Already surrounded by machines that allow him, painstakingly, to communicate, the physicist Stephen Hawking last summer donned what looked like a rakish black headband...The New York Times From ACM News | April 9, 2012
If you venture into a coffee shop in the coming months and see someone with a pair of futuristic glasses that look like a prop from "Star Trek," don’t worry.The New York Times From ACM News | April 5, 2012
Law enforcement tracking of cellphones, once the province mainly of federal agents, has become a powerful and widely used surveillance tool for local police officials...The New York Times From ACM News | April 2, 2012
AT 7 years old, Gilad Elbaz wrote, "I want to be a rich mathematician and very smart." That, he figured, would help him "discover things like time machines, robots...The New York Times From ACM News | March 26, 2012
In 1988, a Cornell graduate student, Robert Tappan Morris, let loose a computer worm on the fledgling version of the Internet. He said it was meant to be an experiment...The New York Times From ACM News | March 22, 2012
During the five-month period between October and February, there were 86 reported attacks on computer systems in the United States that control critical infrastructure...The New York Times From ACM News | March 14, 2012
Hackers operating under the banner Anonymous have been poking a finger in the eye of one private company after another for two years now.
The New York Times From ACM News | March 7, 2012
The elusive hacker movement known as Anonymous has carried out Internet attacks on well-known organizations like Sony and PBS. In August, the group went after its...The New York Times From ACM News | February 28, 2012
These days, it’s hard to find a superlative that adequately describes Apple. But maybe simplest is best: biggest.The New York Times From ACM News | February 24, 2012
It wasn't so long ago that legions of people began walking the streets, talking to themselves. On closer inspection, many of them turned out to be wearing tiny...The New York Times From ACM News | February 23, 2012
Andrew Pole had just started working as a statistician for Target in 2002, when two colleagues from the marketing department stopped by his desk to ask an odd question...The New York Times From ACM News | February 17, 2012
A team of European and American mathematicians and cryptographers have discovered an unexpected weakness in the encryption system widely used worldwide for online...The New York Times From ACM News | February 16, 2012
When Kenneth G. Lieberthal, a China expert at the Brookings Institution, travels to that country, he follows a routine that seems straight from a spy film.The New York Times From ACM News | February 15, 2012
Workers in the digital era can feel at times as if they are playing a video game, battling the barrage of emails and instant messages, juggling documents, Web sites...The New York Times From ACM News | February 9, 2012
Stephen Wolfram, a 52-year-old scientist, software designer and entrepreneur, tends to go his own way—often with noteworthy results.The New York Times From ACM News | February 7, 2012