From ACM Careers
Canonical's Open Documentation Academy aims to help newcomers participate in the open source community, offering mentorship and…
BNN| February 28, 2024
The United States appears poised to heighten scrutiny of Chinese investment in Silicon Valley to better shield sensitive technologies seen as vital to U.S. national...Reuters From ACM News | June 14, 2017
In the minds of many in Silicon Valley and in the auto industry, it is inevitable that cars will eventually drive themselves.
The New York Times From ACM Opinion | June 9, 2017
Sandia National Laboratories physicist Peter Marleau has developed a method for verifying warhead attributes without revealing sensitive design information.
Sandia National Laboratories From ACM Careers | June 9, 2017
Chinese education authorities have gone high-tech to catch cheaters as millions of high-school students take their "gaokao", the annual university entrance exam...Reuters From ACM Careers | June 8, 2017
It started about seven years ago. Iran's top nuclear scientists were being assassinated in a string of similar attacks: Assailants on motorcycles were pulling up...The New York Times From ACM Careers | June 7, 2017
People who use fake profiles online could be more easily identified, thanks to a new tool developed by computer scientists at the University of Edinburgh.
niversity of Edinburgh From ACM Careers | June 7, 2017
The nation's top-level intelligence office, the Director of National Intelligence, wants to find "the most accurate unconstrained face recognition algorithm."
Ars Technica From ACM News | June 1, 2017
On New Year's Eve in 2015 local and federal agents arrested a 26-year-old man in Rochester, N.Y., for planning to attack people at random later that night using...Scientific American From ACM News | May 26, 2017
By analyzing network traffic going to suspicious domains, security administrators could detect malware infections weeks or even months before they're able to capture...Georgia Institute of Technology From ACM Careers | May 23, 2017
Companies without cyber insurance are dusting off policies covering kidnap, ransom and extortion in the world's political hotspots to recoup losses caused by ransomware...Reuters From ACM Careers | May 19, 2017
Computer scientists used a light-up virtual display, autocorrect algorithms, and a physical keyboard to assist head-mount-display users inputting text for home...Michigan Technological niversity From ACM Careers | May 9, 2017
Headlines about mass data breaches have become ominously routine, and yet password convenience still trumps security for most people.
Bloomberg Technology From ACM Careers | May 9, 2017
In October, when malware called Mirai took over poorly secured webcams and DVRs, and used them to disrupt internet access across the United States, I wondered who...The Atlantic From ACM Opinion | May 1, 2017
Hyperion malware detection technology developed at the U.S. Department of Energy's Oak Ridge National Laboratory will move to the commercial market as part of a....S. DHS Science & Technology Directorate From ACM Careers | May 1, 2017
Last year, Capt. Sean Ruddy and his team of operator-soldiers from the US Cyber Brigade entered a Locked Shields, a NATO-organized cyber-defense war game that pits...Wired From ACM Careers | May 1, 2017
Microsoft will build computers even more sleek and beautiful than Apple's. Robots will 3-D-print cool shoes that are personalized just for you.
Wired From ACM Careers | April 28, 2017
The same week that President Trump issued his hire American executive order, the president of one of China's top tech companies said his company wants to do the...NPR From ACM Opinion | April 21, 2017