From ACM Careers
Canonical's Open Documentation Academy aims to help newcomers participate in the open source community, offering mentorship and…
BNN| February 28, 2024
That iPad in your hand? It feels like the most modern of computers. But like the iPhone and the Macintosh, the Apple tablet revolves around a core piece of software...Wired From ACM Careers | August 8, 2013
While even technologically savvy instructors may struggle in moving a strongly Web-supported course to fully online delivery, there are simple solutions to address...eLearn Magazine From ACM Careers | August 8, 2013
As an undergraduate at Oxford University in the mid-1970s, K. Birgitta Whaley struggled to choose between chemistry and physics.Quanta Magazine From ACM Opinion | August 8, 2013
Valerie Jarrett, Senior Advisor to President Barack Obama, weighs in on changes at the national and local level that are making science, technology, engineering...The White House Blog From ACM Careers | August 8, 2013
For the Curiosity rover, it's just another day on Mars—but back on Earth, Tuesday was a day to look back at the $2.5 billion mission's first year, including a moment...NBC News From ACM News | August 7, 2013
Earlier this summer in a packed and freezing-cold auditorium in Doha, the all-female team of students from Qatar University burst into cheers and tears as theyINJAZ...BBC News From ACM News | August 7, 2013
It looks like a bakery. A warm glow emanates from the windows of big, oven-like machines, and a dusting of white powder covers everything.The Associated Press From ACM Careers | August 7, 2013
Researchers at North Carolina State University have created a new flexible nano-scaffold for rechargeable lithium ion batteries that could help make cell phone...North Carolina State niversity From ACM Careers | August 7, 2013
MIT Ph.D. student Kuang Xu has found a way to apply predictive modeling to improve emergency-room wait times.MIT News From ACM Careers | August 7, 2013
If something can connect to a network, it can be hacked. Computers and phones are still popular targets, but increasingly so are cars, home security systems, TVs...CNN From ACM News | August 6, 2013
One year ago Monday (Aug. 5), NASA's Mars rover Curiosity pulled off a stunning and unprecedented landing inside Gale Crater, kicking off a two-year surface mission...Space.com From ACM Opinion | August 6, 2013
The U.S. government's efforts to recruit talented hackers could suffer from the recent revelations about its vast domestic surveillance programs, as many private...Reuters From ACM Careers | August 6, 2013
A new model of wireless networks that better represents the real world could lead to more robust communications protocols.MIT News From ACM Careers | August 6, 2013
Academic research institutions have experienced a significant increase in cyberinfrastructure resources since 2005, according to a new report from the U.S. National...National Science Foundation From ACM TechNews | August 5, 2013
The number of computer and IT jobs grew 13 percent from 2003 to 2012, but the number of people with degrees in these fields from U.S. colleges and universities...CBS MoneyWatch From ACM TechNews | August 5, 2013
David Holz took the main stage at this year's South by Southwest Interactive, the annual innovation conference in Austin, Texas, looking like a hobbit on casual...Popular Science From ACM News | August 5, 2013
At the Black Hat security conference in Las Vegas, a quartet of researchers, Alex Stamos, Tom Ritter, Thomas Ptacek, and Javed Samuel, implored everyone involved...ArsTechnica From ACM News | August 5, 2013
Code.org CEO Hadi Partovi says about 90 percent of U.S. schools lack computer science programs due to a shortage of funds and teachers. There are over 40,000 high...Vator News From ACM TechNews | August 2, 2013
A new curriculum from the Digital Harbor Foundation, BatelleEd, and Arizona State University reflects a shift that is occurring in education, from passive to active...Center for Digital Education From ACM TechNews | July 31, 2013
Law-enforcement officials in the U.S. are expanding the use of tools routinely used by computer hackers to gather information on suspects, bringing the criminal...The Wall Street Journal From ACM News | August 2, 2013