Tech News

Relevant news, analysis, and blogs to keep you best informed, based on world-class research and thought leadership.

Recent Articles

Loading Tech News Entries
For 6 months only, gain free access to CiSE Nov/Dec 2020 special Issue devoted to how scientific computing, data science, and information visualization are helping combat COVID-19.
By Sid Mair
The U.S. government currently uses high-performance computing technology in a variety of ways and experts expect increased investment in artificial intelligence for use within the federal space.
By Schrödinger
Get the computing resources you need, when you need them, with the auto-scaling Virtual Clusters of Schrödinger in the Cloud.
By Antoinette Price
Products come in many shapes and sizes. They could be systems, services, goods, software or any combination of these, and range from a child’s toy, to complex safety-critical systems in an industrial plant.
By IEEE Computer Society Team
The Diversity and Inclusion Task Force presents Women in STEM, with Pierangela Samarati, Professor at the Department of Computer Science of the Università degli Studi di Milano, Italy. Her main research interests are data and applications security and privacy, especially in emerging scenarios. We are humbled to have had the opportunity to discuss…
By Michael Wong
Ultimately it is up to the diligence and intelligence of the software developer to produce a good algorithm design.
By Tushar Pandey
On November 8th 2018, the Amazon billionaire Jeff Bezos had his mobile phone “hacked” after receiving a WhatsApp message that had apparently been sent from the personal account of the crown prince of Saudi Arabia. Smartphones today are everywhere, and with such widespread use, it often becomes an easy target for attackers. Suffice to say, cybersecurity in the mobile world is now more important than ever before.
By Steven Bay
Internal vulnerabilities cannot be ignored. Employees have access, inside knowledge, and from time to time, if disgruntled, may be motivated to do significant damage to the organizations they support. As a trusted and cleared contractor at NSA, Snowden extracted millions of top secret documents and released them to the world.
By IEEE Computer Society Team
Discover innovations from outside your sphere of influence at HOST. Learn about new research that is critical to your future projects. Meet researchers and experts for inspiration, solutions, and practical ideas you can put to use immediately. Register here to secure your spot.
By Tiffani Iacolino
The expansion of technology in our business and in our lives has made cybersecurity a top of mind concern for enterprises, governments, and individuals. This month is Cybersecurity Awareness Month and it’s a good time to raise awareness about online safety, privacy, and cybersecurity. Cyber risks are constantly evolving at a rapid pace and business analysis practitioners are at…
By Dr. Jon Peddie
In 1997 3Dlabs developed its Glint Gamma processor, the first programmable transform and lighting (T&L) engine for its Glint workstation graphics chips and even coining the terms GPU—geometry processor unit, before Nvidia announced its graphics processor unit (GPU).
By Dr. Jon Peddie
In SLI mode, two Voodoo2 add-in-boards (AIBs) could run in parallel, with each one drawing every other line of the display.  The original Voodoo Graphics also had SLI capability but was only used in the arcade and professional markets.
By Matt Shealy
Much of the software code that serves as the base for blockchain and cryptocurrency has been developed using open source software. Developers from all over the world have contributed to create, manage and expand on the software. It’s this open source approach that has created opportunities for business and consumers to use the blockchain in new ways across society.
  Abstract: Does your audience daydream when you present? Are your talking points missing the mark? Does nervousness get the best of you? Could your delivery skills use a boost? If you answered yes to any of these questions, join us for the webinar, “Present With Impact,” where you will…
By Mehrdad Sharbaf, Professor, Innovative Strategic & Visionary Consultant, IEEE CLAS Computer Society Chair, and Past IEEE CLAS Chair
Internet of Things (IoT) or Internet of Intelligent Things is one of the most buzzing and discussed topic in business and research field today. The Internet of Things (IoT) refers to systems that involve computation, sensing, communication, and it involves the connection between humans, non-human physical objects, enabling monitoring, automation,…
By IEEE Computer Society Team
The Association for Computing Machinery (ACM) and IEEE Computer Society (IEEE CS) co-sponsor the Kennedy Award, which was established in 2009 to recognize substantial contributions to programmability and productivity in computing and significant community service or mentoring contributions. It was named for the late Ken Kennedy, founder of Rice University’s computer…
By IEEE Computer Society Team
The Diversity and Inclusion Task Force presents Women in STEM, with Ayanna Howard (Ph.D.), Linda J. and Mark C. Smith Professor and Chair of the School of Interactive Computing at the Georgia Institute of Technology. As a faculty appointment in the School of Electrical and Computer Engineering, and a member of the Board…
By James Riddle
Covid-19 caused a big shift to the cloud. However, I must admit that even without the pandemic, cloud-based tools were surging in popularity. Cloud computing-based technologies are one of the demanded and actively developing areas of the modern IT world. The use of cloud technologies in the educational process is…
By Anna Johansson
While Ruby and Python seem to be the most popular, Python is at the top of the list. Some programmers even prefer Python over JavaScript, despite JavaScript being the superior language.
By IEEE Computer Society Team
  Every year, technology penetrates more aspects of our lives and with this, important questions arise on how our data is being used and how secure it is stored. Let us pause this month to celebrate National Cybersecurity Awareness Month by recognizing and addressing these challenges. The IEEE Computer Society…
There are no results for this search.
   Inside Tech
   Analysis, Blogs, Commentary
   Featured Podcasts