The military has long needed computers that are tough enough on the outside to withstand the rough and tumble of the battlefield. Now, with the proliferation of...The New York Times From ACM News | June 25, 2012
That little iPhone in your pocket is perfectly positioned to become a clone of the credit cards in your wallet or purse.The New York Times From ACM News | June 12, 2012
When the Kinect was introduced in November 2010 as a $150 motion-control add-on to Microsoft's Xbox consoles, it drew attention from more than just video-gamers...The New York Times From ACM News | June 4, 2012
At 7:22:07 p.m. on a recent Thursday, an electronic alarm went off in the soundproof control room of a suburban office building here.The New York Times From ACM News | May 29, 2012
As the computer industry makes a radical shift to new modes of computing—in the cloud and on tablets and smartphones—Hewlett-Packard, a stalwart of the previous...The New York Times From ACM News | May 24, 2012
At the center of the uproar over a Google project that scooped up personal data from potentially millions of unsuspecting people is the company software engineer...The New York Times From ACM News | May 1, 2012
The Simons Foundation, which specializes in science and math research, has chosen the University of California, Berkeley, as host for an ambitious new center for...The New York Times From ACM News | May 1, 2012
In the event of another disaster at a nuclear power plant, the first responders may not be humans but robots.The New York Times From ACM News | April 10, 2012
Already surrounded by machines that allow him, painstakingly, to communicate, the physicist Stephen Hawking last summer donned what looked like a rakish black headband...The New York Times From ACM News | April 9, 2012
If you venture into a coffee shop in the coming months and see someone with a pair of futuristic glasses that look like a prop from "Star Trek," don’t worry.The New York Times From ACM News | April 5, 2012
Law enforcement tracking of cellphones, once the province mainly of federal agents, has become a powerful and widely used surveillance tool for local police officials...The New York Times From ACM News | April 2, 2012
During the five-month period between October and February, there were 86 reported attacks on computer systems in the United States that control critical infrastructure...The New York Times From ACM News | March 14, 2012
Just as NASA is on the cusp of answering the most fascinating questions about Mars—is there, was there or could there be life there?—the money needed to provide...The New York Times From ACM News | March 14, 2012
Think how convenient it would be if you could recharge electronic devices without ever having to plug them in—or even take them out of your briefcase.The New York Times From ACM News | March 12, 2012
The elusive hacker movement known as Anonymous has carried out Internet attacks on well-known organizations like Sony and PBS. In August, the group went after its...The New York Times From ACM News | February 28, 2012
These days, it’s hard to find a superlative that adequately describes Apple. But maybe simplest is best: biggest.The New York Times From ACM News | February 24, 2012
It wasn't so long ago that legions of people began walking the streets, talking to themselves. On closer inspection, many of them turned out to be wearing tiny...The New York Times From ACM News | February 23, 2012