Research vice presidents at some computing giants, such as Microsoft and IBM, rule over divisions housed in dedicated facilities carefully insulated from the rat...Technology Review From ACM Opinion | March 18, 2014
Browsers, brokers, and BIOS: You could safely call that triumvirate the past, present, and future of security, but you'd be wrong.Threatpost From ACM Opinion | March 17, 2014
What would you give for a retinal chip that let you see in the dark or for a next-generation cochlear implant that let you hear any conversation in a noisy restaurant...The Wall Street Journal From ACM News | March 17, 2014
Keeping track of what we reveal about ourselves each day—through email and text messages, Amazon purchases and Facebook "likes"—is hard enough.Newsweek From ACM Opinion | March 17, 2014
Big data has evolved a lot of the past few years; from a happy buzzword to a hated buzzword, and from a focus on volume to a focus on variety and velocity.GigaOm From ACM Opinion | March 13, 2014
I once worked with Steven Spielberg on the development of Minority Report, derived from the short story by Philip K. Dick featuring a future society that uses surveillance...Wired From ACM Opinion | March 12, 2014
Days after the disappearance of Malaysia Airlines Flight MH370 shortly after midnight on Saturday, investigators considering a range of possible causes—mechanical...The New York Times From ACM Opinion | March 12, 2014
Every year, just before South by Southwest Interactive starts, the froth starts churning. Everybody begins wondering what this year’s breakout hit app will be.Wired From ACM Opinion | March 11, 2014
In the last few days we've seen a spate of headlines like 2029: the year when robots will have the power to outsmart their makers, all occasioned by an Observer...Alan Winfield From ACM Opinion | March 10, 2014
For more than a year now, tens of millions of Americans have found time each day to devote themselves to an essential task: swiping at their phones and tablets...The New Yorker From ACM Opinion | March 10, 2014
Back when we first started getting reports of the Chinese breaking into U.S. computer networks for espionage purposes, we described it in some very strong language...The Atlantic From ACM Opinion | March 7, 2014
Edward Snowden could have been thwarted from leaking classified U.S. documents if the National Security Agency encrypted the information to make it unreadable,...Bloomberg From ACM Opinion | March 4, 2014
Shortly after Tim Cook succeeded Steve Jobs as CEO of Apple in August 2011, he told a confidant that he got up every morning reminding himself just to do the right...The Wall Street Journal From ACM Opinion | March 4, 2014