Tech News

Relevant news, analysis, and blogs to keep you best informed, based on world-class research and thought leadership.

Recent Articles

By Bhavani Thuraisingham
Abstract This article is based on a keynote address I gave virtually at the IEEE Computer Society’s International Conference on Data Engineering (ICDE) in May 2022. It first discusses the challenges faced by women and those from the under-represented communities in computer science careers and the benefits of a career…
By IEEE Computer Society
The Diversity and Inclusion Task Force presents Pride in STEM, with Dr. Alexander Gamero Garrido, Future Faculty Fellow at Northeastern University. Dr. Gamero Garrido talks about his challenge of finding spaces that cater to the intersection of identities, in his case, being gay and Hispanic. Continue reading to learn more…
By Viswanathan
Artificial intelligence, or AI, has spread its hands in almost all areas of our lives. According to Google CEO Sundar Pichai, Artificial Intelligence’s impact will be even more than fire and electricity for humans in the coming years. It has revolutionized all industry sectors and has turned out to be…
By IEEE Computer Society
The Diversity and Inclusion Task Force presents Pride in STEM, with Dr. John Samuel, Associate Professor at École Supérieure de Chimie Physique Électronique (CPE Lyon) and Associate Researcher at LIRIS Lab. It can be a challenge showing up with authenticity, but Dr. Samuel mentions we must first come out to…
By Pohan Lin
Modern businesses generate a lot of data in their daily dealings. This includes information on their customers, as well as internal data that lets them know how well they’re performing at any given time. The best companies leverage this data to give them the advantage they need. Data orchestration is…
By Tanhaz Kamaly
Data architecture’s just like regular architecture. In both spheres, principles underlying good architecture should be observed. Sure, there’ll be certain designs that work well for a broad swathe of applications and other designs that are a little more niche, but no matter the exact nature of the structure, you can…
By Indy Gupta
 Impostor Syndrome! When you doubt your skills and capabilities, and feel you might be an impostor or a “fraud” in your professional circles. In this week’s episode: Seven prominent Computer Scientists from academia and industry talk about how they handle Impostor Syndrome, Failures, and Rejections. Featuring: Pratima Rao Gluckman (Engineering…
By IEEE Computer Society
The Diversity and Inclusion Task Force presents Pride in STEM, with Dr. Daniel Gillis, Associate Professor in the School of Computer Science at the University of Guelph. Dr. Gillis finds himself at the confluence of many communities and uses his background to not just talk about change, but build it!…
By Dr. Nachaat Mohamed
Windows Background Intelligent Transfer Service (BITS) is a service that was first included with Windows XP, and it allows applications to transfer files in the background without interrupting the user. When an application wants to send or receive a file, BITS queues requests and determines the best delivery time. If…
By Jean Smith
Data backup and disaster recovery is one that cannot be understated. It is an important part of any company’s IT infrastructure. The data that a company stores on a server or other storage device is the organization’s lifeblood. If it is not backed up, then there could be catastrophic consequences.…
By Indy Gupta
You have surely compared yourself to others at some point in your life. Perhaps you do it weekly or even daily, or without thinking! Computer Science is a pretty competitive profession, and some argue comparing oneself to others is a human instinct. The first of our remix episodes is here!…
By IEEE Computer Society
The Diversity and Inclusion Task Force presents Pride in STEM, with Didem Gurdur Broo, Marie Skłodowska-Curie Fellow at Stanford University. Didem echoes not only a call for representation, but also creating an environment where people from diverse backgrounds feel safe to stay in industry and academia.
By Stella Evans
As smart devices begin to become a norm in commercial buildings, data security risks do as well. All systems are gradually moving to the cloud, and as they transition there, the dangers that face them are different. You must consider the systems that protect your building to combat these new…
By Samantha Clayton
Navigating the digital transformation era requires a strong captain, and forward-thinking businesses opt for a CIO (Chief Information Officer) to steer the ship. Companies jumping on board (okay, that’s the last ship reference) to recruit a CIO for this task are not alone. In 2020, the total number of CIOs…
By Severine Hierso
Coding and programming languages are the building blocks of our modern digital world. But although the most significant developments in this field have happened within living memory, the history of coding and the timeline of programming languages is longer than you might think. It starts with surprising and remarkable people,…
By Jessica Day
There are many types of software, types of software development contracts, and types of software design patterns. The key to avoiding setbacks and keeping your dataflow moving in software design is simplicity. A big part of keeping your work simple is to be clear on the responsibilities of each segment…
By IEEE Computer Society
The Diversity and Inclusion Task Force presents Pride in STEM, with Griffin Solot-Kehl, a Developer Advocate at Dolby Laboratories. Griffin offers great advice for up-and-coming developers to be loud, build things, and make connections. He also sends a call to organizations to strive to create diverse and representative leadership.
By Tanhaz Kamaly
What is data management? Data Lifecycle Management (DLM) combines the best practices from the various stages of the data life cycle: production, data cleansing, data management, data protection, and data governance. It defines how the data is captured, prepared, transported, managed, analyzed, and governed at each phase of the data…
By Katrina Thompson
Modern Authentication is becoming a key element in IAM security, as well as a foundational pillar of Zero Trust security. More than 80% of all data breaches start with a compromised or stolen identity, according to the Verizon 2021 Data Breach Investigations Report. While traditional authentication continues to play a…
By IEEE Computer Society
The Diversity and Inclusion Task Force presents Pride in STEM, with Ivan Zhao, a student at Brown University studying applied mathematics and computer science. Not only did Ivan teach himself frontend development, design, and 3D modeling, but he’s also active with a publication reclaiming tech-optimism and a student-led venture fund.…
There are no results for this search.
   Inside Tech
   Analysis, Blogs, Commentary
   Featured Podcasts