Google and other online mapmakers revise borders depending on who is viewing them, in deference to diplomats, policymakers, and their own executives, according...The Washington Post From ACM TechNews | February 20, 2020
Local authorities in the U.S. and Europe use predictive governance algorithms to assess people's risk of criminality, and base probation, jail time, and other decisions...The New York Times From ACM TechNews | February 13, 2020
Researchers at cybersecurity firm Recorded Future report that eight of the top 10 software flaws most commonly exploited last year were associated with Microsoft...ZDNet From ACM TechNews | February 11, 2020
The U.S. Federal Aviation Administration has proposed new safety standards for specific unmanned-aircraft models, a significant step toward eventually authorizing...The Wall Street Journal From ACM TechNews | February 11, 2020
A new law in Illinois aims to give job candidates a better understanding of how companies use artificial intelligence to screen video interviews.
The Philadelphia Inquirer From ACM TechNews | January 31, 2020
Researchers have demonstrated a security flaw in the widely used SHA-1 security algorithm that would allow bad actors to fake files and the information within them...Nanyang Technological University (Singapore) From ACM TechNews | January 30, 2020