From ACM Careers
Canonical's Open Documentation Academy aims to help newcomers participate in the open source community, offering mentorship and…
BNN| February 28, 2024
A couple of weeks ago, a small team of security researchers gathered near a car parked outside one of their company’s buildings.New Scientist From ACM Careers | August 3, 2015
She is known as Xiaoice, and millions of young Chinese pick up their smartphones every day to exchange messages with her, drawn to her knowing sense of humor and...The New York Times From ACM News | July 31, 2015
The leather-bound diaries of a 19th-century high-school principal in southwestern India are helping change how archivists around the world handle email.The Wall Street Journal From ACM Careers | July 30, 2015
Researchers mount successful attacks against Tor, the popular anonymity network, and show how to prevent them.MIT News From ACM Careers | July 29, 2015
When President Obama launched his Twitter account in May, people noticed his rapid accumulation of followers, a silly back-and-forth with President Clinton, but...The Atlantic From ACM News | July 23, 2015
It couldn't get any more steampunk if it tried: a wooden robot hisses like an airbrake as a blast of compressed air shoves its arm sideways, sending a credit card...BBC News From ACM Careers | July 22, 2015
When Facebook Inc. engineers needed security software to monitor the thousands of Apple Inc. Mac laptops, they couldn't find what they needed.The Wall Street Journal From ACM Careers | July 21, 2015
After Tuesday's historic agreement between Iran and the "P5+1" group of countries, inspectors from the International Atomic Energy Agency will have access to all...Wired From ACM News | July 20, 2015
The U.S. Department of Homeland Security Science and Technology Directorate has expanded the capability of its mobile apps archiving technology to track copyright....S. DHS Science & Technology Directorate From ACM Careers | July 20, 2015
The giants of the Web have been pressing developers of mobile apps to index their content so it can be parsed by search engines or linked to from other sites.Bloomberg From ACM Careers | July 17, 2015
Before Max Krohn, the OkCupid co-founder, played online matchmaker, he had a far-less-romantic interest in cryptography. But he couldn't see a way to make a living...The Wall Street Journal From ACM Careers | July 16, 2015
A computer network security tool developed by Lawrence Livermore National Laboratory computer scientists and engineers has been licensed to Cambridge Global Advisors...Lawrence Livermore National Laboratory From ACM Careers | July 15, 2015
In the past decade, Moxie Marlinspike has squatted on an abandoned island, toured the U.S. by hopping trains, he says, and earned the enmity of government officials...The Wall Street Journal From ACM Opinion | July 10, 2015
Seven teams have earned the right to compete in the finals of DARPA’s Cyber Grand Challenge, a tournament designed to speed the development of automated security...DARPA From ACM Careers | July 9, 2015
Granting governments access to encrypted data would increase data security concerns, the authors of a new report say. MIT CSAIL From ACM Careers | July 8, 2015
NIST has proposed two new cybersecurity building blocks, one to help organizations improve the security of email, the other to enable mobile devices to provide...National Institute of Standards and Technology From ACM Careers | July 7, 2015
In his 1942 short story 'Runaround', science-fiction writer Isaac Asimov introduced the Three Laws of Robotics—engineering safeguards and built-in ethical principles...Nature From ACM News | July 2, 2015