From ACM Careers
Canonical's Open Documentation Academy aims to help newcomers participate in the open source community, offering mentorship and…
BNN| February 28, 2024
The U.S. government is creating a new agency to monitor cybersecurity threats, pooling and analyzing information on a spectrum of risks, a senior Obama administration...Reuters From ACM Careers | February 10, 2015
Human attention isn't stable, ever, and it costs us: lives lost when drivers space out, billions of dollars wasted on inefficient work, and mental disorders that...The Atlantic From ACM News | February 9, 2015
This summer, people will cruise through the streets of Greenwich, U.K., in electric shuttles with no one's hands on the steering wheel—or any steering wheel at...Nature From ACM News | February 9, 2015
With NSF support, Iowa State University is making a version of ISEAGE (the Internet-Scale Event and Attack Generation Environment) software technology available...Iowa State University From ACM Careers | February 5, 2015
The British army is creating a special force of Facebook warriors, skilled in psychological operations and use of social media to engage in unconventional warfare...The Guardian From ACM News | February 4, 2015
Privacy law expert Neil M. Richards argues in a new book that digital technologies should give more attention to the important human values that required hard fights...Washington niversity in St. Louis From ACM Careers | February 4, 2015
China had 649 million Internet users by the end of 2014, with 557 million of those using handsets to go online, said a government report on Tuesday, as the world's...Reuters From ACM News | February 3, 2015
Nineteen ninety-five was the inaugural year of the 21st century, a clear starting point for contemporary life.Wired From ACM Careers | January 30, 2015
Just four pieces of information are enough to identify 90 percent of the people in a data set recording three months of credit-card transactions by 1.1 million...MIT News From ACM Careers | January 30, 2015
Researchers have found evidence that profitable email phishing scams may benefit from phishers' use of "information-rich" emails that include graphics, logos, and...University at Buffalo From ACM Careers | January 26, 2015
The search for chief information security officers has become a seller’s market as companies rush to hire security experts in the wake of several high-profile cyberattacks...The Wall Street Journal From ACM Careers | January 26, 2015
Well before the Internet of Things becomes an actual thing, chipmakers are jockeying to get a piece of the potentially huge new market.CNET From ACM Careers | January 23, 2015
On a campus notable for tight security and secret offices, Building 92 is a rare beacon of openness. Guests can enter without a Microsoft ID and browse corporate...Wired From ACM Careers | January 22, 2015
A man in Sweden says he will pay up to $2,000 to anyone who can break into his landlord’s website.The New York Times From ACM Careers | January 16, 2015
A mobile version of a guide designed to help first responders browse and search for information on biodetection technologies is now available from the iTunes store...Pacific Northwest National Laboratory From ACM Careers | January 14, 2015
The lack of enough cybersecurity professionals could be a major problem for many organizations in 2015, according to new research by the Massachusetts-based Enterprise...Network World From ACM TechNews | January 12, 2015
In 2007, Bill Gates stepped onstage at the International Consumer Electronics Show in Las Vegas to help introduce Sync, a combination GPS navigator, digital music...Bloomberg Businessweek From ACM Careers | January 12, 2015