From ACM Careers
Canonical's Open Documentation Academy aims to help newcomers participate in the open source community, offering mentorship and…
BNN| February 28, 2024
For nearly 50 years, coins were the currency in New York’s subway and bus system. Tokens carried the next 40 years, until the MetroCard first slid into riders’...The New York Times From ACM News | February 27, 2013
The "Internet of Things" is great—we'll soon be able to build apps for our cars, thermostats, refrigerators, and more. But what happens when attackers get into...VentureBeat From ACM Opinion | February 27, 2013
Tesco—the company that runs a chain of grocery stores across Great Britain—uses digital armbands to track the performance of its warehouse staff.Wired From ACM Careers | February 22, 2013
The White House threatened China and other countries with trade and diplomatic action over corporate espionage as it cataloged more than a dozen cases of cyberattacks...The Wall Street Journal From ACM News | February 21, 2013
When Kevin Mandia, a retired military cybercrime investigator, decided to expose China as a primary threat to U.S. computer networks, he didn't have to consult...Associated Press From ACM Careers | February 21, 2013
A congressman gets an earful from his neighbor after church about a tax bill. A senator suddenly finds old high school classmates calling her about an upcoming...Politico From ACM Careers | February 20, 2013
When the Federal Trade Commission told the public it would give $50,000 to anyone who could devise an effective and convenient way to stop telemarketing robocalls...ArsTechnica From ACM Careers | February 19, 2013
A multinational security firm has secretly developed software capable of tracking people's movements and predicting future behaviour by mining data from social...The Guardian From ACM News | February 19, 2013
The Pentagon sparked an uproar among troops and veterans when it revealed that a new high-level medal honoring drone pilots will rank above some traditional combat...Army Times From ACM News | February 15, 2013
DARPA's Active Authentication program is investigating using behavioral biometrics for online identity checks to address the frailty of password-based validation...DARPA From ACM Careers | February 15, 2013
The Pentagon plans a massive expansion of the joint U.S. Cyber Command, potentially creating a rare pocket of job growth for troops in a force otherwise constrained...DefenseNews From ACM Careers | February 14, 2013
Sandia National Laboratories computer science researcher Jeremy Wendt wants to figure out how to reduce the number of visitors that cyberanalysts have to check...Sandia National Laboratories From ACM Careers | February 13, 2013
Early on Halloween morning, members of Facebook's Computer Emergency Response Team received an urgent email from an FBI special agent who regularly briefs them...ArsTechnica From ACM News | February 12, 2013
For the past few months, some of the world's leading cryptographers have been keeping a closely guarded secret about a pioneering new invention.Slate From ACM Careers | February 12, 2013
Five years ago mobile phones were at the forefront of technology, by 2010 the focus was on tablet computers and now billions of yen, dollars and pounds are being...BBC News From ACM News | February 12, 2013
Google Inc. sees self-driving cars being available to consumers in three to five years. Regulators and the insurance industry aren't so sure it can happen that...Bloomberg From ACM News | February 8, 2013
When Kristian Kielhofner first heard that his company's new servers were crashing last summer, he worried that he might be facing a product recall.Wired From ACM Careers | February 8, 2013