acm-header
Sign In

Communications of the ACM

Careers


Featured Job
bg-corner

Training For the Day a Tweet Dictates Where to Send Swat
From ACM Careers

Training For the Day a Tweet Dictates Where to Send Swat

Emergency responders in northern Texas watch as an imaginary crisis takes over their social media feeds.

Amazon's Robot War Is Spreading
From ACM Careers

Amazon's Robot War Is Spreading

It was Amazon that drove America's warehouse operators into the robot business.

Educating and Strengthening the Cybersecurity Workforce
From ACM Careers

Educating and Strengthening the Cybersecurity Workforce

California State University is creating unique educational opportunities for students and faculty members in an effort to produce career-ready cybersecurity professionals...

Investors Bet on a Quiet Tech Revolution in Europe
From ACM Careers

Investors Bet on a Quiet Tech Revolution in Europe

It's not banking or mining shares, but rather technology stocks, that have come up trumps in Europe this year and are poised to end the first quarter as the best...

Making America's Power Grid Much, Much Smarter
From ACM Careers

Making America's Power Grid Much, Much Smarter

Microgrids could help the U.S. power grid quickly respond to and quarantine problems to prevent huge outages.

Security For Multirobot Systems
From ACM Careers

Security For Multirobot Systems

Researchers have developed a technique for preventing malicious hackers from commandeering robot teams' communication networks.

Research Examines Susceptibility to Cyberattacks Through Brain Activity, Eye Gaze
From ACM Careers

Research Examines Susceptibility to Cyberattacks Through Brain Activity, Eye Gaze

Researchers are using neuroimaging to observe what happens in Internet users' brains when they encounter malware warnings or malicious websites.

This Entrepreneur Dares You to Hack His Gadgets
From ACM Opinion

This Entrepreneur Dares You to Hack His Gadgets

Serial entrepreneur Andrew "Bunnie" Huang believes that consumer product companies should make their hardware designs publicly available so that anyone can study...

­sing Game Theory to Predict Cyberattacks
From ACM Careers

­sing Game Theory to Predict Cyberattacks

A new game theory algorithm could one day help detect election tampering.

Blockchain: A Better Way to Track Pork Chops, Bonds, Bad Peanut Butter?
From ACM Careers

Blockchain: A Better Way to Track Pork Chops, Bonds, Bad Peanut Butter?

Frank Yiannas has spent years looking in vain for a better way to track lettuce, steaks and snack cakes from farm and factory to the shelves of Walmart, where he...

Nsa Risks Talent Exodus Amid Morale Slump, Trump Fears
From ACM Careers

Nsa Risks Talent Exodus Amid Morale Slump, Trump Fears

The National Security Agency risks a brain-drain of hackers and cyber spies due to a tumultuous reorganization and worries about the acrimonious relationship between...

How the Media Are ­sing Encryption Tools to Collect Anonymous Tips
From ACM Careers

How the Media Are ­sing Encryption Tools to Collect Anonymous Tips

There was a time when a whistleblower had to rely on the Postal Service, or a pay phone, or an underground parking garage to leak to the press.

Trump Inspires Encryption Boom in Leaky D.c.
From ACM Careers

Trump Inspires Encryption Boom in Leaky D.c.

Poisonous political divisions have spawned an encryption arms race across the Trump administration, as both the president’s advisers and career civil servants scramble...

The Former Secretary of Defense Outlines the Future of Warfare
From ACM Opinion

The Former Secretary of Defense Outlines the Future of Warfare

To an engineer in Silicon Valley, the Defense Department can look a little old, a little slow, and a little fat.

Turning Back Ddos Attacks
From ACM Careers

Turning Back Ddos Attacks

The U.S. Department of Homeland Security's Science and Technology Directorate is funding several research projects that will help defenders turn away distributed...

Army Lab Integrates Future Soldier Technology
From ACM Careers

Army Lab Integrates Future Soldier Technology

Lighter weight protective body armor and undergarments, newer uniform fabrics, conformal wearable computers, and integrated sensors are all part of the U.S. Army's...

It Decisions Makers and Executives Don't Agree on Cyber Security Responsibility
From ACM Careers

It Decisions Makers and Executives Don't Agree on Cyber Security Responsibility

There's a severe disconnect between IT decision makers and C-suite executives when it comes to handling cyber attacks. Namely, both believe the other one is responsible...

Hacker Knows Best: Privacy Tips from Kevin Mitnick
From ACM Opinion

Hacker Knows Best: Privacy Tips from Kevin Mitnick

Kevin Mitnick knows all the ways your privacy could be violated through your phone, computer and tablet.

New Office Sensors Know When You Leave Your Desk
From ACM Careers

New Office Sensors Know When You Leave Your Desk

About a year ago, in a widely reported story, journalists at British newspaper the Telegraph found little black boxes installed under their desks.

Simulated Ransomware Attack Shows Vulnerability of Industrial Controls
From ACM Careers

Simulated Ransomware Attack Shows Vulnerability of Industrial Controls

Researchers at Georgia Institute of Technology have developed a form of ransomware that was able to take control of a simulated water treatment plant. The simulated...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account