Playing a computer game once meant sitting on the couch and pushing buttons on a controller, but those buttons have been disappearing of late, replaced by human...The New York Times From ACM News | September 15, 2011
After racing and biking back roads on the San Francisco Peninsula for almost half a century without serious incident, on July 3 I crashed while riding downhill...The New York Times From ACM News | September 12, 2011
He claims to be 21 years old, a student of software engineering in Tehran who reveres Ayatollah Ali Khamenei, and despises dissidents in his country.The New York Times From ACM News | September 12, 2011
As concerns grow over data collection, including proposed legislation to more closely protect consumers, mobile applications developers are building basic privacy...The New York Times From ACM TechNews | August 15, 2011
European regulators are increasingly embracing the concept of giving people the right to be forgotten on the Web by providing them with greater control over their...The New York Times From ACM TechNews | August 10, 2011
The Pentagon is developing plans to use social networking sites like Facebook and Twitter as both a resource and a weapon in future conflicts. Its research and...The New York Times From ACM News | August 3, 2011
Mike Nichols has a poster on his office wall. It shows the young Muhammad Ali glaring down at a fallen Sonny Liston, the bruising heavyweight who had seemed invincible...The New York Times From ACM News | August 3, 2011
Imagine, if you will, a young Mark Zuckerberg circa 2003, tapping out mail messages from his Harvard dorm room. It's a safe bet he never would have guessed that...The New York Times From ACM News | July 26, 2011
Companies have long used criminal background checks, credit reports and even searches on Google and LinkedIn to probe the previous lives of prospective employees...The New York Times From ACM News | July 25, 2011
The robotics pioneer Rodney Brooks often begins speeches by reaching into his pocket, fiddling with some loose change, finding a quarter, pulling it out and twirling...The New York Times From ACM News | July 12, 2011
The hackers, calling themselves the A-Team, assembled a trove of private information and put it online for all to see: names, aliases, addresses, phone numbers...The New York Times From ACM News | July 5, 2011
A small group of Internet security specialists gathered in Singapore last week to start up a global system to make email and e-commerce more secure, end the proliferation...The New York Times From ACM News | June 27, 2011
With an innovative camera due out later this year from a company called Lytro, photographers will have one less excuse for having missed that perfect shot.The New York Times From ACM News | June 24, 2011
Not too long ago, theorists fretted that the Internet was a place where anonymity thrived. Now, it seems, it is the place where anonymity dies.The New York Times From ACM News | June 22, 2011
The Federal Bureau of Investigation is giving significant new powers to its roughly 14,000 agents, allowing them more leeway to search databases, go through household...The New York Times From ACM News | June 16, 2011
When Keila Fong arrived at Yale, she had never given much thought to computer science. But then last year everyone on campus started talking about the film "The...The New York Times From ACM News | June 14, 2011
The Obama administration is leading a global effort to deploy "shadow" Internet and mobile phone systems that dissidents can use to undermine repressive governments...The New York Times From ACM News | June 13, 2011