When Edward Snowden met with reporters in a Hong Kong hotel room to spill the NSA's secrets, he famously asked them put their phones in the fridge to block any...Wired From ACM News | July 21, 2016
Microsoft pulled the strings. At least, that’s what Google and so many business and tech journalists said when the search giant first faced antitrust complaints...Wired From ACM News | July 15, 2016
Apple's new Swift Playgrounds iPad application is designed to teach novices how to code, using the Swift programming language with their mobile devices. Wired From ACM TechNews | July 15, 2016
Car-hacking demonstrations tend to get all the glory in the security research community—remotely paralyzing a Jeep on the highway or cutting a Corvette’s brakes...Wired From ACM News | July 14, 2016
For anyone who cares about Internet security and encryption, the advent of practical quantum computing looms like the Y2K bug in the 1990s: a countdown to an unpredictable...Wired From ACM News | July 7, 2016
In the age of big data analytics, the proprietary algorithms web sites use to determine what data to display to visitors have the potential to illegally discriminate...Wired From ACM News | June 29, 2016
In the past two years a group of researchers in Israel has become highly adept at stealing data from air-gapped computers—those machines prized by hackers that,...Wired From ACM News | June 29, 2016
This week, China's Sunway TaihuLight officially became the fastest supercomputer in the world. The previous champ? Also from China.Wired From ACM News | June 22, 2016
In the early 1970s, at Silicon Valley's Xerox PARC, Alan Kay envisioned computer software as something akin to a biological system, a vast collection of small cells...Wired From ACM News | June 14, 2016
If you follow the ongoing creation of self-driving cars, then you probably know about the classic thought experiment called the Trolley Problem.Wired From ACM News | June 9, 2016
University of Minnesota researchers are developing a system that monitors parking lots and provides a real-time count of spaces for truck drivers.Wired From ACM TechNews | June 9, 2016
Security flaws in software can be tough to find. Purposefully planted ones—hidden backdoors created by spies or saboteurs—are often even stealthier.Wired From ACM News | June 1, 2016
IBM's Watson supercomputer hardly needs any more resumé-padding. It’s already wonJeopardy, written a cookbook, and dabbled in revolutionizing healthcare. Wired From ACM News | May 13, 2016
Stingrays, a secretive law enforcement surveillance tool, are one of the most controversial technologies in the government’s spy kit.Wired From ACM News | May 9, 2016
Deep neural networks are remaking the Internet. Able to learn very human tasks by analyzing vast amounts of digital data, these artificially intelligent systems...Wired From ACM News | May 6, 2016