From ACM Careers
Canonical's Open Documentation Academy aims to help newcomers participate in the open source community, offering mentorship and…
BNN| February 28, 2024
Researchers from the Georgia Tech have discovered two security weaknesses that permit installation of malware onto Apple mobile devices using seemingly innocuous...Georgia Institute of Technology From ACM Careers | July 31, 2013
The news out of Moscow of late has been dominated by Edward Snowden, the American leaker of secret state documents who is currently seeking temporary asylum in...Fortune From ACM News | July 30, 2013
The last few years have presented an unprecedented shift in the computing world as PCs are being replaced with mobile devices. But now that a large portion of the...Forbes From ACM News | July 29, 2013
Twelve years later, the cranes and earthmovers around the National Security Agency are still at work, tearing up pavement and uprooting trees to make room for a...The Washington Post From ACM News | July 26, 2013
NASA's Space Apps Challenge recently became the world's largest open hackathon, with over 8,000 participants spanning 44 countries.Wired From ACM Opinion | July 23, 2013
In Louisiana, the wife of a former soldier is scaling back on Facebook posts and considering unfriending old acquaintances, worried an innocuous joke or long-lost...The Associated Press From ACM News | July 22, 2013
The U.S. Navy is turning to the Information Technology and Web Science Program at Rensselaer Polytechnic Institute to prepare a select group of U.S. Navy officers...Rensselaer Polytechnic Institute From ACM Careers | July 22, 2013
University of Washington engineers found in a recent study that the user's experience could be key to creating an authentication system that doesn't rely on passwords...niversity of Washington From ACM Careers | July 17, 2013
Like dozens of other brick-and-mortar retailers,Nordstrom wanted to learn more about its customers—how many came through the doors, how many were repeat visitors—the...The New York Times From ACM News | July 15, 2013
Two years ago, a half-dozen programmers and entrepreneurs started working together in a Tel Aviv basement to create one of Israel's 5,000 high-tech companies.Technology Review From ACM Careers | July 15, 2013
Bug bounty programs can be as much as 100 times more cost-effective for finding security vulnerabilities than hiring full-time security researchers to do the same...Threatpost From ACM News | July 12, 2013
A new hardware component design makes data encryption more secure by disguising cloud servers' memory-access patterns. MIT News From ACM Careers | July 2, 2013
In a small, dark, room off a long hallway within a sprawling complex of buildings in Silicon Valley, an array of massive flat-panel displays and video cameras track ...Technology Review From ACM News | June 28, 2013
Looking down from 500 miles above Earth's surface, you could watch the FedEx Custom Critical Delivery truck move across the country along 3,140 miles of highway...Wired From ACM News | June 26, 2013
The National Institute of Standards and Technology has opened registration for its 3rd Cybersecurity Framework Workshop, to be held July 10-12, 2013, in San Diego...University of California, San Diego From ACM Careers | June 26, 2013
Ram Sriharsha works in the engine room powering one of Silicon Valley's most influential companies. He’s an engineer at Yahoo.Wired From ACM News | June 25, 2013
Edward J. Snowden, the former National Security Agency contractor who leaked details about American surveillance, personifies a debate at the heart of technology...The New York Times From ACM News | June 25, 2013