acm-header
Sign In

Communications of the ACM

Careers


Featured Job
bg-corner

Revealed: The 1962 CIA Paper That Predicts the Big Deal With Big Data
From ACM News

Revealed: The 1962 CIA Paper That Predicts the Big Deal With Big Data

The Central Intelligence Agency has published for the first time "Some Far-Out Thoughts on Computers," a 1962 internal document that shows how eager the agency...

Hacking Highlights Dangers to Seoul of North's Cyber-Warriors
From ACM News

Hacking Highlights Dangers to Seoul of North's Cyber-Warriors

A hacking attack that brought down three South Korean broadcasters and two major banks has been identified by most commentators as North Korea flexing its muscles...

The Era of Deep Archiving Begins
From ACM Opinion

The Era of Deep Archiving Begins

As a Dartmouth student in the early 1970s, William McDonough went, somewhat casually, to hear a lecture by a visiting celebrity. Mr. McDonough had little idea beforehand...

Where Are the Cyber Pros?
From ACM TechNews

Where Are the Cyber Pros?

The U.S. government has made progress on building a cyber workforce but continues to face several hurdles. The biggest challenge might be the budget climate and...

The Secret of the Wonder Weapon That Israel Will Show Off to Obama
From ACM Careers

The Secret of the Wonder Weapon That Israel Will Show Off to Obama


Israel Ramps ­p Its Cyberdefense Training
From ACM Careers

Israel Ramps ­p Its Cyberdefense Training

Twice a week about 200 Israeli high school students in seven separate locations meet after school for six hours of extra classes.

Sandia Cyber Research Lab Formally Opens in Stressful Times
From ACM Careers

Sandia Cyber Research Lab Formally Opens in Stressful Times

The recent spate of major businesses acknowledging their Web sites had been hacked brought an unusual urgency to the formal opening of Sandia's Cyber Engineering...

Drones on Display: Security Firms Go Hi-Tech in Rush to Seal the Border
From ACM Careers

Drones on Display: Security Firms Go Hi-Tech in Rush to Seal the Border

From a distance, it looked like Wyatt Nease was using a handset to operate a remote control car.

Space Based Relay Study
From ACM Careers

Space Based Relay Study

NASA Goddard Space Flight Center's Exploration and Space Communications Division, is leading a study on behalf of the Space Communications and Navigation Program...

Can Your Boss Read Your Email?
From ACM Opinion

Can Your Boss Read Your Email?

Harvard faculty members responded with shock after the Boston Globe revealed that theuniversity’s administration had searched 16 faculty deans’ email accounts to...

Navy Wants You to Write Algorithms That Automatically ID Threats
From ACM Careers

Navy Wants You to Write Algorithms That Automatically ID Threats

It remains the dream of military imagery analysts who stare at surveillance footage all day: sensors and cameras that alert their human masters to looming threats...

Lars Rasmussen: The Brains Behind Facebook's Future
From ACM Opinion

Lars Rasmussen: The Brains Behind Facebook's Future

For a man that made his career out of helping millions of people find their way around, Lars Rasmussen is frank about his own navigational shortcomings.

Groundbreaking Cyber Fast Track Research Program Ending
From ACM Careers

Groundbreaking Cyber Fast Track Research Program Ending

When Peiter Zatko, the security researcher and pioneering hacker known as Mudge, joined the federal government several years ago to help run a DARPA research program...

Feds Crack Down on Mobile-Phone Spammers
From ACM News

Feds Crack Down on Mobile-Phone Spammers

The U.S Federal Trade Commission said today that it is cracking down on marketers that are allegedly bombarding consumers with hundreds of millions of unwanted on...

Tracking Sensors Invade the Workplace
From ACM News

Tracking Sensors Invade the Workplace

A few years ago when Bank of America Corp. wanted to study whether face time mattered among its call-center teams, the big bank asked about 90 workers to wear badges...

Demand For Cybersecurity Jobs Is Soaring
From ACM TechNews

Demand For Cybersecurity Jobs Is Soaring

Demand for cybersecurity specialists is expanding at 3.5 times the pace of the overall IT job market, and grew 73 percent from 2007 to 2012, according to a Burning...

Web Privacy Becomes a Business Imperative
From ACM Careers

Web Privacy Becomes a Business Imperative

Privacy is no longer just a regulatory headache. Increasingly, Internet companies are pushing each other to prove to consumers that their data is safe and in their...

Wireless Connections Creep Into Everyday Things
From ACM News

Wireless Connections Creep Into Everyday Things

A car that tells your insurance company how you're driving. A bathroom scale that lets you chart your weight on the Web. And a meter that warns your air conditioner...

After M.t.a. Setbacks, No-Swipe Fare Cards Are Still Stuck in the Future
From ACM News

After M.t.a. Setbacks, No-Swipe Fare Cards Are Still Stuck in the Future

For nearly 50 years, coins were the currency in New York’s subway and bus system. Tokens carried the next 40 years, until the MetroCard first slid into riders’...

Hackers Could ­se 'the Internet of Things' to Turn Everyday Devices Into Paths of Attack
From ACM Opinion

Hackers Could ­se 'the Internet of Things' to Turn Everyday Devices Into Paths of Attack

The "Internet of Things" is great—we'll soon be able to build apps for our cars, thermostats, refrigerators, and more. But what happens when attackers get into...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account