Take the stress out of job hunting with the IEEE Computer Society’s new, updated Career Center!
Search upcoming conferences in your technical domain and region. Don't forgot to sign up for conference open registration alerts!
Have you been looking for a way to make your mark in computing? Look no further than these calls. We want contributions from computing professionals who have interest and expertise from the many disciplines within the computing community!
An overview of how the world’s workforce is changing over the next decade and how to prepare for it.
Learn what goals you need to set and the people you should network with to advance in computing.
High-level summaries of the latest developments and discoveries in computing. Download reports, guides, predictions, and tips.
By Dr. Nachaat Mohamed
Human-computer communication has come a long way since the first computers were developed. Today, we use computers and other digital devices to communicate with each other, access information, and perform countless tasks. As technology evolves at an unprecedented rate, the future of human-computer communication looks more exciting than ever before.…
By IEEE Computer Society Team
We wrap up Asian and Pacific Islander Heritage Month with an Excellence in STEM interview with Dr. Yuhong Liu, an accomplished Associate Professor in the Department of Computer Science and Engineering at Santa Clara University. Dr. Liu brings valuable perspectives on fostering an inclusive environment, leveraging diverse voices, and overcoming…
By IEEE Computer Society Team
According to the United Nations, 68% of the world population is projected to live in urban areas by 2050. This will bring environmental, health, and social challenges as the population of cities swells. Communities will need to evaluate a range of technologies to address these and other urban challenges. A…
By Farwa Sajjad
The Internet of Things (IoT) has become integral to business operations. Gartner predicts that there will be approximately 25 billion IoT devices by 2025. As more devices are connected to the internet, more threats emerge that may cripple a business’s digital infrastructure. It’s 2023, and IoT security is still a…
By Hiral Rana
In the constantly evolving world of cybersecurity, attackers are always looking for new vulnerabilities to exploit. While cybersecurity technology continues to advance, so do the methods of cyberattacks. According to research, cyber crimes are forecasted to cost organizations an estimated $10.5 trillion annually by 2025 worldwide. Because of this, it…
By Eugene Zaremba
E-signatures provide a fast and convenient way to get important documents signed. However, it’s important that electronically signed documents are kept secure and can have their validity proven when necessary. There are several features of e-signatures that make this possible which we’re going to explore. First, let’s take a look…
Researchers from the Department of Education at UCLA and the Department of School Psychology and Educational Leadership at Idaho State University have studied the students taking an Intro to Computing course. The research uncovers who takes an Introduction to Computing class based on their major, minor, or whether they’re undecided,…
By Samar Satpalkar
In this age of digital transformation, it seems obvious that every department within the same business hierarchy at a company should be in complete lockstep when it comes to goals and objectives. Yet, this is not always the case when it comes to an IT department and its relationship to…
By IEEE Computer Society Team
Dr. Hui Lei is a Director of Engineering at Meta and a Fellow of the IEEE. With a Ph.D. in Computer Science from Columbia University, his expertise spans cloud computing, data, AI engineering, and IoT. As we celebrate Asian and Pacific Islander Heritage Month, we had the opportunity to speak…

By IEEE Computer Society Team
The early 2000s was a time of significant development and innovation in computer science. The IEEE Computer Society played an essential role in shaping the direction of computing research during this period. Influential research papers were published that paved the way for new technological advancements. This article shares 22 of…
By Stephanie Shank
Does it feel like everywhere you turn, you’re hearing about another cybersecurity incident? Another business, perhaps even in your industry, has fallen victim to a scam. Another threat to prepare for? This article is another warning – but don’t let that stop you from reading on. It’s true that cybercrime…
By IEEE Computer Society Team
Continuing with the Excellence in STEM interview series, the IEEE Computer Society team was privileged to interview Dr. Shaoshan Liu during Asian and Pacific Islander Heritage Month. Dr. Liu is a distinguished technologist with an entrepreneurship and public policy background. Throughout the interview, Dr. Liu sheds light on the importance…
By Dr. Jon Peddie
In 1983, NCR formed a team of six to design a graphics controller that could be used in NCR products and sold to other companies. The team designed a two-chip approach: a graphics controller and a memory interface controller tied together by a propriety pixel bus. The team incorporated a…
By Tim Ferguson
Integrating security initiatives at every stage of the SDLC is gaining momentum. That is, DevOps is fast evolving into a more holistic, security-first process, known as DevSecOps. The DevSecOps approach has gained momentum recently, but teams have a long way to go when implementing its methods. A recent Ponemon study…
LOS ALAMITOS, Calif., 5 May 2023 – Today, at the virtual Backdoor Attacks and Defenses in Machine Learning (BANDS) workshop during The Eleventh International Conference on Learning Representations (ICLR), participants in the IEEE Trojan Removal Competition presented their findings and success rates at effectively and efficiently mitigating the effects of…
By Sam Prasanth
With more job opportunities, better public infrastructure, and easier access to essential resources available in urban centers across the globe, it’s no surprise that the population of our major cities continues to measurably outpace most rural environments. This can be seen in data suggesting 80% of global GDP is generated…
By Gilad David Maayan
Serverless authorization refers to a method of securing serverless applications, where the underlying infrastructure is managed by a cloud provider and runs functions in response to events. This authorization process ensures that only authorized users or systems can access the resources, data, or functions in the serverless application. Serverless authorization…
By Dr. Jon Peddie
ATI had been experimenting with the concepts of a unified shader since the mid-2000s. ATI, like Nvidia and Microsoft, knew it was extravagant to have a shader, or even worse, an array of shaders dedicated to one function, and then sit idle when processing that function wasn’t called for. Making…
LOS ALAMITOS, Calif., 3 May 2023 – The IEEE Computer Society (IEEE CS) has selected Keshav Pingali to receive the 2023 IEEE CS Charles Babbage Award for his “contributions to high-performance compilers and graph computing.” At The University of Texas at Austin, Pingali is the W.A. “Tex” Moncrief Chair of…
LOS ALAMITOS, Calif., 3 May 2023 – IEEE Computer Society announces that Kristen Grauman, a professor in the Department of Computer Science, has been awarded the Edward J. McCluskey Technical Achievement Award by the Institute of Electrical and Electronics Engineers. The award recognizes outstanding and innovative contributions to the fields…
There are no results for this search.
Analysis, Blogs, Commentary
Featured Podcasts