The news archive provides access to past news stories from Communications of the ACM and other sources by date.
Carnegie Mellon University researchers have designed a method of making abnormal network traffic audible by rendering cybersecurity data musically.
Researchers have developed a method for using a traditional computer to simulate the Quantum Approximate Optimization Algorithm (QAOA).
Although analysts have warned that millions of blue-collar jobs in the U.S. industrial heartland will soon be displaced by robots, that is not yet the case at small and medium-sized factories.
An interactive machine learning platform developed by Cornell University scientists is designed to train nonexperts to use algorithms effectively, efficiently, and ethically.
Researchers have developed a machine learning system that aims to make geospatial data more accessible to researchers and governments around the world.
Researchers in Switzerland have developed a self-righting drone inspired by ladybugs.
Researchers at Check Point Research said the Windows-based malware variant known as Formbook has been upgraded to infiltrate Mac computers.
From peppier engines for road trips to heated steering wheels in winter, automakers are developing intelligent vehicles that spot motorists' wants and let them subscribe to options after the sale.
Increasing qubit counts and improving error correction is hard enough. But quantum computing companies are finding one of the biggest challenges might be to find the right people to do that.
Cybersecurity missteps during corporate Digital Transformation efforts can lead to digital breaches.
The MarIA open AI system is a set of deep neural networks trained to acquire an understanding of language, its vocabulary, and its mechanisms to express meaning and write at an expert level.
Luxembourg's CNPD data protection authority fined Amazon a record $888 million for breaching the EU's General Data Protection Regulation (GDPR).
Australia's Federal Court has granted artificial intelligence systems legal recognition as inventors in patent applications, challenging the assumption that invention is a purely human act.
A machine learning framework can proactively counter universal trigger attacksi n natural language processing applications.
U.S. National Aeronautics and Space Administration scientists are calibrating images of the sun with artificial intelligence to enhance data for solar research.
Internet security was once based on trust and needs to be updated.
New unions could change how tech giants engage with their employees.
Repeated ethical violations ends with membership revocation and ban.
The quest to find greater security through obscurity.