The news archive provides access to past news stories from Communications of the ACM and other sources by date.
Researchers have developed PARKAGENT, a computer simulator that models the real-life parking challenges of specific cities, identifying different strategies for improvement and testing the impact of new policies before they are…
IBM's Watson supercomputer recently defeated teams of students from Harvard Business School and the Massachusetts Institute of Technology's Sloan School of Management in a Jeopardy! quiz-show battle.
Hackers are already targeting critical U.S. infrastructure, and have even come close to bringing down segments of them, according to U.S. Department of Homeland Security secretary Janet Napolitano.
Harvard University researchers have developed PlateMate, software that enable users to utilize crowdsourcing to determine the calorie levels of their meals. Users take a picture of each meal and submit it to the crowd, which…
University of Bristol researchers are studying whether social media can be used to track an event or phenomenon. Professors Nello Cristianini and Vaseleios Lampos geo-tagged user posts on Twitter as the input data to investigate…
Internet users that want to protect their privacy by stopping advertisers and other companies from tracking their online behavior will have a hard time doing so with the available opt-out tools, according to a recent Carnegie…
On 6 August, peaceful protests over the police shooting of a local man in London's Tottenham district exploded into full-blown riots. During four days of assaults, arson, and looting, some of London's thousands of closed-circuit…
Spying for Russia can be a hard life. The feds are on your trail, always trying to find out who you’re meeting with and talking to.
If you had to pick 10 technology-related trends that will affect your enterprise infrastructure in the coming year, Gartner says you'd do well to start with virtualization and move to such issues as social media influence,…
National Chiao Tung University researchers have developed a method for using micro-electromechanical systems to create mechanical pixels for computerized displays.
The Georgia Institute of Technology will use IBM analytics technology to study data models as a way to systematically improve the pediatric health system.
In the process of winning DARPA's Red Balloon Challenge, the MIT researchers collected and analyzed a large amount of data on the size and scope of Internet connections and recently published their research.
The Internet is responsible for 170 to 307 gigawatts of global energy consumption, according to the University of California, Berkeley's Justin Ma and the International Computer Science Institute's Barath Raghavan.
Submarines must be able to talk securely with remote naval bases while remaining submerged. Could quantum communications allow them to pull off this technically challenging feat?
The problem with the Harry Potter series, for me and many others, was that it had to end.
Salvatore Torquato’s unique space-packing method has implications in information theory and materials science.
Governments, companies, and individuals have suffered an unusual number of highly publicized data breaches this year. Is there a solution?
Researchers have discovered important security flaws in modern automobile systems. Will car thieves learn to pick locks with their laptops?
Scientists say improvements to extreme-weather prediction are possible with new weather models and a reinvention of the modeling technologies used to process them.