From ACM Careers
Canonical's Open Documentation Academy aims to help newcomers participate in the open source community, offering mentorship and…
BNN| February 28, 2024
In 1984, Mike Lazaridis, an engineering student at the University of Waterloo, and Douglas Fregin, an engineering student at the University of Windsor, founded...Bloomberg Businessweek From ACM Opinion | December 10, 2013
Not limiting their activities to the earthly realm, American and British spies have infiltrated the fantasy worlds of World of Warcraft and Second Life, conducting...ProPublica From ACM News | December 9, 2013
China's government banned financial institutions from trading in bitcoin on Thursday, in what analysts said was a restrained first step towards regulating the digital...Reuters From ACM News | December 5, 2013
Newegg, an online retailer that has made a name for itself fighting the non-practicing patent holders sometimes called "patent trolls," sits on the losing end of...ArsTechnica From ACM News | November 27, 2013
As Bitcoin becomes an increasingly popular form of digital cash, the cryptocurrency is being accepted in exchange for everything from socks to sushi to heroin.Forbes From ACM News | November 22, 2013
Cracking one of the most complicated cipher devices ever created—the Enigma machine—may not have been what Britain's Mavis Batey envisioned when she studied the...CNET From ACM News | November 15, 2013
Carnegie Mellon University researchers examined the passwords that 25,000 faculty, staff, and students used to access grades, financial transcripts, and other sensitive...Ars Technica From ACM TechNews | November 13, 2013
In Israel, like most of the world, the universe of computer whizzes and technology entrepreneurs is overwhelmingly male.The Wall Street Journal From ACM Careers | November 14, 2013
The maker of the most popular computer operating system in the world is launching a new strategy against criminal hackers by bringing together security engineers...Reuters From ACM Careers | November 14, 2013
The internet backbone—the infrastructure of networks upon which internet traffic travels—went from being a passive infrastructure for communication to an active...Wired From ACM Opinion | November 14, 2013
The U.S. intelligence community is pushing a leap forward in facial recognition software that will enable it to determine better the identity of people through...SA Today From ACM News | November 14, 2013
At Bowdoin College in Brunswick, Me., admissions officers are still talking about the high school senior who attended a campus information session last year for...The New York Times From ACM Careers | November 12, 2013
To defend themselves against hackers, some of America's largest corporations have adopted shadowy tactics usually reserved for government spies.CNNMoney From ACM News | November 11, 2013
Tony Fadell is the founder and chief executive of Nest, a company that is trying to bring a high-end technology experience to some of the most prosaic areas of...The New York Times From ACM Opinion | November 11, 2013
Experts in anthropology and cybersecurity at Kansas State University are examining the unspoken knowledge shared by cybersecurity analysts as a way to develop...Kansas State University From ACM Careers | November 11, 2013