Both consumer electronics and apparel are notoriously difficult businesses competing in mature industries. Wearable technology—everything from activity trackers...Wired From ACM Opinion | November 20, 2013
The internet backbone—the infrastructure of networks upon which internet traffic travels—went from being a passive infrastructure for communication to an active...Wired From ACM Opinion | November 14, 2013
Since I started working with Snowden’s documents, I have been using a number of tools to try to stay secure from the NSA.Wired From ACM Opinion | October 9, 2013
When Apple bought AuthenTec for its biometrics technology—reported as one of its most expensive purchases—there was a lot of speculation about how the company would...Wired From ACM Opinion | September 9, 2013
We now know that every day, U.S. phone companies quietly send the government a list of who called whom and when—"telephony metadata"—for every call made on their...Wired From ACM Opinion | June 20, 2013
Physically, the NSA has always been well protected by miles of high fences and electrified wire, thousands of cameras, and gun-toting guards.Wired From ACM Opinion | June 14, 2013
When we talk about design nowadays, the focus has been on the lures (or dangers) of flat design and skeumorphism; whether there should be (or really are any) ...Wired From ACM Opinion | June 3, 2013
Last November, the Museum of Modern Art said that it had acquired 14 videogames, adding working copies and the source code of games like Tetris and The Sims to...Wired From ACM Opinion | May 30, 2013
We now live in a world where public servants informing the public about government behavior or wrongdoing must practice the tradecraft of drug dealers and spies...Wired From ACM Opinion | May 15, 2013
Apple's closed ecosystem is losing the battle for how we connect our mobile devices to accessories as open solutions like Bluetooth dominate over Apple's proprietary...Wired From ACM Careers | May 8, 2013