By adding a fingerprint scanner to its newest mobile phone, Apple Inc. is offering a tantalizing glimpse of a future where your favorite gadget might become a biometric...Reuters From ACM Opinion | September 12, 2013
Apple injected a lot of marketing hyperbole into its claims about the wonders of 64-bit computing when it showed off the A7 processor at the heart of the new ...CNET From ACM Opinion | September 12, 2013
Far from being the measure of disgrace it once was, failure now seems to be a sort of badge of honor. Somewhere along the way, it got to be uncool to reduce one's...Wired From ACM Opinion | September 11, 2013
The latest iPhone has arrived, and along with it what may be the slickest integration of biometric security yet: A fingerprint scanner built seamlessly into the...Forbes From ACM Opinion | September 11, 2013
There's a widely shared image on the Internet of a teacher's note that says: "Dear students, I know when you're texting in class. Seriously, no one just looks down...The Wall Street Journal From ACM Opinion | September 10, 2013
Exactly two decades ago, the RAND Corporation, an influential think tank, proclaimed that "cyberwar is coming!"New Scientist From ACM Opinion | September 10, 2013
The controversy over U.S. government surveillance has produced a king-size collection of strange bedfellows. Beneath the covers one finds both amusing ironies and...Bloomberg Businessweek From ACM Opinion | September 9, 2013
When Apple bought AuthenTec for its biometrics technology—reported as one of its most expensive purchases—there was a lot of speculation about how the company would...Wired From ACM Opinion | September 9, 2013
National Security Agency efforts to overcome encryption of online data weaken American security and undermine the government's duty to protect its own cyberinfrastructure...Indiana niversity From ACM Opinion | September 9, 2013
Now that we have enough details about how the NSA eavesdrops on the Internet, including today's disclosures of the NSA's deliberate weakening of cryptographic systems...The Guardian From ACM Opinion | September 6, 2013
If the Obama administration does conduct military strikes against Syria, as seems likely, it should use military cyber weapons at the earliest possible moment to...Defense One From ACM Opinion | September 6, 2013
At some point in the coming weeks, users of Apple iPhones and iPads will wake up to an alert that there is a new version of the company's mobile operating system...NPR From ACM Opinion | September 4, 2013
One difficulty of reporting on spy outfits like America's National Security Agency is the veil of secrecy they operate behind.The Economist From ACM Opinion | September 3, 2013
You must have seen the warning a thousand times: Too few young people study scientific or technical subjects, businesses can't find enough workers in those fields...IEEE Spectrum From ACM Opinion | September 3, 2013