From ACM Careers
Canonical's Open Documentation Academy aims to help newcomers participate in the open source community, offering mentorship and…
BNN| February 28, 2024
Companies spend billions of dollars each year to protect from determined hackers attacking from across the Internet, but experts warn they shouldn't ignore a closer...CNET From ACM Careers | January 8, 2015
A few years ago, when Greg Martin was in his mid 20s and teaching a computer security course for NASA engineers, he stumbled on an arcane bit of information that...NBC News From ACM Careers | December 31, 2014
The Daily Paywall is a new website that's loaded with tens of thousands of pirated articles from some of the world's top paywalled newspapers, and its proprietor...Motherboard From ACM Careers | December 23, 2014
Every day, researchers add hundreds of new papers to ArXiv, the massive public database of scientific writing and research.The Atlantic From ACM Careers | December 22, 2014
Researchers at the University of Arkansas have developed a model that organizations can use to address and respond to large-scale data breaches. They found that...University of Arkansas, Fayetteville From ACM Careers | December 22, 2014
Since the days of 19th century remedies such as castor oil laxatives and mercury syphilis tablets, pharmacists and patients have had a tacit understanding: Whatever...Bloomberg Businessweek From ACM News | December 19, 2014
Despite its poverty and isolation, North Korea has poured resources into a sophisticated cyber-warfare cell called Bureau 121, defectors from the secretive state...Reuters From ACM Careers | December 5, 2014
Paul Kocher, one of the country's leading cryptographers, says he thinks the explanation for the world's dismal state of digital security may lie in two charts.The New York Times From ACM News | December 5, 2014
When asked what he likes best about working for Google, physicist John Martinis does not mention the famous massage chairs in the hallways, or the free snacks available...Nature From ACM News | December 3, 2014
Information technology is revolutionizing products. Once composed solely of mechanical and electrical parts, products have become complex systems that combine hardware...Harvard Business Review From ACM Opinion | December 3, 2014
When "Captain Ridley's shooting party" gathered here in late August 1938 as weekend guests at Bletchley Park, a Buckinghamshire country house, they were accompanied...The New York Times From ACM Opinion | December 1, 2014
For the first time since accidents severed the neural connection between their brains and limbs, a small number of patients are reaching out and feeling the world...Nature From ACM News | November 26, 2014
Mark Hart, a scientist and engineer in Lawrence Livermore National Laboratory's (LLNL) Defense Technologies Division, has developed a new approach for ensuring...Lawrence Livermore National Laboratory From ACM Careers | November 21, 2014
The U.S. Department of Homeland Security S&T Directorate will unveil more than 40 technologies, tools, and techniques designed to bolster the cybersecurity of...DHS Science & Technology Directorate From ACM Careers | November 19, 2014
U.K. computer science programs are not doing enough to develop students' skills in cybersecurity, according to a new paper from the Council of Professors and Heads...Times Higher Education From ACM TechNews | November 17, 2014
As Google's core business continues to thrive, Larry Page is making huge bets on new technology—ingestible nanoparticles, balloons that beam down broadband—that... From ACM Careers | November 14, 2014
On a bright fall day last year off the coast of Southern California, an Air Force B-1 bomber launched an experimental missile that may herald the future of warfare...The New York Times From ACM News | November 13, 2014