acm-header
Sign In

Communications of the ACM

Careers


Featured Job
bg-corner

Secure, ­ser-Controlled Data
From ACM Careers

Secure, ­ser-Controlled Data

Cryptographic system would allow users to decide which applications access which aspects of their data.

Pentagon Paying Techies to Think Like Terrorists
From ACM Careers

Pentagon Paying Techies to Think Like Terrorists

To stop a terrorist, it helps to think like one.

What Happens When the Surveillance State Becomes an Affordable Gadget?
From ACM News

What Happens When the Surveillance State Becomes an Affordable Gadget?

When Daniel Rigmaiden was a little boy, his grandfather, a veteran of World War II and Korea, used to drive him along the roads of Monterey, California, playing...

Cothority to Apple: Let's Make Secret Backdoors Impossible
From ACM Careers

Cothority to Apple: Let's Make Secret Backdoors Impossible

Cothority, a new software project designed to make secret backdoored software updates nearly impossible, is offering to help Apple ensure that any secret court...

Europe's Antitrust Enforcer on Google, Apple and the Year Ahead
From ACM Opinion

Europe's Antitrust Enforcer on Google, Apple and the Year Ahead

Margrethe Vestager is already having a busy 2016.

Why Digital Security Is an 'arms Race' Between Firms and the Feds
From ACM Opinion

Why Digital Security Is an 'arms Race' Between Firms and the Feds

The Apple-FBI standoff, where Apple is refusing to write special software that would help investigators crack into an iPhone of one of the San Bernardino shooters...

China Lays Out Its Vision to Become a Tech Power
From ACM Careers

China Lays Out Its Vision to Become a Tech Power

China aims to become a world leader in advanced industries such as semiconductors and in the next generation of chip materials, robotics, aviation equipment and...

Pentagon Hackers Are Waging America’s First Cyberwar
From ACM News

Pentagon Hackers Are Waging America’s First Cyberwar

U.S. politicians have long threatened America's enemies with tanks, planes, submarines, and nuclear missiles. Last week defense secretary Ashton Carter leveled...

­.s. Tech Companies ­nite Behind Apple Ahead of Iphone Encryption Ruling
From ACM Careers

­.s. Tech Companies ­nite Behind Apple Ahead of Iphone Encryption Ruling

Tech industry leaders including Alphabet Inc's Google, Facebook Inc, Microsoft Corp, AT&T and more than two dozen other Internet and technology companies filed...

The Beginning of the End For Encryption Schemes?
From ACM Careers

The Beginning of the End For Encryption Schemes?

Researchers from MIT and the University of Innsbruck in Austria report that they have designed and built a quantum computer from five atoms in an ion trap.

U.S. Military Invites Vetted Experts to 'Hack the Pentagon'
From ACM Careers

U.S. Military Invites Vetted Experts to 'Hack the Pentagon'

The Pentagon said on Wednesday it would invite vetted outside hackers to test the cybersecurity of some public U.S. Defense Department websites as part of a pilot...

White House Officials Soften Approach at Rsa Conference
From ACM News

White House Officials Soften Approach at Rsa Conference

Attorney General Loretta E. Lynch joined a parade of Obama administration officials to tech's home turf on Tuesday. Their message: National security depends on...

Ford's Futurist Knows Kids Today See Status in Their Smartphones, Not Cars
From ACM Opinion

Ford's Futurist Knows Kids Today See Status in Their Smartphones, Not Cars

There can't be many job titles out there cooler than "futurist." And earlier this week, I sat down with Sheryl Connelly, who holds that position at the Ford Motor...

Dynamic Security Software Warns ­sers
From ACM Careers

Dynamic Security Software Warns ­sers

University of Alabama in Huntsville researchers are seeing potential in a software application that could effectively warn users when they are about to give away...

Apple Encryption Stand Highlights Mobile Operators' Dilemma
From ACM News

Apple Encryption Stand Highlights Mobile Operators' Dilemma

Apple Inc's stance on privacy in the face of a U.S. government demand to unlock an iPhone belonging to one of the San Bernardino attackers has raised awkward questions...

A Robot That Has Fun at Telemarketers' Expense
From ACM Careers

A Robot That Has Fun at Telemarketers' Expense

Roger Anderson may not seem like a superhero. But to many, he has become one.

What Role Should Silicon Valley Play in Fighting Terrorism?
From ACM Careers

What Role Should Silicon Valley Play in Fighting Terrorism?

On Friday, January 8, several high-level officials from the Obama administration—including the attorney general, the White House chief of staff, and the directors...

Apple Case Highlights Struggles Cios Face in Balancing Privacy, Law Enforcement Requests
From ACM Careers

Apple Case Highlights Struggles Cios Face in Balancing Privacy, Law Enforcement Requests

As technology advances, there's a delicate balance between individual privacy and law enforcement’s requests for information.

To Keep America Safe, Embrace Drone Warfare
From ACM Opinion

To Keep America Safe, Embrace Drone Warfare

"Are you sure they're there?" the decision maker asks. "They" are Qaeda operatives who have been planning attacks against the United States.

The President's Nsa Advisory Board Finally Gets a Tech Expert
From ACM Opinion

The President's Nsa Advisory Board Finally Gets a Tech Expert

It's taken more than a decade, but a critical oversight board tasked with advising the president on the privacy and civil liberties implications of the NSA's surveillance...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account