The news archive provides access to past news stories from Communications of the ACM and other sources by date.
The California Consumer Privacy Act is one of the most stringent and sweeping privacy laws in the country, but may create complications for carmakers and dealerships.
A study by the nonprofit research group Center for an Urban Future offers hope for New York City employees who lack the training to qualify for upcoming technology jobs.
The U.S. Special Operations Command is developing a portable facial recognition system that can identify individuals from 1 kilometer (0.6 miles) off.
A new system can automatically update factual inconsistencies in Wikipedia articles.
Zoltan Istvan is the latest futurist to run for U.S. president.
Supporters say coding know-how is good for students in an increasingly digital world. Opponents say public schools shouldn't serve as job-training sites for tech companies.
The new principles follow recommendations made last year by the Defense Innovation Board, a group led by former Google CEO Eric Schmidt.
She was one of a group of black women mathematicians at NASA and its predecessor who were celebrated in the 2016 movie "Hidden Figures."
Private software developers have launched websites and apps to help people in South Korea track cases of coronavirus and avoid places where infected people have been.
An interdisciplinary research team developed a convolutional neural network that generates crop yield predictions, incorporating information from topographic variables.
Computer scientists have designed an algorithm to combat poaching in wildlife preserves.
Brown University researchers found 25% of 6.5-million Twitter posts about climate change were likely produced by bots, giving the impression of widespread climate change denial.
Agronomists are using new autonomous robots to help them breed better crops.
A new ultra-low-power Wi-Fi radio enables Internet of Things devices to communicate with existing Wi-Fi networks using 5,000 times less power.
Quantum cryptography is clever and impressive, but companies calling it "unbreakable" and "unhackable" turns me into Shrödinger's sourpuss.
Isolated from the rest of the world, one woman pushed computing from a geeky obsession into a transformative industry.
Team says halicin kills some of the world's most dangerous strains.
Europe is backpedaling on facial recognition.
A new cryptographic identity tag can be attached to virtually any product in order to verify its authenticity.
A prototype wearable device blocks microphones in the vicinity from eavesdropping on conversations.
Tyson Foods will use computer vision to track chicken moving through its plants as part of a plan to invest more in automation and artificial intelligence in order to cut costs and reduce waste.
Washington University researchers converted grasshoppers into bomb-sniffing tools by implanting electrodes in the insects' antenna lobes to tap into the capabilities of their olfactory receptor neurons.
Nevada's Democratic Party hopes to avoid the fiasco seen in Iowa when it holds its caucuses Saturday with an in-house electronic voting system that it had to assemble quickly.
The lawsuit says that Google, the top tech brand in public schools, used its educational products to spy on students.
Larry Tesler's contributions to making computers and mobile devices easier to use were the highlight of a long career influencing modern computing.
The Chinese government is working with technology companies to monitor citizens and track confirmed cases of people infected with the coronavirus.
A McKinsey Global Institute survey offers lessons from high-performing companies on artificial intelligence (AI) adoption, of whom about 3% are realizing outsize business results.
Google and other online mapmakers revise borders depending on who is viewing them, in deference to diplomats, policymakers, and their own executives, according to sources familiar with the situation.
In recent years, ransomware attacks have crippled computer networks and extorted money to restore access to users.
ElectionGuard isn't designed to make voting machines safe from hackers. It's meant to make hacking them pointless.