Tech News
Relevant news, analysis, and blogs to keep you best informed, based on world-class research and thought leadership.

Recent Articles

Loading Tech News Entries
By Gilad Maayan
Despite security benefits, there are continuous reports of attackers exploiting unsecured cloud resources and attacking cloud services.
By Larry Alton
Most modern businesses rely heavily on data and analytics to operate successfully, but user errors can easily compromise the integrity of those data and analyses. If the accuracy or consistency of your data are compromised, you won’t be able to rely on the insights you gather. According to insightsoftware, “any…
By Andrej Kovačević
For as long as there have been corporations, there have been corporate mergers. The same goes for other types of businesses of all sizes and varieties. Already this year, there have been more than $2 trillion worth of mergers worldwide – and more are likely on the way. In the…
By Dr. Jon Peddie
A 1993 highly integrated graphics chip designed with a system focus In 1993, facing heavy competition from Sun, HP set the design goal for its new 32-bit HP 9000/712 workstation to reach performance levels of 1992-era workstations and servers at a fraction of their fabrication costs. Their target was the…
By Dr. Jon Peddie
2019 in review and guess at what’s coming It’s that time of year when we pause, take a breath and say, whoa, the year’s over? What happened? Where are we headed? As the above image portrays, it’s a lot clearer looking back than forward. 2019 was the year ray tracing…
By Anna Johansson
Business tools have come a long way in recent years and having access to the right ones can make or break a company. Analytics programs, in particular, have grown in importance. Headed into 2020, businesses need to assess their dashboard capacities to ensure they have ready access to the right…
By Gaurav Belani
Cybersecurity is all about staying ahead of threats rather than managing them later. Read on to know and prepare for the top cybersecurity threats that organizations will face in 2020.  
By Dave Oswill
When ensuring the successful deployment and adoption of a real-time streaming platform, system architects, data engineers, and security architects must address numerous challenges. This article highlights five such challenges that have the potential to negatively impact the usability, operation, maintenance, and security of the platform, as well as the data…
By Andrej Kovačević
Within technology circles, it’s not uncommon to encounter fierce debate about a variety of topics. In recent years, none have been more contentious than the battles over which cryptocurrency and blockchain pair will eventually come to dominate the rest. Since the beginning of the crypto wave, the clear consensus choice…
By Lori Cameron
IEEE VR brings together leaders, innovators, and influencers from around the world to disseminate the latest virtual reality research and advancements. Join us!
By Lori Cameron
The demand for the cloud—along with related fog and edge computing—has resulted in a corresponding demand for a workforce that can deliver top-tier services.
Connecting members worldwide, the Computer Society empowers the people who advance technology by helping individuals achieve goals at all stages of their professional careers.
By Lori Cameron
In keeping with IEEE's continued commitment to providing options to support the needs of all authors, IEEE is introducing an Open Journal for the IEEE Computer Society.  
By Lori Cameron
HOST 2020 facilitates much-needed discussions surrounding hardware-based security research and development, highlighting the latest innovations.
By Michael Martinez
The Air Force Science & Technology 2030 strategy is creating new opportunities for academia, large and small businesses, and other research organizations to turn their ideas into game-changing capabilities.
By Vladimir Getov
To find out, we must journey to the 1970s when the word “super” became fashionable with the newly introduced words “Superman," “supermodel," and "supermarket."
By Lori Cameron
We asked Jim O’Neill, CTO of Entegris, about the future of smart technology and what leaders in the semiconductor industry must change to meet the demands of 5G.
By Mehul Rajput
In the highly advancing and constantly changing technology environment, application security is no more an additional feature or an advantageous aspect of the application but has turned out as a necessity for the application to be a success in the market. For all the developers, app security remains to be…
By Drew Hendricks
The digital transformation has impacted nearly every industry.  Tech advances in the financial service industry, including banks and fintech enterprises, have led to fundamental changes in the way they operate. Nearly 72% of the U.S. population now has a smartphone.  The proliferation of mobile devices, along with smart devices in…
By Gilad Maayan
The increasing number of exploits, ransomware and lack of threat intelligence in organizations has resulted in a less effective endpoint threat detection and response. A recent Endpoint Security Report have shown that 42 percent of all endpoints are unprotected at any given time, and that 70 percent of security breaches originates in endpoints.
There are no results for this search.
   Inside Tech
   Analysis, Blogs, Commentary
   Featured Podcasts