In this episode of ACM ByteCast, Rashmi Mohan hosts 2020 ACM Grace Murray Hopper Award recipient Shyam Gollakota. He is a Torode Professor and leads the Networks and Mobile Systems Lab at the University of Washington's Paul G. Allen School of Computer Science & Engineering. Shyam is the recipient of many awards and recognitions, including a SIGMOBILE Rockstar award, 2021 Moore Inventor Fellowship, MIT Technology Review’s 35 Innovators Under 35, Popular Science ‘brilliant 10,’ and the Forbes’ 30 Under 30 list (twice). His group’s research has earned Best Paper awards at many top conferences, appeared in interdisciplinary journals like Nature, Nature Communications, Science Translational Medicine, and Science Robotics, and was named as an MIT Technology Review Breakthrough Technology of 2016 as well as Popular Science top innovations in 2015. Shyam's research covers a variety of topics, including mobile machine learning, networking, human-computer interaction, battery-free computing, and mobile health. He works across multiple disciplines including computer science, electrical engineering, mechanical engineering, biology, and medicine. His work has been licensed by ResMed Inc, led to three startups (Jeeva Wireless, Sound Life Sciences, and Wavely Diagnostics), and is in use by millions of users.
Use this reference for IT security practitioners to get an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and describes the necessary controls and processes that must be implemented in order to secure your organization's infrastructure.
In this course, you'll learn about components of cloud computing including storage, compute, data management, monitoring, code management, and process and deployment management. Investigate cloud deployment models (public, private, hybrid, and community) and serverless architectures such as Backend as a Service (BaaS) and Function as a Service (FaaS).
As of July 1, 2022, ACM Members no longer have to access the O’Reilly Learning platform as a benefit of ACM membership. Please finish your reading/training by 11:59 PM ET on June 30, 2022. To continue accessing O’Reilly past this date, you will have to contact O’Reilly and purchase a license directly (see special offer here). ACM will continue to explore new partnerships to deliver additional professional development benefits and other opportunities for lifelong learning.
The Ethical Hacker Practice Lab will provide you with the necessary platform to gain hands on skills in security. By completing the lab tasks you will improve your practical skills in Footprinting & Reconnaissance, Scanning Networks, Device & Device Enumeration, Social Engineering, System Hacking Concepts and Port & Process Monitoring.
By highlighting successful technical women who are leading diverse careers in the technology industry, ACM-W’s new webinar series, “Celebrating Technology Leaders,” aims to inform students and early-career professionals about the multitude of career options open to them.
Register now for the for the next free ACM TechTalk, "Seismic Shifts: Challenges and Opportunities in the 'Post-ISA' Era of Computer Systems Design", presented on Wednesday, July 27 at 2:00 PM ET/18:00 UTC by Margaret Martonosi, the Hugh Trumbull Adams '35 Professor of Computer Science at Princeton University. Will Tracz, former chair of ACM SIGSOFT and member of the ACM Professional Development Committee, will moderate the questions and answers session following the talk. Continue the discussion on ACM's Discourse Page.
Register now for the for the next free ACM TechTalk, "Secure Computation in Practice"," presented on Thursday, June 30 at 12:00 PM ET/16:00 UTC by Raluca Ada Popa, Robert E. and Beverly A. Brooks Associate Professor at UC Berkeley and recipient of the 2021 ACM Grace Murray Hopper Award. Natacha Crooks, Associate Professor at UC Berkeley, will moderate the questions and answers session following the talk. Continue the discussion on ACM's Discourse Page.
View the recent for the for the next free ACM TechTalk, "The Past, Present, and Future of Supply Chain Security," presented by Dan Lorenc, CEO of Chainguard. Maya Kaczorowski, Product Manager at Tailscale, moderated the questions and answers session following the talk. Continue the discussion on ACM's Discourse Page
View the recent ACM TechTalk, "Lessons From the Fifty-Year Quest to Turn Programmers into Software Engineers," presented by Adam Barr, book author and software consultant at Crosslake Technologies. Will Tracz, former chair of ACM SIGSOFT and member of the ACM Professional Development Committee, moderatered the questions and answers session following the talk. Continue the discussion on ACM's Discourse Page.
ACM Selects are themed shortlists curated by subject matter experts for both serious and emerging computing professionals, with the goal of providing new ways to discover relevant resources, either through ACM or authenticated by ACM-affiliated specialists. The latest Selects cover People in Computing #7: Women in Hardware and Programming Languages and Spotlight on Computing in Bangladesh.
Written by leading domain experts for software engineers, ACM Case Studies provide an in-depth look at how software teams overcome specific challenges by implementing new technologies, adopting new practices, or a combination of both. Often through first-hand accounts, these pieces explore what the challenges were, the tools and techniques that were used to combat them, and the solution that was achieved.
The Distinguished Speakers Program (DSP) is one of ACM's most valued outreach programs, providing universities, corporations, event and conference planners, and local ACM chapters with direct access to top technology leaders and innovators from nearly every sector of the computing industry. ACM will cover the cost of transportation for the speaker to travel to your event.