Search For:

Displaying 1-39 out of 39 total
Statistical Machine Translation Gains Respect
Found in: Computer
By David Geer
Issue Date:October 2005
pp. 18-21
As business, finance, education, and the Internet become increasingly international and multilingual, Google and other organizations are investing more time, money, and talent into researching the effectiveness of machine-translation technologies.
 
Malicious Bots Threaten Network Security
Found in: Computer
By David Geer
Issue Date:January 2005
pp. 18-20
No summary available.
 
Whatever Happened to Network-Access-Control Technology?
Found in: Computer
By David Geer
Issue Date:September 2010
pp. 13-16
Although vendors developed network-access-control technology to cope with the threats organizations face from within their networks, NAC has not been as widely adopted as experts predicted.
 
Are Companies Actually Using Secure Development Life Cycles?
Found in: Computer
By David Geer
Issue Date:June 2010
pp. 12-16
As threats to applications have increased, developers have begun including security in their software design. Secure development life cycles are methodologies for accomplishing this, but are companies actually using SDLs?
 
Is It Really Time for Real-Time Search?
Found in: Computer
By David Geer
Issue Date:March 2010
pp. 16-19
Due largely to the rise of social networking, the Internet constantly receives large quantities of new material that traditional search technology won't find in real-time. Real-time search addresses this shortcoming.
 
The OS Faces a Brave New World
Found in: Computer
By David Geer
Issue Date:October 2009
pp. 15-17
Increasingly popular approaches such as virtualization, cloud computing, and application-development frameworks are changing the importance of the traditional operating system.
 
The Future of Mobile VoIP in the Enterprise
Found in: Computer
By David Geer
Issue Date:May 2009
pp. 15-18
Mobile VoIP offers many potential benefits but has not yet become widely popular for corporate use. However, technological advances may change this.
 
Networks on Processors Improve On-Chip Communications
Found in: Computer
By David Geer
Issue Date:March 2009
pp. 17-20
As microprocessors have become more complex, on-chip communications, traditionally handled by buses, have become a performance bottleneck. Chip makers are looking into network-on-chip systems to address this issue.
 
Reducing the Storage Burden via Data Deduplication
Found in: Computer
By David Geer
Issue Date:December 2008
pp. 15-17
Companies are collecting and storing huge amounts of data, much of it redundant. Many organizations are turning to data deduplication to reduce these huge information volumes, as well as the equipment and operational costs they entail.
 
Technology News
Found in: Computer
By David Geer
Issue Date:October 2008
pp. 16-19
IPv6 proponents are now supporting the once-criticized network address translation technology to enable communication between the two technologies and allow for an orderly transition to IPv6.
 
Improving Data Accessibility with File Area Networks
Found in: Computer
By David Geer
Issue Date:November 2007
pp. 14-17
To manage their complex information systems, many companies are turning to the use of file area networks, a new file-management approach.
 
For Programmers, Multicore Chips Mean Multiple Challenges
Found in: Computer
By David Geer
Issue Date:September 2007
pp. 17-19
Because they are unable to continue to effectively improve microprocessor performance by shrinking transistors and packing more of them onto single-core chips, vendors are building multicore chips that handle various parts of an application in parallel, an...
 
Vendors Upgrade Their Physics Processing to Improve Gaming
Found in: Computer
By David Geer
Issue Date:August 2006
pp. 22-24
Graphics-engine vendors are looking or ways to improve the processing of the calculations necessary to create more realistic effects and interactions between players and game objects.
 
UWB Standardization Effort Ends in Controversy
Found in: Computer
By David Geer
Issue Date:July 2006
pp. 13-16
There are two principal approaches to UWB technology, and companies have held off making products, hoping an IEEE standardization effort could yield one protocol on which they could focus their efforts.
 
Silicon Optics Aims to Combine the Best of Both Worlds
Found in: Computer
By David Geer
Issue Date:June 2006
pp. 16-19
To reduce the equipment costs and bring optical systems within the reach of more users, vendors are attempting to use CMOS technology to fabricate optical components on silicon.
 
Behavior-Based Network Security Goes Mainstream
Found in: Computer
By David Geer
Issue Date:March 2006
pp. 14-17
Behavior-based security recognizes attacks based on what they do rather than on whether their code matches strings used in a specific past incident.
 
Will Software Developers Ride Ruby on Rails to Success?
Found in: Computer
By David Geer
Issue Date:February 2006
pp. 18-20
Proponents claim that Ruby on Rails offers a fast, productive programming approach that produces reliable, clean applications more quickly, using less code.
 
Security of Critical Control Systems Sparks Concern
Found in: Computer
By David Geer
Issue Date:January 2006
pp. 20-23
Internet connectivity can make operations more convenient, but it also can leave critical industrial control systems vulnerable to the same attacks that threaten other online activities.
 
Building Converged Networks with IMS Technology
Found in: Computer
By David Geer
Issue Date:November 2005
pp. 14-16
Devices and services based on the IP Multimedia Subsystem convergence approach will support a wide range of voice, data, and multimedia services over a single IP infrastructure.
 
Eclipse Becomes the Dominant Java IDE
Found in: Computer
By David Geer
Issue Date:July 2005
pp. 16-18
One approach to making Java more competitive with other market contenders is to create an integrated development environment that would make working with it easier.
 
Security Technologies Go Phishing
Found in: Computer
By David Geer
Issue Date:June 2005
pp. 18-21
Antiphisihing technology is being developed to help fight the criminal practice of using fraudulent e-mail messages to steal financial information.
 
Industry Trends: Chip Makers Turn to Multicore Processors
Found in: Computer
By David Geer
Issue Date:May 2005
pp. 11-13
Computer performance has been driven largely by decreasing the size of chips while increasing the number of transistors they contain. In accordance with Moore?s law, this has caused chip speeds to rise and prices to drop. This ongoing trend has driven much...
 
Will Binary XML Speed Network Traffic?
Found in: Computer
By David Geer
Issue Date:April 2005
pp. 16-18
XML documents are large and inefficient to process and can become a burden on network, processor, and storage infrastructures. To alleviate this problem, some experts are proposing a thinner, binary XML.
 
Is It Time for Clockless Chips?
Found in: Computer
By David Geer
Issue Date:March 2005
pp. 18-21
Vendors are revisiting an old concept--the clockless chip--as they look for new processorapproaches to work with the growing number of cellular phones, PDAs, and other high performance, battery-powered devices.
 
Developments Advance Web Conferencing
Found in: Computer
By David Geer
Issue Date:February 2005
pp. 14-17
No summary available.
 
Hackers Get to the Root of the Problem
Found in: Computer
By David Geer
Issue Date:May 2006
pp. 17-19
Hackers are developing rootkits--a collection of tools they can install on a victim's computer to gain administrative access--that have more functionality, can hide themselves more effectively, and can better resist preventive measures.
 
Pervasive Medical Devices: Less Invasive, More Productive
Found in: IEEE Pervasive Computing
By David Geer
Issue Date:April 2006
pp. 85-88
<p>Wireless, robotic, and computer-backed medical devices are interfacing across the landscape, racing to accident scenes, performing surgery, and monitoring long-term care for young and old alike. With the potential for improved healthcare and long-...
 
In Brief: Grid-Based Modeling Technique Furthers Earthquake Risk Prediction
Found in: IEEE Distributed Systems Online
By David Geer
Issue Date:February 2006
pp. 5
A UK-based grid computing project merges two earthquake data modeling methods?one macro and one micro.
 
Nanotechnology: The Growing Impact of Shrinking Computers
Found in: IEEE Pervasive Computing
By David Geer
Issue Date:January 2006
pp. 7-11
Nanotechnology helps make the pervasive aspect of pervasive computing possible. To envision nanotechnology's potential, think about building things from the molecular level up. At that level, you can build in characteristics and capabilities that aren't re...
 
In Brief: IPv6 and Distributed Applications
Found in: IEEE Distributed Systems Online
By David Geer
Issue Date:December 2005
pp. 4
The next-generation Internet protocol, IPv6, is inching its way toward adoption. Asian countries are moving fastest, at least partly because of their great need for IPv6's expanded address space, but efforts in the US and Europe also signal growth.
 
Digital Rights Technology Sparks Interoperability Concerns
Found in: Computer
By David Geer
Issue Date:December 2004
pp. 20-22
No summary available.
 
Survey: Embedded Linux Ahead of the Pack
Found in: IEEE Distributed Systems Online
By David Geer
Issue Date:October 2004
pp. 3
Linux appears to be approaching dominance in embedded systems?a trend that might make it easier for developers to choose a platform, speeding embedded systems' growth on the whole.
 
Will Gesture-Recognition Technology Point the Way?
Found in: Computer
By David Geer
Issue Date:October 2004
pp. 20-23
No summary available.
 
E-Micropayments Sweat the Small Stuff
Found in: Computer
By David Geer
Issue Date:August 2004
pp. 19-22
No summary available.
 
Just How Secure Are Security Products?
Found in: Computer
By David Geer
Issue Date:June 2004
pp. 14-16
No summary available.
 
Will New Standards Help Curb Spam?
Found in: Computer
By David Geer
Issue Date:February 2004
pp. 14-16
<p></p>
 
Taking Steps to Secure Web Services
Found in: Computer
By David Geer
Issue Date:October 2003
pp. 14-16
<p>Organizations are investing considerable resources in Web services, an approach that comprises a set of platform-neutral technologies designed to ease the delivery of services over intranets and the Internet. Web services enable interoperability v...
 
Federated Approach Expands Database-Access Technology
Found in: Computer
By David Geer
Issue Date:May 2003
pp. 18-20
<p></p><p></p>
 
Software Developer Profession Expanding
Found in: IEEE Software
By David Geer
Issue Date:March 2006
pp. 112-115
Employment prospects for software developers are looking up. There?s a greater number of developer positions globally than there are qualified software engineers to fill them. This gap will continue to increase as the number of available jobs increases. Me...
 
 1