acm-header
Sign In

Communications of the ACM

Careers


Featured Job
bg-corner

A Guide to Challenges Facing Self-Driving Car Technologists
From ACM Opinion

A Guide to Challenges Facing Self-Driving Car Technologists

In the minds of many in Silicon Valley and in the auto industry, it is inevitable that cars will eventually drive themselves.

Overcoming the Trust Barrier in Nuclear Weapons Verification Measurements
From ACM Careers

Overcoming the Trust Barrier in Nuclear Weapons Verification Measurements

Sandia National Laboratories physicist Peter Marleau has developed a method for verifying warhead attributes without revealing sensitive design information.

Chinese Exam Authorities ­se Facial Recognition, Drones to Catch Cheats
From ACM Careers

Chinese Exam Authorities ­se Facial Recognition, Drones to Catch Cheats

Chinese education authorities have gone high-tech to catch cheaters as millions of high-school students take their "gaokao", the annual university entrance exam...

Why Car Companies Are Hiring Computer Security Experts
From ACM Careers

Why Car Companies Are Hiring Computer Security Experts

It started about seven years ago. Iran's top nuclear scientists were being assassinated in a string of similar attacks: Assailants on motorcycles were pulling up...

Software Tool to Detect Fake Online Profiles
From ACM Careers

Software Tool to Detect Fake Online Profiles

People who use fake profiles online could be more easily identified, thanks to a new tool developed by computer scientists at the University of Edinburgh.

Got a Face-Recognition Algorithm? ­ncle Sam Wants to Review It
From ACM News

Got a Face-Recognition Algorithm? ­ncle Sam Wants to Review It

The nation's top-level intelligence office, the Director of National Intelligence, wants to find "the most accurate unconstrained face recognition algorithm."

When Hatred Goes Viral: Inside Social Media's Efforts to Combat Terrorism
From ACM News

When Hatred Goes Viral: Inside Social Media's Efforts to Combat Terrorism

On New Year's Eve in 2015 local and federal agents arrested a 26-year-old man in Rochester, N.Y., for planning to attack people at random later that night using...

Top Hacker Conference to Target Voting Machines
From ACM Careers

Top Hacker Conference to Target Voting Machines

Hackers will target American voting machines—as a public service, to prove how vulnerable they are. 

Network Traffic Provides Early Indication of Malware Infection
From ACM Careers

Network Traffic Provides Early Indication of Malware Infection

By analyzing network traffic going to suspicious domains, security administrators could detect malware infections weeks or even months before they're able to capture...

Companies ­se Kidnap Insurance to Guard Against Ransomware Attacks
From ACM Careers

Companies ­se Kidnap Insurance to Guard Against Ransomware Attacks

Companies without cyber insurance are dusting off policies covering kidnap, ransom and extortion in the world's political hotspots to recoup losses caused by ransomware...

Google, Not the Government, Is Building the Future
From ACM Opinion

Google, Not the Government, Is Building the Future

One persistent criticism of Silicon Valley is that it no longer works on big, world-changing ideas.

Physical Keyboards Make Virtual Reality Typing Easier
From ACM Careers

Physical Keyboards Make Virtual Reality Typing Easier

Computer scientists used a light-up virtual display, autocorrect algorithms, and a physical keyboard to assist head-mount-display users inputting text for home...

Your Password Is Terrible and Everyone Wants to Fix That
From ACM Careers

Your Password Is Terrible and Everyone Wants to Fix That

Headlines about mass data breaches have become ominously routine, and yet password convenience still trumps security for most people.

The Internet of Things Needs a Code of Ethics
From ACM Opinion

The Internet of Things Needs a Code of Ethics

In October, when malware called Mirai took over poorly secured webcams and DVRs, and used them to disrupt internet access across the United States, I wondered who...

­.s.-Funded Malware Detection Tech Gets Commercial License
From ACM Careers

­.s.-Funded Malware Detection Tech Gets Commercial License

Hyperion malware detection technology developed at the U.S. Department of Energy's Oak Ridge National Laboratory will move to the commercial market as part of a...

The ­S Takes On the World in Nato's Cyber War Games
From ACM Careers

The ­S Takes On the World in Nato's Cyber War Games

Last year, Capt. Sean Ruddy and his team of operator-soldiers from the US Cyber Brigade entered a Locked Shields, a NATO-organized cyber-defense war game that pits...

Next List 2017 20 Tech Visionaries Who Are Creating the Future
From ACM Careers

Next List 2017 20 Tech Visionaries Who Are Creating the Future

Microsoft will build computers even more sleek and beautiful than Apple's. Robots will 3-D-print cool shoes that are personalized just for you.

President Trump's New Order Gives China Tech Opportunity To 'hire American' Too
From ACM Opinion

President Trump's New Order Gives China Tech Opportunity To 'hire American' Too

The same week that President Trump issued his hire American executive order, the president of one of China's top tech companies said his company wants to do the...

How to Build Your Own Moonshot Lab, According to Astro Teller
From ACM Opinion

How to Build Your Own Moonshot Lab, According to Astro Teller

From balloon-based Internet to self-driving cars, Astro Teller and his team have produced some of the world's most ambitious technology products.

With Trump's Border Plans, Security and Surveillance Firms Eye Bigger Profits
From ACM Careers

With Trump's Border Plans, Security and Surveillance Firms Eye Bigger Profits

There's a lot of excitement at the Border Security Expo in San Antonio, where vendors schmooze with government buyers and peddle their wares.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account