acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

FTC PrivacyCon 2016 – Call for Privacy and Security Research Presentations
From U.S. Public Policy Committee of the ACM

FTC PrivacyCon 2016 – Call for Privacy and Security Research Presentations

The FTC invites presentation proposals on consumer privacy and security issues in the commercial sector for a privacy conference, PrivacyCon, to be held on January...

ACM Policy Award Nominations Due November 30
From U.S. Public Policy Committee of the ACM

ACM Policy Award Nominations Due November 30

ACM is accepting nominations for the inaugural ACM Policy Award to honor the contributions of an individual, or a small group, who has had a significant impact...

NTIA to Host First Cybersecurity Multistakeholder Forum on Vulnerability Research Disclosure on September 29
From U.S. Public Policy Committee of the ACM

NTIA to Host First Cybersecurity Multistakeholder Forum on Vulnerability Research Disclosure on September 29

The National Telecommunications and Information Administration (NTIA) will hold the kickoff meeting for the new cybersecurity multistakeholder process on vulnerability...

Will the Flying Car Make a Comeback?
From Blog@Ubiquity

Will the Flying Car Make a Comeback?

We're still waiting for flying cars to materialize as a mass-market product. Why? The answer lies in computer technology—or the lack thereof. The post Will theBLOG...

NTIA Drone Privacy Multistakeholder Forum to Convene on September 24
From U.S. Public Policy Committee of the ACM

NTIA Drone Privacy Multistakeholder Forum to Convene on September 24

The National Telecommunications and Information Administration (NTIA) will convene the second meeting of the multistakeholder process on drone privacy, transparency...

Hill Tech Happenings, Week of September 14
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of September 14

Wednesday, September 16, 2015 Hearing: Achieving the Promise of Health Information Technology: Improving Care Through Patient Access to Their Records Senate Health...

NIST Invites Comments on U.S. Participation in International Cybersecurity Standards
From U.S. Public Policy Committee of the ACM

NIST Invites Comments on U.S. Participation in International Cybersecurity Standards

The National Institute of Standards and Technology (NIST) is accepting public comments on a new interagency report advocating U.S. participation in international...

In Memoriam: Joseph Traub
From U.S. Public Policy Committee of the ACM

In Memoriam: Joseph Traub

Computing pioneer Jospeh Traub passed away on August 24. ACM recognized him as an ACM Fellow in 1994 for his research on information-based complexity and parallel...

President Obama Establishes National Strategic Computing Initiative
From U.S. Public Policy Committee of the ACM

President Obama Establishes National Strategic Computing Initiative

President Obama signed an Executive Order establishing the National Strategic Computing Initiative to ensure the U.S. remains on the leading-edge of research, development...

Can Robots Be Trusted?
From Blog@Ubiquity

Can Robots Be Trusted?

Can robots be trusted to make better decisions than humans? Sometimes automation can be a matter or life or death. The post Can Robots Be Trusted? appeared first...

Why Physical Cyber Security is Broken
From Blog@Ubiquity

Why Physical Cyber Security is Broken

The physical Internet is evolving away from resiliency toward fragility and vulnerability. A broken Internet means flawed cybersecurity. The post Why Physical Cyber...

The Future of Tech is Regulation
From Blog@Ubiquity

The Future of Tech is Regulation

The future of technology is government regulation—NOT unbridled technology. The post The Future of Tech is Regulation appeared first on BLOG@UBIQUITY.

Hill Tech Happenings, Week of August 3
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of August 3

Senate Floor: Cybersecurity Information Sharing Act, S. 754 Legislation pertaining to the sharing of cybersecurity threat and vulnerability information between...

Why Can’t Programmers Be More Like Ants? Or a Lesson in Stigmergy
From Blog@Ubiquity

Why Can’t Programmers Be More Like Ants? Or a Lesson in Stigmergy

If we want to advance the art and science of software development, we should direct our attention to the insect world of stigmergy. The post Why Can’t Programmers...

NTIA Multistakeholder Process on Drones: First Meeting on August 3
From U.S. Public Policy Committee of the ACM

NTIA Multistakeholder Process on Drones: First Meeting on August 3

The National Telecommunications and Information Administration (NTIA) will hold the first meeting of the new multistakeholder process on drone privacy, transparency...

EAC Election Data Summit on August 12-13
From U.S. Public Policy Committee of the ACM

EAC Election Data Summit on August 12-13

The U.S. Election Assistance Commission (EAC) will host an EAC Election Data Summit on August 12-13 at American University in Washington, D.C. The two-day summit...

USACM Submits Comments to NIST on Privacy Risk Management for Federal Information Systems
From U.S. Public Policy Committee of the ACM

USACM Submits Comments to NIST on Privacy Risk Management for Federal Information Systems

USACM today submitted comments to NIST on the draft report, Privacy Risk Management for Federal Information Systems (NISTIR 8062). USACM supports NIST’s efforts...

Hill Tech Happenings, Week of July 27
From U.S. Public Policy Committee of the ACM

Hill Tech Happenings, Week of July 27

House Floor H.R. 2206, State Wide Interoperable Communications Enhancement Act H.R. 1634, Border Security Technology Accountability Act Tuesday July 28, 2015 Hearing...

USACM Celebrates 25th Anniversary of the Americans with Disabilities Act
From U.S. Public Policy Committee of the ACM

USACM Celebrates 25th Anniversary of the Americans with Disabilities Act

On July 26, 2015, we will celebrate the 25th anniversary of the signing of the Americans with Disabilities Act (ADA). The ACM U.S. Public Policy Council joins the...

NTIA Invites Participation in a New Cybersecurity Multistakeholder Process on Vulnerability Research Disclosure
From U.S. Public Policy Committee of the ACM

NTIA Invites Participation in a New Cybersecurity Multistakeholder Process on Vulnerability Research Disclosure

The National Telecommunications and Information Administration (NTIA) invites businesses, organizations, and individuals to participate in a new cybersecurity multistakeholder...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account