Tech News
Relevant news, analysis, and blogs to keep you best informed, based on world-class research and thought leadership.

Recent Articles

Loading Tech News Entries
By Drew Hendricks
Check Facebook right now, and you’re likely to find a dozen videos vying for your attention. Which you watch depends on an enormous number of things: your mood, which color catches your eye, the company or individual who posted it, and more. But as far as performance video is concerned,…
By Rick Kuhn
Nearly 50 years have passed since the invention of the reference monitor concept for access control.  A fundamental building block of computer security, a reference monitor was conceived as a non-bypassable component that was tamper-proof, always invoked, and small enough to allow assurance of its correctness.  Inherent in this concept…
By Jeffrey Voas, FIEEE
Cybersecurity is an overused term.  It is aged. It is worn out.  It lacks technical meaning. It became popularized during decades of continuous, successful hacking events such as ransomware attacks, data breaches, network intrusions, spyware, etc. It became a well-known word to the general public through the media that reported…
By Anna Johansson
As a business owner, you can invest in the latest and greatest technology to keep your data safe and your systems secure. You can employ VPNs, firewalls, and end-to-end encryption to keep everything on lockdown. But no matter how much time or money you invest, the security of your organization…
By Anna Johansson
In 2019, using a secure internet network is more important than ever. Cybercriminals continually find new ways to gain access to personal information they later use or sell to others. If you’re not protected, your privacy is at risk. In theory, a Virtual Private Network (VPN) is a good way…
By Larry Alton
For IT management, few issues are more challenging or relevant than cybersecurity. And when it comes to CCTV and other forms of surveillance video footage, it’s important to implement a forward-thinking security plan to prevent confidential information and data from ending up in the wrong hands. CCTV as a Business…
By Neal Leavitt
If you own a dog or cat and love them like family, odds are your vet may have already recommended injecting a biochip transponder into Fido or Fluffy.  The device basically serves as an RFID tag so if your pet runs away, you can track their whereabouts and hopefully recover…
By Michael Martinez
October is National Cybersecurity Awareness Month, and the Computer Society is bringing you daily tips, tools, and resources to celebrate. Check back daily for your tip of the day and be sure to sign up for our webinar featuring Steven Bay, the former NSA boss of Edward Snowden, who will explore the Snowden…
By Michael Martinez
Forrest Shull, assistant director for empirical research at Carnegie Mellon University’s Software Engineering Institute (SEI) and current First Vice President of the IEEE Computer Society, was elected as the society’s 2020 President-Elect and the 2021 President. Shull will serve as the 2021 President for a one-year term beginning January 2021. He is an…
By Lori Cameron
We asked a panel of healthcare technology experts to weigh in on what job-seekers can expect between now and 2026 when 2.4 million new healthcare jobs will be created.
By Lori Cameron
The IEEE International Conference on Data Mining (ICDM) provides an international forum for the presentation of original research, as well as practical innovations.
By Larry Alton
Recently, marketing experts have raised some serious concerns about the rise of AI-generated content and its ability to interfere with SEO rankings. The Verge, for example, reported on a website full of AI-generated content that, at least at first, all seemed plausible enough, until you realize they site people and…
By Anna Johansson
Most industries have undergone radical transformations in the past decade, thanks to the rapid development of new technology. But few industries have been changed as significantly as the real estate industry. Real estate agents, homebuyers, and current homeowners have all had to adapt to the new changes—and more changes are…
By Pekka Jääskeläinen and Michal Babej, Customized Parallel Computing Group, Tampere University, Finland
Heterogeneous-Compute Interface for Portability (HIP) is a runtime API and a conversion tool to help make CUDA programs more portable. It was originally contributed by AMD to the open source community with the intention to ease the effort of making CUDA applications also work on AMD’s ROCm platform. While AMD…
By Lori Cameron
Three women who have had an extraordinary impact in the field of computing offer sound advice on the age-old issue of gender relations.
By Lori Cameron
We asked leading experts in the "Internet of Things" to tell us what graduates and job-seekers can expect in the coming years. Here's what they predicted.
By Lori Cameron
Computer Society senior member Andre Gradvohl of the University of Campinas, Brazil Ministry of Education and São Paulo State Council of Education talks connected homes.
By Larry Alton
Technology brought us into the gig economy, which is now flourishing. In case you aren’t familiar, the “gig economy” refers to economic conditions where companies tend to hire people for “gigs,” or short-term, flexible work, and people are more interested in taking on many different contracts, clients, and opportunities, rather…
By Anna Johansson
The hardest part of being a security professional is thwarting preventable attacks caused by user error. Remote workers are especially prone to making these mistakes, and they’re driving security professionals crazy. 1.  Remote workers struggle to understand their role Everyone in the tech world understands the advantage IoT systems provide…
By Lori Cameron
As the global visualization market soars to $4.5 billion by 2025, innovators are working diligently to develop solutions that can handle the volume and complexity of data now being generated.
There are no results for this search.
   Inside Tech
   Analysis, Blogs, Commentary
   Featured Podcasts