The news archive provides access to past news stories from Communications of the ACM and other sources by date.
NASA's Juno spacecraft will make its long anticipated arrival at Jupiter on July 4. Coming face-to-face with the gas giant, Juno will begin to unravel some of the greatest mysteries surrounding our solar system's largest planet…
An Amazon warehouse is a flurry of activity.
Researchers in China say they have demonstrated a form of device-independent quantum cryptography, sending a key over a distance of more than 100 kilometers at data rates measured in kilobits per second, and distances of more…
KTH Royal Institute of Technology researchers have completed work on RECONFIG, a European Union-funded project aimed at enabling robots to use body language to cooperate with one another on complex jobs.
Researchers at the Georgia Institute of Technology have developed a framework that standardizes communications for the Internet of Things.
Washington State University researchers have developed a software tool that can track, manage, analyze, and catalogue the short, repeating sequences of bacterial DNA.
The idea of a device that can materialize one's memories out of thin air seems like it could only exist in science fiction. But in a new study, researchers were able to pretty accurately sketch out the thoughts of participants…
A new category of company is offering 'drones as a service' to customers who want to outsource the planning, compliance, and execution of commercial drone flights.
Justine Cassell has taken her virtual assistant Sara on a road trip.
The brightest area on Ceres, located in the mysterious Occator Crater, has the highest concentration of carbonate minerals ever seen outside Earth, according to a new study from scientists on NASA's Dawn mission.
In the age of big data analytics, the proprietary algorithms web sites use to determine what data to display to visitors have the potential to illegally discriminate against users.
The Obama administration has issued $150 million in grants for 39 technology-related partnerships in 25 states and Washington, D.C. Awardees will use this money to develop tech talent as a way to retain and generate jobs in…
The ALPHA artificial intelligence created by a University of Cincinnati doctoral graduate is a milestone in the use of genetic-fuzzy systems with specific implementation in unmanned combat aerial vehicles in simulated air-combat…
"This is a final notice from the IRS."
Researchers at Linkoping University and the University of Warwick have shown that common statistical methods used to analyze brain activity through images taken with magnetic resonance imaging scanners cannot be trusted.
Donald Trump has dismissed political data operations as "overrated," but his campaign is now bolstering its online fundraising and digital outreach by turning to GOP tech specialists who previously tried to stop him from winning…
The EU-funded SECURity at the network EDge (SECURED) project is focused on the design of a solution to offload the execution of security applications into a programmable device at a network's fringes.
A team at Penn State performed a single quantum operation on individual atoms on separate stacked planes. Professor David S. Weiss says the technique highlights the potential for using atoms as the building blocks of circuits…
In the past two years a group of researchers in Israel has become highly adept at stealing data from air-gapped computers—those machines prized by hackers that, for security reasons, are never connected to the internet or connected…
Chemicals found in Martian rocks by NASA's Curiosity Mars rover suggest the Red Planet once had more oxygen in its atmosphere than it does now.
A team from Disney Research and Shanghai's Fudan University has used deep-learning techniques to train computer software to recognize events in videos.
The FBI has access to nearly 412 million photos in its facial recognition system—perhaps including the one on your driver's license.
They call it "mechanical doping," but the name simply doesn't do it justice.
Researchers at the University of Missouri have developed a visual cloud computing architecture that streamlines the process of analyzing visual electronic data.
Researchers from Ben-Gurion University of the Negev report data can be stolen from an air-gapped computer using the computer's fan to a nearby mobile phone equipped with a microphone.
Edward Snowden has been in exile in Russia since 2013, when he leaked classified documents about the National Security Agency's mass surveillance programs.
Last Friday (6/24), at exactly 9:57 and 48 seconds a.m. PDT, NASA's Juno spacecraft was 5.5 million miles (8.9 million kilometers) from its July 4th appointment with Jupiter.
For the first time, cosmologists have used the full power of Albert Einstein's general theory of relativity to perform detailed calculations of the Universe's evolution.
Artificial intelligence (AI) may be worsening inequality, given the biases being embedded within the underlying machine-learning algorithms, says Kate Crawford, a researcher at Microsoft and co-chair of a White House symposium…
The World Economic Forum has published its annual list of 2016's breakthrough technologies, with a specific focus on closing the gaps in investment and regulation.