I never thought I'd ever hear myself utter such words post-1995. But after the reveal of the Surface tablet—complete with an ultra-thin, pressure-sensitive keyboard...Gizmodo From ACM Opinion | June 26, 2012
The big question: Is the iPhone a "bicycle for the mind," as the late Steve Jobs said about the first Mac, or a crutch that does too much of our thinking for us...Bloomberg Businessweek From ACM Opinion | June 25, 2012
About nine years ago, I had a question for Min Kao, the CEO of the GPS concern Garmin. His answer was determined, and I thought of it as I watched the news from...AllThingsD From ACM Opinion | June 22, 2012
When Alan Turing arrived to start work at the National Physical Laboratory at Teddington, south-west London, he was 33 years old. It was October 1945 and he was...BBC News From ACM Opinion | June 22, 2012
By closely connecting research and development Google is able to conduct experiments on an unprecedented scale, often resulting in new capabilities for the company...Alfred Spector, Peter Norvig, Slav Petrov From Communications of the ACM | July 1, 2012
All computer scientists know about the Universal Turing Machine, one of the foundation stones of theoretical computer science. Much less well known is the practical...Martin Campbell-Kelly From Communications of the ACM | July 1, 2012
On June 18, Microsoft beckoned 200 or so members of the media to a grimy, industrial part of Hollywood for what it described as a can’t-miss affair.Bloomberg Businessweek From ACM Opinion | June 20, 2012
June 23 marks the 100th birthday of Alan Turing. If I had to name five people whose personal efforts led to the defeat of Nazi Germany, the English mathematician...Arstechnica From ACM News | June 19, 2012
A store of information dubbed the "Knowledge Graph" now adds useful context and detail to the list of links that Google serves up.Technology Review From ACM News | June 15, 2012
If you're an experienced computer user, you probably remember explaining to newbies how a desktop computer worked: Your photos should go in this folder; your documents...The New York Times From ACM Opinion | June 15, 2012
Ross Miller made a good point about Apple's new flagship laptop, in his review for the Verge. Once you take into account that it has a solid-state drive, it's actually...Reuters From ACM Opinion | June 15, 2012
That little iPhone in your pocket is perfectly positioned to become a clone of the credit cards in your wallet or purse.The New York Times From ACM News | June 12, 2012
Has the U.S. government been caught with its virtual hands in the world's cookie jar? And might it lose control of the Internet as a consequence?MSNBC From ACM Opinion | June 12, 2012
Despite the massive amounts of computing power dedicated by search engine companies to crawling and indexing trillions of documents on the Internet, search engines...Arstechnica From ACM Opinion | June 8, 2012
The National Spelling Bee of 2023 started out like any other, but controversy enveloped the contest when Suzy Hamilton, an 8-year-old from Tulsa, emerged as the...The Wall Street Journal From ACM News | June 7, 2012
In December 2010, after we had reverse engineered the Stuxnet virus, I argued that the attackers must have known they would open Pandora's box. Others suggested...The New York Times From ACM Opinion | June 6, 2012
Until recently, the idea of holding a conversation with a computer seemed pure science fiction. If you asked a computer to "open the pod bay doors"—well, that was...Technology Review From ACM Opinion | June 5, 2012
A couple of days ago, I received an e-mail from Iran. It was sent by an analyst from the Iranian Computer Emergency Response Team, and it was informing me about...Wired From ACM Opinion | June 1, 2012
Two weeks ago, Steve Wozniak made a public call for Apple to open its platforms for those who wish to tinker, tweak and innovate with their internals. EFF supports...Electronic Frontier Foundation From ACM Opinion | May 30, 2012
From all indications, it would appear that attackers are continuing to attack and malware authors are carrying on writing malware.Threatpost From ACM Opinion | May 29, 2012