June 15, 2015 Virtual Reality Headsets Raise Very Real Concerns by NICK WINGFIELD By NICK WINGFIELD Users of the new generation of these devices will have to navigate the physical and emotional challenges of their real-life and…
June 15, 2015 IBM Invests to Help Open-Source Big Data Software — and Itself by STEVE LOHR By STEVE LOHR IBM plans to invest heavily in accelerating the adoption of the open-source big data software, Spark. With the move, IBM is…
June 13, 2015 New Internet Regulations Take Effect, and Web Users See No Change by REBECCA R. RUIZ By REBECCA R. RUIZ For all the buildup, the dawn of the new net neutrality rules was anticlimactic. For the average user weary of…
June 13, 2015 Favorite tweets We made it! Six Seasons! Thanks to the millions of new Yahoo users who are our most engaged audience across our network. #CommunityLivesOn —…
June 13, 2015 Recording a Phone’s Screen on a Mac by J. D. BIERSDORFER By J. D. BIERSDORFER Tips for mirroring your phone’s display on a Mac, and how to get desktop notifications from Gmail. Published: June 12,…
June 13, 2015 YouTube Takes On Amazon With New Gaming App by CONOR DOUGHERTY By CONOR DOUGHERTY Amazon beat Google to the acquisition of a popular gaming video service. Now Google is responding with a new YouTube Gaming…
June 13, 2015 Facebook Offers a Glimpse of Oculus Rift Goggles by QUENTIN HARDY By QUENTIN HARDY The company outlined ambitious plans for the virtual reality headset, but didn’t actually demonstrate the product. Published: June 11, 2015 at…
June 13, 2015 France Wants Google to Apply ‘Right to Be Forgotten’ Ruling Worldwide or Face Penalties by MARK SCOTT By MARK SCOTT The authorities want the ruling to apply to all of Google’s domains like Google.com, though the company contends that Europe’s privacy…
June 13, 2015 Jack Dorsey Returns to Twitter as Chief, to Shrugs and Quips by VINDU GOEL and MIKE ISAAC By VINDU GOEL and MIKE ISAAC Mr. Dorsey is a figure of legend to newer Twitter employees, and remembered with varying degrees of fondness…
June 12, 2015 Chinese Hackers Circumvent Popular Web Privacy Tools by NICOLE PERLROTH By NICOLE PERLROTH Exploiting a vulnerability in server software used by Chinese Internet portals, hackers were able to unmask visitors to sites deemed hostile…