acm-header
Sign In

Communications of the ACM

Careers


Featured Job
bg-corner

Wimbledon 2017: The Tech Behind the World's Top Tennis Tournament
From ACM Careers

Wimbledon 2017: The Tech Behind the World's Top Tennis Tournament

The Championships at Wimbledon, which consumes some 28 tons of strawberries, 10,000 litres of cream, and 320,000 glasses of Pimm's per year, is notable for its...

'internet of Ships' Tells Tale of ­ss Fitzgerald Tragedy, Or Half of It
From ACM News

'internet of Ships' Tells Tale of ­ss Fitzgerald Tragedy, Or Half of It

On early Saturday morning off the coast of Japan, the Philippines-flagged cargo container carrierACX Crystal struck the USS Fitzgerald (DDG-62) on its starboard...

Got a Face-Recognition Algorithm? ­ncle Sam Wants to Review It
From ACM News

Got a Face-Recognition Algorithm? ­ncle Sam Wants to Review It

The nation's top-level intelligence office, the Director of National Intelligence, wants to find "the most accurate unconstrained face recognition algorithm."

Watch Out Hackers: Deploying Ransomware Is Now a Crime in California
From ACM Careers

Watch Out Hackers: Deploying Ransomware Is Now a Crime in California

As of January 1, the delivery of ransomware is illegal in California thanks to Senate Bill 1137 going into effect.

Vr Started with Gaming, But It Will Take Over Every Other Industry
From ACM Careers

Vr Started with Gaming, But It Will Take Over Every Other Industry

"We are looking at sensory immersion.

Iphone Exploit Bounty Surges to an Eye-Popping $1.5 Million
From ACM Careers

Iphone Exploit Bounty Surges to an Eye-Popping $1.5 Million

A controversial broker of security exploits is offering $1.5 million (£1.2 million) for attacks that work against fully patched iPhones and iPads, a bounty that's...

Colin Powell's E-Mail Tips: ­se Private Phone Line, Personal Aol Account… and Keep Mouth Shut
From ACM Careers

Colin Powell's E-Mail Tips: ­se Private Phone Line, Personal Aol Account… and Keep Mouth Shut

In an e-mail exchange with then-incoming Secretary of State Hillary Clinton, former Secretary of State Colin Powell warned that the State Department Diplomatic...

Cothority to Apple: Let's Make Secret Backdoors Impossible
From ACM Careers

Cothority to Apple: Let's Make Secret Backdoors Impossible

Cothority, a new software project designed to make secret backdoored software updates nearly impossible, is offering to help Apple ensure that any secret court...

Ford's Futurist Knows Kids Today See Status in Their Smartphones, Not Cars
From ACM Opinion

Ford's Futurist Knows Kids Today See Status in Their Smartphones, Not Cars

There can't be many job titles out there cooler than "futurist." And earlier this week, I sat down with Sheryl Connelly, who holds that position at the Ford Motor...

Autonomous Car Makers Hand Over Data on Glitches and Failures to California Dmv
From ACM Careers

Autonomous Car Makers Hand Over Data on Glitches and Failures to California Dmv

If you want to build a self-driving car and test it on public roads in California, the state's Department of Motor Vehicles says that every year you have to submit...

Backslash: Anti-Surveillance Gadgets For Protesters
From ACM Careers

Backslash: Anti-Surveillance Gadgets For Protesters

When riot police descended on protesters in Ferguson, Missouri, last year sporting assault rifles and armored vehicles, the images sparked an awareness of the military...

Robokiller Wins Ftc Prize By Annihilating Robocalls
From ACM Careers

Robokiller Wins Ftc Prize By Annihilating Robocalls

A new technology called "RoboKiller" has won a $25,000 grand prize from the Federal Trade Commission in the agency's "Robocalls: Humanity Strikes Back" contest...

Here Are Eff's Most Influential Cases from Its First 25 Years
From ACM News

Here Are Eff's Most Influential Cases from Its First 25 Years

On Friday, July 10, the Electronic Frontier Foundation celebrated its 25th anniversary.

'epic' Fail—how Opm Hackers Tapped the Mother Lode of Espionage Data
From ACM News

'epic' Fail—how Opm Hackers Tapped the Mother Lode of Espionage Data

Government officials have been vague in their testimony about the data breaches—there was apparently more than one—at the Office of Personnel Management.

How to Crack Many Master Lock Combinations in Eight Tries or Less
From ACM Careers

How to Crack Many Master Lock Combinations in Eight Tries or Less

There's a vulnerability in Master Lock branded padlocks that allows anyone to learn the combination in eight or fewer tries, a process that requires less than two...

As Demand Grows, Midwestern Colleges Prep Students to Fly Drones
From ACM Careers

As Demand Grows, Midwestern Colleges Prep Students to Fly Drones

On the night of May 4, 2007, a tornado classified as a 5 on the Enhanced Fujita Scale reached the town of Greensburg, Kansas.

Air Force Research: How to ­se Social Media to Control People Like Drones
From ACM News

Air Force Research: How to ­se Social Media to Control People Like Drones

Facebook isn't the only organization conducting research into how attitudes are affected by social media.

Supreme Court Weighing When Online Speech Becomes Illegal Threat
From ACM News

Supreme Court Weighing When Online Speech Becomes Illegal Threat

When does an online threat become worthy of criminal prosecution?

As Human Laws Grapple with Robots, There Are No Easy Answers
From ACM News

As Human Laws Grapple with Robots, There Are No Easy Answers

There's been a lot of buzz about robots lately.

It's Official: Computer Scientists Pick Stronger Passwords
From ACM TechNews

It's Official: Computer Scientists Pick Stronger Passwords

Carnegie Mellon University researchers examined the passwords that 25,000 faculty, staff, and students used to access grades, financial transcripts, and other sensitive...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account