The news archive provides access to past news stories from Communications of the ACM and other sources by date.
Purdue University researchers have developed nanoelectromechanical resonators, which contain a small beam of silicon that vibrates when voltage is applied.
The Internet Architecture Board, the Internet Engineering Task Force, the Internet Society, the Institute of Electrical and Electronics Engineers, and the World Wide Web Consortium recently signed a statement affirming the importance…
When a pilot in a Eurofighter Typhoon jet glances down, he doesn't see a steel-grey floor. Instead he sees clouds, and maybe sheep and cows in green fields below.
Warwick University researchers are studying replacing the wiring inside cars with devices that communicate via light signals. The researchers have demonstrated how visible light communication could simplify and lighten the electronic…
Jon Kleinberg's early work was not for the mathematically faint of heart.
There was a time, not all that long ago, when the U.S. military wouldn't even whisper about its plans to hack into opponents' networks.
Technical University of Braunschweig researchers have found that smartphones can be joined together in a network, which when connected via Wi-Fi, can carry out increased numbers of calculations per second.
University of Bristol researchers say they have developed a quantum chip that will lead to the creation of completely secure mobile phones and super-fast computers that are much more powerful than today's devices.
Austrian researchers have developed FunkFeuer, a low-cost way of spreading Internet access across communities using the same open radio spectrum as Wi-Fi.
A barely regulated industry for zero-day exploits sold by researchers has sprung up, and even certain insiders believe trade of these hacker or security tools should be subject to more stringent regulation, analysts say.
It was a tweet that fired the imagination like few others. On May 10, 2011, at 1:35 in the afternoon, Eric Brewer told the world he was redesigning the most important operation on the Internet.
Most major Websites these days maintain huge databases: Shopping sites have databases of inventory and customer ratings, travel sites have databases of seat availability on flights, and social-networking sites have databases…
Imagine if, in addition to all the things your smartphone does now, it could also act as your keys to the real world.
The death of first moonwalker Neil Armstrong and the success of NASA's Curiosity rover have reignited interest in the idea of taking a spin on the moon and Mars, at least virtually.
For a center of cutting-edge scientific research, Caltech's Jet Propulsion Lab seems to be a pretty wacky place. Luke Johnson, a graphic designer at the lab, set out to explore and map the campus on a dare, which became a much…
Enterprise employers and security specialists are increasingly growing concerned about what some see as a deepening skills shortage in the information technology security field.
Smarphone owners carry around more processing power in their pocket than a 1970s-era supercomputer, but most of the time it languishes unused.
Idaho National Laboratory researchers have developed Sophia, software designed to help network operators detect intruders and other anomalies.
The "sequester," or a series of automatic federal spending cuts, are set to go into effect in January 2013, cutting science funding dramatically.
For as long as many of us can remember, high-tech industries have flourished in the suburban office parks that are so ubiquitous in Silicon Valley, North Carolina's Research Triangle and other "nerdistans." But in recent years…
After decades in Flatland, the end of Moore's Law is pushing semiconductors into the third dimension.
Thirty-two of the 39 living A.M. Turing Award laureates gathered in San Francisco to pay tribute to "the father of CS" and discuss the past, present, and future of computing.
Thanks to the University of New South Wales and IBM Research, scientists are moving closer to the junction of quantum and digital computing.
Security researchers used malware to investigate large-scale Internet censorship in Egypt and Libya.