From ACM Careers
Canonical's Open Documentation Academy aims to help newcomers participate in the open source community, offering mentorship and…
BNN| February 28, 2024
As computer-based testing becomes more common across the country, cheaters and those trying to prevent it are going high-tech.The Wall Street Journal From ACM Careers | June 11, 2013
In 2008 U.S. troops in Iraq discovered that Shi’ite insurgents had figured out how to tap and record video feeds from overhead American drones. Now you too can...Wired From ACM News | June 10, 2013
A new algorithm solves a major problem with homomorphic encryption, which would let Web servers process data without decrypting it. From ACM Careers | June 10, 2013
Facebook, which once seemed poised to take over the Internet, is showing its limitations: a host of newer services are gaining ground among trend-setting youth;...Reuters From ACM Opinion | June 5, 2013
It was a Sunday afternoon in SoHo and while most New Yorkers were having brunch, Makeda Peters and her boyfriend were on a street corner craning their necks at...The New York Times From ACM News | June 3, 2013
The Soviet Union disappeared from the map more than two decades ago. But online an 'e-vil empire' is thriving.The Associated Press From ACM News | May 31, 2013
A few years ago, the National Security Agency, the country's top electronic spy agency, pondered a question with national security implications.The Salt Lake Tribune From ACM Careers | May 31, 2013
If the Internet is to reach everywhere—from the pills you swallow to the shoes on your feet—then computers will need to get a whole lot smaller.Technology Review From ACM News | May 30, 2013
The target computer is picked. The order to strike has been given. All it takes is a finger swipe and a few taps of the touchscreen, and the cyberattack is prepped...Wired From ACM News | May 29, 2013
Recently, the FBI has been attacking the "going dark" problem—that is, its inability to read all electronic communications—from both legal and technological angles...Slate From ACM Opinion | May 28, 2013
Last February, Astro Teller, the director of Google's secretive research lab, Google X, went to seek approval from Chief Executive Officer Larry Page for an unlikely...Bloomberg Businessweek From ACM Careers | May 28, 2013
The idea is to use airborne infra-red cameras to collect evidence, which could then be used to prosecute vandals who deface property at night.BBC News From ACM News | May 28, 2013
When Mailbox sold itself to Dropbox for a reported $100 million or so this March, the month-old iPhone app wasn’t even available to the public.Wired From ACM Opinion | May 24, 2013
Name a target anywhere in China, an official at a state-owned company boasted recently, and his crack staff will break into that person's computer, download the...The New York Times From ACM Careers | May 24, 2013
Microsoft announced a new version of the Xbox One earlier this week, and with it an improved and essentially reinvented version of Kinect, the company's body- and...Technology Review From ACM Careers | May 23, 2013
As much time as we spend with our cell phones and laptops and tablets, it's still pretty much a one-way relationship.Smithsonian magazine From ACM Careers | May 23, 2013
One of the many promising applications of quantum mechanics in the information sciences is quantum key distribution (QKD) in which the counterintuitive behavior...MIT News Office From ACM News | May 22, 2013
Researchers at the University of Alabama at Birmingham have uncovered new hard-to-detect methods that criminals may use to trigger mobile device malware. Such attacks...University of Alabama at Birmingham From ACM Careers | May 21, 2013