The news archive provides access to past news stories from Communications of the ACM and other sources by date.
Social media companies are struggling to contain new forms of political misinformation on their platforms that bubbled up during this year's midterm elections.
Princeton University researchers used years' worth of global earthquake data to generate a three-dimensional simulation of the Earth's interior.
U.K. companies in the science, technology, engineering, and math sectors will work together to create and lead a U.K. National Center for Computing Education.
Startup Kebotix has created software that learns material chemistry from models of molecules with known properties in order to design novel compounds.
Researchers have found vulnerabilities in some solid-state drives that allow hackers to circumvent encryption and access local data without knowing the password.
China's Xinhua state news agency has debuted a virtual newsreader that the agency said "can read texts as naturally as a professional news anchor."
San Jose State University's Craig Clements says artificial intelligence is being explored to more rapidly localize fires and predict their propagation and behaviors.
The US now can claim the top two machines on a list of the 500 fastest supercomputers, as Sierra, an IBM machine for nuclear weapons research at Lawrence Livermore National Laboratory, edged out a Chinese system that last year…
I'm a simple person. To me, a computer consists of three parts: data that goes in and out, operations that modify the data, and storage that holds the data.
In 2016, the chip industry's clock ran out.
Researchers found that factors such as excessive bickering and poorly worded arguments led to about a third of Requests for Comment by Wikipedia editors going unresolved.
Researchers discovered a new vulnerability in Intel processors that can allow attackers to leak encrypted data from the internal process of a central processing unit .
Researchers have developed a technique to see through walls using ambient Wi-Fi signals and an ordinary smartphone.
A high school student in Minnesota has developed a virtual reality app that prepares children for an magnetic resonance imaging scan.
A company in Japan has developed an automated system that could rival Amazon Go in terms of quickly providing consumers with products.
Discussion topics included counterterrorism, data breaches, and surveillance.
If you're planning on moving to China anytime soon, here's a piece of advice: Get yourself a WeChat account.
In 2011, Hany Farid, a photo-forensics expert, received an e-mail from a bereaved father.
In a laboratory that overlooks a busy shopping street in Cambridge, Massachusetts, a robot is attempting to create new materials.
Researchers have created robots that can adapt to their environment based on centralized sensory processing, environmental perception, and decision-making software.
A new system for aggregating data usage reports emphasizes maintaining personal privacy.
A specially equipped Sikorsky helicopter can be controlled through a handheld tablet, and learning to pilot it can take as little as 45 minutes.
It was five years ago this month that ESA's GOCE gravity-mapping satellite finally gave way to gravity, but its results are still yielding buried treasure—giving a new view of the remnants of lost continents hidden deep under…
This accomplishment will feed research on developing atomic-scale devices for storing digital bits, and the storage of quantum bits in the magnetic spin of atomic nuclei.
After decades of neglect, hellish and cloud-enveloped Venus—sometimes called Earth's evil twin—is a world ready and waiting for renewed exploration.
Chinese authorities have begun deploying a new surveillance tool: "gait recognition" software that uses people's body shapes and how they walk to identify them, even when their faces are hidden from cameras.
Massachusetts Institute of Technology researchers have developed a method to train semantic parsers by mimicking the way a child learns language.
The U.S. Food and Drug Administration is not sufficiently protecting medical devices from being hacked, according to a U.S. Department of Health and Human Services report.
A new study predicts demand for information technology workers will outstrip supply, due to growth in digital technologies, tighter labor markets, and few workers with specialized skills.