From ACM Careers
Canonical's Open Documentation Academy aims to help newcomers participate in the open source community, offering mentorship and…
BNN| February 28, 2024
The U.S. Department of Homeland Security's Transition to Practice program is giving cybersecurity technologies developed at the U.S. national laboratories a better...Sandia National Laboratories From ACM Careers | September 10, 2014
I teach theory and practice of social media at NYU, and am an advocate and activist for the free culture movement, so I’m a pretty unlikely candidate for internet...Medium From ACM Opinion | September 9, 2014
NATO leaders agreed on Friday that a large-scale cyber attack on a member country could be considered an attack on the entire U.S.-led alliance, potentially triggering...Reuters From ACM News | September 5, 2014
Los Alamos National Laboratory has licensed a compact random-number-generation technology to Whitewood Encryption Systems for use in commercial cryptographic systems...Los Alamos National Laboratory From ACM Careers | September 4, 2014
Security experts say the only hope of protecting corporate networks from hackers is something the industry calls "defense in depth."The New York Times From ACM Careers | September 3, 2014
Georgia State University computer science professor Xiaojun Cao says it's difficult to keep passwords 100% safe and secure, and suggests superior alternatives to...Georgia State University From ACM Careers | September 3, 2014
For all the positives social media provides, it can also open the door to deception, potentially wreaking havoc on people's lives both personally and professionally...University of Kentucky From ACM Careers | August 29, 2014
For all the talk about using big data and data science to solve the world’s problems—and even all the talk about big data as one of the world’s problems—it seems...GigaOm From ACM Opinion | August 28, 2014
Makers of surveillance systems are offering governments across the world the ability to track the movements of almost anybody who carries a cellphone, whether they...The Washington Post From ACM News | August 26, 2014
A team at the University of Alabama at Birmingham is investigating security and usability of next-generation CAPTCHAs based on simple computer games.University of Alabama at Birmingham From ACM Careers | August 26, 2014
China could have a new homegrown operating system by October to take on imported rivals such as Microsoft Corp, Google Inc and Apple Inc, Xinhua news agency said...Reuters From ACM News | August 25, 2014
Punk bands from Blondie to the Ramones once played in Broadway Studios, an age-worn 95-year-old neoclassical building surrounded by strip clubs in San Francisco’s...Technology Review From ACM News | August 22, 2014
Here's something you probably didn't expect in your inbox: Researchers have now developed a way to email brainwaves.Newsweek From ACM News | August 22, 2014
In a retired shore station for transpacific communications cables on the western coast of Vancouver Island sits a military computer in a padlocked cage.The Atlantic From ACM News | August 21, 2014
When most hackers are infiltrating computer systems, the last thing on their mind is getting caught, according to new data. From ACM News | August 14, 2014
As people grow more aware of government and criminal surveillance of their mobile devices and computers, a flurry of companies have recently launched products they...The Wall Street Journal From ACM Careers | August 14, 2014
Scholars are exhilarated by the prospect of tapping into the vast troves of personal data collected by Facebook, Google, Amazon, and a host of start-ups, which...The New York Times From ACM News | August 13, 2014
For one weekend every year, thousands of the world’s best—or worst, depending on your point of view—hackers meet in Las Vegas, Nevada, for Defcon.Time From ACM Opinion | August 12, 2014