Relevant news, analysis, and blogs to keep you best informed, based on world-class research and thought leadership.
In literature, the classics have long been a staple of summer reading lists. Computer security has its own share of classics, too -- reference points that serve as a foundation for understanding the field’s ever-changing chessboard of attack and defense. This list can be enjoyed the next time you're lounging on the beach.
Innovations in services applications are transforming industry in profound ways, enabling information and computing tech to perform business services more efficiently. It also involves building autonomous infrastructures that require minimal human involvement.
How a woman named "Steve" became one of Britain’s most celebrated IT pioneers, entrepreneurs, and philanthropists
In the realm of computing pioneers, Dame Stephanie “Steve” Shirley is one of the most celebrated, not only for building a $3 billion tech empire in 1960s England, but for doing it with an all-female, work-from-home staff of professionally qualified women who had left the work force.
To kick off our 2019 career features, we interviewed Christine Miyachi, who has almost 30 years of experience working for startups and large corporations. She also writes a blog about software architecture.
A new report from the IEK Consulting of Industrial Technology Research Institute assesses the 2030 market perspectives and policy plans of major Asian countries and lists the 10 most crucial advanced technologies that will affect the Asian region by 2030.
IEEE Computer Society President Cecilia Metra welcomes readers to a newly designed website at Computer.Org.
As smart cities are fast becoming the norm, computing experts search for even better ways to fight big-city problems like reducing traffic and pollution.
At first, they laughed at her. Back then, there was mechanical & aerospace engineering. But in the 60s, software engineering was unheard of. That's when Margaret Hamilton trailblazed.
Today it eats our world. Pioneers recall its origins: "No school existed for learning how to build software. You were on your own....Little did we know that what we were doing then would become known years later as 'software engineering.'"
Loading Tech News Entries
By Steve Habazin
The rise of the Internet and its permeating influence on our daily lives sees no limits. From personal social media engagement to how we do business, a lot is stored and done in “the cloud.” To think there’s an entire space dedicated to our virtual activities may have been unbelievable…
IEEE ITSC 2019 Conference: Join a New Project on Reliable, Safe, Secure and Time Deterministic Intelligent Systems
By Michael Martinez
Learn about IEEE Digital Reality Initiative and the new project on Reliable, Safe, Secure and Time Deterministic Intelligent Systems at ITSC 2019! IEEE Computer Society and IEEE Digital Reality Initiative recently launched a project on Reliable, Safe, Secure and Time Deterministic Intelligent Systems. Systems capable of making autonomous decisions based…
By Larry Alton
Many new tech entrepreneurs want to launch an app or platform that provides some measure of cloud functionality. It’s popular, convenient, and cost-effective, allowing you to sell a monthly subscription service instead of selling one instance of a product. On top of that, it grants you the ability to scale…
By Jon Peddie
A book everyone interested in big data and visualization should read We are awash in data. We know it, but it’s like the weather, we can’t manage it. We are struggling to get a grip on it, understand it, use it and exploit it, but it is being generated faster…
Career Round Table: A Growing Trillion Dollar Software Market Desperately Needs Engineers. What You Need to Know, Part One
By Lori Cameron
Software experts predict AI, neural networks, testing, blockchain, and algorithms are among the next big things to create new, well-paying jobs in tech.
Career Round Table: With Demand for Data Scientists at an All-Time High, Top Experts Offer Sound Career Advice
By Lori Cameron
We asked leading big data experts to tell us what graduates and job-seekers can expect in the coming years as big data experiences massive growth. Here's what they had to say.
From AI to Integrated Platforms, Nextgen ALM Tools are on the Cutting Edge of Requirements Management
By Ferrnando Valera
Industries such as automotive and medical devices are experiencing a unique transformation in adopting new technologies that are not yet clearly regulated. For example, the software in car brakes is heavily regulated, but the AI software that drives the entire car isn’t. Moreover, many IT organizations have taken advantage of…
By Dr. Jon Peddie
Trying to transition from CAD to Commodity PCs the company developed a great chip Artist Graphics founded 1979 by Horace and Robert Beale, in Minneapolis released their first add-in board, the Artist 1 in November of 1982, based on an NEC 7220 and sporting a gigantic 1024 × 768 resolution.…
By Lucy Manole
Tech companies, exceptionally big tech firms are compensating their employees particularly well. No wonder excellent salary package is one of the main factors why people look for tech jobs.
By David Nicol, Editor in Chief, IEEE Security and Privacy
The owner of a small firm responds to an email apparently from the company’s bank, but as a result of the interaction the company’s bank account is cleaned out, wired to an account in Eastern Europe. The purchasing manager of a large company opens a spreadsheet which proports to come…
By Bhavani Thuraisingham
The applications of Machine Learning techniques have exploded in recent years due in part to advances in data science and high-performance computing. For example, it is now possible to collect, store, manipulate, analyze and retain massive amounts of data, and therefore the Machine Learning systems are now able to learn…
Software 2.0: How AI and Deep Learning Will Soon Write Code. This Automated Software Revolution Will Take Center Stage at ASE 2019.
By Lori Cameron
Not only will ASE 2019 reveal the latest AI-infused software innovations, but it will demonstrate exclusive automation and software tools that can help developers work smarter.
By Drew Hendricks
Check Facebook right now, and you’re likely to find a dozen videos vying for your attention. Which you watch depends on an enormous number of things: your mood, which color catches your eye, the company or individual who posted it, and more. But as far as performance video is concerned,…
By Rick Kuhn
Nearly 50 years have passed since the invention of the reference monitor concept for access control. A fundamental building block of computer security, a reference monitor was conceived as a non-bypassable component that was tamper-proof, always invoked, and small enough to allow assurance of its correctness. Inherent in this concept…
By Jeffrey Voas, FIEEE
Cybersecurity is an overused term. It is aged. It is worn out. It lacks technical meaning. It became popularized during decades of continuous, successful hacking events such as ransomware attacks, data breaches, network intrusions, spyware, etc. It became a well-known word to the general public through the media that reported…
By Anna Johansson
As a business owner, you can invest in the latest and greatest technology to keep your data safe and your systems secure. You can employ VPNs, firewalls, and end-to-end encryption to keep everything on lockdown. But no matter how much time or money you invest, the security of your organization…
By Anna Johansson
In 2019, using a secure internet network is more important than ever. Cybercriminals continually find new ways to gain access to personal information they later use or sell to others. If you’re not protected, your privacy is at risk. In theory, a Virtual Private Network (VPN) is a good way…
By Larry Alton
For IT management, few issues are more challenging or relevant than cybersecurity. And when it comes to CCTV and other forms of surveillance video footage, it’s important to implement a forward-thinking security plan to prevent confidential information and data from ending up in the wrong hands. CCTV as a Business…
By Neal Leavitt
If you own a dog or cat and love them like family, odds are your vet may have already recommended injecting a biochip transponder into Fido or Fluffy. The device basically serves as an RFID tag so if your pet runs away, you can track their whereabouts and hopefully recover…
There are no results for this search.
Analysis, Blogs, Commentary