From ACM Careers
Canonical's Open Documentation Academy aims to help newcomers participate in the open source community, offering mentorship and…
BNN| February 28, 2024
"Are you sure they're there?" the decision maker asks. "They" are Qaeda operatives who have been planning attacks against the United States.The New York Times From ACM Opinion | February 22, 2016
The latest standoff between Europe and American tech companies runs through a quiet street just north of the Louvre Museum, past chic cafes and part of the French...The New York Times From ACM News | January 25, 2016
In the hours after 14 people were killed in San Bernardino, Calif., a familiar voice celebrated the attacks on Twitter: "California, we have already arrived with...The New York Times From ACM Careers | December 9, 2015
Want to learn how to break into the computerized heart of a medical device or an electronic voting machine? Maybe a smartphone or even a car?The New York Times From ACM Careers | December 1, 2015
As President Xi Jinping of China prepares for his first state visit to the United States this month, Washington has warned that it could hit Chinese companies with...The New York Times From ACM News | September 10, 2015
She is known as Xiaoice, and millions of young Chinese pick up their smartphones every day to exchange messages with her, drawn to her knowing sense of humor and...The New York Times From ACM News | July 31, 2015
The privacy policy for Hulu, a video-streaming service with about nine million subscribers, opens with a declaration that the company "respects your privacy."The New York Times From ACM News | June 29, 2015
A group of researchers at the Chinese web services company Baidu have been barred from participating in an international competition for artificial intelligence...The New York Times From ACM News | June 4, 2015
Ever since Jim Balsillie and Mike Lazaridis stepped down as co-chairmen and co-chief executives of BlackBerry, neither has spoken much in public about the once-dominant...The New York Times From ACM Opinion | May 26, 2015
The Pentagon’s new 33-page cybersecurity strategy is an important evolution in how America proposes to address a top national security threat. It is intended to...The New York Times From ACM Opinion | April 28, 2015
Before Betsy Chao, a senior here at Rutgers University, could take midterm exams in her online courses this semester, her instructors sent emails directing students...The New York Times From ACM Careers | April 9, 2015
When technology executives imagine the boogeyman, they see a baby-face guy in wire-rim glasses. His name is Jay Edelson.The New York Times From ACM Careers | April 9, 2015
Mounting evidence that the co-pilot crashed a Germanwings plane into a French mountain has prompted a global debate about how to better screen crewmembers for mental...The New York Times From ACM News | April 7, 2015
A small group of high-ranking Pentagon officials made a quiet visit to Silicon Valley in December to solicit national security ideas from start-up firms with little...The New York Times From ACM Careers | March 2, 2015
When Google hosted a boot camp here this month for its Android operating system, there were some new faces in the room: auto manufacturers.The New York Times From ACM Careers | February 24, 2015
Google's research arm, Google X, is called the company's Moonshot Factory. One reason the company picked the word "Moonshot" was to remind people to tackle big...The New York Times From ACM Careers | February 17, 2015
Technology giants often meet their end not with a bang but a whimper, a slow, imperceptible descent into irrelevancy that may not immediately be reflected in the...The New York Times From ACM Opinion | February 13, 2015
A man in Sweden says he will pay up to $2,000 to anyone who can break into his landlord’s website.The New York Times From ACM Careers | January 16, 2015