The news archive provides access to past news stories from Communications of the ACM and other sources by date.
A new electronic platform from General Motors is envisioned as the linchpin of the automaker's future, enabling the function of almost all its cars' digital systems.
Google's plan to limit the software services it provides Chinese telecommunication giant Huawei is expected to accelerate the isolation of China's Internet users.
George Mason and Virginia Commonwealth universities now offer a digital technology credential.
Researchers are pursuing promising drug candidates via supercomputing to differentiate candidate molecules' protein-binding ability.
Computer science techniques combat intrusive cameras.
The U.S. Postal Service is conducting a pilot study in which self-driving trucks will complete a more-than-1,000-mile mail run between Phoenix and Dallas.
Public transportation agencies in nearly every state are using drones, according to a recent American Association of State Highway and Transportation Officials report.
Security researchers have discovered a Linux version of Winnti, a malware used by Chinese government-sponsored hackers.
Patrick Harms at the University of Gottingen in Germany has designed an automated process for evaluating the usability of virtual reality.
Researchers have developed sensors inspired by animals to help autonomous machines navigate in dangerous environments and avoid accidents.
The 56th Design Automation Conference announced the five recipients of this year’s Under-40 Innovators Award.
Article 13 of the EU Copyright Directive could have a drastic impact on video game streamers and their fans in Europe.
MIT and the U.S. Air Force have signed an agreement to launch a new program designed to make fundamental advances in artificial intelligence that could improve Air Force operations while also addressing broader societal needs…
The European Union has established a framework giving it powers to punish individuals outside the bloc who launch cyberattacks.
A U.S. National Science Foundation-funded project found machine learning techniques could anticipate Australian wheat yields two months before the end of the growing season.
Researchers at Michigan State University are analyzing big data to determine better research models to fight the spread of breast cancer and test potential drugs.
Concerns about ensuring website identity and security.
In a class at St. James Episcopal Church in Newport Beach, CA, visually impaired teens directed telescopes in Chile to capture images of asteroids.
Some U.S. manufacturers are offering employees programming and robotics training, as automation sweeps through the industry.
Santa Clara County, CA, has deployed a smart traffic management system.
In South Korea, which turned on its 5G telecom networks nationwide in April, businesses and organizations are counting on 5G to enable the delivery of new technologies.
Intel and a coalition of security researchers have identified a new vulnerability in Intel's chips which could permit the theft of sensitive data from central processing units.
Estonia is currently the only country in the world that authorizes online voting for its entire electorate, due to its confidence in its Internet voting (i-voting) system.
His insights led to tools widely used in modern cryptography.
A driverless electric truck has started delivering freight daily along a public road in Sweden.
Microsoft warns a serious vulnerability in Windows Remote Desktop Services could be exploited to launch a WannaCry-level attack against Internet-connected computers.
A new algorithm gives robots handwriting and drawing capability, in a step toward machines that can communicate and collaborate more seamlessly with humans.
Johns Hopkins Medicine researchers have developed a computer simulation of tumor behavior that encapsulates finer blood-flow patterns and how they engineer cancer growth.
University of Washington scientists have developed a pediatric ear-infection diagnostic technique that uses a smartphone to detect fluid accumulation behind the eardrum.
Firms that promised high-tech ransomware solutions almost always just pay the hackers.