From ACM Careers
Canonical's Open Documentation Academy aims to help newcomers participate in the open source community, offering mentorship and…
BNN| February 28, 2024
A University of Michigan researcher is leading a project to build alternative computer hardware that could process images and video 1,000 times faster with 10,000...niversity of Michigan From ACM Careers | August 15, 2013
The new electron beam writer housed in the Nano3 cleanroom facility at the University of California, San Diego's Qualcomm Institute is important for two major areas...University of California, San Diego From ACM Careers | August 13, 2013
The U.S. National Security Agency, hit by disclosures of classified data by former contractor Edward Snowden, said Thursday it intends to eliminate about 90 percent...Reuters From ACM News | August 9, 2013
As computers have matured over time, the human brain has no way of keeping up with silicon's rapid-fire calculating abilities.Scientific American From ACM News | August 8, 2013
That iPad in your hand? It feels like the most modern of computers. But like the iPhone and the Macintosh, the Apple tablet revolves around a core piece of software...Wired From ACM Careers | August 8, 2013
As an undergraduate at Oxford University in the mid-1970s, K. Birgitta Whaley struggled to choose between chemistry and physics.Quanta Magazine From ACM Opinion | August 8, 2013
If something can connect to a network, it can be hacked. Computers and phones are still popular targets, but increasingly so are cars, home security systems, TVs...CNN From ACM News | August 6, 2013
Academic research institutions have experienced a significant increase in cyberinfrastructure resources since 2005, according to a new report from the U.S. National...National Science Foundation From ACM TechNews | August 5, 2013
At the Black Hat security conference in Las Vegas, a quartet of researchers, Alex Stamos, Tom Ritter, Thomas Ptacek, and Javed Samuel, implored everyone involved...ArsTechnica From ACM News | August 5, 2013
Law-enforcement officials in the U.S. are expanding the use of tools routinely used by computer hackers to gather information on suspects, bringing the criminal...The Wall Street Journal From ACM News | August 2, 2013
Vampir, a software development toolset, can analyze in detail a running application as it is executed on the hundreds of thousands of processors of the Titan supercomputer...Oak Ridge National Laboratory From ACM Careers | August 2, 2013
A research paper that was highlighted last year at an international symposium is the winner of the National Security Agency's first annual Science of Security (SoS)...National Security Agency From ACM Careers | August 1, 2013
Raymond Laflamme can't yet sell you a quantum computer. But he'll sell you a $13,000 logic board for measuring entangled photons.Technology Review From ACM Careers | July 31, 2013
The news out of Moscow of late has been dominated by Edward Snowden, the American leaker of secret state documents who is currently seeking temporary asylum in...Fortune From ACM News | July 30, 2013
Scientists in the fast-growing field of computational genomics are getting lots of data but lack the computer power needed to analyze it quickly.Johns Hopkins niversity From ACM Careers | July 16, 2013
Bug bounty programs can be as much as 100 times more cost-effective for finding security vulnerabilities than hiring full-time security researchers to do the same...Threatpost From ACM News | July 12, 2013
In 2006, when Tomás Palacios completed his PhD in electrical and computer engineering at the University of California at Santa Barbara, he was torn between taking...MIT News Office From ACM Careers | July 3, 2013