanced Research Projects Agency recent ended its Cash for Locating and Identifying Quick Response Codes challenge without anyone successfully completing the contest's full task.
North Carolina State University researchers recently conducted a study on the privacy and security risks associated with mobile application advertisements, and found that some apps included aggressive ad libraries which pose…
The spring air in the small, sand-dusted town has a soft haze to it, and clumps of green-gray sagebrush rustle in the breeze.
For those of you reluctant to welcome our new robot overloads, it might be time to reconsider your stance.
Struggling to make your smartphone battery last the whole day? Paying for your apps might help.
Hewlett-Packard's research division is developing Corona, a manycore chipset designed to outperform existing average-sized high-performance computing clusters.
The U.S. Commerce Department's announcement that it will temporarily extend ICANN's current Internet Assigned Numbers Authority contract for six months instead of renewing it prompted soon-to-depart ICANN CEO Rod Beckstrom to…