The news archive provides access to past news stories from Communications of the ACM and other sources by date.
It's been eight months since a pair of security researchers proved beyond any doubt that car hacking is more than an action movie plot device when they remotely killed the transmission of a 2014 Jeep Cherokee as I drove it down…
We're rightly proud of the Large Hadron Collider, which accelerates protons up to 7 Tera-electron Volts before smashing them together.
A strange new kind of galactic beast has been spotted in the cosmic wilderness.
Matthias Meyer has just published the results of what may be the world's most wasteful genome-sequencing project.
IBM Research Africa's Kenya lab is giving shape to Lucy, a technology platform aimed at finding "commercially viable solutions to the continent's grand challenges."
In an interview, C++ programming language creator Bjarne Stroustrup discusses its next planned iteration, C++ 17.
Researchers say they have developed a way to quickly and easily produce very detailed face models.
A new study shows Instagram's decision to ban certain words used by pro-eating disorder communities had those communities making up new, almost identical words.
Companies get help digging the pearls of wisdom out of their big data.
Wall Street banks are buzzing about blockchain.
Astronomer Scott Sheppard runs through his checklist as he settles in for a long night of skygazing at the Subaru telescope atop Mauna Kea, Hawaii.
Apple shouldn't have to comply with a search order for an iPhone used by one the San Bernardino, California, terrorists because the Constitution forbids it, the company said Tuesday.
The U.S. Defense Advanced Research Projects Agency is seeking ideas on how products assembled from benign technologies might be transformed into security threats.
Last weekend's South by Southwest Interactive Festival was a showcase for many types of robots.
Researchers at Virginia Polytechnic Institute and State University's Discovery Analytics Center have proposed using machine learning to model the U.S. Supreme Court.
Momentum for bringing computer science to all primary and secondary U.S. schools is building, even though many issues remain unresolved.
Security experts say U.S. government efforts to force technology firms to grant access to encrypted devices will do little to prevent terrorists from using the technology.
The latest computer games can be fantastically realistic.
To stop a terrorist, it helps to think like one.
Following the defeat of one of its finest human players, the ancient game of Go has joined the growing list of tasks at which computers perform better than humans.
The latest filing in the legal war between the planet’s most powerful government and its most valuable company gave one indication of how the high-stakes confrontation could escalate even further.
Princeton University professor Brian Kernighan has co-authored a book on the computer language Go with Alan Donovan, a member of the Go design team.
The Laser Interferometer Gravitational-Wave Observatory is helping researchers detect gravitational waves caused by the collision of two black holes 1.3 billion years ago.
Computer-vision models designed to reproduce the capacities of the human brain may need to be adjusted.
The new software could be particularly useful in fields where subjective interpretation has been the norm.
Three years ago, reeling from Edward J. Snowden’s disclosure of the government’s vast surveillance programs and uncertain how to respond, President Obama said he welcomed a vigorous public debate about the wrenching trade-offs…
The move didn't make sense to the humans packed into the sixth floor of Seoul's Four Seasons hotel. But the Google machine saw it quite differently.
Bill Gates says it is possible that in six to 10 years "cloud computing will offer super-computation by using quantum."
Max Planck Institute researcher Robert Gutig has used a computer model to develop a new learning procedure for neural networks.