acm-header
Sign In

Communications of the ACM

Careers


Featured Job
bg-corner

Dudes With Drones
From ACM Careers

Dudes With Drones

No one knows exactly how many personal drones are buzzing through our skies, but Chris Anderson, the longtime editor of Wired magazine who now heads a drone manufacturer...

The Holder of Secrets
From ACM Opinion

The Holder of Secrets

From the garden terrace of a sixth-floor walkup on a quiet Berlin street, there was a clear view to the TV Tower, in Alexanderplatz.

How Big Data Algorithms See ­s—while They Eat ­S ­p
From ACM Opinion

How Big Data Algorithms See ­s—while They Eat ­S ­p

Four years ago I interviewed Sam Yagan, then CEO of OKCupid, about the mathematics underlying his free matchmaking site.

Should Industrial Robots Be Able to Hurt Their Human Coworkers?
From ACM News

Should Industrial Robots Be Able to Hurt Their Human Coworkers?

How much should a robot be allowed to hurt its coworkers?

Hackers Gather For Cyberwar in an Intense 48-Hour Sim
From ACM Careers

Hackers Gather For Cyberwar in an Intense 48-Hour Sim

Locked Shields is among the world's preeminent cyber attack simulations.

When Cybersecurity Threats Come from the Inside
From ACM Careers

When Cybersecurity Threats Come from the Inside

AT&T acknowledged earlier this week that in August an employee had gained unauthorized access to some customers' personal data—including Social Security and driver's...

New York City Shuts Down Unauthorized Sensors
From ACM Careers

New York City Shuts Down Unauthorized Sensors

With little fanfare, urban areas have become overgrown by a tangle of sensors: cameras unobtrusively snapping pictures at traffic lights, microphones secretly triangulating...

How The Cold War And George Orwell Helped Make The Internet What It Is
From ACM Opinion

How The Cold War And George Orwell Helped Make The Internet What It Is

The story of how the digital age came to be involves a cast of more than 40 people, ranging from a 19th century English countess to California hippies.

Cyber Spy High: Meet the Nsa's Hacker Recruiter
From ACM Opinion

Cyber Spy High: Meet the Nsa's Hacker Recruiter

The National Security Agency has a recruiting problem.

Print Your Own Cellphone Microscope for Pennies
From ACM Careers

Print Your Own Cellphone Microscope for Pennies

Researchers at Pacific Northwest National Laboratory have developed a sleek, simple, and inexpensive way to turn a cellphone into a high powered, high quality...

How Two Men ­nlocked Modern Encryption
From ACM Careers

How Two Men ­nlocked Modern Encryption

In September of 1974, when he was 30 years old, Whitfield Diffie was obsessed with cryptography.

Ios 8 Brings Big Boost For Web Programmers
From ACM Careers

Ios 8 Brings Big Boost For Web Programmers

Web programmers rejoice: Apple's new iOS 8 has added support for standards that will let you build better games and more productive websites.

Crime Ring Revelation Reveals Cybersecurity Conflict of Interest
From ACM Careers

Crime Ring Revelation Reveals Cybersecurity Conflict of Interest

A small cybersecurity firm claimed this summer to have uncovered a scam by Russian Internet thieves to amass a mountain of stolen information from 420,000 Web and...

IBM Computer Scientist Named Macarthur Fellow
From ACM Careers

IBM Computer Scientist Named Macarthur Fellow

IBM computer scientist Craig Gentry was named to the 2014 class of MacArthur Fellows for his work on cryptography. The MacArthur 'genius grants' recognize exceptionally...

Tim Cook Interview: The Iphone 6, the Apple Watch, and Remaking a Company's Culture
From ACM Opinion

Tim Cook Interview: The Iphone 6, the Apple Watch, and Remaking a Company's Culture

Steve Jobs’s office remains Steve Jobs's office.

How Main Street Will Pay For Home Depot's Data Breach
From ACM News

How Main Street Will Pay For Home Depot's Data Breach

Federal law protects consumers from the cost of fraudulent charges incurred when thieves steal credit-card and debit-card numbers.

So You Want to Hack Apple Pay?
From ACM News

So You Want to Hack Apple Pay?

A decade ago, a group of Johns Hopkins University grad students tried to hack one of the first commercially popular Near Field Communication payment systems—the...

Google Is Target of European Backlash on ­.s. Tech Dominance
From ACM News

Google Is Target of European Backlash on ­.s. Tech Dominance

A top German official called for Google to be broken up.

Sandia Cyber-Testing Contributes to Dhs Transition to Practice
From ACM Careers

Sandia Cyber-Testing Contributes to Dhs Transition to Practice

The U.S. Department of Homeland Security's Transition to Practice program is giving cybersecurity technologies developed at the U.S. national laboratories a better...

Why I Just Asked My Students To Put Their Laptops Away
From ACM Opinion

Why I Just Asked My Students To Put Their Laptops Away

I teach theory and practice of social media at NYU, and am an advocate and activist for the free culture movement, so I’m a pretty unlikely candidate for internet...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account