acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectHuman Computer Interaction
authorThe New York Times
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


The Human Voice, as Game Changer
From ACM News

The Human Voice, as Game Changer

Vlad Sejnoha is talking to the TV again.

Google Begins Testing Its Augmented-Reality Glasses
From ACM News

Google Begins Testing Its Augmented-Reality Glasses

If you venture into a coffee shop in the coming months and see someone with a pair of futuristic glasses that look like a prop from "Star Trek," don’t worry.

Police Are Using Phone Tracking as a Routine Tool
From ACM News

Police Are Using Phone Tracking as a Routine Tool

Law enforcement tracking of cellphones, once the province mainly of federal agents, has become a powerful and widely used surveillance tool for local police officials...

The Snails of War
From ACM News

The Snails of War

The electric snail is here. There's an electric cockroach too.

Bypassing the Password
From ACM TechNews

Bypassing the Password

The U.S. Defense Advanced Research Projects Agency wants to see an alternative to passwords and is supporting work that would confirm a computer user's identity...

New Interest in Hacking as Threat to Security
From ACM News

New Interest in Hacking as Threat to Security

During the five-month period between October and February, there were 86 reported attacks on computer systems in the United States that control critical infrastructure...

Automatic Recharging, From a Distance
From ACM News

Automatic Recharging, From a Distance

Think how convenient it would be if you could recharge electronic devices without ever having to plug them in—or even take them out of your briefcase.

The First Google Maps War
From ACM News

The First Google Maps War

Did Google Maps almost cause a war in 2010? On Nov. 3 of that year, Edén Pastora, the Nicaraguan official tasked with dredging the Rio San Juan, justified his country's...

The Bright Side of Being Hacked
From ACM News

The Bright Side of Being Hacked

Hackers operating under the banner Anonymous have been poking a finger in the eye of one private company after another for two years now.  

Et Tu, Google? Android Apps Can Also Secretly Copy Photos
From ACM News

Et Tu, Google? Android Apps Can Also Secretly Copy Photos

It's not just Apple. Photos are vulnerable on Android phones, too.

For Impatient Web Users, an Eye Blink Is Just Too Long to Wait
From ACM News

For Impatient Web Users, an Eye Blink Is Just Too Long to Wait

Wait a second. No, that's too long.

Microsoft Ponders Future of Kinect, Tech
From ACM News

Microsoft Ponders Future of Kinect, Tech

When Microsoft thinks about the future of technology, it seems to do so with its stomach.

In Attack on Vatican Web Site, a Glimpse of Hackers' Tactics
From ACM News

In Attack on Vatican Web Site, a Glimpse of Hackers' Tactics

The elusive hacker movement known as Anonymous has carried out Internet attacks on well-known organizations like Sony and PBS. In August, the group went after its...

A Law Apple Would Like to Break
From ACM News

A Law Apple Would Like to Break

These days, it’s hard to find a superlative that adequately describes Apple. But maybe simplest is best: biggest.

Behind the Google Goggles, Virtual Reality
From ACM News

Behind the Google Goggles, Virtual Reality

It wasn't so long ago that legions of people began walking the streets, talking to themselves. On closer inspection, many of them turned out to be wearing tiny...

How Companies Learn Your Secrets
From ACM News

How Companies Learn Your Secrets

Andrew Pole had just started working as a statistician for Target in 2002, when two colleagues from the marketing department stopped by his desk to ask an odd question...

From ACM News

Flaw Found in an Online Encryption Method

A team of European and American mathematicians and cryptographers have discovered an unexpected weakness in the encryption system widely used worldwide for online...

Traveling Light in a Time of Digital Thievery
From ACM News

Traveling Light in a Time of Digital Thievery

When Kenneth G. Lieberthal, a China expert at the Brookings Institution, travels to that country, he follows a routine that seems straight from a spy film.

From ACM Careers

The Age of Big Data

Good with numbers? Fascinated by data? The sound you hear is opportunity knocking.

In Data Deluge, Multitaskers Go to Multiscreens
From ACM News

In Data Deluge, Multitaskers Go to Multiscreens

Workers in the digital era can feel at times as if they are playing a video game, battling the barrage of emails and instant messages, juggling documents, Web sites...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account