I was shaking as I shouldered the rifle and peered through the scope at the small steel target 100 yards downrange.Wired From ACM Opinion | February 25, 2013
"Start asking security experts which powerful Washington institutions have been penetrated by Chinese cyberspies," report my colleagues Craig Timberg and Ellen...The Washington Post From ACM Opinion | February 25, 2013
At a NASCAR event on Saturday, debris created by a serious crash flew into the stands and injured a number of fans.GigaOm From ACM Opinion | February 25, 2013
Cloud computing has been around for some time now. But not many people believe they can do all their computing in the cloud. Not many, that is, outside the brainaics...Fortune From ACM Opinion | February 22, 2013
As the College of Cardinals prepares to elect a new pope, security people like me wonder about the process. How does it work, and just how hard would it be to hack...CNN From ACM News | February 21, 2013
Like the flap of a butterfly's wings causing a hurricane half a world away, the ripples of unintended consequences from Ron Rosenbaum's "Secrets of the Little Blue...The Atlantic From ACM Opinion | February 21, 2013
Admittedly, mobile technology evolves at a very fast pace. But somewhere along the way we seem to have skipped an entire generation of networks.GigaOm From ACM Opinion | February 21, 2013
There's no arguing that Apple set the standard for modern mobile devices with the iPhone and the iPad. It didn't take long after those two products launched for...CNN From ACM Opinion | February 20, 2013
It turns out that President Barack Obama’s head-scratching mention of a project to map the human brain in his most recent State of the Union speech was more than...The Washington Post From ACM Opinion | February 20, 2013
Great design, the management expert Gary Hamel once said, is like Justice Potter Stewart's famous definition of pornography—you know it when you see it.The New York Times From ACM Opinion | February 20, 2013
The combination of man and machine has been so entrenched in our popular culture that for many, the idea that you could attach a sensor to a mouse brain which enables...GigaOm From ACM Opinion | February 19, 2013
The world needs a new international legal instrument on cyberspace, in light of the new waves of trans-border cyberattacks that have become a disturbing aspect...The Christian Science Monitor From ACM Opinion | February 15, 2013
Steve Jobs couldn't hide his frustration. Asked at a technology conference in 2010 whether Apple might finally turn its attention to television, he launched into...Technology Review From ACM Opinion | February 15, 2013
The Department of Homeland Security's Office for Civil Rights and Civil Liberties has determined that the DHS’s warrantless, and often suspicion-less, search and...Threatpost From ACM Opinion | February 13, 2013
With the reintroduction of the much-maligned Cyber Intelligence Sharing and Protection Act scheduled for the day after the State of the Union, the House of Representatives...Forbes From ACM Opinion | February 13, 2013
It was the late Steve Jobs' worst nightmare. A powerful Asian manufacturer, Samsung Electronics Co Ltd, uses Google Inc's Android software to create smartphones...Reuters From ACM Opinion | February 12, 2013
When John Brennan, President Obama's choice to be the next head of the CIA, appeared before a Senate committee yesterday, one question supplanted all others at...Smithsonian magazine From ACM Opinion | February 8, 2013