acm-header
Sign In

Communications of the ACM

Careers


Featured Job
bg-corner

N.S.A. Breached Chinese Servers Seen as Security Threat
From ACM News

N.S.A. Breached Chinese Servers Seen as Security Threat

American officials have long considered Huawei, the Chinese telecommunications giant, a security threat, blocking it from business deals in the United States for...

Could Diamonds Be a Computer's Best Friend?
From ACM Careers

Could Diamonds Be a Computer's Best Friend?

For the first time, physicists have demonstrated that information can flow through a diamond wire. Their experiment reveals that diamond wires could one day be...

Revelations of N.s.a. Spying Cost ­.s. Tech Companies
From ACM News

Revelations of N.s.a. Spying Cost ­.s. Tech Companies

Microsoft has lost customers, including the government of Brazil.

Bot & Dolly and the Rise of Creative Robots
From ACM Careers

Bot & Dolly and the Rise of Creative Robots

Behind a small cafe in San Francisco's Potrero Hill neighborhood stands an unmarked warehouse where the future of human-machine interaction is taking shape.

Startup Focuses on Efficient Cooling For Computer Servers
From ACM Careers

Startup Focuses on Efficient Cooling For Computer Servers

  Timothy Shedd of the University of Wisconsin-Madison has invented a computer cooling system that is roughly 10 times more efficient than the air-conditioning...

Building Bicep2: A Conversation with Jamie Bock
From ACM Opinion

Building Bicep2: A Conversation with Jamie Bock

Caltech Professor of Physics Jamie Bock and his collaborators announced on March 17, 2014 that they have successfully measured a B-mode polarization signal in the...

Computer Scientist Makes a Power Play
From ACM Careers

Computer Scientist Makes a Power Play

A Binghamton University researcher aims to slash the energy used by computing systems ranging from smart phones to data centers.

Three Questions For Leslie Lamport, Winner of Computing's Top Prize
From ACM Opinion

Three Questions For Leslie Lamport, Winner of Computing's Top Prize

This year's winner of the Turing Award—often referred to as the Nobel Prize of computing—was announced yesterday as Leslie Lamport, a computer scientist whose research...

All Hacking Eyes on the Prize Money at Cansecwest
From ACM Careers

All Hacking Eyes on the Prize Money at Cansecwest

When it comes to hacking, it turns out that greed really is good.

Stanford Students Show Phone Record Surveillance Can Yield Vast Amounts of Information
From ACM News

Stanford Students Show Phone Record Surveillance Can Yield Vast Amounts of Information

The National Security Agency's mass surveillance of telephone metadata could yield detailed information about the private lives of individuals far beyond what the...

5 Things That Will Remake Big Data in the Next 5 Years
From ACM Opinion

5 Things That Will Remake Big Data in the Next 5 Years

Big data has evolved a lot of the past few years; from a happy buzzword to a hated buzzword, and from a focus on volume to a focus on variety and velocity.

Computer Science: The Learning Machines
From ACM News

Computer Science: The Learning Machines

Three years ago, researchers at the secretive Google X lab in Mountain View, California, extracted some 10 million still images from YouTube videos and fed them...

Federal Agencies Embrace New Technology and Strategies to Find the Enemy Within
From ACM News

Federal Agencies Embrace New Technology and Strategies to Find the Enemy Within

After years of focusing on outside threats, the federal government and its contractors are turning inward, aiming a range of new technologies and counterintelligence...

Stanford Engineers Create a Software Tool to Reduce the Cost of Cloud Computing
From ACM News

Stanford Engineers Create a Software Tool to Reduce the Cost of Cloud Computing

We hear a lot about the future of computing in the cloud, but not much about the efficiency of the data centers that make the cloud possible.

Language Barriers
From ACM Opinion

Language Barriers

The British scientist and polymath Stephen Wolfram has always had big ambitions.

Inside the New Arms Race to Control Bandwidth on the Battlefield
From ACM News

Inside the New Arms Race to Control Bandwidth on the Battlefield

An electromagnetic mystery in northern Iraq changed the course of Jesse Potter's life.

The One Good Thing About Cyberattacks
From ACM Careers

The One Good Thing About Cyberattacks

The normally humdrum world of IT security is heating up, and not just because of comedian Stephen Colbert's controversial closing keynote at last week's RSA Conference...

Meet the Seven People Who Hold the Keys to Worldwide Internet Security
From ACM News

Meet the Seven People Who Hold the Keys to Worldwide Internet Security

In a nondescript industrial estate in El Segundo, a boxy suburb in south-west Los Angeles just a mile or two from LAX international airport, 20 people wait in a...

Xi Jinping Leads Internet Security Group
From ACM News

Xi Jinping Leads Internet Security Group

President Xi Jinping will head the central Internet security and informatization leading group, according to a statement released after the first meeting of the...

TrustyCon's RSA Conference Rebels Promise More to Come
From ACM Careers

TrustyCon's RSA Conference Rebels Promise More to Come

What started as a one-man boycott of the annual RSA Conference here in response to the confab'sparent company's ties to the National Security Agency has begun to...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account