From ACM Careers
Canonical's Open Documentation Academy aims to help newcomers participate in the open source community, offering mentorship and…
BNN| February 28, 2024
Nano-spirals with unique optical properties could be added to identity cards, currency, and other objects to make them almost impossible to counterfeit, researchers...Vanderbilt University From ACM Careers | June 4, 2015
A National Institute of Standards and Technology draft document lays out a framework for privacy risk management to anticipate and address information technology's...National Institute of Standards and Technology From ACM Careers | June 3, 2015
You might not need to remember complicated e-mail and bank account passwords much longer. A new study suggests that your brain's response to certain words could...Binghamton niversity From ACM Careers | June 2, 2015
Ever since Jim Balsillie and Mike Lazaridis stepped down as co-chairmen and co-chief executives of BlackBerry, neither has spoken much in public about the once-dominant...The New York Times From ACM Opinion | May 26, 2015
In a conference room nine floors above London's St. Giles High Street, a Russian engineer named Sasha booted up a computer and began giving me instructions.Advertising Age From ACM Careers | May 19, 2015
The race to make the first quantum computer is becoming as important as the race 75 years ago to get the first nuke. It could change the balance of power in politics...Newsweek From ACM Opinion | May 4, 2015
Verayo, an MIT spinout, uses random variations in silicon chips as authentication identifiers for consumer products.MIT News From ACM Careers | May 1, 2015
There's a vulnerability in Master Lock branded padlocks that allows anyone to learn the combination in eight or fewer tries, a process that requires less than two...Ars Technica From ACM Careers | April 30, 2015
Facebook, it seems, is unstoppable. The social publishing site, just 11 years old, is now the dominant force in American media.The Atlantic From ACM Careers | April 29, 2015
On the night of May 4, 2007, a tornado classified as a 5 on the Enhanced Fujita Scale reached the town of Greensburg, Kansas.Ars Technica From ACM Careers | April 29, 2015
The Pentagon’s new 33-page cybersecurity strategy is an important evolution in how America proposes to address a top national security threat. It is intended to...The New York Times From ACM Opinion | April 28, 2015
A research team at the Georgia Tech Research Institute is studying a range of security challenges involving field programmable gate arrays.Georgia Institute of Technology From ACM Careers | April 28, 2015
Somewhere near Iceland, a new NATO member, Berlya is under cyber-attack, most likely launched from its arch-rival Crimsonia, although the Berlyans can’t be completely...The Wall Street Journal From ACM News | April 24, 2015
Chris Roberts knows a lot about hacking planes. But not because he's trying to make them fall out of the sky.The Washington Post From ACM Careers | April 24, 2015
Iowa State University researchers measured brain activity to identify what might motivate an employee to violate company policy and sell or trade sensitive information...Iowa State University From ACM Careers | April 23, 2015
The Department of Homeland Security plans to open an office in California's Silicon Valley to recruit talent from the technology sector and build relationships...The Washington Post From ACM Careers | April 23, 2015
Earlier this year, the film Blackhat got high marks for realistic scenes in which hackers and information security specialists work at their computers to hunt down...The Wall Street Journal From ACM Careers | April 22, 2015