Tech companies like Google, Facebook and Zynga are on a shopping spree. They're buying small startups with innovative products and apps. But, many times, the tech...NPR From ACM Careers | September 24, 2012
With the right approach, data mining can discover unexpected side effects and drug interactions.Neil Savage From Communications of the ACM | October 1, 2012
It's not easy to give over 1.3 billion people access to the internet—especially if that population is spread across a vast area that ranges from hinterland to sprawling...New Scientist From ACM News | September 18, 2012
The Internet tools of the Arab Spring have become the weapons of a new Arabian nightmare playing out at American diplomatic missions across North Africa and the...Politico From ACM News | September 14, 2012
Behind every Google Map, there is a much more complex map that's the key to your queries but hidden from your view.The Atlantic From ACM News | September 12, 2012
Google Earth: source of information, source of wonder, source of art. In 2010, Paul Bourke, a research associate professor at the University of Western Australia...The Atlantic From ACM News | September 11, 2012
Technology tends to cascade into the marketplace in waves. Think of personal computers in the 1980s, the Internet in the 1990s, and smartphones in the last five...The New York Times From ACM News | September 11, 2012
Reshaped and renamed by generations of developers and gentrifiers, the borders of New York City’s neighborhoods are often hazy at best. Yesterday's Chinatown is...The New York Times From ACM News | September 10, 2012
It was a tweet that fired the imagination like few others. On May 10, 2011, at 1:35 in the afternoon, Eric Brewer told the world he was redesigning the most important...Wired From ACM Opinion | September 5, 2012
Most major Websites these days maintain huge databases: Shopping sites have databases of inventory and customer ratings, travel sites have databases of seat availability...MIT News Office From ACM News | September 5, 2012
University of Texas (UT) at Dallas researchers have developed Frankenstein, a software system that can cloak itself as it steals and reconfigures information in...T Dallas News From ACM TechNews | August 29, 2012
Security researchers used malware to investigate large-scale Internet censorship in Egypt and Libya.Marina Krakovsky From Communications of the ACM | September 1, 2012
Just as remarkable as the power of mobility, over everything from love to learning to global development, is how fast it all happened. It is hard to think of any...Time From ACM News | August 20, 2012
When Google imagines the future of Web search, it sees a search engine that understands human meaning and not just words, that can have a spoken conversation with...The New York Times From ACM News | August 9, 2012
The growing use of information and communication technology is generating vast volumes of structured and unstructured data that present an opportunity that European...CORDIS News From ACM TechNews | August 3, 2012
Online behavioral advertising and sophisticated data aggregation have changed the face of advertising and put privacy in the crosshairs.Samuel Greengard From Communications of the ACM | August 1, 2012
The eight-person winning team used original computer algorithms to narrow the search space and then relied on human observation to move the pieces into their final...Tom Geller From Communications of the ACM | August 1, 2012
If you're a student of the privacy and tech law worlds (or you just read Ars) then you're probably familiar with last year's Supreme Court decision, Jones v. United...ArsTechnica From ACM News | July 19, 2012