From ACM Careers
Canonical's Open Documentation Academy aims to help newcomers participate in the open source community, offering mentorship and…
BNN| February 28, 2024
For the Curiosity rover, it's just another day on Mars—but back on Earth, Tuesday was a day to look back at the $2.5 billion mission's first year, including a moment...NBC News From ACM News | August 7, 2013
Earlier this summer in a packed and freezing-cold auditorium in Doha, the all-female team of students from Qatar University burst into cheers and tears as theyINJAZ...BBC News From ACM News | August 7, 2013
It looks like a bakery. A warm glow emanates from the windows of big, oven-like machines, and a dusting of white powder covers everything.The Associated Press From ACM Careers | August 7, 2013
If something can connect to a network, it can be hacked. Computers and phones are still popular targets, but increasingly so are cars, home security systems, TVs...CNN From ACM News | August 6, 2013
One year ago Monday (Aug. 5), NASA's Mars rover Curiosity pulled off a stunning and unprecedented landing inside Gale Crater, kicking off a two-year surface mission...Space.com From ACM Opinion | August 6, 2013
The U.S. government's efforts to recruit talented hackers could suffer from the recent revelations about its vast domestic surveillance programs, as many private...Reuters From ACM Careers | August 6, 2013
A new model of wireless networks that better represents the real world could lead to more robust communications protocols.MIT News From ACM Careers | August 6, 2013
David Holz took the main stage at this year's South by Southwest Interactive, the annual innovation conference in Austin, Texas, looking like a hobbit on casual...Popular Science From ACM News | August 5, 2013
At the Black Hat security conference in Las Vegas, a quartet of researchers, Alex Stamos, Tom Ritter, Thomas Ptacek, and Javed Samuel, implored everyone involved...ArsTechnica From ACM News | August 5, 2013
Code.org CEO Hadi Partovi says about 90 percent of U.S. schools lack computer science programs due to a shortage of funds and teachers. There are over 40,000 high...Vator News From ACM TechNews | August 2, 2013
Law-enforcement officials in the U.S. are expanding the use of tools routinely used by computer hackers to gather information on suspects, bringing the criminal...The Wall Street Journal From ACM News | August 2, 2013
Ten years ago this week, Senator James M. Inhofe, the Republican from Oklahoma, used a two-hour floor speech to launch his campaign on the credibility of climate...The New York Times From ACM Opinion | August 2, 2013
Vampir, a software development toolset, can analyze in detail a running application as it is executed on the hundreds of thousands of processors of the Titan supercomputer...Oak Ridge National Laboratory From ACM Careers | August 2, 2013
A research paper that was highlighted last year at an international symposium is the winner of the National Security Agency's first annual Science of Security (SoS)...National Security Agency From ACM Careers | August 1, 2013
On a pebbled field built next to a parking lot, a small rover scoots forward and expels a long sheet of polyimide plastic from its backside, the third film the...Wired From ACM News | July 31, 2013
Raymond Laflamme can't yet sell you a quantum computer. But he'll sell you a $13,000 logic board for measuring entangled photons.Technology Review From ACM Careers | July 31, 2013
While studying physics and electrical engineering as an MIT undergraduate in the late 1990s, Mehmet Fatih Yanik managed to avoid taking any biology classes until...MIT News Office From ACM Careers | July 31, 2013
Over the past six months, "fans" of this Web site and its author have shown their affection in some curious ways.Krebs on Security From ACM Opinion | July 31, 2013