The IT History Society (ITHS) is a world-wide group of over 500 members working together to assist in and promote the documentation, preservation, cataloging, and researching of Information Technology (IT) history. We offer a place where individuals, academicians, corporate archivists, curators of public institutions, and hobbyists alike can gather and share information and resources. This catalog of resource sites concerning IT history is the only one of its kind and is a valuable resource for IT historians and archivists alike.
TIMESTAMPS
The Wayback Machine - https://web.archive.org/web/20160702193337/https://www.computer.org/web/computingnow
'); overlayDIV.data("fullURL", listItemModel.attributes.url); overlayDIV.data("target", listItemModel.attributes.target); overlayDIV.css({"width":"100%", "height":"100%"}); overlayDIV.click(function() { var fullURL = $(this).data("fullURL"); var target = $(this).data("target"); $(".overlayScreen_13wM").css({"opacity":"0", "filter":"alpha(opacity = 0)"}); $(this).css({"opacity":"0.3", "filter":"alpha(opacity = 30)"}); if ( type == "supplement" || target == "_blank" ) { $("#externalLinkForm_13wM").attr("action", fullURL); $("#externalLinkForm_13wM").submit(); } else { $("#contentAndControlsContainer").fadeOut(300, function() { var encodedTitle = escape(listItemModel.attributes.urlTitle); var url = "/web/computingnow/rest/-/api/" + listItemModel.attributes.type + "/" + listItemModel.attributes.groupId + "/" + encodedTitle; $.ajax({ type: 'POST', url: url, success: function(data) { var jsonData = eval('(' + data + ')'); var status = jsonData.status; var body = jsonData.body; var title = jsonData.title; var displayDate = jsonData.displayDate; var creator = jsonData.creator; var urlTitle = jsonData.urlTitle; var comments = jsonData.commentArray; var pageTitle = jsonData.pageTitle; var articleSource = jsonData.articleSource; var headerImagePath = jsonData.headerImagePath; var commentParentId = jsonData.commentParentId; var commentParentType = jsonData.commentParentType; var peerReviewed = jsonData.peerReviewed; $("#CONTENT_" + pageModeTarget_13wM).alternateScroll("remove"); if ( articleSource == "CSDL" ) { var headerImageObj = $(''); headerImageObj.attr("id","contentContainerheaderImage"); $("#CONTENT_" + pageModeTarget_13wM).html(body); if ( peerReviewed ) { var peerReviewedObj = $(''); peerReviewedObj.css("display","block"); $("#CONTENT_" + pageModeTarget_13wM).prepend(peerReviewedObj); if ($(".peerReviewedIcon_LargeRight").length > 0) { $(".peerReviewedIcon_LargeRight").hide(); } } else { if ($(".peerReviewedIcon_LargeRight").length > 0) { $(".peerReviewedIcon_LargeRight").hide(); } if ($(".peerReviewedIcon_CSDL_LargeRight").length > 0) { $(".peerReviewedIcon_CSDL_LargeRight").hide(); } } $("#CONTENT_" + pageModeTarget_13wM).prepend(headerImageObj); $("#CONTENT_TITLE_" + pageModeTarget_13wM).hide(); $("#CONTENT_CREATORDISPLAYDATE_" + pageModeTarget_13wM).hide(); $(".html-pdf").hide(); $(".html-adobe").hide(); $("td:contains('Download Content')").parent().hide(); $("#fontChanger").hide(); } else { $("#CONTENT_" + pageModeTarget_13wM).html(body); $("#CONTENT_TITLE_" + pageModeTarget_13wM).html(title); $("#CONTENT_TITLE_" + pageModeTarget_13wM).show(); $("#CONTENT_CREATORDISPLAYDATE_" + pageModeTarget_13wM).html(creator + " " + displayDate); $("#CONTENT_CREATORDISPLAYDATE_" + pageModeTarget_13wM).show(); $("#fontChanger").show(); if ( peerReviewed ) { $(".peerReviewedIcon_LargeRight").show(); } else { $(".peerReviewedIcon_LargeRight").hide(); } if ($(".peerReviewedIcon_CSDL_LargeRight").length > 0) { $(".peerReviewedIcon_CSDL_LargeRight").hide(); } } $("#contentAndControlsContainer").fadeIn(300); $("#CONTENT_" + pageModeTarget_13wM).alternateScroll(); if ( peerReviewed ) { var peerReviewedObjTop = $("#contentContainerheaderImage").height() + 20; $(".peerReviewedIcon_CSDL_LargeRight").css("top", peerReviewedObjTop+"px"); } intialDimensions(); document.title = pageTitle; $("#shareWithLinkList").attr("data-url", fullURL); $(".numberedPage").remove(); if ( articleSource != "CSDL" ) { $(".alt-scroll-content, .alt-scroll-content p").jfontsize({ btnMinusMaxHits: 2, btnPlusMaxHits: 5, sizeChange: 2 }); $(".jfontsize-button").click(function() { intialDimensions(); $(".numberedPage").remove(); appendNumberedButtons(); }); } if ( totalInnerContentHeight >= divHeight ) { appendNumberedButtons(); enableViewAs = true; } else { $("#viewAs").attr("src", "/ieeecs-ContentContainer-portlet/images/viewAsOnlyOne.png"); enableViewAs = false; var newContentHeight = $(".alt-scroll-content").height(); $("#CONTENT_").height(newContentHeight + 100); } if ( hideNavButtons.toUpperCase() == "NO" && totalNumberOfPages > 1 ) { $("#contentNavHolder").show(); } else { $("#contentNavHolder").hide(); } hideShowButtons(); populateComments(commentParentId, commentParentType); document.title = title; window.history.pushState({"html":body,"pageTitle":pageTitle},"", fullURL); } }); }); } }); htmlObj.append(overlayDIV); } } } function populateTitle_13wM(titleText) { if ( hideTitle_13wM == "NO" ) { $("#titleText_13wM").html(titleText); } } function populteFilteredTitle_13wM(titleText) { if ( titleText == "" ) { $("#filterResultsMessage_13wM").hide(); $("#filterResultsMessage_13wM").html(""); } else { $("#filterResultsMessage_13wM").html(titleText); $("#filterResultsMessage_13wM").show(); } } function getCurrentTop_13wM() { return $("#contentListContainer_13wM").scrollTop(); } var lastPosition_13wM = -1; function scrollMovement_13wM(direction, duration, controlType) { var currentPosition = getCurrentTop_13wM(); var totalContentHeight = $("#scrollableListContent_13wM").height(); var appendContentOffset = scrollMovementValue_13wM * 2; var nextElementSetZone = totalContentHeight - appendContentOffset; var newPosition = 0; if ( direction == "UP" ) { newPosition = currentPosition - scrollMovementValue_13wM; if ( newPosition nextElementSetZone ) { var start = lastItemDisplayed_13wM; var end = lastItemDisplayed_13wM + itemsPerPage_13wM; if ( filterIsOn_13wM ) { populateContentListContainer_13wM(filterCollection_13wM, false, start, end); } else { populateContentListContainer_13wM(contentCollection_13wM, false, start, end); } } if ( controlType == "BUTTON" || controlType == "TOUCH" ) { newPosition = currentPosition + scrollMovementValue_13wM; $("#contentListContainer_13wM").scrollTo(newPosition+"px", duration); } lastPosition_13wM = currentPosition; if ( lastPosition_13wM == currentPosition && totalContentHeight - scrollMovementValue_13wM == currentPosition ) { $("#paginationMessage_13wM").html("You've reached the bottom of the list."); $("#paginationMessage_13wM").fadeIn(100, function() { $("#paginationMessage_13wM").fadeOut(1000, function() { $("#paginationMessage_13wM").html(""); }); }); } } } $("#prevPage_13wM").click(function() { scrollMovement_13wM("UP", scrollDuration_13wM, "BUTTON"); }); $("#nextPage_13wM").click(function() { scrollMovement_13wM("DOWN", scrollDuration_13wM, "BUTTON"); }); $("#filterValue_13wM").keyup(function(e) { var code = (e.keyCode ? e.keyCode : e.which); if ( (code >= 48 && code = 65 && code = 3 ) { filterCollection_13wM = new ListItemCollection(); var filterArray = contentCollection_13wM.filter(function(event) { var currentTitle = event.get("title").toUpperCase(); var currentDescription = event.get("description").toUpperCase(); var currentSubType = event.get("subType").toUpperCase(); var currentChannel = event.get("channel").toUpperCase(); var currentPeerReviewed = event.get("peerReviewed"); return currentTitle.indexOf(filterValue) > -1 || currentDescription.indexOf(filterValue) > -1 || currentSubType.indexOf(filterValue) > -1 || currentChannel.indexOf(filterValue) > -1 || (filterValue.toUpperCase().substring(0,4) == "PEER" && currentPeerReviewed); }); var filterSize = filterArray.length; if ( filterSize > 0 ) { filterIsOn_13wM = true; for (var i in filterArray) { filterCollection_13wM.add(filterArray[i]); } populateContentListContainer_13wM(filterCollection_13wM, true, 0, displayThisManyItems_13wM); populteFilteredTitle_13wM(filteredTitle_13wM.replace("$",filterSize)); } else { $("#scrollableListContent_13wM").html(""); var html = new EJS({element: 'emptyResults_13wM'}).render(); var htmlObj = $(html); $("#scrollableListContent_13wM").append(htmlObj); populteFilteredTitle_13wM(""); } } } function getInitialContent_13wM() { var initialContentList = {"javaClass":"java.util.ArrayList","list":[{"dateTime":"Friday, Sep 21, 2012","urlTitle":"cloud-computing-creates-new-roles-in-it","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=6035785&t=1467487779357","groupId":53319,"channel":"INSIGHTS","description":"More and more businesses are becoming comfortable with cloud computing. While it's still early in the evolution to this new computing paradigm, adoption is proceeding at a rapid pace. The market has reached the tipping point that affirms a new technology's market viability and validates expectations of continued momentum.","dateTimeMS":1348203600000,"title":"Cloud Computing Creates New Roles in IT","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=cloud-computing-creates-new-roles-in-it","target":"_self","peerReviewed":false,"subType":"","id":7336332,"orderField":0},{"dateTime":"Monday, Sep 24, 2012","urlTitle":"the-growing-demand-for-software-assurance","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=6048599&t=1467487779368","groupId":53319,"channel":"SECURITY","description":"As computing professionals, we know the critical and central role software plays in our lives and work. The size and complexity of programs continue to grow, as well as the number of their application domains. Unfortunately, there are often serious problems in software dependability, with issues of availability, reliability, safety, and security. The extensive use of the Internet and distributed computing has made software security an increasingly prominent and serious problem.","dateTimeMS":1348462800000,"title":"The Growing Demand for Software Assurance","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=the-growing-demand-for-software-assurance","target":"_self","peerReviewed":false,"subType":"","id":7336351,"orderField":0},{"dateTime":"Thursday, Oct 4, 2012","urlTitle":"making-interviews-count","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=6069852&t=1467487779377","groupId":53319,"channel":"INSIGHTS","description":"There's no question that it's harder to get a job these days. Just getting your resume into the hands of a decision-maker is a major challenge, and if you're lucky enough to pull that off, then you've got an interview and — if you're good at interviewing — a round of interviews to prepare for.","dateTimeMS":1349330400000,"title":"Making Interviews Count","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=making-interviews-count","target":"_self","peerReviewed":false,"subType":"","id":7336408,"orderField":0},{"dateTime":"Wednesday, Oct 3, 2012","urlTitle":"become-a-mobile-apps-innovator","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=6069890&t=1467487779385","groupId":53319,"channel":"MOBILE","description":"In the rapidly evolving mobile application market, new technologies, players, devices, and platforms emerge just about every month. These constant shifts in the business landscape and competitive environment create uncertainty and risk for application developers already struggling to stand out. But few can ignore the opportunity, since mobility will eventually have a role in most digital products and services.","dateTimeMS":1349244000000,"title":"Become a Mobile Apps Innovator","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=become-a-mobile-apps-innovator","target":"_self","peerReviewed":false,"subType":"","id":7336389,"orderField":0},{"dateTime":"Tuesday, Oct 2, 2012","urlTitle":"technology-volunteers-make-a-difference","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=6078804&t=1467487779395","groupId":53319,"channel":"INSIGHTS","description":"When the deadliest tornado outbreak in nearly a decade thrashed the state of Alabama in the spring of 2011, communities in rural Marion County were among the first to take a direct hit from a mile-wide, 132-mile-long EF-5 tornado. All businesses except one were damaged or destroyed in the small town of Hackleburg, including the police station and central telephone office.","dateTimeMS":1349154000000,"title":"Technology Volunteers Make a Difference","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=technology-volunteers-make-a-difference","target":"_self","peerReviewed":false,"subType":"","id":7336370,"orderField":0},{"dateTime":"Tuesday, Oct 9, 2012","urlTitle":"mobile-and-pervasive-computing","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=6114367&t=1467487779404","groupId":53319,"channel":"INSIGHTS","description":"Back in 1984, when he was a student member of IEEE, Sumi Helal outlined his technological vision of what the world would be like in 2084 for the magazine IEEE Potential. He came across the magazine years later, after he'd helped make some of those technological predictions come true. Now at the University of Florida, Gainesville, Helal spoke to the IEEE Computer Society's Dick Price about teaching and the two mobile middleware startups he helped found. His advice to students? Stay in school as long as you can.","dateTimeMS":1349758800000,"title":"Mobile and Pervasive Computing","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=mobile-and-pervasive-computing","target":"_self","peerReviewed":false,"subType":"","id":7336427,"orderField":0},{"dateTime":"Monday, Oct 29, 2012","urlTitle":"q2-2012-technology-purchase-index-tpi-update","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=6126686&t=1467487779412","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"The TPI for overall technology purchases increased 1.9% between Q42011 and Q22012 reflecting slow but steady growth in the planned IT purchase intentions for business, education and institutions in the United States and Canada.","dateTimeMS":1351494000000,"title":"Q2 2012 Technology Purchase Index (TPI) Update","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=q2-2012-technology-purchase-index-tpi-update","target":"_self","peerReviewed":false,"subType":"","id":7336717,"orderField":0},{"dateTime":"Wednesday, Nov 28, 2012","urlTitle":"accruing-technical-debt:-practical-decision-making-and-its-business-relevance","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=6364728&t=1467487779421","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Christof Ebert discusses technical debt including a Netscape vs. IE case study and provides a framework with practices for managing technical debt.","dateTimeMS":1354107600000,"title":"Accruing Technical Debt: Practical Decision-Making and Its Business Relevance","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=accruing-technical-debt%3A-practical-decision-making-and-its-business-relevance","target":"_self","peerReviewed":false,"subType":"","id":7336256,"orderField":0},{"dateTime":"Thursday, Nov 29, 2012","urlTitle":"woven-on-the-loom-of-sorrow","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=6364761&t=1467487779430","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Author Grady Booch provides an audio recording of his On Computing column, in which he discusses how conflict has shaped computing and computing has changed the nature of warfare.","dateTimeMS":1354194000000,"title":"Woven on the Loom of Sorrow","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=woven-on-the-loom-of-sorrow","target":"_self","peerReviewed":false,"subType":"","id":7336275,"orderField":0},{"dateTime":"Friday, Nov 30, 2012","urlTitle":"simware:-a-holistic-warehouse-scale-computer-simulator","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=6364780&t=1467487779439","groupId":53319,"channel":"NETWORKING","description":"Author Sungkap Yeo discusses how SimWare can simulate various aspects of a datacenter to analyze power consumption and heat efficiency.","dateTimeMS":1354280400000,"title":"SimWare: A Holistic Warehouse-Scale Computer Simulator","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=simware%3A-a-holistic-warehouse-scale-computer-simulator","target":"_self","peerReviewed":false,"subType":"","id":7336660,"orderField":0},{"dateTime":"Monday, Dec 3, 2012","urlTitle":"the-impact-of-cloud-computing-on-it-jobs","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=6488106&t=1467487779451","groupId":53319,"channel":"INSIGHTS","description":"If you've been working in the IT industry for any length of time, you've probably heard of the term \"cloud computing\". Cloud computing is essentially the use of computing resources to deliver services to users over the internet. As many have expected, this concept has changed the way that hardware and software is used.","dateTimeMS":1354539600000,"title":"The Impact of Cloud Computing on IT Jobs","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=the-impact-of-cloud-computing-on-it-jobs","target":"_self","peerReviewed":false,"subType":"","id":7336294,"orderField":0},{"dateTime":"Thursday, Dec 6, 2012","urlTitle":"work-play","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=6562153&t=1467487779492","groupId":53319,"channel":"INSIGHTS","description":"Authors David Alan Grier and Erin Dian Dumbacher provide an audio recording of their Forward Slash column, in which they discuss the odd relationship gaming has with software and software engineering.","dateTimeMS":1354798800000,"title":"Work/Play","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=work-play","target":"_blank","peerReviewed":false,"subType":"","id":7336313,"orderField":0},{"dateTime":"Tuesday, Dec 11, 2012","urlTitle":"scada-systems:-challenges-for-forensics-investigators","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=6599854&t=1467487779515","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Gary Kessler interviews Irfan Ahmed about SCADA (supervisory control and data acquisition) systems.","dateTimeMS":1355230800000,"title":"SCADA Systems: Challenges for Forensics Investigators","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=scada-systems%3A-challenges-for-forensics-investigators","target":"_self","peerReviewed":false,"subType":"","id":7336679,"orderField":0},{"dateTime":"Friday, Feb 22, 2013","urlTitle":"new-directions-in-computer-science","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Computer science is undergoing a fundamental change. Over the last 40 years the field was concerned with making computers useful. Focus was on programming languages, compilers, operating systems, data structures and algorithms. These are still important topics but with the merging of computing and communication, the emergence of social networks, and the large amount of information in digital form, focus is shifting to applications such as the structure of networks and extracting information from large data sets. This talk will give a brief vision of the future and then an introduction to the science base that is forming to support these new directions in computer science.","dateTimeMS":1361527260000,"title":"New Directions in Computer Science","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=new-directions-in-computer-science","target":"_self","peerReviewed":false,"subType":"VIDEO","id":7336774,"orderField":0},{"dateTime":"Thursday, Feb 28, 2013","urlTitle":"video:-towards-a-theory-of-trust-in-networks-of-humans-and-computers","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/images/thumbnails/100x100/JeannetteWing.jpg","groupId":53319,"channel":"NETWORKING","description":"Jeannette M. Wing's Keynote Speech on the 14th Computing in the 21st Century Conference.","dateTimeMS":1362056400000,"title":"Video: Towards a Theory of Trust in Networks of Humans and Computers","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=video%3A-towards-a-theory-of-trust-in-networks-of-humans-and-computers","target":"_self","peerReviewed":false,"subType":"VIDEO","id":7352552,"orderField":0},{"dateTime":"Friday, Apr 5, 2013","urlTitle":"computing-conversations:-pooja-sankar-on-the-piazza-collaboration-system","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/images/thumbnails/100x100/ComputingConversations.jpg","groupId":53319,"channel":"NETWORKING","description":"Computer magazine's multimedia editor Charles Severance interviews Pooja Sankar about the Piazza online collaboration system that was developed to help students, particularly women, studying science and engineering subjects feel less isolated.","dateTimeMS":1365163200000,"title":"Computing Conversations: Pooja Sankar on the Piazza Collaboration System","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=computing-conversations%3A-pooja-sankar-on-the-piazza-collaboration-system","target":"_self","peerReviewed":false,"subType":"VIDEO","id":7340788,"orderField":0},{"dateTime":"Tuesday, Jun 11, 2013","urlTitle":"computing-conversations:-bob-metcalfe-on-the-first-ethernet-lan","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/images/thumbnails/100x100/ComputingConversations.jpg","groupId":53319,"channel":"NETWORKING","description":"Computer magazine's multimedia editor Charles Severance interviews Bob Metcalfe about the creation of the first Ethernet local area network 40 years ago at Xerox Palo Alto Research Center.","dateTimeMS":1370952000000,"title":"Computing Conversations: Bob Metcalfe on the First Ethernet LAN","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=computing-conversations%3A-bob-metcalfe-on-the-first-ethernet-lan","target":"_self","peerReviewed":false,"subType":"VIDEO","id":7475586,"orderField":0},{"dateTime":"Thursday, Jul 11, 2013","urlTitle":"privacy-and-online-social-networks:-can-colorless-green-ideas-sleep-furiously","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/images/thumbnails/100x100/connected-nodes-on-earth-100x100.jpg","groupId":53319,"channel":"SECURITY","description":"One definition of privacy is the selective revelation of information about oneself. With billions of people using social media, it's increasingly difficult for users to control what they're disclosing and to whom. Current privacy protection measures block leakages via privacy settings that are syntactic in nature, but existing solutions don't attempt to cover all the entities who might end up receiving the data, ensure the need for or use of the data collected, determine the duration of data retention, or reveal if the data is merged with external information to reveal the user's full identity. The title of the article is from linguist Noam Chomsky, who used it to distinguish between syntax and semantics. Virtually all privacy solutions thus far handle issues relating only to the first hop of the personal data flow from a user. The gap can only be filled by examining the semantics behind the multihop flow of user data over time. This article surveys the state of the art and presents some potential directions in moving from a syntactic approach to a more holistic semantics-based approach.","dateTimeMS":1373515200000,"title":"Privacy and online social networks: can colorless green ideas sleep furiously?","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=privacy-and-online-social-networks%3A-can-colorless-green-ideas-sleep-furiously","target":"_self","peerReviewed":true,"subType":"","id":7510492,"orderField":0},{"dateTime":"Tuesday, Jul 2, 2013","urlTitle":"the-rise-and-fall-of-the-ivory-tower","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/images/shared/MusingsFromTheIvoryTower-100x100.jpg","groupId":7512968,"channel":"","description":"Welcome to \"Musings from the Ivory Tower,\" my blog that will appear regularly in Computing Now \u2014 or at least as regularly as I feel compelled to rant about something new that catches my eye or ruins my day.","dateTimeMS":1372788840000,"title":"The Rise and Fall of the Ivory Tower","type":"article","subCategories":"","url":"/web/musings-from-the-ivory-tower/content?g=7512968&type=article&urlTitle=the-rise-and-fall-of-the-ivory-tower","target":"_self","peerReviewed":false,"subType":"BLOG POST","id":7612703,"orderField":0},{"dateTime":"Wednesday, Aug 14, 2013","urlTitle":"software-defined-networking:-on-the-verge-of-a-breakthrough-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/images/thumbnails/100x100/software2-puzzle-code-100x100.jpg","groupId":53319,"channel":"SECURITY","description":"Many experts predict that software-defined networking, a technology that's been highly touted for several years, will finally begin gaining ground in the marketplace.","dateTimeMS":1376481600000,"title":"Software-Defined Networking: On the Verge of a Breakthrough?","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=software-defined-networking%3A-on-the-verge-of-a-breakthrough-","target":"_self","peerReviewed":false,"subType":"NEWS","id":7571046,"orderField":0},{"dateTime":"Thursday, Aug 22, 2013","urlTitle":"publications-of-the-future-rantings-and-ravings","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/images/shared/MusingsFromTheIvoryTower-100x100.jpg","groupId":7512968,"channel":"","description":"In this, my second blog post, I'd like to elaborate on some of the matters I introduced last month, related to the quality of scholarly publications. In my first post, I lamented about the probability of a future in which there may be a decreasing number of higher education authors and readers of scholarly articles. This month I'd like to continue that discussion, but focus on other matters that I think may affect the nature of scholarly publications in the future.","dateTimeMS":1377179160000,"title":"Publications of the Future - Rantings and Ravings","type":"article","subCategories":"","url":"/web/musings-from-the-ivory-tower/content?g=7512968&type=article&urlTitle=publications-of-the-future-rantings-and-ravings","target":"_self","peerReviewed":false,"subType":"BLOG POST","id":7612684,"orderField":0},{"dateTime":"Friday, Aug 30, 2013","urlTitle":"errant-hashtag:-the-good-of-the-city","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=7626655&t=1467487779598","groupId":53319,"channel":"NETWORKING","description":"Podcast - Author David Alan Grier expands on his Errant Hashtag column, in which he discusses how the idea of \"smart cities\" makes more sense than the idea of \"smart homes.\"","dateTimeMS":1377853260000,"title":"Errant Hashtag: The Good of the City","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=errant-hashtag%3A-the-good-of-the-city","target":"_self","peerReviewed":false,"subType":"PODCAST","id":7627617,"orderField":0},{"dateTime":"Thursday, Sep 19, 2013","urlTitle":"algorithmic-analysis-leads-to-efficient-approach-for-plant-conservation","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=7662090&t=1467487779607","groupId":53319,"channel":"INSIGHTS","description":"Protecting 17 percent of the land on Earth, the authors state, could result in the preservation of 67 percent of endemic plant species.\n\nThat\u2019s certainly efficient\u2014and the result of a new, collaborative plant-conservation study\u2014Achieving the Convention on Biological Diversity\u2019s Goals for Plant Conservation\u2014led by Lucas Joppa and Piero Visconti of Microsoft Research Cambridge, Clinton N. Jenkins of North Carolina State, and Stuart L. Pimm of Duke.\n\nPimm and Jenkins lead the conservation nonprofit Saving Species, which works with local communities and international agencies to purchase and protect threatened lands critical for biodiversity.","dateTimeMS":1379580600000,"title":"Algorithmic Analysis Leads to Efficient Approach for Plant Conservation","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=algorithmic-analysis-leads-to-efficient-approach-for-plant-conservation","target":"_self","peerReviewed":false,"subType":"","id":7662088,"orderField":0},{"dateTime":"Wednesday, Sep 18, 2013","urlTitle":"fueling-the-future:-fapesp","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=7665162&t=1467487779615","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Joint research centers offer a location where dedicated researchers can collaborate openly and are free to make an impact with other researchers. The FAPESP Institute for IT Research is based in São Paulo, Brazil. Its research is currently focused on the environment through work with the e-Phenology project. The project is jointly funded by Microsoft Research and FAPESP (the São Paulo Research Foundation).","dateTimeMS":1379494800000,"title":"Fueling the Future: FAPESP","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=fueling-the-future%3A-fapesp","target":"_self","peerReviewed":false,"subType":"","id":7670173,"orderField":0},{"dateTime":"Tuesday, Oct 1, 2013","urlTitle":"computing-and-the-law:-law:-so-you-want-to-start-a-software-company-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=7687738&t=1467487779624","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Authors Brian M. Gaff and Greg Hendershott provide an audio recording of the Computing and the Law column, in which they discuss that although bringing that new app to market sounds exciting, doing so without addressing common start-up issues will make the process more difficult than it needs to be. From Computer's October 2013 issue: http://www.computer.org/csdl/mags/co/.... Visit Computer: http://www.computer.org/computer.","dateTimeMS":1380618000000,"title":"Computing and the Law: Law: So, You Want to Start a Software Company?","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=computing-and-the-law%3A-law%3A-so-you-want-to-start-a-software-company-","target":"_self","peerReviewed":false,"subType":"PODCAST","id":7687736,"orderField":0},{"dateTime":"Friday, Oct 4, 2013","urlTitle":"open-or-not-open-that-is-the-question-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/images/shared/MusingsFromTheIvoryTower-100x100.jpg","groupId":7512968,"channel":"","description":"If you\u2019re a faculty member with teaching responsibilities and don't know about \"open,\u201d it's time you found out. Even if you\u2019re a taxpayer and not a faculty member \u2014 or certainly if you\u2019re both \u2014 and don't know about it, it's time you found out.","dateTimeMS":1380895680000,"title":"Open, or Not Open. That is the Question.","type":"article","subCategories":"","url":"/web/musings-from-the-ivory-tower/content?g=7512968&type=article&urlTitle=open-or-not-open-that-is-the-question-","target":"_self","peerReviewed":false,"subType":"BLOG POST","id":7697485,"orderField":0},{"dateTime":"Thursday, Oct 10, 2013","urlTitle":"president-s-corner:-who-we-are","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=7702100&t=1467487779641","groupId":53319,"channel":"INSIGHTS","description":"IEEE Computer Society President David Alan Grier discusses the importance of the Computer Society's relationship with IEEE. From Computer's October 2013 issue.","dateTimeMS":1381395600000,"title":"President's Corner: Who We Are","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=president-s-corner%3A-who-we-are","target":"_self","peerReviewed":false,"subType":"VIDEO","id":7702098,"orderField":0},{"dateTime":"Monday, Oct 28, 2013","urlTitle":"touchdevelop-helps-students-build-their-first-apps","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=7733391&t=1467487779650","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"More than 500 students from 17 Seattle schools participated in App Day 2013 -- a fun opportunity for students to gain first-hand computer programming experience with the help of Microsoft's TouchDevelop platform, which easily allows you to build apps on the iPad, iPhone, Android, PC, Mac and Windows Phone.","dateTimeMS":1382950800000,"title":"TouchDevelop helps students build their first apps","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=touchdevelop-helps-students-build-their-first-apps","target":"_self","peerReviewed":false,"subType":"VIDEO","id":7733389,"orderField":0},{"dateTime":"Tuesday, Nov 12, 2013","urlTitle":"analyst-perspectives","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=7762979&t=1467487779659","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending November 01, 2013.","dateTimeMS":1384250400000,"title":"Analyst Perspectives","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=analyst-perspectives","target":"_self","peerReviewed":false,"subType":"","id":7763002,"orderField":0},{"dateTime":"Friday, Nov 15, 2013","urlTitle":"analyst-perspectives-weekly-scan","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=7765142&t=1467487779668","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"This issue of Analyst Perspectives Weekly Scan covers analyst commentary from the week ending November 08, 2013.","dateTimeMS":1384511580000,"title":"Analyst Perspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=analyst-perspectives-weekly-scan","target":"_self","peerReviewed":false,"subType":"","id":7765140,"orderField":0},{"dateTime":"Thursday, Nov 21, 2013","urlTitle":"analyst-perspectives-weekly-sc-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=7780439&t=1467487779677","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"This issue of Analyst Perspectives Weekly Scan covers analyst commentary from the week ending November 15, 2013.","dateTimeMS":1385028000000,"title":"Analyst Perspectives - Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=analyst-perspectives-weekly-sc-1","target":"_self","peerReviewed":false,"subType":"","id":7780437,"orderField":0},{"dateTime":"Tuesday, Nov 26, 2013","urlTitle":"andrew-tanenbaum:-writing-the-book-on-networks-video","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi53","groupId":53319,"channel":"NETWORKING","description":"Author Charles Severance interviews Andrew Tanenbaum about how he came to write one of the key books in the computer science field. From Computer's December 2013 issue.","dateTimeMS":1385460000000,"title":"Andrew Tanenbaum: Writing the Book on Networks Video","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=andrew-tanenbaum%3A-writing-the-book-on-networks-video","target":"_self","peerReviewed":false,"subType":"VIDEO","id":7958584,"orderField":0},{"dateTime":"Monday, Dec 2, 2013","urlTitle":"analystperspectives-weekly-scan-week-ending-november-22-2013","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending November 22, 2013.","dateTimeMS":1385978400000,"title":"AnalystPerspectives Weekly Scan - week ending November 22, 2013","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=analystperspectives-weekly-scan-week-ending-november-22-2013","target":"_self","peerReviewed":false,"subType":"","id":7799900,"orderField":0},{"dateTime":"Friday, Dec 6, 2013","urlTitle":"analystperspectives-weekly-scan","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=7826419&t=1467487779705","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending November 29, 2013.","dateTimeMS":1386324000000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=analystperspectives-weekly-scan","target":"_self","peerReviewed":false,"subType":"","id":7826417,"orderField":0},{"dateTime":"Monday, Dec 9, 2013","urlTitle":"using-fuel-cells-to-make-data-centers-more-efficient-more-sustainable","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=7826480&t=1467487779714","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Data centers are playing an increasingly important role in powering 21st-century computing, and that trend seems likely to intensify over the foreseeable future. One of the keys to making data centers efficient is to improve their rate of availability, but that typically entails significant additional costs in infrastructure. But what if improved service availability could be achieved while reducing infrastructure costs?","dateTimeMS":1386583200000,"title":"Using Fuel Cells to Make Data Centers More Efficient, More Sustainable","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=using-fuel-cells-to-make-data-centers-more-efficient-more-sustainable","target":"_self","peerReviewed":false,"subType":"","id":7826478,"orderField":0},{"dateTime":"Wednesday, Dec 11, 2013","urlTitle":"bill-eklow-on-micoroprocessor-reliability","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Distinguished manufacturing engineer at Cisco Systems, Bill Eklow examines application-enabled defects with microprocessors. He describes several approaches that can be used to identify and mitigate application-level errors. This video is part of the Computing Now \"Industry Perspective\" series for December 2013.","dateTimeMS":1386756120000,"title":"Bill Eklow on Micoroprocessor Reliability","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=bill-eklow-on-micoroprocessor-reliability","target":"_self","peerReviewed":false,"subType":"VIDEO","id":7826946,"orderField":0},{"dateTime":"Tuesday, Dec 10, 2013","urlTitle":"analystperspectives-weekly-scan-week-ending-december-6-2013","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=7836671&t=1467487779732","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending December 06, 2013.","dateTimeMS":1386706680000,"title":"AnalystPerspectives Weekly Scan - week ending December 6, 2013","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=analystperspectives-weekly-scan-week-ending-december-6-2013","target":"_self","peerReviewed":false,"subType":"","id":7836696,"orderField":0},{"dateTime":"Thursday, Dec 19, 2013","urlTitle":"analystperspectives-weekly-sc-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending December 13, 2013.","dateTimeMS":1387447200000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=analystperspectives-weekly-sc-1","target":"_self","peerReviewed":false,"subType":"","id":7850989,"orderField":0},{"dateTime":"Thursday, Jan 9, 2014","urlTitle":"analystperspectives-weekly-scan-december-20-27-2013","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi7","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the weeks ending December 20-27, 2013.","dateTimeMS":1389271260000,"title":"AnalystPerspectives Weekly Scan December 20-27, 2013","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=analystperspectives-weekly-scan-december-20-27-2013","target":"_self","peerReviewed":false,"subType":"","id":7877404,"orderField":0},{"dateTime":"Tuesday, Jan 14, 2014","urlTitle":"hacking-to-build-diverse-teams-of-technological-innovators","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi10","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Technology can play a key role in finding solutions to big problems. First, we have to build diverse teams of innovators to lead the way. Hackathons provide a great opportunity for anyone to experience coding and see how technology can be used to address serious issues. As I contemplate my New Year's resolutions, I hope to do all that I can to encourage everyone who has an interest in computing to participate in a hackathon\u2014as either a hacker or a sponsor.","dateTimeMS":1389702780000,"title":"Hacking to build diverse teams of technological innovators","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=hacking-to-build-diverse-teams-of-technological-innovators","target":"_self","peerReviewed":false,"subType":"","id":7877533,"orderField":0},{"dateTime":"Monday, Jan 13, 2014","urlTitle":"analystperspectives-weekly-sc-2","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi12","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending January 03, 2014.","dateTimeMS":1389618000000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=analystperspectives-weekly-sc-2","target":"_self","peerReviewed":false,"subType":"","id":7878696,"orderField":0},{"dateTime":"Thursday, Jan 16, 2014","urlTitle":"analystperspectives-weekly-scan-week-ending-january-10-2014-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi31","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending January 10, 2014.","dateTimeMS":1389866400000,"title":"AnalystPerspectives Weekly Scan - week ending January 10, 2014.","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=analystperspectives-weekly-scan-week-ending-january-10-2014-","target":"_self","peerReviewed":false,"subType":"","id":7898797,"orderField":0},{"dateTime":"Wednesday, Jan 22, 2014","urlTitle":"analystperspectives-weekly-sc-3","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi33","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending January 17, 2014.","dateTimeMS":1390384800000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=analystperspectives-weekly-sc-3","target":"_self","peerReviewed":false,"subType":"","id":7924302,"orderField":0},{"dateTime":"Wednesday, Jan 29, 2014","urlTitle":"analystperspectives-weekly-scan-from-the-week-ending-january-24-2014-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi41","groupId":53319,"channel":"SECURITY","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending January 24, 2014.","dateTimeMS":1390991340000,"title":"AnalystPerspectives Weekly Scan from the week ending January 24, 2014.","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=analystperspectives-weekly-scan-from-the-week-ending-january-24-2014-","target":"_self","peerReviewed":false,"subType":"","id":7945520,"orderField":0},{"dateTime":"Tuesday, Feb 4, 2014","urlTitle":"analystperspectives-weekly-scan-from-the-week-ending-january-31-2014","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi58","groupId":53319,"channel":"SECURITY","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending January 31, 2014.","dateTimeMS":1391497200000,"title":"AnalystPerspectives Weekly Scan from the week ending January 31, 2014","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=analystperspectives-weekly-scan-from-the-week-ending-january-31-2014","target":"_self","peerReviewed":false,"subType":"","id":7961556,"orderField":0},{"dateTime":"Wednesday, Feb 12, 2014","urlTitle":"analystperspectives-weekly-scan-week-ending-february-7-2014","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi70","groupId":53319,"channel":"NETWORKING","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending February 07, 2014.","dateTimeMS":1392195660000,"title":"AnalystPerspectives Weekly Scan - Week Ending February 7, 2014","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=analystperspectives-weekly-scan-week-ending-february-7-2014","target":"_self","peerReviewed":false,"subType":"","id":7982033,"orderField":0},{"dateTime":"Thursday, Feb 13, 2014","urlTitle":"preventing-shell-upload-vulnerabilities-in-php","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"SECURITY","description":"Shell upload vulnerabilities allow an attacker to upload a malicious PHP file and execute it by accessing it via a web browser. The \"shell\" is a PHP script that allows the attacker to control the server - essentially a backdoor program, similar in functionality to a trojan for personal computers. If the attacker can upload this page/shell to a web site, they can control the application server. Shell upload vulnerabilities are very easy to find and exploit in PHP. File uploads are usually handled by the move_uploaded_file() function, so searching for calls to that function can reveal code that might be potentially vulnerable. Multiple methods are available to prevent shell upload vulnerabilities, which I\u2019ll discuss in just a bit.","dateTimeMS":1392282900000,"title":"Preventing Shell Upload Vulnerabilities in PHP","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=preventing-shell-upload-vulnerabilities-in-php","target":"_self","peerReviewed":false,"subType":"","id":7987617,"orderField":0},{"dateTime":"Friday, Feb 14, 2014","urlTitle":"computing-conversations:-joseph-hardin-on-ncsa-mosaic","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi79","groupId":53319,"channel":"INSIGHTS","description":"Author Charles Severance provides an audio recording of his Computing Conversations column, in which he discusses his interview with Joseph Hardin about the development of the Mosaic browser at the National Center for Supercomputing Applications and how it introduced the World Wide Web to the general public.","dateTimeMS":1392380820000,"title":"Computing Conversations: Joseph Hardin on NCSA Mosaic","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=computing-conversations%3A-joseph-hardin-on-ncsa-mosaic","target":"_self","peerReviewed":false,"subType":"VIDEO","id":7990809,"orderField":0},{"dateTime":"Wednesday, Feb 19, 2014","urlTitle":"analystperspectives-week-ending-february-14-2014-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi81","groupId":53319,"channel":"SECURITY","description":"AnalystPerspectives Weekly Scan covers analyst commentary from the week ending February 14, 2014.","dateTimeMS":1392800400000,"title":"AnalystPerspectives - week ending February 14, 2014.","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=analystperspectives-week-ending-february-14-2014-","target":"_self","peerReviewed":false,"subType":"","id":8002136,"orderField":0},{"dateTime":"Thursday, Feb 20, 2014","urlTitle":"nonconfidential-patient-types-in-emergency-clinical-decision-support","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi84","groupId":53319,"channel":"SECURITY","description":"Simple tools are needed to support differential diagnosis in a cognitively complex setting. Tools that show similar patients' diagnoses and treatment trajectories might provide useful clinical decision support for emergency physicians who use a case-based reasoning approach. However, privacy concerns that arise with indirect use of electronic health records (EHRs) must be addressed. The authors present a method to abstract a collection of EHRs into a set of summarized patient types and demonstrate its use on a database of medical records.","dateTimeMS":1392919080000,"title":"Nonconfidential Patient Types in Emergency Clinical Decision Support","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=nonconfidential-patient-types-in-emergency-clinical-decision-support","target":"_self","peerReviewed":false,"subType":"","id":8011509,"orderField":0},{"dateTime":"Thursday, Feb 20, 2014","urlTitle":"electronic-medical-records:-confidentiality-care-and-epidemiology","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi85","groupId":53319,"channel":"SECURITY","description":"A unified patient medical record offers hope for better care and reduced costs without deteriorating the confidentiality of patient information. However, two kinds of confidentiality concerns\u2014patients\u2019 desire to preserve privacy and vendors\u2019 desire to limit knowledge of their systems\u2014impede the full exploitation of medical records for better patient care.","dateTimeMS":1392920100000,"title":"Electronic Medical Records: Confidentiality, Care, and Epidemiology","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=electronic-medical-records%3A-confidentiality-care-and-epidemiology","target":"_self","peerReviewed":false,"subType":"","id":8011370,"orderField":0},{"dateTime":"Thursday, Feb 20, 2014","urlTitle":"identity-management-in-privacy-we-trust:-bridging-the-trust-gap-in-ehealth-environments","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi86","groupId":53319,"channel":"SECURITY","description":"Healthcare systems are moving to decentralized scenarios, forming a mesh of mobile services and care providers. A rapidly growing number of users aren't shy about using new services on their home computers, mobile phones, and laptops. Identity management solutions, deployed for ease of use, control the data that users provide to individual healthcare services. These solutions raise trust and privacy concerns about who owns users' data, how to control its spread, and how to build trustworthy associations between healthcare providers. Reputation systems can enhance eHealth systems by bridging the gap between strong contractual agreements and first-time domain exchanges.","dateTimeMS":1392921300000,"title":"Identity Management--In Privacy We Trust: Bridging the Trust Gap in eHealth Environments","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=identity-management-in-privacy-we-trust%3A-bridging-the-trust-gap-in-ehealth-environments","target":"_self","peerReviewed":false,"subType":"","id":8012491,"orderField":0},{"dateTime":"Thursday, Feb 20, 2014","urlTitle":"point-counterpoint","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi87","groupId":53319,"channel":"SECURITY","description":"The first article, \"The Consequences of the Lack of Privacy in Today's Electronic Health Systems,\" by Deborah C. Peel, argues that because the public doesn't trust technology systems that prevent them from deciding who can see, use, or sell their health data, millions avoid treatment or hide information and suffer bad health outcomes. The second article, \"Privacy and Security as Enabler, Not Barrier, to Responsible Health Data Uses,\" by Deven McGraw, states that trust in health technology will be enabled not by focusing disproportionately on patient consent but through robust policies that address all of the fair information practice principles.","dateTimeMS":1392921780000,"title":"Point/Counterpoint","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=point-counterpoint","target":"_self","peerReviewed":false,"subType":"","id":8011528,"orderField":0},{"dateTime":"Thursday, Feb 20, 2014","urlTitle":"securing-information-technology-in-healthcare","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi88","groupId":53319,"channel":"SECURITY","description":"Dartmouth College's Institute for Security, Technology, and Society conducted three workshops on securing information technology in healthcare, attended by a diverse range of experts in the field. This article summarizes the three workshops.","dateTimeMS":1392922320000,"title":"Securing Information Technology in Healthcare","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=securing-information-technology-in-healthcare","target":"_self","peerReviewed":false,"subType":"","id":8011090,"orderField":0},{"dateTime":"Wednesday, Feb 26, 2014","urlTitle":"analystperspectives-week-ending-february-21-2014-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi107","groupId":53319,"channel":"SECURITY","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending February 21, 2014.","dateTimeMS":1393405200000,"title":"AnalystPerspectives week ending February 21, 2014.","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=analystperspectives-week-ending-february-21-2014-","target":"_self","peerReviewed":false,"subType":"","id":8022431,"orderField":0},{"dateTime":"Tuesday, Mar 4, 2014","urlTitle":"tools-of-the-trade:-developing-in-the-cloud","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi109","groupId":53319,"channel":"CLOUD","description":"Author Diomidis Spinellis provides an audio recording of his Tools of the Trade column, in which he discusses how cloud-based services are making the software development infrastructure increasingly homogeneous by allowing developers to use the same tools across diverse projects and employers, transferring knowledge and skills from one job to the next, and offering a deeper talent pool of experienced developers.","dateTimeMS":1393923600000,"title":"Tools of the Trade: Developing in the Cloud","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=tools-of-the-trade%3A-developing-in-the-cloud","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8022910,"orderField":0},{"dateTime":"Monday, Mar 3, 2014","urlTitle":"the-true-cost-of-mobility-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi111","groupId":53319,"channel":"MOBILE","description":"Editor-in-chief Forrest Shull discusses the privacy implications of mobile and cloud computing with John Howie, chief operating officer of the Cloud Security Alliance.","dateTimeMS":1393837800000,"title":"The True Cost of Mobility?","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=the-true-cost-of-mobility-","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8022762,"orderField":0},{"dateTime":"Thursday, Mar 6, 2014","urlTitle":"analystperspectives","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi122","groupId":53319,"channel":"MOBILE","description":"AnalystPerspectives Weekly Scan covers analyst commentary from the week ending February 28, 2014","dateTimeMS":1394097060000,"title":"AnalystPerspectives","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analystperspectives","target":"_self","peerReviewed":false,"subType":"","id":8039517,"orderField":0},{"dateTime":"Friday, Mar 7, 2014","urlTitle":"joseph-salvo-on-the-industrial-internet-cn-industry-perspective","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi123","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"In this Industry Perspective video for the March 2014 issue of Computing Now (http:computingnow.computer.org), Joseph Salvo of GE Global Research in NY describes the Industrial Internet and how technologies will enable the modularization and composition of advanced, complex industrial systems. At the movement's core are the implicit technology adoptions of the technologies underlying the Web of Things and Internet of Things, coupled with a societal change to collaborative and crowd-sourced solutions.","dateTimeMS":1394183820000,"title":"Joseph Salvo on the Industrial Internet -- CN Industry Perspective","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=joseph-salvo-on-the-industrial-internet-cn-industry-perspective","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8053036,"orderField":0},{"dateTime":"Monday, Mar 10, 2014","urlTitle":"len-kleinrock:-the-first-two-packets-on-the-internet-video","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi130","groupId":53319,"channel":"NETWORKING","description":"Author Charles Severance interviews Len Kleinrock about the Internet's humble beginnings. From Computer's March 2014 issue.","dateTimeMS":1394439420000,"title":"Len Kleinrock: The First Two Packets on the Internet Video","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=len-kleinrock%3A-the-first-two-packets-on-the-internet-video","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8119401,"orderField":0},{"dateTime":"Wednesday, Mar 12, 2014","urlTitle":"errant-hashtag:-assets-to-the-table","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi133","groupId":53319,"channel":"SECURITY","description":"Author David Alan Grier expands on his Errant Hashtag column, discussing how cyber assets are redefining the relationship between corporations and nation-states.","dateTimeMS":1394611200000,"title":"Errant Hashtag: Assets to the Table","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=errant-hashtag%3A-assets-to-the-table","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8057718,"orderField":0},{"dateTime":"Wednesday, Mar 12, 2014","urlTitle":"the-next-disruption-in-digital-learning","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/images/shared/MusingsFromTheIvoryTower-100x100.jpg","groupId":7512968,"channel":"","description":"The next disruption in digital learning is already here, but like the future, it's not evenly distributed. This disruption represents the integration of eLearning, publishing, and digital media, and the form of this disruption is the new EPUB 3 format developed for digital publications by the International Digital Publishing Forum (IDPF). At a technical level, EPUB 3 provides an open content framework for structuring, packaging, and mobile delivery of HTML5 content in a way that's accessible to diverse users in diverse environments.","dateTimeMS":1394649660000,"title":"The Next Disruption in Digital Learning","type":"article","subCategories":"","url":"/web/musings-from-the-ivory-tower/content?g=7512968&type=article&urlTitle=the-next-disruption-in-digital-learning","target":"_self","peerReviewed":false,"subType":"BLOG POST","id":53946088,"orderField":0},{"dateTime":"Friday, Mar 14, 2014","urlTitle":"analystperspectives-weekly-sc-4","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi135","groupId":53319,"channel":"MOBILE","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending February 08, 2013.","dateTimeMS":1394784000000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analystperspectives-weekly-sc-4","target":"_self","peerReviewed":false,"subType":"","id":8063418,"orderField":0},{"dateTime":"Monday, Mar 17, 2014","urlTitle":"film-identify-track-tag-sense-fly","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi136","groupId":53319,"channel":"MOBILE","description":"When researchers such as Ranveer Chandra get creative with wireless protocols, it's possible to reuse unoccupied spectrum, give Xbox games an edge, let mobile devices run longer, or provide Internet access to impoverished rural areas.","dateTimeMS":1395043200000,"title":"Film, Identify, Track, Tag, Sense, Fly","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=film-identify-track-tag-sense-fly","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8066823,"orderField":0},{"dateTime":"Tuesday, Mar 18, 2014","urlTitle":"4-critical-questions-to-boost-mobile-app-security","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi140","groupId":53319,"channel":"SECURITY","description":"Today, many financial services organizations are using mobile apps to amp up customer service and efficiency. These same apps, though, are probably a security problem waiting to happen. Fortunately, smart development teams can mitigate the risk by asking the right questions.","dateTimeMS":1395129600000,"title":"4 Critical Questions to Boost Mobile App Security","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=4-critical-questions-to-boost-mobile-app-security","target":"_self","peerReviewed":false,"subType":"","id":8074231,"orderField":0},{"dateTime":"Tuesday, Mar 25, 2014","urlTitle":"computing-conversations:-doug-van-houweling-on-building-the-nsfnet","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"NETWORKING","description":"Author Charles Severance provides an audio recording of his Computing Conversations column, in which he discusses his interview with Doug Van Houweling about how the NSFNet went from connecting a few supercomputers to becoming \"the Internet.\"","dateTimeMS":1395737880000,"title":"Computing Conversations: Doug Van Houweling on Building the NSFNet","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=computing-conversations%3A-doug-van-houweling-on-building-the-nsfnet","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8097730,"orderField":0},{"dateTime":"Thursday, Mar 27, 2014","urlTitle":"analystperspectives-weekly-sc-6","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi148","groupId":53319,"channel":"SECURITY","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending March 21, 2014","dateTimeMS":1395907560000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=analystperspectives-weekly-sc-6","target":"_self","peerReviewed":false,"subType":"","id":8100122,"orderField":0},{"dateTime":"Thursday, Apr 3, 2014","urlTitle":"analystperspectives-weekly-sc-7","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi173","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending March 28, 2014.","dateTimeMS":1396512060000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=analystperspectives-weekly-sc-7","target":"_self","peerReviewed":false,"subType":"","id":8124723,"orderField":0},{"dateTime":"Tuesday, Apr 8, 2014","urlTitle":"andrea-covini-vice-ceo-of-the-italian-association-for-computing","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi182","groupId":53319,"channel":"BIG DATA","description":"Published on Apr 2, 2014\nIn this Computing Now Industry Perspective video, Andrea Covini, vice CEO of the Italian Association for Computing (AICA, www.aica.it), discusses the importance and pervasiveness of semantics and other enabling technologies such as data mining, machine learning, and artificial intelligence. He points out their role in AICA's activities -- for example, related to competence-framework design, certification, and automatic assessment. He also raises attention to DIDAMATICA 2014 (http://didamatica2014.unina.it), a yearly conference on teaching and education run by AICA. For more on semantics in education, see the April 2014 issue of CN.","dateTimeMS":1396950300000,"title":"Andrea COVINI, Vice CEO of the Italian Association for Computing","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=andrea-covini-vice-ceo-of-the-italian-association-for-computing","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8131411,"orderField":0},{"dateTime":"Wednesday, Apr 9, 2014","urlTitle":"terry-hook-from-clock-it-skills","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"BIG DATA","description":"In this Computing Now Industry Perspective video, Terry Hook from clock-IT-skills in the United Kingdom uses his experience with developing the European e-Competence Framework to illustrate how semantics could help in the development of standards for learning outcomes. For more on semantics in education, see the April 2014 issue of CN.","dateTimeMS":1397030640000,"title":"Terry Hook from clock-IT-skills","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=terry-hook-from-clock-it-skills","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8131438,"orderField":0},{"dateTime":"Friday, Apr 11, 2014","urlTitle":"analyst-perspectiv-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi188","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending April 04, 2014.","dateTimeMS":1397203500000,"title":"Analyst Perspectives","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=analyst-perspectiv-1","target":"_self","peerReviewed":false,"subType":"","id":8141567,"orderField":0},{"dateTime":"Thursday, Apr 10, 2014","urlTitle":"heartbleed:-how-did-it-escape-detection-for-so-long-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi189","groupId":53319,"channel":"SECURITY","description":"The past few days have been choc-a-block with discussions of Heartbleed\u2013what it is and how it works, and what the average user should do about it. (For the former, here is a particularly understandable explanation. The answer to the latter: wait until sites are fixed, and THEN change your password. If it\u2019s a high-value site, changing your password before the patch has been installed and a new key/certificate has been generated is counterproductive, as it may make your new password more vulnerable rather than less. Ed Felten provides good advice both for the average user and for website operators on what they should do.","dateTimeMS":1397166600000,"title":"Heartbleed: How Did It Escape Detection For So Long?","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=heartbleed%3A-how-did-it-escape-detection-for-so-long-","target":"_self","peerReviewed":false,"subType":"","id":8143162,"orderField":0},{"dateTime":"Wednesday, Apr 16, 2014","urlTitle":"analystperspectives-weekly-sc-8","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi191","groupId":53319,"channel":"CLOUD","description":"Analyst conversations continue in the Cloud this week, with a focus on security and privacy. Here are some of those discussions.","dateTimeMS":1397669760000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=analystperspectives-weekly-sc-8","target":"_self","peerReviewed":false,"subType":"","id":8153703,"orderField":0},{"dateTime":"Monday, Apr 21, 2014","urlTitle":"wwt-brings-astronomy-to-life-for-children-of-all-ages","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"BIG DATA","description":"The night sky holds a special fascination for children worldwide. They gaze at the moon and stars shining overhead, and wonder what they are and how they got there. This natural curiosity is dampened, however, for children who live in urban areas, where air and light pollution dim the celestial show. With only a pale version of the night sky visible to them, their natural fascination with the heavens can wane, their attention turning to the brighter displays of video games. And while we have nothing against video games, we at Microsoft Research are pleased to offer youngsters the chance to be captivated again by the stories written on the canvas of the sky. Thanks to Microsoft Research\u2019s WorldWide Telescope (WWT), anyone can see the night sky in all its glory and be enraptured by endlessly fascinating tours of the heavens.","dateTimeMS":1398106740000,"title":"WWT brings astronomy to life for children of all ages","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=wwt-brings-astronomy-to-life-for-children-of-all-ages","target":"_self","peerReviewed":false,"subType":"","id":8160622,"orderField":0},{"dateTime":"Thursday, Apr 24, 2014","urlTitle":"analyst-perspectiv-2","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi195","groupId":53319,"channel":"SECURITY","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending April 18, 2014.","dateTimeMS":1398326460000,"title":"Analyst Perspectives","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=analyst-perspectiv-2","target":"_self","peerReviewed":false,"subType":"","id":8162383,"orderField":0},{"dateTime":"Friday, Apr 25, 2014","urlTitle":"floating-display:-visual-cues-for-gestural-interactions","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi196","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Many people are working on near-field user-interface devices that detect hover, gesture, and pose. But there is nothing in the space in front of a device to show the user what to do. This project introduces a floating display that hovers over the device, providing visual cues for gestural interactions.","dateTimeMS":1398412920000,"title":"Floating Display: Visual Cues for Gestural Interactions","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=floating-display%3A-visual-cues-for-gestural-interactions","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8162436,"orderField":0},{"dateTime":"Monday, Apr 28, 2014","urlTitle":"holograph:-3-d-spatiotemporal-interactive-data-visualization","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi197","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Holograph is an interactive, 3-D data-visualization research platform that can render static and dynamic data above or below the plane of the display using a variety of 3-D stereographic techniques. The platform enables rapid exploration, selection, and manipulation of complex, multidimensional data to create and refine natural user-interaction techniques and technologies, with the goal of empowering everyone to understand the growing tide of large, complex data sets.","dateTimeMS":1398672300000,"title":"Holograph: 3-D spatiotemporal interactive data visualization","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=holograph%3A-3-d-spatiotemporal-interactive-data-visualization","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8162456,"orderField":0},{"dateTime":"Tuesday, Apr 29, 2014","urlTitle":"monofusion:-scanning-objects-in-real-time-with-a-single-web-camera","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"This project offers a method for creating 3-D scans of arbitrary environments in real time, utilizing only a single RGB camera as the input sensor. The camera could be one already available in a tablet or a phone, or it could be a cheap web camera. No additional input hardware is required. This removes the need for power-intensive active sensors that do not work robustly in natural outdoor lighting. In seconds, a user can generate a compelling 3-D model, which can be used in augmented reality, for 3-D printing, or in computer-aided design.","dateTimeMS":1398759120000,"title":"MonoFusion: Scanning objects in real time with a single web camera","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=monofusion%3A-scanning-objects-in-real-time-with-a-single-web-camera","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8162509,"orderField":0},{"dateTime":"Thursday, May 1, 2014","urlTitle":"printing-interactivity:-customizable-3-d-printing","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi200","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Presenting two new technologies that empower consumers to design and produce working physical devices customized to their particular needs:\n\nA highly interactive, touch-first 3-D printing app makes 3-D modeling accessible to a broad range of consumers. It uses the 3-D printer support in Windows 8.1 and adds an intuitive, block-based editor.\nA technique enabling users to create working interactive devices cheaply and easily, based on recent advances in conductive inks coupled with a new type of modular electronic components.\nWhen combined, these two technologies give a glimpse of a future world where it is inexpensive and easy for users to build devices with customized form and function.","dateTimeMS":1398932700000,"title":"Printing Interactivity: Customizable 3-D Printing","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=printing-interactivity%3A-customizable-3-d-printing","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8162589,"orderField":0},{"dateTime":"Friday, May 2, 2014","urlTitle":"surroundweb:-spreading-the-web-to-multiple-screens","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi201","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Projectors, tablets, and other devices, combined with depth cameras, enable applications to span multiple \"screens.\" This work enables webpages to be experienced outside of your PC monitors to take advantage of all your devices in concert. For example, a karaoke webpage could use your phone, tablet, big-screen television, and projectors to provide an awesome entertainment experience. Webpages also are enabled to \u201csee\u201d objects in the room and respond to them -- all while preserving privacy from the owner of the webpage.","dateTimeMS":1399017660000,"title":"SurroundWeb: Spreading the Web to Multiple Screens","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=surroundweb%3A-spreading-the-web-to-multiple-screens","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8162793,"orderField":0},{"dateTime":"Friday, May 9, 2014","urlTitle":"quick-answers-from-large-data","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi202","groupId":53319,"channel":"BIG DATA","description":"Tempe is an interactive system for exploring large data sets. It accelerates faster machine learning by facilitating quick, iterative feature engineering and data understanding. Tempe is a combination of three technologies:\n\nTrill: a high-speed, temporal, progressive-relational stream-processing engine 100 times faster than StreamInsight.\nWINQ: a layer that emulates LINQ but provides progressive queries\u2014providing \u201cbest effort\u201d partial answers.\nStat: an interactive, C# integrated development environment that enables users to visualize progressive answers.\nThe combination of these technologies enables users to try and discard queries quickly, enabling much faster exploration of large data sets.","dateTimeMS":1399621440000,"title":"Quick Answers From Large Data","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=quick-answers-from-large-data","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8162945,"orderField":0},{"dateTime":"Thursday, May 8, 2014","urlTitle":"when-urban-air-quality-meets-big-data","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi203","groupId":53319,"channel":"BIG DATA","description":"Urban air quality -- the concentration of PM2.5 -- is of great importance in protecting human health. While there are limited air-quality-monitor-stations in a city, air quality varies by location significantly and is influenced by multiple complex factors, such as traffic flow and land use. Consequently, people cannot know the air quality of a location without a monitoring station. This project infers real-time, fine-grained air-quality information throughout a city, based on air-quality data reported by existing monitor stations and a variety of data sources observed in the city, such as meteorology, traffic flow, human mobility, the structure of road networks, and points of interest. This fine-grained air-quality information could help people figure out when and where to go jogging\u2014or when they should shut the window or put on a face mask in locations where air quality is already a daily issue. This could lead to long-term solutions in predicting forthcoming air quality and identifying the root cause of air pollution.","dateTimeMS":1399539060000,"title":"When Urban Air Quality Meets Big Data","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=when-urban-air-quality-meets-big-data","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8193213,"orderField":0},{"dateTime":"Tuesday, May 6, 2014","urlTitle":"errant-hashtag:-real-change","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi205","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Author David Alan Grier expands on his Errant Hashtag column, discussing how The change that software has wrought is a change to how we organize ourselves.","dateTimeMS":1399348860000,"title":"Errant Hashtag: Real Change","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=errant-hashtag%3A-real-change","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8172174,"orderField":0},{"dateTime":"Wednesday, May 7, 2014","urlTitle":"toward-compressive-camera-networks","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi206","groupId":53319,"channel":"BIG DATA","description":"A video demonstration of how compressive sensing lets researchers reconstruct high-resolution data from fewer samples, which could alleviate the data deluge in large-scale multimodal camera networks.","dateTimeMS":1399435260000,"title":"Toward Compressive Camera Networks","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=toward-compressive-camera-networks","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8172602,"orderField":0},{"dateTime":"Monday, May 12, 2014","urlTitle":"computing-conversations:-nathaniel-borenstein-on-mime","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi207","groupId":53319,"channel":"NETWORKING","description":"Author Charles Severance provides an audio recording of his Computing Conversations column, in which he discusses his interview with Nathaniel Borenstein about how mail evolved from plaintext to multimedia.","dateTimeMS":1399871160000,"title":"Computing Conversations: Nathaniel Borenstein on MIME","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=computing-conversations%3A-nathaniel-borenstein-on-mime","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8172630,"orderField":0},{"dateTime":"Friday, May 16, 2014","urlTitle":"how-search-can-help-in-a-medical-crisis","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi230","groupId":53319,"channel":"MOBILE","description":"One day, a woman named Lisa is walking her dog, Lucky, when she meets an elderly neighbor. Suddenly, the neighbor falls unconscious and stops breathing.\n\nWhat would you do in this scenario? These days, many people\u2019s initial reaction would be to reach for their mobile phones and seek help. But today\u2019s search engines don\u2019t offer pertinent assistance for such a situation. You can go to Wikipedia or the Mayo Clinic site, but those resources are designed for relaxed information seeking, not for urgent settings such as the one above.","dateTimeMS":1400216460000,"title":"How Search Can Help in a Medical Crisis","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=how-search-can-help-in-a-medical-crisis","target":"_self","peerReviewed":false,"subType":"","id":8192563,"orderField":0},{"dateTime":"Thursday, May 15, 2014","urlTitle":"analystperspectives-weekly-sc-9","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi231","groupId":53319,"channel":"SECURITY","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending May 09, 2014.","dateTimeMS":1400142540000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=analystperspectives-weekly-sc-9","target":"_self","peerReviewed":false,"subType":"","id":8196113,"orderField":0},{"dateTime":"Tuesday, May 20, 2014","urlTitle":"mobile-engagement-is-driving-enterprise-it-transformations","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi234","groupId":53319,"channel":"MOBILE","description":"As the IT market becomes increasingly cloud- and mobile-led, enterprises grapple with how to evolve their IT infrastructure while balancing the costs and challenges of transforming their IT strategies to conform to industry regulations.","dateTimeMS":1400562120000,"title":"Mobile engagement is driving enterprise IT transformations","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=mobile-engagement-is-driving-enterprise-it-transformations","target":"_self","peerReviewed":false,"subType":"","id":8202796,"orderField":0},{"dateTime":"Thursday, May 22, 2014","urlTitle":"analystperspectives-weekly-s-10","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi236","groupId":53319,"channel":"MOBILE","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending May 16, 2014.","dateTimeMS":1400734920000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-10","target":"_self","peerReviewed":false,"subType":"","id":8219932,"orderField":0},{"dateTime":"Wednesday, May 28, 2014","urlTitle":"analystperspectives-weekly-s-11","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi251","groupId":53319,"channel":"MOBILE","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending May 23, 2014.","dateTimeMS":1401283860000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-11","target":"_self","peerReviewed":false,"subType":"","id":8217984,"orderField":0},{"dateTime":"Monday, Jun 2, 2014","urlTitle":"computing-and-the-law:-privacy-and-big-data","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"BIG DATA","description":"Authors Brian M. Gaff, Heather Egan Sussman, and Jennifer Geetter provide an audio recording of the Computing and the Law column, in which they discuss how big data's explosive growth has prompted the US government to release new reports that address the issues\u2014particularly related to privacy\u2014resulting from this growth.","dateTimeMS":1401692460000,"title":"Computing and the Law: Privacy and Big Data","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=computing-and-the-law%3A-privacy-and-big-data","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8224216,"orderField":0},{"dateTime":"Wednesday, Jun 4, 2014","urlTitle":"errant-hashtag:-peace-in-our-time","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"NETWORKING","description":"Author David Alan Grier expands on his Errant Hashtag column, discussing the First and Second Great Wars of Internet Governance.","dateTimeMS":1401860220000,"title":"Errant Hashtag: Peace in Our Time","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=errant-hashtag%3A-peace-in-our-time","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8225586,"orderField":0},{"dateTime":"Thursday, Jun 5, 2014","urlTitle":"expanding-the-frontiers-of-smartphone-ecosystems","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi265","groupId":53319,"channel":"MOBILE","description":"A video demonstration of Smart AppStore, which offers five important features for today's smartphone users: biometric authentication, multilevel authorization, gesture recognition and navigation, user-tailored reputation scores, and identity management.","dateTimeMS":1401944460000,"title":"Expanding the Frontiers of Smartphone Ecosystems","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=expanding-the-frontiers-of-smartphone-ecosystems","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8225912,"orderField":0},{"dateTime":"Monday, Jun 9, 2014","urlTitle":"analystperspectives-weekly-s-12","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi271","groupId":53319,"channel":"CLOUD","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending May 30, 2014.","dateTimeMS":1402326420000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-12","target":"_self","peerReviewed":false,"subType":"","id":8238738,"orderField":0},{"dateTime":"Monday, Jun 9, 2014","urlTitle":"requirements:-beyond-anecdotal-thinking:-deepening-our-understanding-for-achieving-quality-goa-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"SECURITY","description":"Author Jane Cleland-Huang provides an audio recording of her Requirements column, in which she discusses the importance of making informed decisions about how much time and effort to invest in analyzing security needs and specifying product-level security requirements.","dateTimeMS":1402290900000,"title":"Requirements: Beyond Anecdotal Thinking: Deepening Our Understanding for Achieving Quality Goals","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=requirements%3A-beyond-anecdotal-thinking%3A-deepening-our-understanding-for-achieving-quality-goa-1","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8238783,"orderField":0},{"dateTime":"Wednesday, Jun 11, 2014","urlTitle":"tools-of-the-trade:-service-orchestration-with-rundeck","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Author Diomidis Spinellis provides an audio recording of his On Computing column, in which he discusses how managing and controlling a serviceís provision is tricky, but tools for service orchestration, like Rundeck, can make our lives easier. From IEEE Software's July/August 2014 issue.","dateTimeMS":1402464060000,"title":"Tools of the Trade: Service Orchestration with Rundeck","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=tools-of-the-trade%3A-service-orchestration-with-rundeck","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8239109,"orderField":0},{"dateTime":"Thursday, Jun 12, 2014","urlTitle":"analystperspectives-weekly-s-13","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi274","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending June 06, 2014.","dateTimeMS":1402595100000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-13","target":"_self","peerReviewed":false,"subType":"","id":8244746,"orderField":0},{"dateTime":"Monday, Jun 16, 2014","urlTitle":"seeking-answers-amid-world-cup-excitement","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/53319.png","groupId":53319,"channel":"INSIGHTS","description":"\u201cSports are extremely predictable,\u201d he explains, \u201cbut the World Cup is much more idiosyncratic. It\u2019s more like politics in that way. We know a lot about how a generic Brazil team would do against a generic Croatia team, similar to the way I know how a generic Republican candidate will do against a generic Democratic candidate. Yet it is a whole lot less certain than how the New York Yankees are going to do against the Seattle Mariners with 60 baseball games of data already in the books.\n\n\u201cThat being said, over time, we learn more and more ways to get the data we need to answer the idiosyncratic events in a purely data-driven way.\u201d","dateTimeMS":1402904700000,"title":"Seeking Answers amid World Cup Excitement","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=seeking-answers-amid-world-cup-excitement","target":"_self","peerReviewed":false,"subType":"","id":8283250,"orderField":0},{"dateTime":"Tuesday, Jun 17, 2014","urlTitle":"analystperspectives-weekly-s-14","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi278","groupId":53319,"channel":"CLOUD","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending June 13, 2014.","dateTimeMS":1403012160000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-14","target":"_self","peerReviewed":false,"subType":"","id":8263051,"orderField":0},{"dateTime":"Tuesday, Jun 24, 2014","urlTitle":"a-flexible-pinhole-camera-model-for-coherent-non-uniform-sampling","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/53319.png","groupId":53319,"channel":"BIG DATA","description":"a pinhole camera model that allows modulating the sampling rate over the field of view with great flexibility. This flexible pinhole camera or FPC is defined by a viewpoint (i.e. eye) and by a sampling map that specifies the sampling locations on the image plane. The sampling map is constructed from known regions of interest with interactive and automatic approaches. The FPC provides an inexpensive 3-D projection operation which allows rendering complex datasets quickly, in feed-forward fashion, by projection followed by rasterization.","dateTimeMS":1403586060000,"title":"A Flexible Pinhole Camera Model for Coherent Non-Uniform Sampling","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=a-flexible-pinhole-camera-model-for-coherent-non-uniform-sampling","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8283210,"orderField":0},{"dateTime":"Thursday, Jun 26, 2014","urlTitle":"analystperspectives-weekly-s-15","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi282","groupId":53319,"channel":"MOBILE","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending June 20, 2014.","dateTimeMS":1403760660000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-15","target":"_self","peerReviewed":false,"subType":"","id":8279978,"orderField":0},{"dateTime":"Wednesday, Jul 2, 2014","urlTitle":"analystperspectives-weekly-s-16","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi292","groupId":53319,"channel":"MOBILE","description":"Our News of the Week in Review begins with a variety of Data, Big Data & Digital Assets applications. Here is a sampling from this week\u2019s articles:","dateTimeMS":1404277740000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-16","target":"_self","peerReviewed":false,"subType":"","id":8294203,"orderField":0},{"dateTime":"Thursday, Jul 3, 2014","urlTitle":"andrew-s-tanenbaum:-the-impact-of-minix","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi304","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Author Charles Severance interviews Andrew S. Tanenbaum about the \nmotivation, development, and market impact of the MINIX operating system.","dateTimeMS":1404394980000,"title":"Andrew S. Tanenbaum: The Impact of MINIX","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=andrew-s-tanenbaum%3A-the-impact-of-minix","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8297824,"orderField":0},{"dateTime":"Monday, Jul 7, 2014","urlTitle":"the-financial-challenges-of-cloud-pure-plays:-what-they-can-learn-from-software-vendors","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi305","groupId":53319,"channel":"CLOUD","description":"There is little doubt that a fundamental change is happening in the way enterprises consume IT. Technological advancements that enable cloud deployments of enterprise software are driving the change. While the technology changes are notable, they also carry with them a business model change. Customers can now purchase IT in a more incremental and flexible way, changing the sales model from blue-suit selling to add-to-cart selling.","dateTimeMS":1404710340000,"title":"The financial challenges of cloud pure plays: What they can learn from software vendors","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=the-financial-challenges-of-cloud-pure-plays%3A-what-they-can-learn-from-software-vendors","target":"_self","peerReviewed":false,"subType":"","id":8300634,"orderField":0},{"dateTime":"Thursday, Jul 10, 2014","urlTitle":"analystperspectives-weekly-s-17","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi311","groupId":53319,"channel":"MOBILE","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending July 04, 2014.","dateTimeMS":1404968760000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-17","target":"_self","peerReviewed":false,"subType":"","id":8310538,"orderField":0},{"dateTime":"Wednesday, Jul 16, 2014","urlTitle":"tools-of-the-trade:-service-orchestration-with-runde-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi312","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Author Diomidis Spinellis provides an audio recording of his On Computing column, in which he discusses how managing and controlling a serviceís provision is tricky, but tools for service orchestration, like Rundeck, can make our lives easier. From IEEE Software's July/August 2014 issue.","dateTimeMS":1405487340000,"title":"Tools of the Trade: Service Orchestration with Rundeck","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=tools-of-the-trade%3A-service-orchestration-with-runde-1","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8314630,"orderField":0},{"dateTime":"Thursday, Jul 17, 2014","urlTitle":"conjecture-proof-leads-to-polya-prize","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi313","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"It was almost a year ago that you might have learned the astounding news that a team of two researchers from Yale University and one from Microsoft Research had announced a proof of a riddle that had eluded mathematicians for more than half a century.\n\nThe Kadison-Singer conjecture, first proposed by Richard Kadison and Isadore Singer in 1959, pertains to the mathematical foundations of quantum mechanics.","dateTimeMS":1405574220000,"title":"Conjecture Proof Leads to Pólya Prize","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=conjecture-proof-leads-to-polya-prize","target":"_self","peerReviewed":false,"subType":"","id":8314688,"orderField":0},{"dateTime":"Tuesday, Jul 22, 2014","urlTitle":"chasing-the-impossible-dream:-gps-based-locations-indoors","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi314","groupId":53319,"channel":"MOBILE","description":"Conventional wisdom holds that the use of GPS satellites to enable indoor mapping is a non-starter. GPS receivers, it is said, simply don\u2019t work indoors, for a variety of reasons. While Earth\u2019s outdoors environment has been mapped extensively, indoor localization of places such as shopping malls or department stores remains an elusive dream.","dateTimeMS":1406006760000,"title":"Chasing the Impossible Dream: GPS-Based Locations Indoors","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=chasing-the-impossible-dream%3A-gps-based-locations-indoors","target":"_self","peerReviewed":false,"subType":"","id":8314909,"orderField":0},{"dateTime":"Wednesday, Jul 23, 2014","urlTitle":"catapult:-moving-beyond-cpus-in-the-cloud","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi315","groupId":53319,"channel":"NETWORKING","description":"Operating a datacenter at web scale requires managing many conflicting requirements. The ability to deliver computation at a high level and speed is a given, but because of the demands such a facility must meet, a datacenter also needs flexibility. Additionally, it must be efficient in its use of power, keeping costs as low as possible.","dateTimeMS":1406093760000,"title":"Catapult: Moving Beyond CPUs in the Cloud","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=catapult%3A-moving-beyond-cpus-in-the-cloud","target":"_self","peerReviewed":false,"subType":"","id":8314936,"orderField":0},{"dateTime":"Monday, Jul 14, 2014","urlTitle":"sap\u2019s-\u2018run-simple\u2019-message-is-on-target-but-not-a-current-reality","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"CLOUD","description":"TBR believes SAP is hitting on the right notes as businesses seek to easily use IT to meet goals. At the same time, IT buyers are demanding increased simplicity from their IT environments. SAP is reacting to and driving change. The pace of change has increased dramatically, reflected in public cloud business growing at over five times the overall rate of IT growth. SAP is also driving disruptive change, looking to use innovation to upset competitors and expand its addressable markets.","dateTimeMS":1405312860000,"title":"SAP\u2019s \u2018Run Simple\u2019 message is on target but not a current reality","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=sap%E2%80%99s-%E2%80%98run-simple%E2%80%99-message-is-on-target-but-not-a-current-reality","target":"_self","peerReviewed":false,"subType":"","id":8314963,"orderField":0},{"dateTime":"Tuesday, Jul 15, 2014","urlTitle":"software-defined-networking-has-moved-beyond-hype-but-obstacles-remain-to-its-widespread-adoption","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"NETWORKING","description":"Once a nascent technology understood only by networking visionaries, software-defined networking (SDN) has moved beyond the hype and into real-world network deployments. In 2012 and most of 2013, networking suppliers were primarily focused on communicating their SDN strategies and showcasing initial solutions. Over the last six to 12 months, however, TBR has witnessed not only a maturation of these solutions, but also the implementation of customer deployments as proof that SDN may transform the networking industry similar to how virtualization transformed the server industry over the last decade. Unlike in 2013, when SDN deployments were found only in the data centers of large cloud providers such as Google and Amazon, customers in other verticals such as retail and manufacturing are now using the technology in their production networks.","dateTimeMS":1405403520000,"title":"Software-defined networking has moved beyond hype, but obstacles remain to its widespread adoption","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=software-defined-networking-has-moved-beyond-hype-but-obstacles-remain-to-its-widespread-adoption","target":"_self","peerReviewed":false,"subType":"","id":8314990,"orderField":0},{"dateTime":"Friday, Jul 18, 2014","urlTitle":"next-steps-in-device-proliferation:-toward-a-consumer-internet-of-things-iot-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"MOBILE","description":"As the smartphone and tablet markets saturate and mature, device vendors and consumers are looking toward new smart connected devices that will expand the frontiers of usefulness and entertainment value, while driving growth for device vendors, software developers, software vendors and other adjacent market sectors. While \u201cwearables,\u201d portable devices that often interface with users\u2019 smartphones, have attracted the greatest attention, TBR believes the larger potential market is in fixed devices in the home. The leader in this category is the Nest thermostat, offered by the Nest Labs, now a subsidiary of Google. We think the consumer IoT will complement and often lead the commercial IoT, and together, they will fuel a wave of innovation and expansion in all segments of IT.","dateTimeMS":1405662900000,"title":"Next Steps in Device Proliferation: Toward a Consumer Internet of Things (IoT)","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=next-steps-in-device-proliferation%3A-toward-a-consumer-internet-of-things-iot-","target":"_self","peerReviewed":false,"subType":"","id":8315019,"orderField":0},{"dateTime":"Monday, Jul 21, 2014","urlTitle":"outcome-based-software-buying-creates-new-cy14-opportunities-for-oem-partners","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Enterprise applications customers are increasingly looking for simple-to-deploy solutions that solve defined business problems. Further, they demand the solutions be up and running in shorter and shorter periods of time. Gone are the days when a vendor could expect a long, drawn-out sales process followed by a lengthy systems integration process. Inspired by the instant gratification of their daily lives as consumers, enterprise customers increasingly want the \u201cadd to cart\u201d ease to be extended into enterprise software purchases.","dateTimeMS":1405918860000,"title":"Outcome-based software buying creates new CY14 opportunities for OEM partners","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=outcome-based-software-buying-creates-new-cy14-opportunities-for-oem-partners","target":"_self","peerReviewed":false,"subType":"","id":8315046,"orderField":0},{"dateTime":"Thursday, Jul 24, 2014","urlTitle":"network-equipment-suppliers-will-work-to-make-the-dream-of-network-virtualization-a-reality-in-2014","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi320","groupId":53319,"channel":"NETWORKING","description":"Transformation within the networking industry is occurring rapidly, as networks continue to evolve to fulfill their role as the delivery mechanism for a rapidly growing number of enterprise applications, particularly those being delivered via the cloud and mobile devices.\nAs expected, most of the major network hardware suppliers, including Avaya, Cisco, Dell, HP and Huawei, had a strong presence at Interop Las Vegas 2014, and software vendors such as F5, VMware and Citrix have emerged as major players within the networking ecosystem. One notable exception was Juniper, whose presence was limited to leading a handful of workshops, as the company did not have a booth in the vendor exhibition hall \u2014 further evidence Juniper is de-emphasizing its enterprise business as it focuses on cutting costs in the short term and charting a course for long-term growth.","dateTimeMS":1406221320000,"title":"Network equipment suppliers will work to make the dream of network virtualization a reality in 2014","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=network-equipment-suppliers-will-work-to-make-the-dream-of-network-virtualization-a-reality-in-2014","target":"_self","peerReviewed":false,"subType":"","id":8315075,"orderField":0},{"dateTime":"Friday, Jul 25, 2014","urlTitle":"changing-malware-attack-rates-guide-new-strategies-for-security-vendors","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"SECURITY","description":"Every day cybercriminals launch sophisticated malware attacks against organizations designed to steal valuable data or disable critical services to inflict damage on the organization. The number of malware attacks is increasing, but recent research from Technology Business Research Inc. (TBR) indicates the rate of increase varies significantly depending on the organization; malware attack rates are increasing more rapidly for some organizations and leveling off for others. Security vendors and service providers must adjust their strategies to adapt to changing attack rates.","dateTimeMS":1406264880000,"title":"Changing malware attack rates guide new strategies for security vendors","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=changing-malware-attack-rates-guide-new-strategies-for-security-vendors","target":"_self","peerReviewed":false,"subType":"","id":8315115,"orderField":0},{"dateTime":"Monday, Jul 28, 2014","urlTitle":"growth-areas-such-as-cloud-big-data-security-and-it-consolidation-will-help-atos-ramp-up-revenue-through-2016","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"CLOUD","description":"TBR Perspective \nAtos\u2019 2016 Ambition plan sets a clear strategy for the firm\u2019s growth: Leverage strengths in managed services (MS) and consulting & systems integration (C&SI), commit to disruptive and innovative offerings (with cloud computing as a key growth area), expand reach in North America and emerging geographies, and enhance its position in the payment market through Worldline. With its strategy in place, the firm is in execution mode to overcome its growth challenges, as 2013 revenue declined 0.9% year-to-year at constant scope and exchange rates. Atos is positioning as an end-to-end consult-design-build-run service provider, consolidating its previously separate consulting and technology services with its SI service line and tightening the relationship with the MS service line. Atos\u2019 strategy to align its C&SI business by its four core vertical markets and begin to develop industry-specialized MS offerings will help the firm increase the value and attractiveness of its portfolio. The firm\u2019s investments to augment its traditional portfolio with offerings around technology trends such as cloud, big data and analytics, mobility, smart utilities, and digital security will help support long-term revenue growth and accelerate global expansion. While 2014 will be a year of recovery for the firm, with a difficult 1H14 but anticipated growth improvement in 2H14, the 2016 Ambition plan will enable the firm to reach its three-year target to increase organic revenue by 2% to 3% CAGR from 2014 to 2016.","dateTimeMS":1406524440000,"title":"Growth areas such as cloud, big data, security and IT consolidation will help Atos ramp up revenue through 2016","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=growth-areas-such-as-cloud-big-data-security-and-it-consolidation-will-help-atos-ramp-up-revenue-through-2016","target":"_self","peerReviewed":false,"subType":"","id":8315142,"orderField":0},{"dateTime":"Tuesday, Jul 29, 2014","urlTitle":"salesforce-com-and-its-ecosystem-evolve-to-address-industry-demands","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi323","groupId":53319,"channel":"MOBILE","description":"Salesforce.com relies on ISV Platform partners to develop and sell industry-specific applications\nSalesforce1 is the driving force behind the company\u2019s industry applications play. Salesforce.com is taking a similar approach as Amazon Web Services (AWS) and Microsoft by leaving partners white spaces to build, sell and service industry-specific applications. While Salesforce and its platform competitors have the technical expertise and agility to build industry-specific applications in-house, building and supporting these applications increases R&D and sales and marketing costs \u2014 costs that Salesforce.com, in TBR\u2019s opinion, is trying to reduce. Instead, leveraging partners to drive the majority of industry growth and ensure simple integration enables Salesforce.com to enter the industry applications market while improving profitability and leaving the risk to partners.","dateTimeMS":1406614680000,"title":"Salesforce.com and its ecosystem evolve to address industry demands","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=salesforce-com-and-its-ecosystem-evolve-to-address-industry-demands","target":"_self","peerReviewed":false,"subType":"","id":8351834,"orderField":0},{"dateTime":"Wednesday, Jul 30, 2014","urlTitle":"opportunities-evolving-from-cyber-supply-chain-security-concerns","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi324","groupId":53319,"channel":"SECURITY","description":"Just a few years ago, security breaches were typically enabled by vulnerabilities in the breached organization\u2019s IT infrastructure. Today, however, many security breaches are the consequence of vulnerabilities in the IT infrastructures of the affected organization\u2019s business partners, including the wholesalers, retailers, payment processors and other partners in the organization\u2019s cyber supply chain. This has led to heightened expectations for strong security controls at cyber supply chain partner organizations, a primary topic of discussion at the SecureWorld Boston 2014 conference.\nIncreased focus on cyber supply chain security has altered the way organizations evaluate security solutions and justify security expenditures. It has impacted the way security vendors and service providers engage with customers, placed more demands on cloud service providers and created opportunities for auditors and cyber insurance companies.","dateTimeMS":1406701320000,"title":"Opportunities evolving from cyber supply chain security concerns","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=opportunities-evolving-from-cyber-supply-chain-security-concerns","target":"_self","peerReviewed":false,"subType":"","id":8351854,"orderField":0},{"dateTime":"Tuesday, Jul 1, 2014","urlTitle":"analystperspectives-weekly-s-18","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi362","groupId":53319,"channel":"MOBILE","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending July 25, 2014.","dateTimeMS":1404192720000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-18","target":"_self","peerReviewed":false,"subType":"","id":8351875,"orderField":0},{"dateTime":"Thursday, Jul 31, 2014","urlTitle":"analystperspectives-weekly-s-19","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi363","groupId":53319,"channel":"MOBILE","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending July 25, 2014.","dateTimeMS":1406785020000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-19","target":"_self","peerReviewed":false,"subType":"","id":8351904,"orderField":0},{"dateTime":"Monday, Aug 4, 2014","urlTitle":"how-might-climate-change-affect-our-food-supply-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi365","groupId":53319,"channel":"BIG DATA","description":"t\u2019s no easy question to answer, but prudence demands that we try. Thus, Microsoft and the United States Department of Agriculture (USDA) have teamed up to tackle \u201cfood resilience,\u201d one of several themes that make up the White House\u2019s Climate Data Initiative.","dateTimeMS":1407131340000,"title":"How might climate change affect our food supply?","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=how-might-climate-change-affect-our-food-supply-","target":"_self","peerReviewed":false,"subType":"","id":8351963,"orderField":0},{"dateTime":"Tuesday, Aug 5, 2014","urlTitle":"analystperspectives-weekly-s-20","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi383","groupId":53319,"channel":"MOBILE","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending August 01, 2014.","dateTimeMS":1407250020000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-20","target":"_self","peerReviewed":false,"subType":"","id":8363020,"orderField":0},{"dateTime":"Wednesday, Aug 6, 2014","urlTitle":"computing-conversations:-elizabeth-fong-on-sql-standards","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi384","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Author Charles Severance provides an audio recording of his Computing Conversations column, in which he discusses his interview with Elizabeth Fong about how the standards were created for the Structured Query Language (SQL) database.","dateTimeMS":1407304980000,"title":"Computing Conversations: Elizabeth Fong on SQL Standards","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=computing-conversations%3A-elizabeth-fong-on-sql-standards","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8365587,"orderField":0},{"dateTime":"Thursday, Aug 14, 2014","urlTitle":"analystperspectives-weekly-s-21","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi390","groupId":53319,"channel":"SECURITY","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending August 08, 2014.","dateTimeMS":1407995400000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-21","target":"_self","peerReviewed":false,"subType":"","id":8375307,"orderField":0},{"dateTime":"Monday, Aug 18, 2014","urlTitle":"requirements:-privacy-requirements-in-an-age-of-increased-sharing","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi397","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Author Travis Breaux provides an audio recording of the Requirements column, in which he discusses the increasing importance of privacy in emerging software ecosystems, legal and standards compliance, and software design practice.","dateTimeMS":1408369860000,"title":"Requirements: Privacy Requirements in an Age of Increased Sharing","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=requirements%3A-privacy-requirements-in-an-age-of-increased-sharing","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8384420,"orderField":0},{"dateTime":"Tuesday, Aug 19, 2014","urlTitle":"analystperspectives-weekly-s-22","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi399","groupId":53319,"channel":"SECURITY","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending August 15, 2014.","dateTimeMS":1408456800000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-22","target":"_self","peerReviewed":false,"subType":"","id":8384294,"orderField":0},{"dateTime":"Wednesday, Aug 20, 2014","urlTitle":"quantum-computing-101","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi401","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"An introduction to the mind-bending world of quantum computing. Learn how Microsoft is blending quantum physics with computer science.","dateTimeMS":1408556880000,"title":"Quantum Computing 101","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=quantum-computing-101","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8386793,"orderField":0},{"dateTime":"Thursday, Aug 21, 2014","urlTitle":"stopping-bugs-before-they-sneak-into-software","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi402","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Software development is not for the faint-hearted. Programmers often work long hours, typing code while staring at computer monitors. Computer software can include millions of lines of code, so given the nature and the volume of the work involved, mistakes are unavoidable.","dateTimeMS":1408597500000,"title":"Stopping Bugs Before They Sneak into Software","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=stopping-bugs-before-they-sneak-into-software","target":"_self","peerReviewed":false,"subType":"","id":8387026,"orderField":0},{"dateTime":"Tuesday, Aug 26, 2014","urlTitle":"computing-conversations:-nii-quaynor-on-bringing-the-internet-to-africa","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi403","groupId":53319,"channel":"NETWORKING","description":"Author Charles Severance provides an audio recording of his Computing Conversations column, in which he discusses his interview with Nii Quaynor about how the story of bringing the Internet to Africa is one of cooperation and collaboration for the common good.","dateTimeMS":1409061540000,"title":"Computing Conversations: Nii Quaynor on Bringing the Internet to Africa","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=computing-conversations%3A-nii-quaynor-on-bringing-the-internet-to-africa","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8392973,"orderField":0},{"dateTime":"Wednesday, Aug 27, 2014","urlTitle":"science-fiction-prototyping:-my-summer-with-a-robot","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi404","groupId":53319,"channel":"MOBILE","description":"Futurist Brian David Johnson expands on his Science Fiction Prototyping column, speaking with Julie Hubschman about how she spent the summer with Jimmy the Robot, a walking, talking, tweeting science fiction prototype.","dateTimeMS":1409115960000,"title":"Science Fiction Prototyping: My Summer with a Robot","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=science-fiction-prototyping%3A-my-summer-with-a-robot","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8393000,"orderField":0},{"dateTime":"Friday, Sep 5, 2014","urlTitle":"analystperspectives-weekly-s-24","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi417","groupId":53319,"channel":"SECURITY","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending August 29, 2014.","dateTimeMS":1409894700000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-24","target":"_self","peerReviewed":false,"subType":"","id":8408038,"orderField":0},{"dateTime":"Monday, Sep 8, 2014","urlTitle":"vmware-is-enabling-it-and-process-transformation-to-drive-high-profile-customer-engagements","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi418","groupId":53319,"channel":"NETWORKING","description":"\u201cNo Limits\u201d was the theme for VMware\u2019s partner, developer and customer conference VMworld 2014, encapsulating the transformational opportunities cloud, mobile and big data disruptors are creating for businesses.","dateTimeMS":1410152580000,"title":"VMware is enabling IT and process transformation to drive high-profile customer engagements","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=vmware-is-enabling-it-and-process-transformation-to-drive-high-profile-customer-engagements","target":"_self","peerReviewed":false,"subType":"","id":8408065,"orderField":0},{"dateTime":"Tuesday, Sep 9, 2014","urlTitle":"requirements-engineering-means-business-success","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi420","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Business success means to deliver the right solutions at the right time to the right markets. Requirements Engineering is the discipline within systems and software engineering that bridges the entire life cycle and thus determines success or failure of a product or project. This blog provides a fresh look on requirements engineering, and why you need to improve it...","dateTimeMS":1410240780000,"title":"Requirements Engineering Means Business Success","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=requirements-engineering-means-business-success","target":"_self","peerReviewed":false,"subType":"","id":8477278,"orderField":0},{"dateTime":"Wednesday, Sep 10, 2014","urlTitle":"software-defined-storage-redefines-modern-data-management","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi421","groupId":53319,"channel":"NETWORKING","description":"Data center transformation is no longer an option for only the brave or well-funded. Software-defined storage (SDS) is transforming data management into a simpler, less costly and more approachable option for customers compared to traditional models. Because the SDS approach is progressing more rapidly and at a more customer-accessible level than other technologies, such as networking, it will help define the overall software-defined data center movement that is in motion.","dateTimeMS":1410325560000,"title":"Software-defined storage redefines modern data management","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=software-defined-storage-redefines-modern-data-management","target":"_self","peerReviewed":false,"subType":"","id":8414217,"orderField":0},{"dateTime":"Friday, Sep 12, 2014","urlTitle":"disruptive-technologies-will-prove-instrumental-to-effectively-dealing-with-emerging-government-challe","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi422","groupId":53319,"channel":"NETWORKING","description":"The conference topics revolved around how to take advantage of cross-organizational collaboration and disruptive technologies such as predictive analytics to improve government services delivery through more efficient and innovative IT technology enablement.","dateTimeMS":1410497160000,"title":"Disruptive technologies will prove instrumental to effectively dealing with emerging government challe","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=disruptive-technologies-will-prove-instrumental-to-effectively-dealing-with-emerging-government-challe","target":"_self","peerReviewed":false,"subType":"","id":8414244,"orderField":0},{"dateTime":"Friday, Sep 19, 2014","urlTitle":"analystperspectives-weekly-s-25","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi427","groupId":53319,"channel":"MOBILE","description":"As Apple unveils its latest iPhone and Apple Watch, analysts fill the Mobile & Broadband section with thoughts and opinions. Here are just a few:","dateTimeMS":1411103400000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-25","target":"_self","peerReviewed":false,"subType":"","id":8433540,"orderField":0},{"dateTime":"Monday, Sep 22, 2014","urlTitle":"tableau-conference-2014:-sir-mix-a-lot-was-only-the-beginning-see-more-at:-http:-techproessentials-com-tableau-conference-2014-sir-mix-a-lot-was-only-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi428","groupId":53319,"channel":"BIG DATA","description":"CEO and co-founder Christian Chabot kicked things off in front of a crowd of over 5,500 customers and partners. The theme of the opening keynote was \u201cThe Art of Analytics.\u201d Mr. Chabot likened an analyst\u2019s design process for data visualization to the creative process of an artist with a blank canvas or a sculptor with a slab or marble. Visualization software, he drove home, should \u201cunleash the creative power of data\u201d and has the power to \u201cremove the drudgery\u201d of analysis. - See more at: http://techproessentials.com/tableau-conference-2014-sir-mix-a-lot-was-only-the-beginning/#sthash.xdqJQqIr.dpuf","dateTimeMS":1411363080000,"title":"Tableau Conference 2014: Sir Mix-a-Lot Was Only the Beginning - See more at: http://techproessentials.com/tableau-conference-2014-sir-mix-a-lot-was-only-the-beginning/#sthash.cLKAwIqj.dpuf","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=tableau-conference-2014%3A-sir-mix-a-lot-was-only-the-beginning-see-more-at%3A-http%3A-techproessentials-com-tableau-conference-2014-sir-mix-a-lot-was-only-","target":"_self","peerReviewed":false,"subType":"","id":8433567,"orderField":0},{"dateTime":"Wednesday, Sep 24, 2014","urlTitle":"not-so-simple-security","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi429","groupId":53319,"channel":"SECURITY","description":"The announcement of the creation of Simply Secure \u2013 \u201ca new organization focused on making open source security tools simpler and easier for people to use\u201d \u2013 is an interesting attempt to change the forces that have up to now been slowing or blocking the adoption of security in consumer-facing devices and applications.","dateTimeMS":1411534860000,"title":"Not So Simple Security","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=not-so-simple-security","target":"_self","peerReviewed":false,"subType":"","id":8436233,"orderField":0},{"dateTime":"Thursday, Sep 25, 2014","urlTitle":"analystperspectives-weekly-s-26","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi431","groupId":53319,"channel":"BIG DATA","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending September 19, 2014.","dateTimeMS":1411621800000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-26","target":"_self","peerReviewed":false,"subType":"","id":8438503,"orderField":0},{"dateTime":"Monday, Sep 29, 2014","urlTitle":"catching-fire-in-the-cloud:-infor-takes-on-customer-stasis-workday-and-salesforce-com","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"","description":"It\u2019s year four in the Charles Phillips era at Infor, and the more things change the more they remain the same. The changes are impressive \u2013 new functionality across a wide swath of its legacy product lines, a new release of Infor XI, its next generation suite, a focus on industry-specific clouds that is such a good idea that I expect it will attract copycats from all over the market, a dedicated data science consulting team, new capabilities for defining and delivering best practices in implementations \u2013 it\u2019s a long list, and it all looks good.","dateTimeMS":1411967880000,"title":"Catching Fire in the Cloud: Infor Takes on Customer Stasis, Workday, and Salesforce.com","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=catching-fire-in-the-cloud%3A-infor-takes-on-customer-stasis-workday-and-salesforce-com","target":"_self","peerReviewed":false,"subType":"","id":53950881,"orderField":0},{"dateTime":"Monday, Oct 6, 2014","urlTitle":"analystperspectives-weekly-s-27","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi456","groupId":53319,"channel":"MOBILE","description":"AnalystPerspectives Weekly Scan covers analyst commentary from the week ending September 26, 2014.","dateTimeMS":1412573940000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-27","target":"_self","peerReviewed":false,"subType":"","id":8454514,"orderField":0},{"dateTime":"Thursday, Oct 9, 2014","urlTitle":"prpl-matters","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/swift-thumb.jpg","groupId":8459902,"channel":"","description":"Welcome to the inaugural post of prpl Matters \u2013 an ongoing series of perspectives by myself and other prpl Foundation members, addressing the challenges of bringing the Internet of things (IoT) ecosystem to fruition. The posts will address how technologists from a range of sectors and business interests can more rapidly move toward far greater success through collaborative efforts on key underlying areas of interest and value to all.","dateTimeMS":1412887740000,"title":"Security: The Ultimate Barrier to IoT Success","type":"article","subCategories":"","url":"/web/prpl-matters/content?g=8459902&type=article&urlTitle=prpl-matters","target":"_self","peerReviewed":false,"subType":"BLOG POST","id":53951446,"orderField":0},{"dateTime":"Monday, Oct 13, 2014","urlTitle":"-how-far-can-we-trust-big-data-analytics-google-hangout","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi462","groupId":53319,"channel":"BIG DATA","description":"Stuart Williams, Vice President, TBRI serves as the moderator leading discussions on usage and limits of big data analytics. He talks with Greg Arnold, LinkedIn, Senior Director of Data Engineering and Mike Ames, SAS, Director of Data Science.","dateTimeMS":1413228480000,"title":"\"How Far Can We Trust Big Data Analytics?\" Google+ Hangout","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=-how-far-can-we-trust-big-data-analytics-google-hangout","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8468079,"orderField":0},{"dateTime":"Tuesday, Oct 14, 2014","urlTitle":"analystperspectives-weekly-s-28","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi463","groupId":53319,"channel":"CLOUD","description":"AnalystPerspectives Weekly Scan covers analyst commentary from the week ending October 10, 2014.","dateTimeMS":1413291780000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-28","target":"_self","peerReviewed":false,"subType":"","id":8469268,"orderField":0},{"dateTime":"Thursday, Oct 16, 2014","urlTitle":"operator-focus-in-north-america-shifting-from-lte-coverage-to-densification-and-monetization","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi464","groupId":53319,"channel":"MOBILE","description":"With LTE now deployed pervasively across North America and gaining momentum in Latin America, industry focus is shifting toward how to densify these networks to handle the exponential increase in data traffic and how to monetize this powerful new network infrastructure. The private 2014 4G Americas Analyst Forum focused on these topics and others, and provided a unique view into how operators and vendors plan to address the major challenges the industry faces. Several of the sessions covered included how to better leverage Wi-Fi and cellular together, what 5G will look like, and what obstacles are slowing the take-off of the M2M market.","dateTimeMS":1413471600000,"title":"Operator focus in North America shifting from LTE coverage to densification and monetization","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=operator-focus-in-north-america-shifting-from-lte-coverage-to-densification-and-monetization","target":"_self","peerReviewed":false,"subType":"","id":8473547,"orderField":0},{"dateTime":"Friday, Oct 17, 2014","urlTitle":"requirements:-requirements-in-a-global-world","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi465","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Author Jane Cleland-Huang provides an audio recording of the Requirements column, coauthored with Paula Laurent, in which she discusses how the challenges of eliciting requirements in global projects can be addressed through deliberate upfront planning processes that take into consideration people, technology, meeting locations, communication, workflow processes, and documentation needs.","dateTimeMS":1413557580000,"title":"Requirements: Requirements in a Global World","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=requirements%3A-requirements-in-a-global-world","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8475682,"orderField":0},{"dateTime":"Tuesday, Oct 21, 2014","urlTitle":"one-minute-guide-to-understanding-the-supply-chain-analytics-continuum","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":53319,"channel":"BIG DATA","description":"Analytics are now an integral part of any supply chain information management system. Modern \ncomputing power and advances in analytical software have made powerful analytics not only possible, \nbut practical for most businesses sitting on top of a cornucopia of supply chain data. Analytics run the \ngambit from historical data dumps to models that suggest the best course of action based on a set of \nprobable outcomes.","dateTimeMS":1413870960000,"title":"One minute Guide to Understanding the Supply Chain Analytics Continuum","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=one-minute-guide-to-understanding-the-supply-chain-analytics-continuum","target":"_self","peerReviewed":false,"subType":"","id":8488472,"orderField":0},{"dateTime":"Monday, Oct 27, 2014","urlTitle":"understanding-the-supply-chain-collaboration-continuum","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi468","groupId":53319,"channel":"BIG DATA","description":"Collaboration of information and timing and are two extremely critical aspects of supply chain business intelligence and information management. Not getting data to the appropriate decision makers renders the information nominally useless. Not giving it to the right people, or right group of people, via the right mechanism also means that data loses value.","dateTimeMS":1414386840000,"title":"Understanding the Supply Chain Collaboration Continuum","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=understanding-the-supply-chain-collaboration-continuum","target":"_self","peerReviewed":false,"subType":"BLOG POST","id":8476949,"orderField":0},{"dateTime":"Wednesday, Oct 29, 2014","urlTitle":"analystperspectives-weekly-s-29","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi481","groupId":53319,"channel":"BIG DATA","description":"Analyst commentary.","dateTimeMS":1414615800000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-29","target":"_self","peerReviewed":false,"subType":"","id":8483532,"orderField":0},{"dateTime":"Thursday, Oct 30, 2014","urlTitle":"tbr-perspective:-symantec\u2019s-move-will-disrupt-security-and-storage-landscapes","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi483","groupId":53319,"channel":"SECURITY","description":"Symantec\u2019s decision to split into two (as yet unnamed) companies was a much needed move to get Symantec back on track to competitive growth rates in the fast-moving security and storage software markets. Once renowned as an endpoint security vendor, the new Symantec security company is preparing to re-emerge as a stronger security vendor with a broader portfolio and a renewed focus on addressing the key drivers (such as zero-day threats) for businesses\u2019 and consumers\u2019 IT security decisions.","dateTimeMS":1414688400000,"title":"TBR perspective: Symantec\u2019s move will disrupt security and storage landscapes","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=tbr-perspective%3A-symantec%E2%80%99s-move-will-disrupt-security-and-storage-landscapes","target":"_self","peerReviewed":false,"subType":"","id":8493186,"orderField":0},{"dateTime":"Monday, Nov 3, 2014","urlTitle":"analystperspectives-weekly-s-30","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi484","groupId":53319,"channel":"MOBILE","description":"AnalystPerspectives Weekly Scan covers analyst commentary.","dateTimeMS":1414994460000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-30","target":"_self","peerReviewed":false,"subType":"","id":8494446,"orderField":0},{"dateTime":"Wednesday, Nov 5, 2014","urlTitle":"analystperspectives-weekly-s-31","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi501","groupId":53319,"channel":"CLOUD","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending October 31, 2014.","dateTimeMS":1415235120000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-31","target":"_self","peerReviewed":false,"subType":"","id":8501311,"orderField":0},{"dateTime":"Thursday, Nov 6, 2014","urlTitle":"engility\u2019s-acquisition-of-tasc-diversifies-its-customer-base-and-adds-high-value-solutions-to-its-portfolio-\u2014-all-acquired-for-a-bargain-price","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi502","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"In 2009 Northrop Grumman sold TASC to private equity backers General Atlantic LLC and Kohlberg Kravis Roberts & Co. for $1.65 billion. The agreed-on price for TASC to Engility, nearly $550 million less than what TASC\u2019s owners paid five years ago, likely reflects how challenging the federal IT environment has been since 2009. Additionally, TASC employs about 4,000 employees versus 5,000 at the time of the spin-off from Northrop. TASC\u2019s projected revenue contribution to Engility in 2014 of $1.1 billion is down 31% from $1.6 billion in 2009 and implies a nearly flat 1x multiplier for the acquisition price.","dateTimeMS":1415257020000,"title":"Engility\u2019s acquisition of TASC diversifies its customer base and adds high-value solutions to its portfolio \u2014 all acquired for a bargain price","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=engility%E2%80%99s-acquisition-of-tasc-diversifies-its-customer-base-and-adds-high-value-solutions-to-its-portfolio-%E2%80%94-all-acquired-for-a-bargain-price","target":"_self","peerReviewed":false,"subType":"","id":8501338,"orderField":0},{"dateTime":"Friday, Nov 7, 2014","urlTitle":"advancing-cloud-computing","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi503","groupId":53319,"channel":"SECURITY","description":"This Web extra features Ed Amoroso, AT&T\u2019s Chief Security Officer, discussing practical methods for securing the cloud. From IT Professional's November/December 2014 Guest Editors' Introduction, \"Advancing Cloud Computing,\" by Irena Bojanova, Vladimir Dimitrov, and Fulvio Corno.","dateTimeMS":1415340180000,"title":"Advancing Cloud Computing","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=advancing-cloud-computing","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8501367,"orderField":0},{"dateTime":"Tuesday, Nov 11, 2014","urlTitle":"analystperspectives-weekly-s-32","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi505","groupId":53319,"channel":"CLOUD","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending November 07, 2014.","dateTimeMS":1415716500000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-32","target":"_self","peerReviewed":false,"subType":"","id":8509588,"orderField":0},{"dateTime":"Thursday, Nov 20, 2014","urlTitle":"errant-hashtag:-the-external-environment","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi513","groupId":53319,"channel":"MOBILE","description":"David Alan Grier provides an audio recording of his Errant Hashtag column, in which he discusses how amateur software developers might lack precise technical skills but bring detailed knowledge of their environments to the table.","dateTimeMS":1416464460000,"title":"Errant Hashtag: The External Environment","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=errant-hashtag%3A-the-external-environment","target":"_self","peerReviewed":false,"subType":"","id":8518932,"orderField":0},{"dateTime":"Monday, Nov 24, 2014","urlTitle":"analystperspectives-weekly-s-33","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi516","groupId":53319,"channel":"MOBILE","description":"News of the Week - Analysts Insights\nUpdates in the Mobile & Broadband market this week have analysts talking.","dateTimeMS":1416840840000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-33","target":"_self","peerReviewed":false,"subType":"","id":8528737,"orderField":0},{"dateTime":"Tuesday, Nov 25, 2014","urlTitle":"third-international-women\u2019s-hackathon-continues-into-december","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi517","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"t the hackathon kickoff (which took place in Phoenix, Arizona, during the 2014 Grace Hopper Celebration of Women in Computing), participants around the world worked on these challenges, connecting virtually with one another. Those of us in Arizona were excited to link up with female hackers in India, Japan, Nepal, England, South Africa, Turkey, Pakistan, Bangladesh, Brazil, Kenya, and Trinidad & Tobago. (","dateTimeMS":1416938520000,"title":"Third International Women\u2019s Hackathon continues into December","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=third-international-women%E2%80%99s-hackathon-continues-into-december","target":"_self","peerReviewed":false,"subType":"","id":8530979,"orderField":0},{"dateTime":"Friday, Nov 28, 2014","urlTitle":"data-visualization-for-the-internet-of-things","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi519","groupId":53319,"channel":"BIG DATA","description":"The Internet of Things (IoT) is a mediocre phrase. It\u2019s not creative or clever, and it doesn\u2019t exactly roll off the tongue. It is only because the phenomenon\u2019s potential is so great that it can get away with such a lackluster name. Every day, more machines, sensors, and devices are talking to data systems, and eventually, to analytics users. This data is complex, vast, and fast-moving. The IoT represents a new approach to thinking about devices and data generation, and so a new analytical approach is required as well.","dateTimeMS":1417155480000,"title":"Data Visualization for the Internet of Things","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=data-visualization-for-the-internet-of-things","target":"_self","peerReviewed":false,"subType":"","id":8531164,"orderField":0},{"dateTime":"Wednesday, Dec 3, 2014","urlTitle":"analystperspectives-weekly-s-34","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi534","groupId":53319,"channel":"SECURITY","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending November 28, 2014.","dateTimeMS":1417638900000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-34","target":"_self","peerReviewed":false,"subType":"","id":8538185,"orderField":0},{"dateTime":"Wednesday, Jan 28, 2015","urlTitle":"sustainable-pace","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/agile-thumb.jpg","groupId":8504655,"channel":"","description":"Sustainable pace is a crap concept: We usually view it as the pace at which we should work, more or less. And while the \u201cmore\u201d should happen infrequently and only in small amounts the \u201cless\u201d rarely enters our consciousness. It does make sense for physical activity. I run a marathon at sustainable pace because to work less is to diminish the sense of accomplishment. That doesn't mean that I'll feel as whole and happy at the end as if I\u2019d been having a nice walk on the beach sipping Pina Coladas. And, yes, the Puritan work ethic aside, I deserve that once in a while, too.","dateTimeMS":1422475200000,"title":"Working at a Sustainable Pace","type":"article","subCategories":"","url":"/web/agile-careers/content?g=8504655&type=article&urlTitle=sustainable-pace","target":"_self","peerReviewed":false,"subType":"BLOG POST","id":50896460,"orderField":0},{"dateTime":"Wednesday, Dec 10, 2014","urlTitle":"analystperspectives-weekly-s-35","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi542","groupId":53319,"channel":"BIG DATA","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending December 05, 2014.","dateTimeMS":1418196060000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-35","target":"_self","peerReviewed":false,"subType":"","id":8545386,"orderField":0},{"dateTime":"Wednesday, Dec 10, 2014","urlTitle":"inspired-by-games","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/hoffman.png","groupId":8545555,"channel":"","description":"Technology is born of inspiration, of dreaming the impossible. But there is still an opportunity to use technology to solve societal challenges. Games have this potential. Inspired By Games is focused on showcasing new applications, innovative game design and leading-edge technology in the hope of inspiring others to break rules, cross boundaries, collaborate across the globe and explore cross-disciplinary applications of the arts, culture, science, enterprise, and education.","dateTimeMS":1418239680000,"title":"Inspired by Games","type":"article","subCategories":"","url":"/web/inspired-by-games/content?g=8545555&type=article&urlTitle=inspired-by-games","target":"_self","peerReviewed":false,"subType":"BLOG POST","id":54260471,"orderField":0},{"dateTime":"Tuesday, Dec 16, 2014","urlTitle":"requirements:-toward-meaningful-industrial\u2013academic-partnerships","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi555","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Author Jane Cleland-Huang provides an audio recording of the Requirements column in which she discusses the Ready-Set-Transfer panel at the 2014 IEEE International Requirements Engineering Conference.","dateTimeMS":1418746020000,"title":"Requirements: Toward Meaningful Industrial\u2013Academic Partnerships","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=requirements%3A-toward-meaningful-industrial%E2%80%93academic-partnerships","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8551610,"orderField":0},{"dateTime":"Wednesday, Dec 17, 2014","urlTitle":"software-engineering-for-internet-computing:-internetware-and-beyond","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi557","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"IEEE Software Multimedia Editor Davide Falessi interviews Antonia Bertolino, Hong Mei, and Tao Xie, guest editors of the magazine\u2019s January/February 2015 issue on Software Engineering for Internet Computing: Internetware and Beyond.","dateTimeMS":1418852040000,"title":"Software Engineering for Internet Computing: Internetware and Beyond","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=software-engineering-for-internet-computing%3A-internetware-and-beyond","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8558217,"orderField":0},{"dateTime":"Thursday, Dec 18, 2014","urlTitle":"cloud-computing-helps-make-sense-of-cloud-forests","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi558","groupId":53319,"channel":"CLOUD","description":"The researchers want to unravel the impact of micro-climate variation in the cloud forest ecosystem. Essentially, they want to understand how the forest works\u2014how carbon dioxide, water, nitrogen, and other nutrients cycle through plants, animals, and microorganisms in this complex ecosystem. To do so, they\u2019ve placed some 700 sensors in 15 forest plots, locating the devices at levels throughout the forest, from beneath the soil to the top of the canopy.","dateTimeMS":1418887560000,"title":"Cloud computing helps make sense of cloud forests","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=cloud-computing-helps-make-sense-of-cloud-forests","target":"_self","peerReviewed":false,"subType":"","id":8559126,"orderField":0},{"dateTime":"Friday, Dec 19, 2014","urlTitle":"grady-booch:-of-boilers-bit-and-bots","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi559","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Author Grady Booch provides an audio recording of his On Computing column, in which he discusses how parallels exist between the Industrial Revolution and our current computing revolution regarding risk, transparency, and responsibility. Grady then examines some of these parallels, their implications for society, and individual developer\u2019s responsibilities.","dateTimeMS":1418968860000,"title":"Grady Booch: Of Boilers, Bit, and Bots","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=grady-booch%3A-of-boilers-bit-and-bots","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8559147,"orderField":0},{"dateTime":"Friday, Dec 26, 2014","urlTitle":"saying-goodbye-and-good-riddance-to-passwords","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi560","groupId":53319,"channel":"SECURITY","description":"There are a lot of things about modern Internet security that come up short when it comes to providing real protection but easily the biggest offender is passwords. We use passwords for everything, from logging into our mail and social networks to our banks and medical records. And the not so big secret is that, for the vast majority of people, passwords provide no security at all.","dateTimeMS":1419574800000,"title":"Saying Goodbye and Good Riddance to Passwords","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=saying-goodbye-and-good-riddance-to-passwords","target":"_self","peerReviewed":false,"subType":"","id":8560047,"orderField":0},{"dateTime":"Monday, Dec 29, 2014","urlTitle":"centralizing-national-flood-data-in-the-cloud-can-help-reduce-loss-of-life-and-property","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi561","groupId":53319,"channel":"CLOUD","description":"Researchers from the University of Texas partnered with other researchers, federal agencies, and first responders to create the National Flood Interoperability Experiment (NFIE). They used Microsoft Azure to build a new national flood data-modeling and mapping system with the potential to provide life- and cost-saving information to the public. The goals of the NFIE include standardizing data, demonstrating a scalable solution, and helping to close the gap between national flood forecasting and local emergency response.","dateTimeMS":1419834300000,"title":"Centralizing national flood data in the cloud can help reduce loss of life and property","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=centralizing-national-flood-data-in-the-cloud-can-help-reduce-loss-of-life-and-property","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8560076,"orderField":0},{"dateTime":"Tuesday, Dec 30, 2014","urlTitle":"xim-1-3-extends-photo-sharing-to-the-big-screen-on-multiple-platforms","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi562","groupId":53319,"channel":"CLOUD","description":"Xim is a free app that gives you the ability to create a temporary, ad hoc network between multiple phones so you can share photos with others\u2014whether remote or in the same room, without relinquishing your personal mobile device. Friends can follow along synchronously on their own devices or browser interface, and can even control the pace of photos or pinch and zoom while you provide color commentary. With version 1.3 you can share your photos on the big screen via streaming media devices.","dateTimeMS":1419921060000,"title":"Xim 1.3 Extends Photo-Sharing to the Big Screen on Multiple Platforms","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=xim-1-3-extends-photo-sharing-to-the-big-screen-on-multiple-platforms","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8560105,"orderField":0},{"dateTime":"Thursday, Jan 15, 2015","urlTitle":"tpcps-gain-new-appreciation-as-it-security-solution","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/webcontent/TPCPs-small-image.png","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Contemporary information technology isn't adequate to secure the valuable information these systems are entrusted to manage, as recent security breaches at US corporations and government agencies demonstrate. There are two reasons for this. First, public and private networks, based on Ethernet and the TCP/IP protocol, weren?t designed to protect information, but to make it easy to share information. Second, the architecture of the modern IT infrastructure was established long before cybercrime became the global nemesis that it is today, and therefore the issues of security and trust weren?t well understood or taken into account.","dateTimeMS":1421335740000,"title":"TPCPs Gain New Appreciation as IT Security Solution","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=tpcps-gain-new-appreciation-as-it-security-solution","target":"_blank","peerReviewed":false,"subType":"","id":47967906,"orderField":0},{"dateTime":"Tuesday, Jan 20, 2015","urlTitle":"2015-looking-to-be-a-great-year-for-cloud-adoption","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/cloud-computing-thumbnail.jpg","groupId":53319,"channel":"CLOUD","description":"In 2014, the cloud market rang in at $156 billion. In 2015, projected cloud spend is set at over 180 billion. With cloud spending eventually topping off at $235 billion in 2017, it seems evident that the growing trend in business is overall cloud adoption.","dateTimeMS":1421771280000,"title":"2015 Looking to Be a Great Year for Cloud Adoption","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=2015-looking-to-be-a-great-year-for-cloud-adoption","target":"_blank","peerReviewed":false,"subType":"","id":47964088,"orderField":0},{"dateTime":"Wednesday, Jan 21, 2015","urlTitle":"interoperable-e-participation","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/compute-outlook.jpg","groupId":53319,"channel":"BIG DATA","description":"Interoperable e-Participation\n\nComputer magazine Editor in Chief Sumi Helal interviews Constantinos Patsakis about a cryptographic protocol that guarantees citizens privacy through data aggregation and fosters e-participation in a scalable and interoperable way. From Computer's January 2015 issue.","dateTimeMS":1421848740000,"title":"Interoperable e-Participation","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=interoperable-e-participation","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":47967177,"orderField":0},{"dateTime":"Thursday, Jan 22, 2015","urlTitle":"sap-and-culture-clash-marshaling-weapons-in-the-war-of-business-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"SAP\u2019s annual sales kickoff meeting season, FKOM, is under way, with the North American and European versions kicking off this week. FKOM is where the new strategies, products, alliances, and services are all pressure-tested on that thin, white-shirted line of sales people who have the unenviable job of syncing the year\u2019s marketing strategy with the desperate desires of SAP\u2019s customers, and then getting them to actually write a check. It\u2019s a mating ritual that is equal parts science and art, and its quarterly execution is one of the software industry\u2019s greatest and most mystical natural wonders.","dateTimeMS":1421936940000,"title":"SAP and Culture Clash: Marshaling Weapons in the \u201cWar of Business\u201d","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=sap-and-culture-clash-marshaling-weapons-in-the-war-of-business-","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":54201559,"orderField":0},{"dateTime":"Friday, Jan 23, 2015","urlTitle":"what-is-errant-hashtag-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/grier.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"David Alan Grier starts off the new year by taking a moment to define \"Errant Hashtag,\" his monthly column and video that appears in Computer magazine each month.","dateTimeMS":1422024480000,"title":"What Is Errant Hashtag?","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=what-is-errant-hashtag-","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":47977420,"orderField":0},{"dateTime":"Monday, Jan 26, 2015","urlTitle":"startup-advice-get-your-story-straight","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/whurley-thumb.jpg","groupId":53319,"channel":"STARTUPS","description":"Open source advocate William Hurley, known as whurley, got his start working for large companies--in research and development at Apple and as a master inventor for IBM. But where he found his real success was in co-founding new companies--first security management company Symbiot, then Chaotic Moon, an Austin-based mobile software design and development studio, and now Honest Dollar, a stealth financial technology startup that will launch this year at SxSW in Austin.","dateTimeMS":1422300720000,"title":"Startup Advice: Get Your Story Straight","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=startup-advice-get-your-story-straight","target":"_blank","peerReviewed":false,"subType":"","id":50274959,"orderField":0},{"dateTime":"Saturday, Jan 24, 2015","urlTitle":"software-engineering-for-internet-computing-internetware-and-beyond","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/sw.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"IEEE Software Multimedia Editor Davide Falessi interviews Antonia Bertolino, Hong Mei, and Tao Xie, guest editors of the magazine\u2019s January/February 2015 issue on Software Engineering for Internet Computing: Internetware and Beyond.","dateTimeMS":1422154140000,"title":"Software Engineering for Internet Computing: Internetware and Beyond","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=software-engineering-for-internet-computing-internetware-and-beyond","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":49748356,"orderField":0},{"dateTime":"Wednesday, Jan 28, 2015","urlTitle":"computing-and-the-law-ip-issues-for-startups","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/computinglaw.jpg","groupId":53319,"channel":"STARTUPS","description":"IP expert Brian M. Gaff discusses the myriad issues that most startups face before even opening their doors, including getting financing, hiring the right people, finding office space, and--importantly--getting the companyís intellectual property under control and adequately protected.","dateTimeMS":1422453420000,"title":"Computing and the Law: IP Issues for Startups","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=computing-and-the-law-ip-issues-for-startups","target":"_blank","peerReviewed":false,"subType":"PODCAST","id":50247298,"orderField":0},{"dateTime":"Tuesday, Jan 27, 2015","urlTitle":"startup-rock-stars-set-for-march-24-in-san-francisco","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/srs-thumb.jpg","groupId":53319,"channel":"STARTUPS","description":"Startup Rock Stars will provide valuable information for those running, or thinking of running, a startup \u2013 no matter what stage of investment. Visit http://www.computer.org/Startup to see the full list of Rock Stars speakers.","dateTimeMS":1422360660000,"title":"Startup Rock Stars Set for March 24 in San Francisco","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=startup-rock-stars-set-for-march-24-in-san-francisco","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":50274918,"orderField":0},{"dateTime":"Tuesday, Jan 27, 2015","urlTitle":"what-s-different-about-windows-10-analysts-weigh-in","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/windows10.png","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Analysts discuss the pros and cons of Microsoft's new Windows 10 OS.","dateTimeMS":1422373620000,"title":"What's Different About Windows 10: Analysts Weigh In","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=what-s-different-about-windows-10-analysts-weigh-in","target":"_blank","peerReviewed":false,"subType":"","id":49917419,"orderField":0},{"dateTime":"Wednesday, Jan 28, 2015","urlTitle":"enough-consumer-coolness-it-s-time-to-make-a-case-for-windows-10-in-the-enterprise","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"While the biggest selling point of Windows 10 \u2013 a single code base for building apps that run across every possible device \u2013 was definitely part of the messaging of the event, the evidence that Microsoft knows what this really means for the enterprise, or even what makes enterprise users tick, was missing in action. Again.","dateTimeMS":1422457740000,"title":"Enough Consumer Coolness: It\u2019s Time to Make a Case for Windows 10 in the Enterprise","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=enough-consumer-coolness-it-s-time-to-make-a-case-for-windows-10-in-the-enterprise","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":54201539,"orderField":0},{"dateTime":"Wednesday, Jan 28, 2015","urlTitle":"canadian-startups-recognized-in-techvibes-annual-contest","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/canada-thumb.jpg","groupId":53319,"channel":"STARTUPS","description":"A friendly buying and selling platform, a quick-and-easy online store builder, and the maker of connected urban bikes were among the members of the Canadian startup community singled out for kudos in Techvibes' 2014 Canadian Startup Awards.","dateTimeMS":1422453480000,"title":"Canadian Startups Recognized in Techvibes Annual Contest","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=canadian-startups-recognized-in-techvibes-annual-contest","target":"_blank","peerReviewed":false,"subType":"","id":50247258,"orderField":0},{"dateTime":"Thursday, Jan 29, 2015","urlTitle":"crowdfunding-takes-off-like-a-rocket","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/meece-thumb.jpg","groupId":53319,"channel":"STARTUPS","description":"Brian Meece started out as a ukelele player. Now he's CEO of the online crowdfunding platform RocketHub. Launched in 2010 by Meece and actor/producer Jed Cohen, tech writer Vladimir Vukicevic, and later musician/linguist Alon Hillel-Tuch, the site hosts users from around the world who post campaigns to raise funds and awareness for projects and endeavors.","dateTimeMS":1422551820000,"title":"Crowdfunding Takes Off Like a Rocket","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=crowdfunding-takes-off-like-a-rocket","target":"_blank","peerReviewed":false,"subType":"","id":51896853,"orderField":0},{"dateTime":"Monday, Feb 2, 2015","urlTitle":"fix-it-the-pattern-goal-of-leaving-the-system-more-whole","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/agile-thumb.jpg","groupId":8504655,"channel":"","description":"Christopher Alexander tells us that each pattern is an act of repair that should leave the system more Whole than when we started. That\u2019s the pattern agenda: that every person contribute just a bit every day to making the world more Whole.","dateTimeMS":1422893880000,"title":"Fix it: The Pattern Goal of Leaving the System More Whole","type":"article","subCategories":"","url":"/web/agile-careers/content?g=8504655&type=article&urlTitle=fix-it-the-pattern-goal-of-leaving-the-system-more-whole","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":51900358,"orderField":0},{"dateTime":"Monday, Mar 9, 2015","urlTitle":"two-heads-are-better-than-one","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/agile-thumb.jpg","groupId":8504655,"channel":"","description":"To me, pair development is a no-brainer. It\u2019s more fun than working alone, and you get a little of the benefit of the wisdom of the crowds but without the overhead of ineffective meetings and quality gates that method usually brings.","dateTimeMS":1425900300000,"title":"Two Heads Are Better than One","type":"article","subCategories":"","url":"/web/agile-careers/content?g=8504655&type=article&urlTitle=two-heads-are-better-than-one","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":53932470,"orderField":0},{"dateTime":"Thursday, Apr 2, 2015","urlTitle":"bread-on-the-waters","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/agile-thumb.jpg","groupId":8504655,"channel":"","description":"Innovation has given rise to a whole raft of departments and initiatives, in many industries, aimed at technology transfer. It\u2019s about monetizing ideas.","dateTimeMS":1427988540000,"title":"Bread on the Waters","type":"article","subCategories":"","url":"/web/agile-careers/content?g=8504655&type=article&urlTitle=bread-on-the-waters","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":51905277,"orderField":0},{"dateTime":"Monday, Feb 2, 2015","urlTitle":"startup-advice-howard-leonhardt-says-make-an-impact-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/leonhardt-thumb.jpg","groupId":53319,"channel":"STARTUPS","description":"Howard Leonhardt is an inventor, serial entrepreneur, patent holder, winemaker, and baseball team owner. But what's brought him a different kind of fulfillment is seeing how the cardiac products he's developed have saved human lives.","dateTimeMS":1422903840000,"title":"Startup Advice: Howard Leonhardt Says 'Make an Impact'","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=startup-advice-howard-leonhardt-says-make-an-impact-","target":"_blank","peerReviewed":false,"subType":"","id":53906875,"orderField":0},{"dateTime":"Tuesday, Feb 3, 2015","urlTitle":"industry-waits-for-new-crowdfunding-rules","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/crowdfunding-thumb.jpg","groupId":53319,"channel":"STARTUPS","description":"When the US JOBS Act was passed in April 2012 with overwhelming bipartisan support, it was heralded as a historic victory. No longer would Wall Street have exclusive control of startup fundraising. Instead, startups would be able to reach out to regular people as investors. But two years later, the US Securities and Exchange Commission (SEC) has yet to finalize rules on two of the act's key provisions.","dateTimeMS":1422987840000,"title":"Industry Waits for New Crowdfunding Rules","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=industry-waits-for-new-crowdfunding-rules","target":"_blank","peerReviewed":false,"subType":"","id":51910176,"orderField":0},{"dateTime":"Tuesday, Feb 3, 2015","urlTitle":"guido-van-rossum-welcome-to-python-programming","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/guido.jpg","groupId":53319,"channel":"STARTUPS","description":"Guido van Rossum, the Dutch computer programmer best known as the author of the Python programming language, offers a quick Python introduction to computer programming students.","dateTimeMS":1422988860000,"title":"Guido van Rossum: Welcome to Python Programming","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=guido-van-rossum-welcome-to-python-programming","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":53906895,"orderField":0},{"dateTime":"Wednesday, Feb 4, 2015","urlTitle":"take-the-startup-rock-stars-google-hangout-quiz","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/startups-thumb.jpg","groupId":53319,"channel":"STARTUPS","description":"During this Hangout, which comes one month before the in-person March 24th Startup Rock Stars event in San Francisco, California, speakers will share their Top 10 tips for helping make sure the venture you start gets off on the right foot\u2014and succeeds.","dateTimeMS":1423043580000,"title":"Take the Startup Rock Stars Google Hangout Quiz","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=take-the-startup-rock-stars-google-hangout-quiz","target":"_blank","peerReviewed":false,"subType":"EVENT","id":53933324,"orderField":0},{"dateTime":"Tuesday, Feb 17, 2015","urlTitle":"what-software-trends-are-important-for-product-development-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ebert-thumb.jpg","groupId":5954967,"channel":"","description":"To be successful in the software business, you continuously need to push efficiency and competitiveness. We talked to our clients from various industries, to identify where they are and what software technology trends are important for product development.","dateTimeMS":1424181660000,"title":"What Software Trends Are Important for Product Development?","type":"article","subCategories":"","url":"/web/software-technologies/content?g=5954967&type=article&urlTitle=what-software-trends-are-important-for-product-development-","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":53920377,"orderField":0},{"dateTime":"Friday, Feb 6, 2015","urlTitle":"ensuring-privacy-in-a-personal-health-record-system","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/feb computer.jpg","groupId":53319,"channel":"SECURITY","description":"Guest editor Alf Weaver interviews Jingquan Li about his article \"Ensuring Privacy in a Personal Health Record System\" and balancing personalization, privacy, and security, from Computer's February 2015 issue on Computing in Healthcare.","dateTimeMS":1423227300000,"title":"Ensuring Privacy in a Personal Health Record System","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=ensuring-privacy-in-a-personal-health-record-system","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":53906935,"orderField":0},{"dateTime":"Friday, Feb 6, 2015","urlTitle":"cloud-report-vcloud-air-platform-9-and-more-on-hybrid-clouds","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ap-thumb.jpg","groupId":53319,"channel":"CLOUD","description":"Various cloud developments are a popular topic this week. Here are just a few of the conversations to be found in the Cloud Computing section of Analyst Perspectives","dateTimeMS":1423230900000,"title":"Cloud Report: vCloud Air, Platform 9, and More on Hybrid Clouds","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=cloud-report-vcloud-air-platform-9-and-more-on-hybrid-clouds","target":"_blank","peerReviewed":false,"subType":"NEWS","id":51918878,"orderField":0},{"dateTime":"Monday, Feb 9, 2015","urlTitle":"ap-apple-s-impact-on-the-mobile-market","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ap-thumb.jpg","groupId":53319,"channel":"MOBILE","description":"In the Mobile & Broadband section, Apple\u2019s impact on the market is just one of many topics you will find.","dateTimeMS":1423491360000,"title":"AP: Apple's Impact on the Mobile Market","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=ap-apple-s-impact-on-the-mobile-market","target":"_blank","peerReviewed":false,"subType":"","id":53906915,"orderField":0},{"dateTime":"Saturday, Feb 7, 2015","urlTitle":"where-will-the-big-data-jobs-be-in-2015-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ap-thumb.jpg","groupId":53319,"channel":"CAREERS","description":"In the IT Management and Human Resources section, analysts discuss skills, staffing and security issues.","dateTimeMS":1423319700000,"title":"Where Will the Big Data Jobs Be in 2015?","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=where-will-the-big-data-jobs-be-in-2015-","target":"_blank","peerReviewed":false,"subType":"","id":51919004,"orderField":0},{"dateTime":"Monday, Feb 9, 2015","urlTitle":"computing-and-the-law-byod-omg-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/computinglaw.jpg","groupId":53319,"channel":"SECURITY","description":"Author Brian M. Gaff provides an audio recording of his Computing and the Law column, in which he discusses how bring your own device (BYOD) allows employees to bring personally owned technology to their workplaces and use it in connection with their jobs.","dateTimeMS":1423492920000,"title":"Computing and the Law: BYOD? OMG!","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=computing-and-the-law-byod-omg-","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":53906855,"orderField":0},{"dateTime":"Tuesday, Feb 10, 2015","urlTitle":"the-role-location-plays-in-software-development","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/grier.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Author David Alan Grier expands on his Errant Hashtag column, in which he discusses how location plays an important role in software development and how nine cities hold 40 percent of the U.S. software market, with particular specialties clustered in specific areas. From Computer's February 2015 issue.","dateTimeMS":1423580100000,"title":"The Role Location Plays in Software Development","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=the-role-location-plays-in-software-development","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":51919069,"orderField":0},{"dateTime":"Tuesday, Feb 10, 2015","urlTitle":"technical-achievement-award-recipients-how-did-they-get-there-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/taa.jpg","groupId":53319,"channel":"INSIGHTS","description":"The five prominent technologists who received 2014 IEEE Computer Society Technical Achievement Awards have one thing on common: they've all been on the research trail for many years.","dateTimeMS":1423597800000,"title":"Technical Achievement Award Recipients: How Did They Get There?","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=technical-achievement-award-recipients-how-did-they-get-there-","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":53906835,"orderField":0},{"dateTime":"Tuesday, Feb 10, 2015","urlTitle":"incubation-and-innovation-at-tek-mountain","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/tek2.jpg","groupId":53319,"channel":"STARTUPS","description":"Audrey Speicher, director of Tek Mountain, talks about the model business incubator in Wilmington, North Carolina, that fosters an entrepreneurial spirit by providing a physical space and work atmosphere conducive to interaction and innovation.","dateTimeMS":1423573680000,"title":"Incubation and Innovation at Tek Mountain","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=incubation-and-innovation-at-tek-mountain","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":51925675,"orderField":0},{"dateTime":"Wednesday, Feb 11, 2015","urlTitle":"s4-hana-it-s-not-r-3-and-it-s-not-1992-either-part-1-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"There\u2019s a lot to unpack from SAP\u2019s S4 HANA announcement of last week, but if I could only highlight the essence of what the announcement means for SAP and its customers, it\u2019s this: SAP needs to make sure every customer understands how the versions of SAP they are running today will lead them to S4 HANA, in what time frame and at what cost.","dateTimeMS":1423660260000,"title":"S/4HANA: It\u2019s Not R/3, and It\u2019s Not 1992 Either (Part 1)","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=s4-hana-it-s-not-r-3-and-it-s-not-1992-either-part-1-","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":54201519,"orderField":0},{"dateTime":"Thursday, Feb 12, 2015","urlTitle":"what-the-open-plan-office-trend-is-doing-to-it-security","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/open-thumb.jpg","groupId":53319,"channel":"SECURITY","description":"Across the country, cubicle walls are coming down as businesses seek to take advantage of the cost-saving benefits associated with open-plan offices. While employees have been very vocal in their collective disdain for the latest workplace trend, it doesn\u2019t appear to be going anywhere soon. In fact, more than 75 percent of U.S. offices now feature an open plan, according to research by Milwaukee design firm Kahler Slater, which means many Americans have no choice but to learn to work in this new environment.","dateTimeMS":1423742520000,"title":"What the Open-Plan Office Trend is Doing to IT Security","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=what-the-open-plan-office-trend-is-doing-to-it-security","target":"_blank","peerReviewed":false,"subType":"","id":53906795,"orderField":0},{"dateTime":"Thursday, Feb 12, 2015","urlTitle":"s-4-hana-it-s-not-r-3-and-it-s-not-1992-either-part-2-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"Part 2 of S/4 HANA: It\u2019s Not R/3, and It\u2019s Not 1992 Either (Part 2)","dateTimeMS":1423754640000,"title":"S/4HANA: It\u2019s Not R/3, and It\u2019s Not 1992 Either (Part 2)","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=s-4-hana-it-s-not-r-3-and-it-s-not-1992-either-part-2-","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":54201499,"orderField":0},{"dateTime":"Friday, Feb 13, 2015","urlTitle":"the-practice-and-future-of-release-engineering","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/swmm.png","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Davide Falessi speaks with IEEE Software Guest Editors Bram Adams and Foutse Khomh about release engineering and its value to the software industry.","dateTimeMS":1423842000000,"title":"The Practice and Future of Release Engineering","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=the-practice-and-future-of-release-engineering","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":51938733,"orderField":0},{"dateTime":"Friday, Feb 13, 2015","urlTitle":"tbr-2015-cloud-predictions-fragmented-capabilities","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/ComputingNow/marketing/tbr.png","groupId":53319,"channel":"CLOUD","description":"Cloud stands at a tipping point between the broad horizontal public platforms that drove the market and the fragmented private and hybrid capabilities that will form its future. The market is shifting to provide services that are customizable for the individual end customer, whether adding security, performance, features or management.","dateTimeMS":1423826940000,"title":"TBR 2015 Cloud Predictions: Fragmented Capabilities","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=tbr-2015-cloud-predictions-fragmented-capabilities","target":"_blank","peerReviewed":false,"subType":"","id":51939023,"orderField":0},{"dateTime":"Monday, Feb 16, 2015","urlTitle":"rise-of-the-alternative-network-provider","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/tbr.png","groupId":53319,"channel":"NETWORKING","description":"Incumbent telecom operators in the U.S. face a new category of competitors that play by a different set of rules. These alternative network providers aim to disrupt the traditional telecom business model by lowering access costs and improving the user experience. Their motivations differ from incumbent telcos, which focus on monetizing their connectivity solutions. Rather, these alternative network providers view access as a sunk cost necessary to drive their other initiatives, such as digital advertising and e-commerce. The stakes are high because these market dynamics will shift the balance of power, money, and landscape makeup in coming years. Only the strongest and most nimble incumbent operators will survive the coming shakeout.","dateTimeMS":1424107620000,"title":"Rise of the Alternative Network Provider","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=rise-of-the-alternative-network-provider","target":"_blank","peerReviewed":false,"subType":"","id":53905504,"orderField":0},{"dateTime":"Monday, Feb 16, 2015","urlTitle":"social-engineering-what-your-business-needs-to-know-to-protect-itself","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/social-thumb.jpg","groupId":53319,"channel":"SECURITY","description":"Pet names, children\u2019s names, and dates remain the most popular inspirations for passwords, despite the fact that these are the worst passwords a person can choose.","dateTimeMS":1424109480000,"title":"Social Engineering: What Your Business Needs to Know to Protect Itself","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=social-engineering-what-your-business-needs-to-know-to-protect-itself","target":"_blank","peerReviewed":false,"subType":"","id":51939302,"orderField":0},{"dateTime":"Monday, Nov 24, 2014","urlTitle":"requirements-engineering-means-business-success","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ebert-thumb.jpg","groupId":5954967,"channel":"SOFTWARE ENGINEERING","description":"Business success means to deliver the right solutions at the right time to the right markets. Requirements Engineering is the discipline within systems and software engineering that bridges the entire life cycle and thus determines success or failure of a product or project. This blog provides a fresh look on requirements engineering, and why you need to improve it...","dateTimeMS":1416841140000,"title":"Requirements Engineering Means Business Success","type":"article","subCategories":"","url":"/web/software-technologies/software engineering/content?g=5954967&type=article&urlTitle=requirements-engineering-means-business-success","target":"_blank","peerReviewed":false,"subType":"","id":54825677,"orderField":0},{"dateTime":"Tuesday, Feb 17, 2015","urlTitle":"companies-turn-to-existing-employees-for-big-data-skills","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/datacareer.jpg","groupId":53319,"channel":"CAREERS","description":"Amazing strides have been made in trying to close the big data skills gap. Although companies are still fine-tuning their ideas on what type of skill sets will be needed to form the big data teams to incorporate analytics into business processes, sort and analyze structured and unstructured data, and monetize existing data, those with graduate degrees or doctorates in statistics--the bonafide data scientists--will certainly be an important part of the team.","dateTimeMS":1424186400000,"title":"Companies Turn to Existing Employees for Big Data Skills","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=companies-turn-to-existing-employees-for-big-data-skills","target":"_blank","peerReviewed":false,"subType":"","id":53888703,"orderField":0},{"dateTime":"Tuesday, Feb 17, 2015","urlTitle":"google-hangout-what-s-happening-in-2015-for-3d-printing-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/3dq.jpg","groupId":53319,"channel":"STARTUPS","description":"Experts agree that 3D printing will be established as one of the truly disruptive technologies of our generation, but what are the hottest trends and the challenges?\n\nWatch video of the Google+ Hangout to hear speakers from Rock Stars of 3D Printing sharing their thoughts on the 3D revolution.\n\nAnd to attend the live March 17 event in San Jose, Calif., visit http://www.computer.org/3dprinting. \n\nHangut speakers include:\n\n\u2022 Brian David Johnson, Futurist and Director, Future Casting and Experience Research | Intel\n\n\u2022 Cliff Waldman, Director of Economic Studies | Manufacturers Alliance for Productivity and Innovation (MAPI)\n\n\u2022 Brian Gaff, Partner | McDermott Will & Emery, LLP\n\n\u2022 Joshua Greenbaum, Analyst | Enterprise Applications Consulting (Moderator)\n\nFor more information on the IEEE Computer Society's Rock Stars event series, visit www.computer.org/rockstars.","dateTimeMS":1424197320000,"title":"Google Hangout: What's Happening in 2015 for 3D Printing?","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=google-hangout-what-s-happening-in-2015-for-3d-printing-","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":53905237,"orderField":0},{"dateTime":"Wednesday, Feb 18, 2015","urlTitle":"requirements-injecting-value-thinking-into-prioritization-decisions","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/swrequirements.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Author Jane Cleland-Huang provides an audio recording of her Requirements column in IEEE Software's March/April 2015 issue, in which she discusses an approach that injects value-thinking into feature prioritization by using story mapping.","dateTimeMS":1424268720000,"title":"Requirements: Injecting Value-Thinking into Prioritization Decisions","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=requirements-injecting-value-thinking-into-prioritization-decisions","target":"_blank","peerReviewed":false,"subType":"PODCAST","id":53894769,"orderField":0},{"dateTime":"Thursday, Feb 19, 2015","urlTitle":"grady-booch-all-watched-over-by-machines-of-loving-grace","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/oncomputing2.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Author Grady Booch provides an audio recording of his On Computing column from IEEE Software's March/April issue, in which he discusses how we must come to grips with a number of practical and ethical conundrums as machines of our own creation become our companions, helpmates, and servants.","dateTimeMS":1424348220000,"title":"Grady Booch: All Watched Over by Machines of Loving Grace","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=grady-booch-all-watched-over-by-machines-of-loving-grace","target":"_blank","peerReviewed":false,"subType":"PODCAST","id":53895140,"orderField":0},{"dateTime":"Friday, Feb 20, 2015","urlTitle":"guest-editors-introduction-the-practice-and-future-of-release-engineering","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/swcoverma.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"IEEE Software Multimedia Editor Davide Falessi speaks with Guest Editors Bram Adams and Foutse Khomh about release engineering and its value to the software industry. (From IEEE Software's March/April 2015 issue).","dateTimeMS":1424435760000,"title":"Guest Editors' Introduction: The Practice and Future of Release Engineering","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=guest-editors-introduction-the-practice-and-future-of-release-engineering","target":"_blank","peerReviewed":false,"subType":"PODCAST","id":53895227,"orderField":0},{"dateTime":"Friday, Feb 20, 2015","urlTitle":"computing-and-the-law-the-significance-of-prior-art","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/computinglaw.jpg","groupId":53319,"channel":"STARTUPS","description":"If you're starting a new company, you may want to learn more about protecting the intellectual property you're developing. And an important foundation for patents is understanding prior art. \n\nAuthor Brian M. Gaff provides an audio recording of the Computing and the Law column, in which he discusses the significance of prior art, an understanding of which is critical whether you\u2019re writing a patent application or embroiled in patent litigation.","dateTimeMS":1424443980000,"title":"Computing and the Law: The Significance of Prior Art","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=computing-and-the-law-the-significance-of-prior-art","target":"_blank","peerReviewed":false,"subType":"PODCAST","id":53895275,"orderField":0},{"dateTime":"Thursday, Feb 19, 2015","urlTitle":"startups-are-not-just-for-ki-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/kids-thumb.jpg","groupId":53319,"channel":"STARTUPS","description":"Many of today's biggest technology companies were founded by kids barely out of high school. Bill Gates learned programming at 13 and left Harvard University as a junior to start Microsoft, a company that now has 78,000 employees worldwide and $50 billion in annual revenue.","dateTimeMS":1424348100000,"title":"Startups Are Not Just for Kids","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=startups-are-not-just-for-ki-1","target":"_blank","peerReviewed":false,"subType":"","id":53905261,"orderField":0},{"dateTime":"Wednesday, Feb 18, 2015","urlTitle":"what-to-expect-in-mobile-in-2015","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ap-thumb.jpg","groupId":53319,"channel":"MOBILE","description":"As preparations get underway for Mobile World Congress 2015, we get things started by sharing some highlights from the Mobile & Broadband section","dateTimeMS":1424277060000,"title":"What to Expect in Mobile in 2015","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=what-to-expect-in-mobile-in-2015","target":"_blank","peerReviewed":false,"subType":"","id":53905282,"orderField":0},{"dateTime":"Monday, Feb 23, 2015","urlTitle":"what-s-your-place-in-the-smart-revolution-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/rsstvid.jpg","groupId":53319,"channel":"NETWORKING","description":"Whether you're building smart cars, dealing with the smart grid, want to control a smart home, or are manufacturing the latest smart clothing, you deal with the same confronting challenges as everyone in the \u201csmart technologies\u201d movement. \n\nAttend Rock Stars of SmartTech on May 12 in Raleigh to get actionable answers and insights. Register at http://www.computer.org/smarttech.","dateTimeMS":1424702400000,"title":"What's Your Place in the Smart Revolution?","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=what-s-your-place-in-the-smart-revolution-","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":53904221,"orderField":0},{"dateTime":"Monday, Feb 23, 2015","urlTitle":"hipaa-compliance-and-3-more-reasons-to-trust-the-cloud","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/cloud-thumb.jpg","groupId":53319,"channel":"INSIGHTS","description":"It takes a leap of faith to trust things you can\u2019t see. Especially if those things are supposed to be protecting your business data.\n\nBusinesses in the healthcare field have to be cautious about data protection because of HIPAA laws and other privacy regulations that govern health information.","dateTimeMS":1424702700000,"title":"HIPAA Compliance and 3 More Reasons to Trust the Cloud","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=hipaa-compliance-and-3-more-reasons-to-trust-the-cloud","target":"_blank","peerReviewed":false,"subType":"","id":53904242,"orderField":0},{"dateTime":"Tuesday, Feb 24, 2015","urlTitle":"a-new-era-of-tech-incubator-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/incubators-thumb.jpg","groupId":53319,"channel":"STARTUPS","description":"If you thought tech incubators were a thing of the past, think again. In multiple cities around the world, new incubators are cropping up while longstanding ones are churning away and even expanding.\nSome have long lists of successful companies they\u2019ve nurtured over the years. Others are around as a result of economic stimulus efforts and/or to capitalize on recent trends. And some focus on specific criteria, such as startups run by college students or select areas of technology, while others have broader interests. But no matter what differentiates them from each other, these incubators have one common goal: to foster the growth of early-stage startups.","dateTimeMS":1424820600000,"title":"A New Era of Tech Incubators?","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=a-new-era-of-tech-incubator-1","target":"_blank","peerReviewed":false,"subType":"","id":53909484,"orderField":0},{"dateTime":"Wednesday, Feb 25, 2015","urlTitle":"car-hacking-how-safe-are-you-behind-the-wheel-in-today-s-digital-society-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/carhack-thumb.jpg","groupId":7989281,"channel":"","description":"The complexity of today\u2019s cars is staggering \u2013 being mechanically inclined doesn\u2019t cut it these days \u2013 you have to be a bit of a computer whiz too in order to service new model cars.","dateTimeMS":1424865720000,"title":"Car Hacking: How Safe Are You Behind the Wheel in Today\u2019s Digital Society?","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=car-hacking-how-safe-are-you-behind-the-wheel-in-today-s-digital-society-","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":53910417,"orderField":0},{"dateTime":"Wednesday, Feb 25, 2015","urlTitle":"top-10-trends-in-internet-of-things","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ap-thumb.jpg","groupId":53319,"channel":"INSIGHTS","description":"The Internet of Things tops off our News for the Week in Review. See what the analysts are saying about IoT trends for 2015.","dateTimeMS":1424872380000,"title":"Top 10 Trends in Internet of Things","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=top-10-trends-in-internet-of-things","target":"_blank","peerReviewed":false,"subType":"","id":53910308,"orderField":0},{"dateTime":"Thursday, Feb 26, 2015","urlTitle":"is-cloud-opening-the-door-to-data-analytics-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ap-thumb.jpg","groupId":53319,"channel":"INSIGHTS","description":"The relationship between the cloud and data is getting some serious attention. Read what the analysts are saying.","dateTimeMS":1424952600000,"title":"Is Cloud Opening the Door to Data Analytics?","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=is-cloud-opening-the-door-to-data-analytics-","target":"_blank","peerReviewed":false,"subType":"","id":53910377,"orderField":0},{"dateTime":"Friday, Feb 27, 2015","urlTitle":"the-role-of-public-comprehensive-universities-in-closing-the-innovation-deficit","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/innovation.jpg","groupId":53319,"channel":"STARTUPS","description":"Computer magazine Advisory Panel member Alf Weaver interviews Chancellor Gary L. Miller about an ambitious initiative by the University of North Carolina Wilmington that demonstrates how public non-research universities can help close the US innovation deficit by encouraging local entrepreneurship and regional economic development.","dateTimeMS":1425050940000,"title":"The Role of Public Comprehensive Universities in Closing the Innovation Deficit","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=the-role-of-public-comprehensive-universities-in-closing-the-innovation-deficit","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":53914064,"orderField":0},{"dateTime":"Friday, Feb 27, 2015","urlTitle":"5-top-web-hosting-models-explained","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/cloudhosting-thumb.jpg","groupId":53319,"channel":"CLOUD","description":"If you\u2019re new to the world of web hosting, you may need a crash course in order to fully understand various terms like dedicated hosting, shared hosting, managed hosting, cloud hosting, and so on.","dateTimeMS":1425056580000,"title":"5 Top Web Hosting Models Explained","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=5-top-web-hosting-models-explained","target":"_blank","peerReviewed":false,"subType":"","id":53915410,"orderField":0},{"dateTime":"Tuesday, Mar 3, 2015","urlTitle":"pros-and-cons-of-dedicated-hosting","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/road-thumb.jpg","groupId":53319,"channel":"CLOUD","description":"Like any other web hosting service, dedicated hosting solutions have some benefits and some downsides. Nevertheless, in some particular cases, some of the pros can also prove to be cons in the end.","dateTimeMS":1425384480000,"title":"Pros and Cons of Dedicated Hosting","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=pros-and-cons-of-dedicated-hosting","target":"_blank","peerReviewed":false,"subType":"","id":53915390,"orderField":0},{"dateTime":"Monday, Mar 2, 2015","urlTitle":"what-we-can-learn-from-steve-jobs","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/jobs-thumb.jpg","groupId":53319,"channel":"STARTUPS","description":"Steve Jobs wasn\u2019t exactly an IT person\u2014he didn\u2019t have a programming or computer science background\u2014yet there\u2019s much to learn from this great innovator. He redefined the IT user experience, creating products and services loved by millions around the world. He reshaped not only the IT industry but others as well\u2014the music industry with the iPod; the cell phone industry with the iPhone; the movie industry with his Pixar Animation Studios films; and the computing industry with the original Mac, the Mac OS X, and the iPad.","dateTimeMS":1425314640000,"title":"What We Can Learn from Steve Jobs","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=what-we-can-learn-from-steve-jobs","target":"_blank","peerReviewed":false,"subType":"","id":53917792,"orderField":0},{"dateTime":"Thursday, Mar 5, 2015","urlTitle":"horvitz-it-s-important-to-pursue-artificial-intelligence","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/horwitz.jpg","groupId":53319,"channel":"INSIGHTS","description":"In this excerpt from a Microsoft Research Luminaries interview, Eric Horvitz, Distinguished Scientist and Managing Director, Microsoft Research Redmond, explains why it's important to pursue Artificial Intelligence.","dateTimeMS":1425558120000,"title":"Horvitz: It's Important to Pursue Artificial Intelligence","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=horvitz-it-s-important-to-pursue-artificial-intelligence","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":53924526,"orderField":0},{"dateTime":"Wednesday, Mar 4, 2015","urlTitle":"implementing-enterprise-saas-if-it-s-easy-it-s-because-you-re-not-trying","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"Back in the early stages of the SaaS market, so many months ago, it seemed obvious that the SaaS market would one day undergo a major transformation as the easy wins based on taking on-premise capabilities and flipping them to the cloud \u2013 pretty much the business model of Salesforce.com in the early days\u2013 gave way to an era of greater complexity and value. At one time it was the value-added cloud capabilities of business networks and the like that were supposed to lead the SaaS world to the promised land by using the cloud to conduct business in ways that simply hadn\u2019t been possible in the on-premise world. \nWrong. So far, anyway.","dateTimeMS":1425484860000,"title":"Implementing Enterprise SaaS: If it\u2019s Easy, it\u2019s Because You\u2019re Not Trying","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=implementing-enterprise-saas-if-it-s-easy-it-s-because-you-re-not-trying","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":54201479,"orderField":0},{"dateTime":"Friday, Mar 6, 2015","urlTitle":"gordon-bell-reflects-on-race-to-build-the-fastest-computer","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/bell-thumb.jpg","groupId":53319,"channel":"INSIGHTS","description":"Gordon Bell talks about the race to build the world's fastest supercomputer as he accepts the IEEE Computer Society's 2014 Seymour Cray Award for designing several computer systems that changed the world of high performance computing, the two most important being the PDP-6 and the VAX-11/780.","dateTimeMS":1425647580000,"title":"Gordon Bell Reflects on Race to Build the Fastest Computer","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=gordon-bell-reflects-on-race-to-build-the-fastest-computer","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":53929719,"orderField":0},{"dateTime":"Monday, Mar 9, 2015","urlTitle":"what-is-parallelism-and-why-should-we-care-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/leiserson-thumb.jpg","groupId":53319,"channel":"INSIGHTS","description":"Charles Leiserson talks about the need to get rid of bloat and inefficiency, build scalable systems, and work on making our computer systems better behaved as he accepts the ACM and IEEE Computer Society 2014 Ken Kennedy Award for his influence on parallel computing systems and their adoption into mainstream use through scholarly research and development.","dateTimeMS":1425901140000,"title":"What Is Parallelism and Why Should We Care?","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=what-is-parallelism-and-why-should-we-care-","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":53929781,"orderField":0},{"dateTime":"Wednesday, Mar 11, 2015","urlTitle":"what-s-the-2022-outlook-for-supercomputing-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/mat-thumb.jpg","groupId":53319,"channel":"INSIGHTS","description":"Satoshi Matsuoka talks about the 2022 outlook for supercomputing as he accepts the IEEE Computer Society 2014 Sidney Fernbach Award. He received the award for his work on advanced infrastructural platforms, large-scale supercomputers, and heterogeneous GPU/CPU supercomputers.","dateTimeMS":1426071720000,"title":"What's the 2022 Outlook for Supercomputing?","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=what-s-the-2022-outlook-for-supercomputing-","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":53929896,"orderField":0},{"dateTime":"Tuesday, Mar 10, 2015","urlTitle":"will-wearables-be-the-next-mobile-payment-devices-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ap-thumb.jpg","groupId":53319,"channel":"MOBILE","description":"Mobile payment is a popular topic among analysts this week. Here are some of the articles you will find in the Financial Services section.\n\n\nCashless Britain \u2013 Not Coming to a Town Near You Soon | Celent - Wed, 04 Mar 2015 |Gareth Lodge\nWearables: The Next Mobile Payment Device? | eMarketer - Tue, 03 Mar 2015 \nMobile Payment Fraud Is a Growing Problem | Gartner - Wed, 04 Mar 2015 \nAnalyst View: Paypal embraces NFC in a move to strengthen its mobile payments play in bricks and mortar retail | Ovum - Tue, 03 Mar 2015 |Eden Zoller\nPayPal\u2019s acquisition of Paydiant and embrace of NFC signal a fresh drive in bricks and mortar retail | Ovum - Tue, 03 Mar 2015 |Eden Zoller","dateTimeMS":1425994740000,"title":"Will Wearables Be the Next Mobile Payment Devices?","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=will-wearables-be-the-next-mobile-payment-devices-","target":"_blank","peerReviewed":false,"subType":"","id":53941750,"orderField":0},{"dateTime":"Tuesday, Mar 10, 2015","urlTitle":"ibm-interconnect-delivers-clear-view-into-long-term-strategy","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/tbr-thumb.jpg","groupId":53319,"channel":"CLOUD","description":"InterConnect is a new customer event that integrates and replaces three smaller and product-focused IBM customer events: Pulse (mobile development), Innovate (software development) and Impact (cloud computing). The three-day analyst track portion of the conference, titled A New Way, had three core stories: A New Way to Think, A New Way to Work and A New Way Forward. LeBlanc has emerged as the single cloud leader IBM needs, appearing at the event with other solution-area senior vice presidents including Mike Rhodin, who leads IBM\u2019s market-making Watson cognitive computing group, and Bob Picciano, who leads IBM Analytics.","dateTimeMS":1426006260000,"title":"IBM InterConnect Delivers Clear View into Long-term Strategy","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=ibm-interconnect-delivers-clear-view-into-long-term-strategy","target":"_blank","peerReviewed":false,"subType":"","id":53941770,"orderField":0},{"dateTime":"Wednesday, Mar 11, 2015","urlTitle":"cloud-computing-week-in-review","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ap-thumb.jpg","groupId":53319,"channel":"CLOUD","description":"Here are some discussions from the cloud marketplace, with more to be found in the Cloud Computing section.","dateTimeMS":1426080360000,"title":"Cloud Computing Week in Review","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=cloud-computing-week-in-review","target":"_blank","peerReviewed":false,"subType":"","id":53941818,"orderField":0},{"dateTime":"Monday, Mar 16, 2015","urlTitle":"defining-the-internet-of-things","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ib2.png","groupId":53926943,"channel":"","description":"The Internet of Things is a reality now. Much is here and more is coming in full speed. We are already able to monitor our health through wearables, get our houses and cars on the phone, use our human bodies for data transmission, and sense the environment.","dateTimeMS":1426505160000,"title":"Defining the Internet of Things","type":"article","subCategories":"","url":"/web/sensing-iot/content?g=53926943&type=article&urlTitle=defining-the-internet-of-things","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":54859800,"orderField":0},{"dateTime":"Tuesday, Mar 31, 2015","urlTitle":"what-are-the-components-of-iot-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ib2.png","groupId":53926943,"channel":"","description":"Most definitions of the Internet of Things include physical objects or devices (also called \u201cthings\u201d) that can sense and/or affect the physical environment, as shown in Figure 1. By 2020, it is expected that the IoT will comprise 50 billion devices, as shown in Figure 3. The IoT also includes virtual objects, such as electronic tickets, agendas, books, and wallets.","dateTimeMS":1427800500000,"title":"What Are the Components of IoT?","type":"article","subCategories":"","url":"/web/sensing-iot/content?g=53926943&type=article&urlTitle=what-are-the-components-of-iot-","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":54871410,"orderField":0},{"dateTime":"Tuesday, Mar 17, 2015","urlTitle":"future-information-ownership-rights-keeping-lawyers-happy-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/sorel.png","groupId":7512968,"channel":"","description":"Publishers are beginning to recognize the need to \u201cpublish\u201d big data sets so that interested communities can access and share source data from which they can carry out their research, etc.","dateTimeMS":1426590240000,"title":"Future Information Ownership Rights (Keeping Lawyers Happy)","type":"article","subCategories":"","url":"/web/musings-from-the-ivory-tower/content?g=7512968&type=article&urlTitle=future-information-ownership-rights-keeping-lawyers-happy-","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":53953154,"orderField":0},{"dateTime":"Thursday, Mar 12, 2015","urlTitle":"3d-printing-poised-to-take-off","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/tumor-thumb.jpg","groupId":53319,"channel":"INSIGHTS","description":"When 3D printing is helping save lives on ABC\u2019s hit hospital drama, \u201cGrey\u2019s Anatomy,\u201d you know that the technology is hitting the mainstream. For a recent episode, 3D Systems' Medical Modeling unit designed and 3D-printed an anatomically correct model of a tumor afflicting a heart and liver from a production designer's sketch on the back of a napkin. And they did it in only four days.","dateTimeMS":1426170900000,"title":"3D Printing Poised to Take Off","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=3d-printing-poised-to-take-off","target":"_blank","peerReviewed":false,"subType":"","id":53950730,"orderField":0},{"dateTime":"Friday, Mar 13, 2015","urlTitle":"the-malware-of-things","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/malware.jpg","groupId":53319,"channel":"SECURITY","description":"It\u2019s easy to get frustrated with the security problems we all face with our connected devices: shouldn\u2019t a PC/laptop/phone/tablet/whatever be secure by design? Is it really that hard?","dateTimeMS":1426265460000,"title":"The Malware of Things","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=the-malware-of-things","target":"_blank","peerReviewed":false,"subType":"","id":53946037,"orderField":0},{"dateTime":"Thursday, Jan 29, 2015","urlTitle":"ces-a-showcase-for-offbeat-gadgets","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/picobrew-thumb.jpg","groupId":7989281,"channel":"","description":"This marked my 10th consecutive year at International CES, and as regular as the day\u2019s sunset, there will always be on display various gadgets that make you scratch your head and wonder what the inventors were thinking. And with others, you still scratch your head as well and think \u2013 what a clever idea! Why didn\u2019t I think of that?","dateTimeMS":1422543600000,"title":"CES a Showcase for Offbeat Gadgets","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=ces-a-showcase-for-offbeat-gadgets","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":53948635,"orderField":0},{"dateTime":"Monday, Mar 16, 2015","urlTitle":"dreaming-big-at-sxswedu","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/bigdreams-thimb.jpg","groupId":53319,"channel":"INSIGHTS","description":"SXSWedu will screen \"Big Dream,\" an inspiring film that tells the intimate stories of seven young women who are breaking barriers as they follow their passion in science, technology, engineering, and math\u2014the acronymically named STEM fields","dateTimeMS":1426513620000,"title":"Dreaming Big at SXSWedu","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=dreaming-big-at-sxswedu","target":"_blank","peerReviewed":false,"subType":"","id":53948589,"orderField":0},{"dateTime":"Thursday, Mar 19, 2015","urlTitle":"what-the-analysts-say-about-the-apple-watch","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ap-thumb.jpg","groupId":53319,"channel":"MOBILE","description":"The Apple watch was a popular topic among analysts last week. Here are some conversations that about the company's new wearable","dateTimeMS":1426762200000,"title":"What the Analysts Say about the Apple Watch","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=what-the-analysts-say-about-the-apple-watch","target":"_blank","peerReviewed":false,"subType":"","id":53952919,"orderField":0},{"dateTime":"Wednesday, Mar 18, 2015","urlTitle":"on-big-data-and-the-iot-interview-with-bill-franks-part-1-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/zicari.jpg","groupId":53319,"channel":"BIG DATA","description":"Roberto V. Zicari,editor of ODBMS.org, spoke with Bill Franks, Chief Analytics Officer for Teradata, about data warehouses, Hadoop, the Internet of Things, and Teradata`s perspective on the world of big data.","dateTimeMS":1426674240000,"title":"On Big Data and the IoT: Interview with Bill Franks (Part 1)","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=on-big-data-and-the-iot-interview-with-bill-franks-part-1-","target":"_blank","peerReviewed":false,"subType":"INTERVIEW","id":53951110,"orderField":0},{"dateTime":"Thursday, Mar 19, 2015","urlTitle":"on-big-data-and-the-iot-interview-with-bill-franks-part-2-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/zicari.jpg","groupId":53319,"channel":"BIG DATA","description":"Roberto V. Zicari, editor of ODBMS.org, spoke with Bill Franks, Chief Analytics Officer for Teradata, about data warehouses, Hadoop, the Internet of Things, and Teradata`s perspective on the world of big data. Roberto is Full Professor of Database and Information Systems at Frankfurt University. He was for over 15 years the representative of the OMG in Europe.","dateTimeMS":1426763340000,"title":"On Big Data and the IoT: Interview with Bill Franks (Part 2)","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=on-big-data-and-the-iot-interview-with-bill-franks-part-2-","target":"_blank","peerReviewed":false,"subType":"","id":53951090,"orderField":0},{"dateTime":"Wednesday, Mar 18, 2015","urlTitle":"connectivity-security-standards-3-iot-keywords","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/swift-thumb.jpg","groupId":8459902,"channel":"","description":"In truth, the Internet of Things might be better called the Internet of Everything.","dateTimeMS":1426677900000,"title":"Connectivity, Security, Standards: 3 IoT Keywords","type":"article","subCategories":"","url":"/web/prpl-matters/content?g=8459902&type=article&urlTitle=connectivity-security-standards-3-iot-keywords","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":53952944,"orderField":0},{"dateTime":"Friday, Mar 20, 2015","urlTitle":"10-tips-for-finding-success-in-consulting","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/consulting-thumb.jpg","groupId":53319,"channel":"INSIGHTS","description":"Many computing professionals, at some point in their careers, consider establishing a consulting business. Consulting offers an opportunity to leave the traditional workplace, work independently, and become your own boss.","dateTimeMS":1426861080000,"title":"10 Tips for Finding Success in Consulting","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=10-tips-for-finding-success-in-consulting","target":"_blank","peerReviewed":false,"subType":"","id":53960417,"orderField":0},{"dateTime":"Monday, Mar 23, 2015","urlTitle":"healthcare-it-expands","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/hit-thumb.jpg","groupId":53319,"channel":"MOBILE","description":"Healthcare, one of the largest and most vital sectors of the US economy, dragged its feet when other industries embraced information technologies and still creates many of its records by hand. But that may be finally changing. Bolstered by funding from the economic stimulus package, the industry is gearing up to computerize patients\u2019 medical records and create a nationwide infrastructure to facilitate the transmission and exchange of records among patients, doctors, hospitals, pharmacies, and others.","dateTimeMS":1427102880000,"title":"Healthcare IT Expands","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=healthcare-it-expands","target":"_blank","peerReviewed":false,"subType":"","id":53959963,"orderField":0},{"dateTime":"Tuesday, Mar 24, 2015","urlTitle":"cryptographer-s-challenge-keeping-genetic-secrets-while-advancing-genetic-research","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/lauter.jpg","groupId":53319,"channel":"SECURITY","description":"Kristin Lauter is solving a problem you may not even know you have: She's working to keep your most personal data private and secure.","dateTimeMS":1427196480000,"title":"Cryptographer's Challenge: Keeping Genetic Secrets While Advancing Genetic Research","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=cryptographer-s-challenge-keeping-genetic-secrets-while-advancing-genetic-research","target":"_blank","peerReviewed":false,"subType":"","id":53961915,"orderField":0},{"dateTime":"Wednesday, Mar 25, 2015","urlTitle":"cloud-storage-only-as-risky-as-you-make-it","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ap-thumb.jpg","groupId":53319,"channel":"CLOUD","description":"Confidentiality and security are always top concerns when an organization considers leveraging the cloud to store their information, and certainly legitimate ones. In this wek's Analyst Perspectives, analysts talk about managing risks and other issues related to cloud computing.","dateTimeMS":1427287620000,"title":"Cloud Storage Only As Risky As You Make It","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=cloud-storage-only-as-risky-as-you-make-it","target":"_blank","peerReviewed":false,"subType":"","id":53963195,"orderField":0},{"dateTime":"Friday, Mar 27, 2015","urlTitle":"ibm-and-twitter-offer-another-piece-of-the-analytics-puzzle","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ap-thumb.jpg","groupId":53319,"channel":"BIG DATA","description":"Here are this week's analyst headlines from the Big Data space:","dateTimeMS":1427457480000,"title":"IBM and Twitter Offer Another Piece of the Analytics Puzzle","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=ibm-and-twitter-offer-another-piece-of-the-analytics-puzzle","target":"_blank","peerReviewed":false,"subType":"","id":53968084,"orderField":0},{"dateTime":"Thursday, Mar 26, 2015","urlTitle":"a-z-video-maria-ebling-on-pervasive-computing","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/ComputingNow/marketing/maria.jpg","groupId":53319,"channel":"MOBILE","description":"Pervasive computing thrives at the intersection of many areas of computer science, including distributed systems, human-computer interaction, and artifical intelligence, says Maria R. Ebling, IEEE Pervasive Computing Editor in Chief. Ebling, a research staff member at the IBM T.J. Watson Research Center, spoke about P=Pervasive as part of IBM's A-Z Video Series.","dateTimeMS":1427382840000,"title":"A-Z Video: Maria Ebling on Pervasive Computing","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=a-z-video-maria-ebling-on-pervasive-computing","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":53966077,"orderField":0},{"dateTime":"Tuesday, Apr 7, 2015","urlTitle":"what-do-we-know-about-software-development-in-startups-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/startupsd-thumb.jpg","groupId":53319,"channel":"STARTUPS","description":"Startups are newly created companies with little or no history of facing high volatility in technologies and markets. In the US alone, 476,000 new businesses are established each month, accounting for nearly 20 percent of job creation. As such, startups are an important factor in the economy.","dateTimeMS":1428406860000,"title":"What Do We Know about Software Development in Startups?","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=what-do-we-know-about-software-development-in-startups-","target":"_blank","peerReviewed":false,"subType":"","id":53989224,"orderField":0},{"dateTime":"Wednesday, Apr 8, 2015","urlTitle":"how-will-technologies-change-by-2022-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/2022.jpg","groupId":53319,"channel":"STARTUPS","description":"Nine technical leaders of the IEEE Computer Society joined forces to write a technical report, entitled IEEE CS 2022, symbolically surveying 23 potential technologies that could change the landscape of computer science and industry by the year 2022.","dateTimeMS":1428492180000,"title":"How Will Technologies Change by 2022?","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=how-will-technologies-change-by-2022-","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":53989204,"orderField":0},{"dateTime":"Monday, Apr 6, 2015","urlTitle":"accidents-will-happen","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/grier.jpg","groupId":53319,"channel":"SECURITY","description":"In \"Accidents Will Happen,\" Grier discusses self-driving cars, automotive information systems, and their tremendous security risks--illustrating how we tend to think about functionality first and consider security problems only as an afterthought.","dateTimeMS":1428320640000,"title":"Accidents Will Happen","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=accidents-will-happen","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":53989244,"orderField":0},{"dateTime":"Wednesday, May 13, 2015","urlTitle":"computing-and-the-law-important-ip-cases-in-2015","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/computinglaw.jpg","groupId":53319,"channel":"STARTUPS","description":"Author Brian M. Gaff, a partner in McDermott Will & Emery LLP, discusses several 2015 intellectual property cases that raise important patent, copyright, and trademark law issues.","dateTimeMS":1431493980000,"title":"Computing and the Law: Important IP Cases in 2015","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=computing-and-the-law-important-ip-cases-in-2015","target":"_blank","peerReviewed":false,"subType":"PODCAST","id":54055308,"orderField":0},{"dateTime":"Friday, Apr 10, 2015","urlTitle":"introducing-the-student-design-showcase","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/byrd.jpg","groupId":53319,"channel":"INSIGHTS","description":"IEEE Computer Society Board of Governors member Greg Byrd is looking for student projects to feature in his new Student Design Showcase column in Computer.","dateTimeMS":1428643620000,"title":"Introducing the Student Design Showcase","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=introducing-the-student-design-showcase","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":53996554,"orderField":0},{"dateTime":"Sunday, Mar 29, 2015","urlTitle":"devops-breaking-down-barriers-to-benefit-bottom-lines","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/devops-thumb.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"DevOps--a merging of \"development\" and \"operations\"--is rapidly changing how software is produced and released. By as early as next year, market-research firm Gartner expects DevOps to move from a niche strategy to the mainstream, embraced by fully a quarter of Global 2000 companies.","dateTimeMS":1427667000000,"title":"DevOps: Breaking Down Barriers to Benefit Bottom Lines","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=devops-breaking-down-barriers-to-benefit-bottom-lines","target":"_blank","peerReviewed":false,"subType":"","id":53970916,"orderField":0},{"dateTime":"Tuesday, Mar 31, 2015","urlTitle":"drones-poised-for-commercial-takeoff","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/drone3.jpg","groupId":7989281,"channel":"","description":"Unless you\u2019re completely cut off from civilization (in which case you wouldn\u2019t be reading this), drones are rapidly buzzzzzzzing their way into our lives. And the global market and impact is enormous. The Consumer Electronics Association, for instance, estimates about 425,000 drones will be sold this year, amounting to about $130 million in sales. By 2018, the annual market is expected to top $1 billion.","dateTimeMS":1427797260000,"title":"Drones Poised for Commercial Takeoff","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=drones-poised-for-commercial-takeoff","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":53973816,"orderField":0},{"dateTime":"Wednesday, Apr 1, 2015","urlTitle":"6-steps-to-prevent-your-business-from-being-hacked","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/cyber-thumb.jpg","groupId":53319,"channel":"SECURITY","description":"Cybersecurity is essential for business owners in 2015. There have been numerous security breaches of major companies just in the last few months, including Anthem Insurance Agency, Sony, and Target.","dateTimeMS":1427874120000,"title":"6 Steps to Prevent Your Business from Being Hacked","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=6-steps-to-prevent-your-business-from-being-hacked","target":"_blank","peerReviewed":false,"subType":"","id":53975948,"orderField":0},{"dateTime":"Friday, Apr 3, 2015","urlTitle":"how-silver-nanowire-technology-is-improving-touchscreen-capability","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/cambrios1.jpg","groupId":53319,"channel":"MOBILE","description":"Demand for new electronic applications is driving opportunities for transparent conductors\u2014and the need for a cost-effective material that conforms to bends and curves, is flexible, and foldable.","dateTimeMS":1428074760000,"title":"How Silver Nanowire Technology Is Improving Touchscreen Capability","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=how-silver-nanowire-technology-is-improving-touchscreen-capability","target":"_blank","peerReviewed":false,"subType":"","id":53989264,"orderField":0},{"dateTime":"Monday, Apr 13, 2015","urlTitle":"mining-domain-knowledge","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/swrequirements.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Author Jane Cleland-Huang provides an audio recording of the Requirements column, in which she discusses how basic data-mining skills can be useful for processing domain documents early during requirements engineering. From IEEE Software's May/June 2015 issue.","dateTimeMS":1428933900000,"title":"Mining Domain Knowledge","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=mining-domain-knowledge","target":"_blank","peerReviewed":false,"subType":"PODCAST","id":53996530,"orderField":0},{"dateTime":"Wednesday, Apr 15, 2015","urlTitle":"anarchy-and-order","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/oncomputing2.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Author Grady Booch provides an audio recording of his On Computing column, in which he discusses how computing amplifies the actions of governments, but can also temper its behavior by enabling mechanisms for private communication as well as for open and transparent communication by the people of a nation.","dateTimeMS":1429075020000,"title":"Anarchy and Order","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=anarchy-and-order","target":"_blank","peerReviewed":false,"subType":"PODCAST","id":54002000,"orderField":0},{"dateTime":"Thursday, Apr 16, 2015","urlTitle":"guest-editors-introduction-trends-in-systems-and-software-variability","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/sw4.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Davide Falessi speaks with IEEE Software Guest Editors Rafael Capilla and Rich Hilliard about the state of the art and practice in system and software variability. From IEEE Software's May/June 2015 issue.","dateTimeMS":1429176480000,"title":"Guest Editors' Introduction: Trends in Systems and Software Variability","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=guest-editors-introduction-trends-in-systems-and-software-variability","target":"_blank","peerReviewed":false,"subType":"PODCAST","id":54002746,"orderField":0},{"dateTime":"Friday, Apr 17, 2015","urlTitle":"smart-networked-systems-and-societies-a-research-agenda","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ram.jpg","groupId":53319,"channel":"NETWORKING","description":"Ram D. Sriram, chief of the Software and Systems Division, Information Technology Laboratory, at the US National Institute of Standards and Technology, discusses a research agenda for fulfilling the promise of the Internet of Things.","dateTimeMS":1429296300000,"title":"Smart Networked Systems and Societies: A Research Agenda","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=smart-networked-systems-and-societies-a-research-agenda","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":54006618,"orderField":0},{"dateTime":"Sunday, May 17, 2015","urlTitle":"latest-analyst-news-about-sap","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ap-thumb.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Analysts are covering the latest news from SAP. Here are just some of the articles you will find in the Enterprise Applications section.","dateTimeMS":1431840000000,"title":"Latest Analyst News About SAP","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=latest-analyst-news-about-sap","target":"_blank","peerReviewed":false,"subType":"","id":54063360,"orderField":0},{"dateTime":"Friday, Apr 17, 2015","urlTitle":"the-ito-silver-nanowire-comparison-straight-facts","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/nanowire2thumb.jpg","groupId":53319,"channel":"INSIGHTS","description":"Rarely have the obvious intrinsic values of technology breakthroughs been more clearly defined. In the realm of transparent electrodes used for touchscreen displays, there is a massive switch on from the incumbent material, indium tin oxide (ITO) to electrodes based on silver nanowires. This transition in display technologies, particularly where screen flexibility and other new properties are required, is because of several easily understood differences between the two materials.","dateTimeMS":1429297260000,"title":"The ITO Silver Nanowire Comparison \u2013 Straight Facts","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=the-ito-silver-nanowire-comparison-straight-facts","target":"_blank","peerReviewed":false,"subType":"","id":54030210,"orderField":0},{"dateTime":"Tuesday, May 12, 2015","urlTitle":"why-wearable-technology-is-fleetin","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/Alton.jpg","groupId":53319,"channel":"MOBILE","description":"Wearable technology has attracted a ton of buzz in the past few years, with special attention over the past few months as Apple readies the official release of the Apple Watch. Consumers, digital marketers, and businesses have all been resetting their expectations and looking to wearable devices as the future of technology, but in reality, these types of devices may only be a short-term fad.","dateTimeMS":1431408300000,"title":"Why Wearable Technology Is Fleeting","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=why-wearable-technology-is-fleetin","target":"_blank","peerReviewed":false,"subType":"","id":54063340,"orderField":0},{"dateTime":"Friday, May 1, 2015","urlTitle":"analyst-commentary","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"BIG DATA","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending April 24, 2015.","dateTimeMS":1430496840000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=analyst-commentary","target":"_blank","peerReviewed":false,"subType":"","id":54189545,"orderField":0},{"dateTime":"Monday, May 4, 2015","urlTitle":"working-in-national-labs-stability-opportunities-for-collaboration","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/applepay-thumb.jpg","groupId":53319,"channel":"INSIGHTS","description":"National research laboratories offer computing professionals a wide range of fascinating and highly rewarding career opportunities. Funded by the US government, these labs are working hard to solve some of the country\u2019s most pressing problems, from investigating climate change models and advancing our understanding of the universe and oceans to finding ways to improve human health and energy production and develop weapons systems.","dateTimeMS":1430750640000,"title":"Working in National Labs Stability, opportunities for collaboration","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=working-in-national-labs-stability-opportunities-for-collaboration","target":"_blank","peerReviewed":false,"subType":"","id":54030094,"orderField":0},{"dateTime":"Saturday, May 9, 2015","urlTitle":"procrastination","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/agile-thumb.jpg","groupId":8504655,"channel":"","description":"I haven\u2019t met anyone who hasn\u2019t, at some point, felt a little guilty about putting off some chore. I\u2019ve been there, too, I often rationalize procrastination by claiming that I work well under pressure. I actually think that\u2019s true sometimes.\nPutting off chores is one thing; putting off decisions is another. Hey, they\u2019re just decisions so delay doesn\u2019t hurt anything, right? I can wait until I\u2019m forced to make the decision and make it then. Much like the \u201cworking under pressure\u201d excuse, I can justify such an approach with a \u201cno harm, no foul\u201d attitude.","dateTimeMS":1431148380000,"title":"Procrastination","type":"article","subCategories":"","url":"/web/agile-careers/content?g=8504655&type=article&urlTitle=procrastination","target":"_blank","peerReviewed":false,"subType":"","id":54065831,"orderField":0},{"dateTime":"Wednesday, May 6, 2015","urlTitle":"the-future-of-personal-communications-a-holistic-approach-to-keeping-up-with-consumer-demand","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/cloud-computing-thumbnail.jpg","groupId":53319,"channel":"CLOUD","description":"In today's digital personal communications age, the average person goes through 35GB of data each day, from storing music, photos and movies to uploading sales presentations. As products like Apple's iPhone and Google's Android have caused mass mobile appeal, there will be a big need for new technologies that not only allow these personal \"pocket\" computers to help us effectively manage our daily lives, but provide ample security and storage. \n\nAnd contrary to what legions of cloud providers state, the cloud is not the universal solution for digital communications storage.","dateTimeMS":1430896800000,"title":"The Future of Personal Communications: A Holistic Approach to Keeping up With Consumer Demand","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=the-future-of-personal-communications-a-holistic-approach-to-keeping-up-with-consumer-demand","target":"_blank","peerReviewed":false,"subType":"","id":54042525,"orderField":0},{"dateTime":"Friday, May 15, 2015","urlTitle":"analyst-perspectiv-3","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"BIG DATA","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending May 08, 2015.","dateTimeMS":1431708360000,"title":"Analyst Perspectives","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=analyst-perspectiv-3","target":"_blank","peerReviewed":false,"subType":"","id":54189525,"orderField":0},{"dateTime":"Tuesday, May 19, 2015","urlTitle":"code-hunt-creating-a-community-with-a-game","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/Capture.jpg","groupId":53319,"channel":"SECURITY","description":"Launched a year ago, Code Hunt is a coding game that challenges players first to deduce a hidden problem from clues presented as unit tests and then to write a program to solve it. The game has been enormously successful, attracting more than 150,000 players from around the world and achieving amazing stickiness\u201499 percent of players return to the game within a week.","dateTimeMS":1432014720000,"title":"Code Hunt: creating a community with a game","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=code-hunt-creating-a-community-with-a-game","target":"_blank","peerReviewed":false,"subType":"","id":54067300,"orderField":0},{"dateTime":"Wednesday, May 20, 2015","urlTitle":"the-internet-of-things-is-causing-a-sea-change-in-manufacturing-that-s-putting-it-mildly-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/neal.jpg","groupId":7989281,"channel":"","description":"In a report issued last year by PWC, \u201cThe Internet of Things\u201d What It Means for US Manufacturing,\u201d the company said \u201cover the next decade, manufacturers could stand to capture about $4 trillion of value from the IoT through increased revenues and lower costs.\u201d\n\nThat\u2019s a lot of pocket change.","dateTimeMS":1432150260000,"title":"Internet of Things Upending Manufacturing","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=the-internet-of-things-is-causing-a-sea-change-in-manufacturing-that-s-putting-it-mildly-","target":"_blank","peerReviewed":false,"subType":"","id":54078859,"orderField":0},{"dateTime":"Tuesday, May 26, 2015","urlTitle":"analyst-perspectiv-4","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"CLOUD","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending May 15, 2015.\nThis week there are acquisitions, partnerships and more.","dateTimeMS":1432617000000,"title":"Analyst Perspectives","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=analyst-perspectiv-4","target":"_blank","peerReviewed":false,"subType":"","id":54189565,"orderField":0},{"dateTime":"Saturday, May 30, 2015","urlTitle":"the-current-and-future-state-of-the-cloud","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/cloud computing thumbnail.jpg","groupId":53319,"channel":"CLOUD","description":"What is going to happen in the cloud computing industry within the following few years? According to QuoteColo, cloud spending will continue to increase around the globe, and cloud based technologies will continue to play an important part in the creation and management of the future IT markets and products.\nBut we don\u2019t necessarily have to look that far into the future; some of the big industry players are already pushing up new cloud based technologies.","dateTimeMS":1432995000000,"title":"The Current and Future State of the Cloud","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=the-current-and-future-state-of-the-cloud","target":"_blank","peerReviewed":false,"subType":"","id":54086779,"orderField":0},{"dateTime":"Saturday, May 30, 2015","urlTitle":"infographic-the-current-and-future-state-of-the-cloud","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/cloud-thumb.jpg","groupId":53319,"channel":"CLOUD","description":"Infographic - The Current and Future State of the Cloud","dateTimeMS":1432995420000,"title":"Infographic - The Current and Future State of the Cloud","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=infographic-the-current-and-future-state-of-the-cloud","target":"_blank","peerReviewed":false,"subType":"","id":54086799,"orderField":0},{"dateTime":"Monday, Jun 1, 2015","urlTitle":"hololens-as-metaphor-the-virtually-real-future-of-microsoft","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"Test driving the HoloLens, Microsoft\u2019s soon-to-be released augmented reality headset, it\u2019s easy to forget the challenges facing Satya Nadella as his first year on the job starts to take shape.","dateTimeMS":1433140020000,"title":"HoloLens as Metaphor: The Virtually Real Future of Microsoft","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=hololens-as-metaphor-the-virtually-real-future-of-microsoft","target":"_blank","peerReviewed":false,"subType":"","id":54201079,"orderField":0},{"dateTime":"Friday, Jun 19, 2015","urlTitle":"sap-and-the-magic-of-success-laying-the-groundwork-for-the-inevitable-future-of-business","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"Sometimes covering SAP and its innovations reminds me of what it\u2019s like being the parent of school-aged children. Good parents complain endlessly.","dateTimeMS":1434735120000,"title":"SAP and the Magic of Success \u2013 Laying the Groundwork for the Inevitable Future of Business","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=sap-and-the-magic-of-success-laying-the-groundwork-for-the-inevitable-future-of-business","target":"_blank","peerReviewed":false,"subType":"","id":54200492,"orderField":0},{"dateTime":"Friday, Jun 19, 2015","urlTitle":"descaling-your-scrum","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/agile-thumb.jpg","groupId":8504655,"channel":"","description":"Every now and then I must remove scale from my teapot. It accumulates with use and slows the heating of the water over time. It may change the flavour of the water a bit but doesn\u2019t otherwise make a whole lot of difference other than to create lime as a byproduct of making tea.\nBusiness that scale their organisations are a lot like that.","dateTimeMS":1434734880000,"title":"Descaling your Scrum","type":"article","subCategories":"","url":"/web/agile-careers/content?g=8504655&type=article&urlTitle=descaling-your-scrum","target":"_blank","peerReviewed":false,"subType":"","id":54144551,"orderField":0},{"dateTime":"Wednesday, Jun 10, 2015","urlTitle":"how-the-patent-purchase-promotion-could-revolutionize-the-tech-wor-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/patent.JPG","groupId":53319,"channel":"STARTUPS","description":"Google has been on the forefront of new technology for decades. Most of the attention the company has generated has come as the result of the products it has developed\u2014Google Search revolutionized the accessibility of the web, Google Maps brought us easier directions and mapping, Google Chrome greatly improved on its contemporaries, and the Android operating system is making waves in basic computing.\n\nBut Google is enabling the development of technology in many other ways. It allows its workers to dedicate a portion of their time to personal pet projects, enabling some of the most creative tech geniuses in the world to come up with new ideas. It funds and purchases young tech startups, giving new resources and more stability to promising new ideas. It even partners and integrates with other tech firms, marrying its technology with those of others in an effort to enable the greatest possible user experience.\n\nNow, the search engine giant is looking to launch a new patent-related program that could work wonders in enabling the development of new technologies at a faster and more efficient rate.\n\nThe Program","dateTimeMS":1433978400000,"title":"How the Patent Purchase Promotion Could Revolutionize the Tech World","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=how-the-patent-purchase-promotion-could-revolutionize-the-tech-wor-1","target":"_blank","peerReviewed":false,"subType":"","id":54114984,"orderField":0},{"dateTime":"Friday, Jun 12, 2015","urlTitle":"analyst-perspectiv-5","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending June 05, 2015.","dateTimeMS":1434102300000,"title":"Analyst Perspectives","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=analyst-perspectiv-5","target":"_blank","peerReviewed":false,"subType":"","id":54141046,"orderField":0},{"dateTime":"Tuesday, Sep 1, 2015","urlTitle":"descaling-your-scrum-part-2","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/agile-thumb.jpg","groupId":8504655,"channel":"","description":"Waterfall seemed like it was well-attuned to developing simple or perhaps complicated systems. Such systems can be master-planned from the outset, with work done by specialized teams. There is feedback but success does not depend on efficient feedback, because it is so rarely needed. And because each stage (analysis, design, implementation, test) was held to be largely independent and simple, the work was partitionable. You could scale each part independently to achieve the maximum throughput.","dateTimeMS":1441142100000,"title":"Descaling your Scrum Part 2","type":"article","subCategories":"","url":"/web/agile-careers/content?g=8504655&type=article&urlTitle=descaling-your-scrum-part-2","target":"_blank","peerReviewed":false,"subType":"","id":54277499,"orderField":0},{"dateTime":"Monday, Jun 22, 2015","urlTitle":"analyst-perspectiv-6","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"MOBILE","description":"AnalystPerspectives Weekly Scan\nConversations including the Internet of Things, connected cars and more.","dateTimeMS":1434995520000,"title":"Analyst Perspectives","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analyst-perspectiv-6","target":"_blank","peerReviewed":false,"subType":"","id":54146986,"orderField":0},{"dateTime":"Tuesday, Jun 23, 2015","urlTitle":"is-it-time-now-for-smart-guns-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/smartgun1_thumb.jpg","groupId":7989281,"channel":"","description":"The tragic Charleston shooting last week has again brought the national conversation about gun control front and center. Concurrent with that has been a lot of Internet chatter about smart gun technology.","dateTimeMS":1435083180000,"title":"Is It Time Now for Smart Guns?","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=is-it-time-now-for-smart-guns-","target":"_blank","peerReviewed":false,"subType":"","id":54160342,"orderField":0},{"dateTime":"Wednesday, Jun 24, 2015","urlTitle":"-all-or-nothing-self-driving-car-is-a-blessing-and-a-curse","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"https://web.archive.org/web/20160702193337/http://computer.org/cms/Computer.org/ComputingNow/marketing/self.jpgcomputer.org","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Beginning this summer, Google is going to roll out its self-driving car prototypes onto real American roads. It\u2019s a big step forward for autonomous, self-driving cars, though this technology has been experimented with and tested for the past several years. In this test, a handful of prototypes will travel throughout Mountain View, California, each with a human safety driver aboard, to rigorously test their feasibility as real-world vehicles.","dateTimeMS":1435186920000,"title":"\"All or Nothing\" Self-Driving Car Is a Blessing and a Curse","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=-all-or-nothing-self-driving-car-is-a-blessing-and-a-curse","target":"_blank","peerReviewed":false,"subType":"","id":54154299,"orderField":0},{"dateTime":"Sunday, Jun 28, 2015","urlTitle":"analyst-commentary-20150626","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"SECURITY","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending June 19, 2015.","dateTimeMS":1435534380000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=analyst-commentary-20150626","target":"_blank","peerReviewed":false,"subType":"","id":54189585,"orderField":0},{"dateTime":"Monday, Jun 29, 2015","urlTitle":"telemedicine-enhancing-health-wearables","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/aetw1.jpg","groupId":8206605,"channel":"","description":"While wearable health tech is still in its early days, its popularity is growing and the general public is beginning to understand the benefits. And this bodes well for the continued growth of telemedicine.","dateTimeMS":1435614600000,"title":"Telemedicine Enhancing Health Wearables","type":"article","subCategories":"","url":"/web/the-doctor-is-in/content?g=8206605&type=article&urlTitle=telemedicine-enhancing-health-wearables","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":54160393,"orderField":0},{"dateTime":"Tuesday, Jun 30, 2015","urlTitle":"a-look-at-the-importance-of-collaborative-teams-in-the-tech-space","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/team.jpg","groupId":53319,"channel":"INSIGHTS","description":"Article: There\u2019s an old worn out saying that goes like this: \u201cThere\u2019s no \u2018I\u2019 in team.\u201d And despite being overly used and regurgitated, it\u2019s a true statement. Whether it\u2019s in a sports arena or a downtown office complex, teams are built on the premise of \u201cwe\u201d \u2013 not \u201cme.\u201d This is especially true for businesses and brands in the tech space, where collaboration fosters innovation.","dateTimeMS":1435707960000,"title":"A Look at the Importance of Collaborative Teams in the Tech Space","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=a-look-at-the-importance-of-collaborative-teams-in-the-tech-space","target":"_blank","peerReviewed":false,"subType":"","id":54165089,"orderField":0},{"dateTime":"Wednesday, Jul 1, 2015","urlTitle":"fully-open-source-software-will-help-realize-the-full-benefits-of-the-internet-of-everything","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/prplkathy2.jpg","groupId":8459902,"channel":"","description":"Each day more devices are added to the repertoire of smart technology, continuing to expand the Internet of Everything (IoE), creating a demand for a broad ecosystem in which technology leaders may collaborate.","dateTimeMS":1435789620000,"title":"Fully Open Source Software Will Help Realize the Full Benefits of the Internet of Everything","type":"article","subCategories":"","url":"/web/prpl-matters/content?g=8459902&type=article&urlTitle=fully-open-source-software-will-help-realize-the-full-benefits-of-the-internet-of-everything","target":"_blank","peerReviewed":false,"subType":"","id":54169179,"orderField":0},{"dateTime":"Thursday, Jul 2, 2015","urlTitle":"analyst-commenta-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"SECURITY","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending June 26, 2015.","dateTimeMS":1435869840000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=analyst-commenta-1","target":"_blank","peerReviewed":false,"subType":"","id":54169977,"orderField":0},{"dateTime":"Monday, Jul 6, 2015","urlTitle":"6-vital-tips-for-hiring-a-great-programmer","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/prg-thumb.jpg","groupId":53319,"channel":"CAREERS","description":"Hiring a new programmer for your team is a big commitment, and you want to be as sure as possible that whomever you hire will work. Know what you are looking for, and do not rush into anything unless it feels right on both sides.","dateTimeMS":1436220000000,"title":"6 Vital Tips for Hiring a Great Programmer","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=6-vital-tips-for-hiring-a-great-programmer","target":"_blank","peerReviewed":false,"subType":"","id":54174546,"orderField":0},{"dateTime":"Tuesday, Jul 7, 2015","urlTitle":"using-procurement-analytics-to-simplify-your-supplier-reconciliation","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/keith-sm.jpg","groupId":54174062,"channel":"","description":"Ask finance managers to name a necessary evil of their responsibilities and many will cite reconciling goods received against invoices not received (\u201cGR-NI\u201d). The GR-NI issue is time-consuming to manage but not exactly mission critical to finding new business. Because of that it often gets demoted to the lowest of priorities. Not dealing with GR-NI, however, creates financial liabilities and can introduce significant risk to your business operations.","dateTimeMS":1436289180000,"title":"Using Procurement Analytics to Simplify Your Supplier Reconciliation","type":"article","subCategories":"","url":"/web/all-things-supply-chain-analytics/content?g=54174062&type=article&urlTitle=using-procurement-analytics-to-simplify-your-supplier-reconciliation","target":"_blank","peerReviewed":false,"subType":"","id":54180325,"orderField":0},{"dateTime":"Monday, Jul 13, 2015","urlTitle":"exploring-unmet-opportunities-in-the-24-billion-wearable-technology-industry","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/raghu-sm.jpg","groupId":54174376,"channel":"","description":"Given its rising popularity and expansion in the marketplace, we\u2019ve decided to focus our first piece on one of today\u2019s hottest markets: wearables. In this post, you\u2019ll find some key trends, where the market\u2019s heading, a few examples of popular wearables and additional information about the unexplored opportunities in this market.","dateTimeMS":1436810580000,"title":"Exploring Unmet Opportunities in the $24 Billion Wearable Technology Industry","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=exploring-unmet-opportunities-in-the-24-billion-wearable-technology-industry","target":"_blank","peerReviewed":false,"subType":"","id":54214363,"orderField":0},{"dateTime":"Friday, Jul 10, 2015","urlTitle":"analyst-commenta-2","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"SECURITY","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending July 03, 2015.","dateTimeMS":1436558400000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=analyst-commenta-2","target":"_blank","peerReviewed":false,"subType":"","id":54178692,"orderField":0},{"dateTime":"Thursday, Jul 9, 2015","urlTitle":"pinterest-s-new-buy-it-option-and-the-future-of-social-shopping","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/social-media-sm.jpg","groupId":53319,"channel":"INSIGHTS","description":"Pinterest has been a unique case in the world of social media marketing, popular enough to be recognized by most modern online consumers, but not quite reaching the breakout popularity of Facebook or Twitter. Still, with nearly 50 million active users in the United States alone, Pinterest does have the potential to rise to the same level.","dateTimeMS":1436459220000,"title":"Pinterest's New Buy It Option and the Future of Social Shopping","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=pinterest-s-new-buy-it-option-and-the-future-of-social-shopping","target":"_blank","peerReviewed":false,"subType":"","id":54177983,"orderField":0},{"dateTime":"Tuesday, Jul 14, 2015","urlTitle":"iot-and-the-ever-expanding-web","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ib2.png","groupId":53926943,"channel":"","description":"In 1992, there were about as many devices hooked up to the Internet as there were people living in San Jose. Today, there are three times more connected devices than there are human beings on the planet.","dateTimeMS":1436910480000,"title":"IoT and the Ever Expanding Web","type":"article","subCategories":"","url":"/web/sensing-iot/content?g=53926943&type=article&urlTitle=iot-and-the-ever-expanding-web","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":54859740,"orderField":0},{"dateTime":"Wednesday, Jul 15, 2015","urlTitle":"big-data-and-the-bright-and-messy-future","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/bigdata_sm.jpg","groupId":53319,"channel":"BIG DATA","description":"It began with a simple problem: how do I figure out who is accessing my web site and what they are viewing? I should take a step back, actually, because it began even before that with the grand challenge of trying to crawl and index an exponentially growing number of websites in the early 21st Century. But that challenge was unique to Google and a few other players, while analyzing web site access was more ubiquitous among the burgeoning social media sites that were coming of age around the same time.","dateTimeMS":1436988840000,"title":"Big Data and the Bright and Messy Future","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=big-data-and-the-bright-and-messy-future","target":"_blank","peerReviewed":false,"subType":"","id":54184762,"orderField":0},{"dateTime":"Thursday, Jul 16, 2015","urlTitle":"silver-nanowire-conductors-not-your-grand-dad-s-touchscreen","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/touch.jpg","groupId":53319,"channel":"MOBILE","description":"While there seems to be a constant stream of technical breakthroughs in computing systems, particularly in processors, memory and faster interfaces, revolutionary changes are also occurring in display and touch technology.","dateTimeMS":1437064260000,"title":"Silver Nanowire Conductors: Not Your Grand Dad's Touchscreen","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=silver-nanowire-conductors-not-your-grand-dad-s-touchscreen","target":"_blank","peerReviewed":false,"subType":"","id":54189631,"orderField":0},{"dateTime":"Friday, Jul 17, 2015","urlTitle":"analyst-commenta-3","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"SECURITY","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending July 10, 2015.","dateTimeMS":1437153420000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=analyst-commenta-3","target":"_blank","peerReviewed":false,"subType":"","id":54189272,"orderField":0},{"dateTime":"Friday, Jul 17, 2015","urlTitle":"big-data-analytics-outsource-or-in-house-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/bigdata.jpg","groupId":53319,"channel":"BIG DATA","description":"According to IDC, the 1.8 zettabytes \u2013 that\u2019s 1.8 trillion gigabytes \u2013 of information created last year will grow by a factor of nine over the next five years. While the storage of massive amounts of data on big computers is not a new idea, what has changed is the need and expectation of mining that data for decision support. That\u2019s what we call big data analytics and all experts agree that the ability to analyze big data will be the difference between success and failure in almost every type of business in the coming years.","dateTimeMS":1437153840000,"title":"Big Data Analytics: Outsource or In-House?","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=big-data-analytics-outsource-or-in-house-","target":"_blank","peerReviewed":false,"subType":"","id":54189751,"orderField":0},{"dateTime":"Monday, Jul 20, 2015","urlTitle":"better-decisions-through-big-data","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/bigdsecure.jpg","groupId":53319,"channel":"SECURITY","description":"Companies and governments increasingly rely on \u2018big data\u2019 to operate efficiently and competitively. Analytics and security must keep pace. What research underpins the latest big data-enabled advances?","dateTimeMS":1437417600000,"title":"Better Decisions through Big Data","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=better-decisions-through-big-data","target":"_blank","peerReviewed":false,"subType":"","id":54194424,"orderField":0},{"dateTime":"Tuesday, Jul 21, 2015","urlTitle":"want-more-actionable-information-from-your-bi-support-your-it-team-s-need-for-data-warehouse-automation","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/keith-sm.jpg","groupId":54174062,"channel":"","description":"If your organization is relatively new to BI but has successfully built some new reports with one of the great visualization tools on the market, you will soon find yourselves in need of a better data organization environment.","dateTimeMS":1437521280000,"title":"Want more actionable information from your BI? Support your IT team\u2019s need for data warehouse automation","type":"article","subCategories":"","url":"/web/all-things-supply-chain-analytics/content?g=54174062&type=article&urlTitle=want-more-actionable-information-from-your-bi-support-your-it-team-s-need-for-data-warehouse-automation","target":"_blank","peerReviewed":false,"subType":"","id":54199008,"orderField":0},{"dateTime":"Wednesday, Jul 22, 2015","urlTitle":"what-s-next-for-salesforce-com-how-about-a-private-equity-play-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"The rumors keep coming, fueled by highly speculative analysis like this latest stab in the dark from Fortune, that Salesforce.com is for sale.","dateTimeMS":1437587640000,"title":"What\u2019s next for Salesforce.com? How About a Private Equity Play?","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=what-s-next-for-salesforce-com-how-about-a-private-equity-play-","target":"_blank","peerReviewed":false,"subType":"","id":54200472,"orderField":0},{"dateTime":"Thursday, Jul 23, 2015","urlTitle":"analyst-commenta-4","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"CLOUD","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending July 17, 2015.","dateTimeMS":1437669660000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=analyst-commenta-4","target":"_blank","peerReviewed":false,"subType":"","id":54202471,"orderField":0},{"dateTime":"Monday, Jul 27, 2015","urlTitle":"expanding-opportunities-in-3d-metals-printing","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/gordon.png","groupId":54174376,"channel":"","description":"3D printing of metals is facilitating the transition to additive manufacturing from rapid prototyping. Printing in plastics has its place in prototyping and education, but metal printing has allowed the technology to be adopted for part production in the aerospace, orthopedic, dental and jewelry industries and is now being developed for the oil and gas, printed electronics, and general engineering industries.","dateTimeMS":1438012440000,"title":"Expanding Opportunities in 3D Metals Printing","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=expanding-opportunities-in-3d-metals-printing","target":"_blank","peerReviewed":false,"subType":"","id":54227960,"orderField":0},{"dateTime":"Tuesday, Jul 28, 2015","urlTitle":"shooting-the-messenger-anti-drone-defense-systems-becoming-big-business","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/dscn.jpg","groupId":7989281,"channel":"","description":"Pundits for the past year or so have been lauding about the wonderful things that drones will do for us \u2013 now we\u2019re trying to figure out how to shoot \u2018em all down.","dateTimeMS":1438120140000,"title":"Shooting the Messenger: Anti-Drone Defense Systems Becoming Big Business","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=shooting-the-messenger-anti-drone-defense-systems-becoming-big-business","target":"_blank","peerReviewed":false,"subType":"","id":54208263,"orderField":0},{"dateTime":"Wednesday, Jul 29, 2015","urlTitle":"my-experience-joining-toptal-a-day-in-the-life-of-picante-verde","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/alejandro.jpg","groupId":53319,"channel":"CAREERS","description":"His website sounds like a forum for salsa recipes.\n\nThe URL for his personal Facebook page reads more like a fan site for green pepper enthusiasts than the profile of an ace computer programmer.","dateTimeMS":1438208400000,"title":"My Experience Joining Toptal - A Day in the Life of Picante Verde","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=my-experience-joining-toptal-a-day-in-the-life-of-picante-verde","target":"_blank","peerReviewed":false,"subType":"","id":54216049,"orderField":0},{"dateTime":"Friday, Jul 31, 2015","urlTitle":"move-to-48-volt-vehicle-systems-accelerates-as-power-demand-increases","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/harrop.jpg","groupId":54174376,"channel":"","description":"Conventional vehicles with an internal combustion engine as the sole traction power have become more electric over the years \u2013 as customers demand more and more electrical and electronic devices.","dateTimeMS":1438375980000,"title":"Move to 48-Volt Vehicle Systems Accelerates as Power Demand Increases","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=move-to-48-volt-vehicle-systems-accelerates-as-power-demand-increases","target":"_blank","peerReviewed":false,"subType":"","id":54218087,"orderField":0},{"dateTime":"Thursday, Jul 30, 2015","urlTitle":"analyst-commenta-5","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending July 24, 2015.","dateTimeMS":1438290240000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-commenta-5","target":"_blank","peerReviewed":false,"subType":"","id":54219037,"orderField":0},{"dateTime":"Monday, Aug 3, 2015","urlTitle":"ray-tracing-for-beginners","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/alex.jpg","groupId":53319,"channel":"INSIGHTS","description":"For the past three decades, there have been two main schools of thought dominating the center stage of 3D graphics: rasterization and ray tracing.","dateTimeMS":1438622040000,"title":"Ray Tracing for Beginners","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=ray-tracing-for-beginners","target":"_blank","peerReviewed":false,"subType":"","id":54226146,"orderField":0},{"dateTime":"Wednesday, Aug 5, 2015","urlTitle":"automate-the-boring-but-essential-parts-of-your-data-warehouse","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/keith-sm.jpg","groupId":54174062,"channel":"","description":"Companies realize that data warehouses are not going to be replaced by Hadoop or in-memory solutions. A 2014 Gartner survey found that only 3% of IT leaders believe that big data or in-memory systems can replace their existing data warehouse infrastructure. That\u2019s a dramatic drop over recent years. As such, DWA is getting a fresh look as a better way to build and manage a data warehouse.","dateTimeMS":1438818300000,"title":"Automate the boring but essential parts of your data warehouse","type":"article","subCategories":"","url":"/web/all-things-supply-chain-analytics/content?g=54174062&type=article&urlTitle=automate-the-boring-but-essential-parts-of-your-data-warehouse","target":"_blank","peerReviewed":false,"subType":"","id":54227415,"orderField":0},{"dateTime":"Thursday, Aug 6, 2015","urlTitle":"avoiding-commoditization-in-wearable-technology","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/hayward.png","groupId":54174376,"channel":"","description":"In 2015 the global wearable technology market will be $24.2 billion, based on surveys conducted by IDTechEx Research. However, the majority of this \u2013 74% - is for already mature wearables \u2013 the humble electronic wristwatch, earphones, blood glucose test strips and the like.","dateTimeMS":1438880400000,"title":"Avoiding Commoditization in Wearable Technology","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=avoiding-commoditization-in-wearable-technology","target":"_blank","peerReviewed":false,"subType":"","id":54227940,"orderField":0},{"dateTime":"Friday, Aug 7, 2015","urlTitle":"analyst-commenta-6","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending July 31, 2015.","dateTimeMS":1438989180000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-commenta-6","target":"_blank","peerReviewed":false,"subType":"","id":54233210,"orderField":0},{"dateTime":"Monday, Aug 10, 2015","urlTitle":"the-best-and-worst-of-windows-10-can-microsoft-stay-competitive-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":53319,"channel":"INSIGHTS","description":"Over the past week or so, the buzz around Windows 10 has exploded. It\u2019s Microsoft\u2019s first major operating system update since the oft-criticized Windows 8 that attempted to marry the best features of desktops and tablets while offering subpar functionality in both areas. Now, after much hype and a week full of knee-jerk reactions, the dust has settled and Windows 10 is comfortably loaded on millions of PCs.","dateTimeMS":1439251020000,"title":"The Best and Worst of Windows 10: Can Microsoft Stay Competitive?","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=the-best-and-worst-of-windows-10-can-microsoft-stay-competitive-","target":"_blank","peerReviewed":false,"subType":"","id":54235825,"orderField":0},{"dateTime":"Tuesday, Aug 11, 2015","urlTitle":"ieee-computer-society-and-at-t-joined-together-to-create-an-encryption-challenge-and-we-have-a-winner-who-cracked-the-code-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/wwii.jpg","groupId":53319,"channel":"SECURITY","description":"Matthew Williams solved the #crackthecode challenge which was based on the 72nd anniversary of the game-changing Sigsaly encryption system launched in WWII.","dateTimeMS":1439311620000,"title":"IEEE Computer Society and AT&T joined together to create an Encryption Challenge, and We Have a Winner who Cracked the Code!","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=ieee-computer-society-and-at-t-joined-together-to-create-an-encryption-challenge-and-we-have-a-winner-who-cracked-the-code-","target":"_blank","peerReviewed":false,"subType":"","id":54236306,"orderField":0},{"dateTime":"Wednesday, Aug 12, 2015","urlTitle":"looking-into-the-future","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ebert-thumb.jpg","groupId":5954967,"channel":"","description":"Where is software heading as a business? I have spoken with many software business leaders around the world. They pointed to five success factors that will advance software business. They left unaddressed whether we evolve to humanity 2.0 \u2013 or a post-human society.","dateTimeMS":1439402100000,"title":"Looking into the Future","type":"article","subCategories":"","url":"/web/software-technologies/content?g=5954967&type=article&urlTitle=looking-into-the-future","target":"_blank","peerReviewed":false,"subType":"","id":54239765,"orderField":0},{"dateTime":"Thursday, Aug 13, 2015","urlTitle":"analyst-commenta-7","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending August 07, 2015.","dateTimeMS":1439510520000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-commenta-7","target":"_blank","peerReviewed":false,"subType":"","id":54241555,"orderField":0},{"dateTime":"Friday, Aug 14, 2015","urlTitle":"sensors-for-wearable-technology-enabling-product-differentiation","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/hayward.png","groupId":54174376,"channel":"","description":"It\u2019s no secret that wearable technology has garnered a lot of attention the past few years. The driving factor has been the adaption of technology that has been widely used in other consumer electronics areas into a form factor that can be worn on the body.","dateTimeMS":1439592660000,"title":"Sensors for Wearable Technology- Enabling Product Differentiation","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=sensors-for-wearable-technology-enabling-product-differentiation","target":"_blank","peerReviewed":false,"subType":"","id":54286188,"orderField":0},{"dateTime":"Thursday, Aug 20, 2015","urlTitle":"seizing-the-data-at-hp-big-data-conference-2015","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/bigdata.jpg","groupId":53319,"channel":"BIG DATA","description":"Ken Rudin, Director of Analytics at Facebook, closed things out in the Day 2 keynote. He debunked four prominent and popular myths about Big Data:\n\n Big Data=Hadoop\n Big Data provides better answers\n Data Science is a science\n Actionable insights are the goal\n\nMr. Rudin spoke about the great challenge of hiring the right people to create a successful analytical culture. Finding individuals who are academically talented and business-savvy is no easy task.","dateTimeMS":1440094020000,"title":"Seizing the Data at HP Big Data Conference 2015","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=seizing-the-data-at-hp-big-data-conference-2015","target":"_blank","peerReviewed":false,"subType":"","id":54249692,"orderField":0},{"dateTime":"Wednesday, Aug 19, 2015","urlTitle":"analyst-commenta-8","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending August 14, 2015.","dateTimeMS":1440027900000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-commenta-8","target":"_blank","peerReviewed":false,"subType":"","id":54249879,"orderField":0},{"dateTime":"Friday, Aug 21, 2015","urlTitle":"the-intangible-future-and-the-rise-of-the-internet-file-system","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"Just a few years ago, we still printed out our photos, bought music on CDs, and movies on DVDs. Books, magazines, and newspapers were all printed on paper. Most people had external hard drives for backup and transferring files. We owned our media and entertainment and had full control over our real and digital lives. Does anyone remember holding up a map while driving, looking up a number in a phonebook, or using an encyclopedia? It feels awfully far away and almost unimaginable.","dateTimeMS":1440201900000,"title":"The Intangible Future and the Rise of the Internet File System","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=the-intangible-future-and-the-rise-of-the-internet-file-system","target":"_blank","peerReviewed":false,"subType":"","id":54261206,"orderField":0},{"dateTime":"Tuesday, Aug 18, 2015","urlTitle":"rethinking-software-testing-in-a-devops-world","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"Faster time to market. Some say it\u2019s not the next big thing; it\u2019s the only thing. Still, even with everyone pushing for DevOps, Agile and Continuous Integration, there is one key component that consistently gets lost in the shuffle \u2014 software testing.","dateTimeMS":1439931000000,"title":"Rethinking Software Testing in a DevOps World","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=rethinking-software-testing-in-a-devops-world","target":"_blank","peerReviewed":false,"subType":"","id":54250642,"orderField":0},{"dateTime":"Monday, Aug 17, 2015","urlTitle":"is-there-a-market-for-an-internet-of-things-powered-cloud-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"Imagine an Internet of Things (IoT)-powered hospital, where real-time patient information is seamlessly transferred from Google Glass to a securely managed cloud, dedicated solely to IoT information. If General Electric (GE) has it its way, their IoT-powered cloud will make this scenario a reality.","dateTimeMS":1439840160000,"title":"Is There a Market for an Internet of Things-Powered Cloud?","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=is-there-a-market-for-an-internet-of-things-powered-cloud-","target":"_blank","peerReviewed":false,"subType":"","id":54250622,"orderField":0},{"dateTime":"Thursday, Aug 20, 2015","urlTitle":"android-should-be-the-a-in-google-s-alphabet","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"There was a lot of surprise and excitement over Google\u2019s, sorry I mean \u201cAlphabet\u2019s,\u201d announcement this week of, well, it\u2019s existence, and how Google will now become a subsidiary of this new company. From a business perspective, there\u2019s a lot to like about this new company and Google\u2019s place in it, but my question is, did the rise of Alphabet and the design of the new Google go far enough?","dateTimeMS":1440092820000,"title":"Android Should be the \u201cA\u201d in Google\u2019s Alphabet","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=android-should-be-the-a-in-google-s-alphabet","target":"_blank","peerReviewed":false,"subType":"","id":54250602,"orderField":0},{"dateTime":"Tuesday, Aug 25, 2015","urlTitle":"the-runaway-growth-of-games-and-the-work-ahead-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/meloni.png","groupId":8545555,"channel":"","description":"The games market has exploded in the past seven years, expanding across an array of platforms that includes PCs, consoles, and mobiles devices. In 2009, mobile gaming barely made a dent in this market, but today it is one of the fastest growing segments. Advances in graphics quality and player engagement have fueled this growth.","dateTimeMS":1440541380000,"title":"The runaway growth of Games and the work ahead\u2026","type":"article","subCategories":"","url":"/web/inspired-by-games/content?g=8545555&type=article&urlTitle=the-runaway-growth-of-games-and-the-work-ahead-","target":"_blank","peerReviewed":false,"subType":"","id":54261226,"orderField":0},{"dateTime":"Monday, Aug 24, 2015","urlTitle":"harnessing-the-business-possibilities-of-the-internet-of-things","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"The Internet of Things (IoT) has captured many headlines over the past year, and that\u2019s because it has captured the imagination of everyone from startup entrepreneurs to heads of well-established enterprises. What started as an Internet-controlled toaster at the 2009 Interop Conference has now blossomed into a multi-billion-dollar world of possibility.","dateTimeMS":1440454140000,"title":"Harnessing the Business Possibilities of the Internet of Things","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=harnessing-the-business-possibilities-of-the-internet-of-things","target":"_blank","peerReviewed":false,"subType":"","id":54260492,"orderField":0},{"dateTime":"Wednesday, Aug 26, 2015","urlTitle":"progress-for-new-products-enabled-by-flexible-battery-technology","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/raghu-sm.jpg","groupId":54174376,"channel":"","description":"Thin, flexible batteries have been available for more than 15 years, but have only had limited commercial success. This is not surprising, since they have been more expensive, offer lower capacity and have a shorter shelf life than regular button cell or larger batteries.","dateTimeMS":1440603660000,"title":"Progress for New Products Enabled by Flexible Battery Technology","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=progress-for-new-products-enabled-by-flexible-battery-technology","target":"_blank","peerReviewed":false,"subType":"","id":54264805,"orderField":0},{"dateTime":"Thursday, Aug 27, 2015","urlTitle":"analyst-commenta-9","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending August 21, 2015.","dateTimeMS":1440693720000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-commenta-9","target":"_blank","peerReviewed":false,"subType":"","id":54264826,"orderField":0},{"dateTime":"Friday, Aug 28, 2015","urlTitle":"50-tools-your-startup-probably-needs","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/startup.jpeg","groupId":53319,"channel":"STARTUPS","description":"Your startup is all about disruptive, game-changing ideas. However, to make that idea into a business you not only need your strategy, but you also need many tools to build your business out. Think about adding these 50 tools.","dateTimeMS":1440801840000,"title":"50 Tools Your Startup Probably Needs","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=50-tools-your-startup-probably-needs","target":"_blank","peerReviewed":false,"subType":"","id":54774372,"orderField":0},{"dateTime":"Monday, Aug 31, 2015","urlTitle":"mobile-ad-revenues-steadily-increasing-but-challenges-abound","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/yah.png","groupId":7989281,"channel":"","description":"Advertisers have been salivating for years at the promise of mobile advertising. Gartner, for instance, predicts that by 2017, annual mobile advertising revenues will be almost $42 billion. Display formats making up most of that chunk, but video (driven by tablets and growth in tablet ownership) will show the highest growth.","dateTimeMS":1441038420000,"title":"Mobile Ad Revenues Steadily Increasing but Challenges Abound","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=mobile-ad-revenues-steadily-increasing-but-challenges-abound","target":"_blank","peerReviewed":false,"subType":"","id":54273009,"orderField":0},{"dateTime":"Wednesday, Sep 2, 2015","urlTitle":"wearable-technology-in-medical-applications-and-healthcare","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/hayward.png","groupId":54174376,"channel":"","description":"The medical and healthcare sector, primarily characterized as \u201cdigital health,\u201d represents the single largest opportunity for the wearable technology industry. Patients want it, some physicians are embracing it, insurance companies are starting to fund some of it, regulators are approving some of it and companies \u2015 big and small \u2015 all want in.","dateTimeMS":1441238520000,"title":"Wearable Technology in Medical Applications and Healthcare","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=wearable-technology-in-medical-applications-and-healthcare","target":"_blank","peerReviewed":false,"subType":"","id":54277998,"orderField":0},{"dateTime":"Wednesday, Sep 2, 2015","urlTitle":"analyst-comment-10","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending August 28, 2015.","dateTimeMS":1441228260000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-comment-10","target":"_blank","peerReviewed":false,"subType":"","id":54280426,"orderField":0},{"dateTime":"Friday, Sep 4, 2015","urlTitle":"growth-potential-of-rfid-in-china-looks-promising","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/raghu-sm.jpg","groupId":54174376,"channel":"","description":"The development of RFID (Radio Frequency Identification) in China has long been heavily supported by the Chinese government and can be readily seen in large projects, such as national identification cards, passports and subway ticket applications.","dateTimeMS":1441402620000,"title":"Growth Potential of RFID in China Looks Promising","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=growth-potential-of-rfid-in-china-looks-promising","target":"_blank","peerReviewed":false,"subType":"","id":54286209,"orderField":0},{"dateTime":"Tuesday, Sep 8, 2015","urlTitle":"racing-to-the-top-as-paas-and-iaas-commoditize-the-quest-to-provide-business-value-add-in-the-cloud-intensifies","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"At a press/analyst meeting last spring, Salesforce.com CEO Marc Benioff was asked whether he had any plans to build out an Amazon AWS-like capability to complement the rest of his cloud strategy. His scoffing reply was right on the money. Competing with AWS and other commodity-level cloud services was \u201ca race to the bottom,\u201d Benioff replied. Case closed.","dateTimeMS":1441748520000,"title":"Racing to the Top: As PaaS and IaaS Commoditize, The Quest to Provide Business Value-add in the Cloud Intensifies","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=racing-to-the-top-as-paas-and-iaas-commoditize-the-quest-to-provide-business-value-add-in-the-cloud-intensifies","target":"_blank","peerReviewed":false,"subType":"","id":54291595,"orderField":0},{"dateTime":"Thursday, Sep 10, 2015","urlTitle":"analyst-comment-11","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending September 04, 2015.","dateTimeMS":1441914300000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-comment-11","target":"_blank","peerReviewed":false,"subType":"","id":54297897,"orderField":0},{"dateTime":"Wednesday, Sep 9, 2015","urlTitle":"flexible-barrier-manufacturing-poised-for-takeoff","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/zervos.png","groupId":54174376,"channel":"","description":"A large opportunity lies in the development of devices in a flexible form factor that can operate without deterioration in performance, allowing them to be more robust, lightweight and versatile in their use \u2015 such as in wearable technology. This is specifically related to flexible OLED displays, and other devices using organic materials (such as OPV), where the organic materials deteriorate very quickly with exposure to oxygen and water.","dateTimeMS":1441820880000,"title":"Flexible Barrier Manufacturing Poised for Takeoff","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=flexible-barrier-manufacturing-poised-for-takeoff","target":"_blank","peerReviewed":false,"subType":"","id":54312221,"orderField":0},{"dateTime":"Friday, Sep 11, 2015","urlTitle":"iot-standardization-it-s-a-war","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ib2.png","groupId":53926943,"channel":"","description":"While developing products and solutions, the Internet of Stuff firms are racing over the creation of tech standards. Will the standards-based bodies and the industry leaders compete or collaborate?","dateTimeMS":1442009640000,"title":"IoT Standardization: It\u2019s a War","type":"article","subCategories":"","url":"/web/sensing-iot/content?g=53926943&type=article&urlTitle=iot-standardization-it-s-a-war","target":"_blank","peerReviewed":false,"subType":"","id":54859720,"orderField":0},{"dateTime":"Monday, Sep 14, 2015","urlTitle":"analyst-comment-12","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending September 11, 2015.","dateTimeMS":1442249580000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-comment-12","target":"_blank","peerReviewed":false,"subType":"","id":54305269,"orderField":0},{"dateTime":"Tuesday, Sep 15, 2015","urlTitle":"15-tips-to-stay-motivated-while-working-from-home","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/wfh.jpg","groupId":53319,"channel":"CAREERS","description":"A number of employees are starting to use the ability to work from home as an opportunity to curate their ideal working environment, no matter where in the world that is.","dateTimeMS":1442331600000,"title":"15 Tips To Stay Motivated While Working From Home","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=15-tips-to-stay-motivated-while-working-from-home","target":"_blank","peerReviewed":false,"subType":"","id":54306331,"orderField":0},{"dateTime":"Friday, Sep 18, 2015","urlTitle":"why-millions-are-invested-in-thin-flexible-sensors","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/chansin.png","groupId":54174376,"channel":"","description":"Traditionally, sensors have been built as rigid components, but recent announcements \u2013 and the emerging markets \u2015 indicate we will see more flexible sensors in the future.","dateTimeMS":1442607300000,"title":"Why Millions Are Invested in Thin Flexible Sensors","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=why-millions-are-invested-in-thin-flexible-sensors","target":"_blank","peerReviewed":false,"subType":"","id":54312759,"orderField":0},{"dateTime":"Thursday, Sep 17, 2015","urlTitle":"don-t-let-an-out-of-date-corporate-network-lead-to-disasters","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"Disasters can come in many shapes and sizes. At your local movie theater, big budget disaster flicks can include earthquakes, tsunamis, and even aliens and rampaging dinosaurs. But in the world of business technology, while disaster may seem more mundane and not come with expensive special effects, the costs of technology-related disasters can be very big budget as well.","dateTimeMS":1442532360000,"title":"Don\u2019t Let an Out-of-Date Corporate Network Lead to Disasters","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=don-t-let-an-out-of-date-corporate-network-lead-to-disasters","target":"_blank","peerReviewed":false,"subType":"","id":54312908,"orderField":0},{"dateTime":"Wednesday, Sep 23, 2015","urlTitle":"analyst-comment-13","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending September 18, 2015.","dateTimeMS":1443025440000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-comment-13","target":"_blank","peerReviewed":false,"subType":"","id":54321137,"orderField":0},{"dateTime":"Thursday, Sep 24, 2015","urlTitle":"when-the-iot-attacks-four-examples-of-the-highest-security-stakes-we-ve-seen","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"Remember the good old days? The days when a security breach just meant your credit card data was stolen from the local convenience store and used for a $2,000 propane tank shopping spree a couple thousand miles away?","dateTimeMS":1443119520000,"title":"When the IoT Attacks: Four Examples of the Highest Security Stakes We\u2019ve Seen","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=when-the-iot-attacks-four-examples-of-the-highest-security-stakes-we-ve-seen","target":"_blank","peerReviewed":false,"subType":"","id":54321164,"orderField":0},{"dateTime":"Monday, Sep 21, 2015","urlTitle":"the-devil-s-dictionary-for-it-and-it-security-two-factor-authentication","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"Access Denied. (But I typed in the credentials right). Access Denied. (You\u2019ve got to be kidding me. One more time.). Access Denied. (That\u2019s it\u2026this computer is going out the window).","dateTimeMS":1442864340000,"title":"The Devil\u2019s Dictionary for IT and IT Security: Two-Factor Authentication","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=the-devil-s-dictionary-for-it-and-it-security-two-factor-authentication","target":"_blank","peerReviewed":false,"subType":"","id":54321191,"orderField":0},{"dateTime":"Tuesday, Sep 22, 2015","urlTitle":"the-future-of-networking-will-be-written-by-the-leaders","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"One of my favorite bands of all time is The Clash, and a famous quote attributed to their late band leader Joe Strummer is that \u201cthe future is unwritten.\u201d And in most cases that is very true. For example, few people in 2005 could have successfully predicted many of the trends and realities of today, whether in the everyday world or in the realm of technology.","dateTimeMS":1442965800000,"title":"The Future of Networking Will Be Written By the Leaders","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=the-future-of-networking-will-be-written-by-the-leaders","target":"_blank","peerReviewed":false,"subType":"","id":54321720,"orderField":0},{"dateTime":"Friday, Sep 25, 2015","urlTitle":"techpro-stat-of-the-week-data-breaches-and-downtime","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"Recent Aberdeen research has shown a 30-60% growth in network security services for SMBs, and for good reason. The costs of data breaches and downtime in this edition of Stat of the Week demonstrate that it\u2019s not cheap for an SMB to not be secure.","dateTimeMS":1443207060000,"title":"TechPro Stat of the Week: Data Breaches and Downtime","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=techpro-stat-of-the-week-data-breaches-and-downtime","target":"_blank","peerReviewed":false,"subType":"","id":54322334,"orderField":0},{"dateTime":"Monday, Sep 28, 2015","urlTitle":"10-online-invoicing-services-for-small-business-owners","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/invoice.jpg","groupId":53319,"channel":"INSIGHTS","description":"The benefits of online services for small business owners have been often noted, including reducing paper, adding efficiency and speed, and cutting costs. While there are online services for small business owners like project management, collaborative tools, marketing and accounting, one of the most advantageous online services has been online invoicing.","dateTimeMS":1443469200000,"title":"10 Online Invoicing Services for Small Business Owners","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=10-online-invoicing-services-for-small-business-owners","target":"_blank","peerReviewed":false,"subType":"","id":54324273,"orderField":0},{"dateTime":"Tuesday, Sep 29, 2015","urlTitle":"a-matter-of-life-and-death-why-we-must-take-iot-flaws-seriously","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/swift-thumb.jpg","groupId":8459902,"channel":"","description":"You\u2019re probably getting desensitized by now to the ever-lengthening list of data breach headlines which have saturated the news for the past couple of years. Targeted attacks, persistent threats and the like usually end up with the hackers capturing sensitive IP, customer information or trade secrets. The result? Economic damage, board level sackings and a heap of bad publicity for the breached organization. But that\u2019s usually where it ends.","dateTimeMS":1443551340000,"title":"A Matter of Life and Death: Why We Must Take IoT Flaws Seriously","type":"article","subCategories":"","url":"/web/prpl-matters/content?g=8459902&type=article&urlTitle=a-matter-of-life-and-death-why-we-must-take-iot-flaws-seriously","target":"_blank","peerReviewed":false,"subType":"","id":54329040,"orderField":0},{"dateTime":"Tuesday, Sep 29, 2015","urlTitle":"farmers-embracing-technology-to-improve-agriculture","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/agriculture.gif","groupId":7989281,"channel":"","description":"Tractor cabs that look like airplane cockpits. Cow heat detection devices. Crop-monitoring drones. Robot milking machines. Sensors that continuously measure everything from nitrogen content to livestock biometrics.","dateTimeMS":1443567780000,"title":"Farmers Embracing Technology to Improve Agriculture","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=farmers-embracing-technology-to-improve-agriculture","target":"_blank","peerReviewed":false,"subType":"","id":54328775,"orderField":0},{"dateTime":"Wednesday, Sep 30, 2015","urlTitle":"analyst-comment-14","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending September 25, 2015.","dateTimeMS":1443633480000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-comment-14","target":"_blank","peerReviewed":false,"subType":"","id":54330338,"orderField":0},{"dateTime":"Thursday, Oct 1, 2015","urlTitle":"reflections-on-fcc-proposal-on-modular-transmitters-and-electronic-labels-for-wireless-devices","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/schultz.jpg","groupId":8459902,"channel":"","description":"Over the last few weeks a discussion has flourished over the FCC\u2019s Notification of Proposed Rule Making (NPRM) on modular transmitters and electronic labels for wireless devices. Some folks have felt that the phrasing has been too Chicken-Little-like and that the FCC\u2019s proposal doesn\u2019t affect the ability to install free, libre or open source operating system. The FCC in fact says their proposal has no effect on open source operating systems or open source in general. The FCC is undoubtedly wrong.","dateTimeMS":1443721200000,"title":"Reflections on FCC Proposal on Modular Transmitters and Electronic Labels for Wireless Devices","type":"article","subCategories":"","url":"/web/prpl-matters/content?g=8459902&type=article&urlTitle=reflections-on-fcc-proposal-on-modular-transmitters-and-electronic-labels-for-wireless-devices","target":"_blank","peerReviewed":false,"subType":"","id":54330379,"orderField":0},{"dateTime":"Friday, Oct 2, 2015","urlTitle":"mapping-the-2-5-billion-3d-printing-industry","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/harrop.png","groupId":54174376,"channel":"","description":"The 3D printing industry will grow from $2.5 billion in 2015 to $20 billion in 2025. This growth is due to both improvements in existing printing technologies and the development of completely new technologies.","dateTimeMS":1443819480000,"title":"Mapping the $2.5 Billion 3D Printing Industry","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=mapping-the-2-5-billion-3d-printing-industry","target":"_blank","peerReviewed":false,"subType":"","id":54332238,"orderField":0},{"dateTime":"Tuesday, Oct 6, 2015","urlTitle":"upcoming-gbr-webinar-learn-5-proven-design-hacks-that-work-to-build-great-products","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/meloni.png","groupId":8545555,"channel":"","description":"Grab your lunch this Wednesday, October 7th at 12pm PST \u2013 Join us as we learn more about key design hacks and the powerful step-by-step GettngToAlpha program perfected by Amy Jo Kim, CEO of Shufflebrain.","dateTimeMS":1444169100000,"title":"UPCOMING GBR WEBINAR: Learn 5 Proven Design Hacks That Work To Build Great Products","type":"article","subCategories":"","url":"/web/inspired-by-games/content?g=8545555&type=article&urlTitle=upcoming-gbr-webinar-learn-5-proven-design-hacks-that-work-to-build-great-products","target":"_blank","peerReviewed":false,"subType":"","id":54339339,"orderField":0},{"dateTime":"Monday, Oct 5, 2015","urlTitle":"analyst-comment-15","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending October 02, 2015.","dateTimeMS":1444078620000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-comment-15","target":"_blank","peerReviewed":false,"subType":"","id":54339433,"orderField":0},{"dateTime":"Wednesday, Oct 7, 2015","urlTitle":"the-security-challenges-threatening-to-tear-the-internet-of-things-apart","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/swift-thumb.jpg","groupId":8459902,"channel":"","description":"The Internet of Things (IoT) has the power to transform our lives, making us more productive at work, and happier and safer at home. But it\u2019s also developing at such a rate that it threatens to outstrip our ability to adequately secure it.","dateTimeMS":1444256820000,"title":"The Security Challenges Threatening to Tear the Internet of Things Apart","type":"article","subCategories":"","url":"/web/prpl-matters/content?g=8459902&type=article&urlTitle=the-security-challenges-threatening-to-tear-the-internet-of-things-apart","target":"_blank","peerReviewed":false,"subType":"","id":54341998,"orderField":0},{"dateTime":"Thursday, Oct 8, 2015","urlTitle":"asia-next-frontier-for-flexible-electronics-manufacturing-equipment","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/raghu-sm.jpg","groupId":54174376,"channel":"","description":"Equipment makers are turning to Asia. There is an impending transition from equipment for development and prototyping purposes to buying equipment for higher volume manufacture. Here, the equipment focus is different: It is not about making state- of-the-art transistors using printing, but doing simpler things, reliably, that can be used in commercial products today.","dateTimeMS":1444340940000,"title":"Asia Next Frontier for Flexible Electronics Manufacturing Equipment","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=asia-next-frontier-for-flexible-electronics-manufacturing-equipment","target":"_blank","peerReviewed":false,"subType":"","id":54345528,"orderField":0},{"dateTime":"Friday, Oct 9, 2015","urlTitle":"can-microsoft-s-renaissance-return-it-to-the-top-of-the-tech-world-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"When Microsoft announced their new lineup of products, including a lot of impressive hardware, it turned a lot of people\u2019s heads. For anyone who follows tech, it\u2019s pretty hard to not compare this to Apple\u2019s recent product announcements and come to the conclusion that Microsoft is, at least right now, doing more interesting things than Apple.","dateTimeMS":1444420980000,"title":"Can Microsoft\u2019s Renaissance Return it to the Top of the Tech World?","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=can-microsoft-s-renaissance-return-it-to-the-top-of-the-tech-world-","target":"_blank","peerReviewed":false,"subType":"","id":54345555,"orderField":0},{"dateTime":"Monday, Oct 12, 2015","urlTitle":"how-to-fix-the-internet-of-broken-things","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/swift-thumb.jpg","groupId":8459902,"channel":"","description":"The Internet of Things is already permeating every part of our lives \u2013 from healthcare to aviation, automobiles to telecoms. But its security is fundamentally broken.","dateTimeMS":1444674120000,"title":"How to Fix the Internet of Broken Things","type":"article","subCategories":"","url":"/web/prpl-matters/content?g=8459902&type=article&urlTitle=how-to-fix-the-internet-of-broken-things","target":"_blank","peerReviewed":false,"subType":"","id":54348139,"orderField":0},{"dateTime":"Tuesday, Oct 13, 2015","urlTitle":"the-real-death-of-windows-phone-american-style-part-i-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"Microsoft\u2019s five-year Windows Phone freefall is living, or dying, proof that there are only so many second chances in tech, even for the kings of second chances, and it\u2019s finally time to throw in the towel on another great phone OS that never lived up to its potential. (ah, Palm OS, we hardly knew ya too.)","dateTimeMS":1444777500000,"title":"The (Real) Death of Windows Phone, American-style (Part I)","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=the-real-death-of-windows-phone-american-style-part-i-","target":"_blank","peerReviewed":false,"subType":"","id":54351330,"orderField":0},{"dateTime":"Friday, Oct 16, 2015","urlTitle":"is-data-prep-the-key-to-analytical-success-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"Analytics \u2013 Everyone wants it, a lot of people use it, few people use it well. Despite the appeal and seeming ubiquity of business analytics today, the experience of the typical business user leaves a lot to be desired.","dateTimeMS":1445022600000,"title":"Is Data Prep the Key to Analytical Success?","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=is-data-prep-the-key-to-analytical-success-","target":"_blank","peerReviewed":false,"subType":"","id":54357184,"orderField":0},{"dateTime":"Monday, Oct 19, 2015","urlTitle":"10-marketplace-companies-to-keep-your-eye-on-in-2016","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/cart.jpg","groupId":53319,"channel":"INSIGHTS","description":"It\u2019s not an easy task too incorporate a business model into this space. However, when it is done correctly, the potential market share to be captured is enormous. Here are 10 marketplace companies to keep your eye on in 2016.","dateTimeMS":1445275260000,"title":"10 Marketplace Companies to Keep Your Eye on in 2016","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=10-marketplace-companies-to-keep-your-eye-on-in-2016","target":"_blank","peerReviewed":false,"subType":"","id":54357212,"orderField":0},{"dateTime":"Wednesday, Oct 14, 2015","urlTitle":"analyst-comment-16","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending October 09, 2015.","dateTimeMS":1444861920000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-comment-16","target":"_blank","peerReviewed":false,"subType":"","id":54357267,"orderField":0},{"dateTime":"Thursday, Oct 15, 2015","urlTitle":"protecting-the-network-from-advanced-layer-7-ddos-attacks","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"Because your website and the supporting systems, applications, and so on are exposed to the outside world, they are ripe targets for sophisticated attacks designed either to exploit uncorrected flaws or to change the way these systems work. As application development continues to move to the cloud, such attacks will continue to be difficult to defend against.","dateTimeMS":1444930140000,"title":"Protecting the Network from Advanced \u2018Layer 7\u2032 DDoS Attacks","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=protecting-the-network-from-advanced-layer-7-ddos-attacks","target":"_blank","peerReviewed":false,"subType":"","id":54357334,"orderField":0},{"dateTime":"Tuesday, Oct 20, 2015","urlTitle":"the-real-death-of-windows-phone-american-style-part-ii-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"(When we last left our tragic hero, Windows Phone, there was no carrier support for the new Lumias that just hit the market, which means\u2026)","dateTimeMS":1445382720000,"title":"The (Real) Death of Windows Phone, American-style (Part II)","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=the-real-death-of-windows-phone-american-style-part-ii-","target":"_blank","peerReviewed":false,"subType":"","id":54359347,"orderField":0},{"dateTime":"Wednesday, Oct 21, 2015","urlTitle":"8-tasks-you-should-automate-at-work","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/productive.jpg","groupId":53319,"channel":"CAREERS","description":"Why work harder when you can work smarter instead? Think of all the time you spend completing tedious tasks at work. Now imagine the extra time you\u2019d have to dedicate to work that is more important and more interesting if you didn\u2019t have to spend so much time slogging through emails, filling out forms, or wracking your brain for a password.","dateTimeMS":1445462460000,"title":"8 Tasks You Should Automate At Work","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=8-tasks-you-should-automate-at-work","target":"_blank","peerReviewed":false,"subType":"","id":54360166,"orderField":0},{"dateTime":"Thursday, Oct 22, 2015","urlTitle":"analyst-comment-17","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending October 16, 2015.","dateTimeMS":1445534520000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-comment-17","target":"_blank","peerReviewed":false,"subType":"","id":54364467,"orderField":0},{"dateTime":"Friday, Oct 23, 2015","urlTitle":"do-you-need-to-be-smarter-than-me-to-use-tableau-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"Tableau is typically known as a provider of interactive data visualization software with a loyal, bordering on cult-like, customer base. So this naturally got me thinking \u2013 who are these \u201cpeople\u201d and do I have the intellectual horsepower to be one of them? Do you need to be smarter than me to use Tableau?","dateTimeMS":1445629980000,"title":"Do You Need to Be Smarter than Me to Use Tableau?","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=do-you-need-to-be-smarter-than-me-to-use-tableau-","target":"_blank","peerReviewed":false,"subType":"","id":54364494,"orderField":0},{"dateTime":"Monday, Oct 26, 2015","urlTitle":"analyst-comment-18","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending October 23, 2015.","dateTimeMS":1445900340000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-comment-18","target":"_blank","peerReviewed":false,"subType":"","id":54366032,"orderField":0},{"dateTime":"Wednesday, Oct 28, 2015","urlTitle":"the-amazing-and-emerging-world-of-electronics-and-vanishing-electrics","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/harrop.jpg","groupId":54174376,"channel":"","description":"Consider the most glamorous things that recently burst upon the scene, such as the MIT robot dog that jumps over obstacles, the Dyson robot vacuum cleaner that is as effective as a traditional model or the latest smart watch with its myriad features. Behind the dazzling exterior, they are made by 100-year-old design rules: buy components, connect them together and drop them in a box.","dateTimeMS":1446056280000,"title":"The Amazing \u2015 and Emerging \u2015 World of Electronics and Vanishing Electrics","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=the-amazing-and-emerging-world-of-electronics-and-vanishing-electrics","target":"_blank","peerReviewed":false,"subType":"","id":54367497,"orderField":0},{"dateTime":"Wednesday, Oct 28, 2015","urlTitle":"use-private-cloud-to-make-customers-an-offer-they-can-t-refuse","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"using private cloud technology to help organizations gain the benefits of business-critical enterprise applications can be a vital component of building and offering services that no smart business can refuse. - See more at: http://www.techproessentials.com/use-private-cloud-to-make-customers-an-offer-they-cant-refuse/#sthash.0UV9v5uY.dpuf","dateTimeMS":1446051000000,"title":"Use Private Cloud to Make Customers an Offer They Can\u2019t Refuse","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=use-private-cloud-to-make-customers-an-offer-they-can-t-refuse","target":"_blank","peerReviewed":false,"subType":"","id":54367429,"orderField":0},{"dateTime":"Friday, Oct 30, 2015","urlTitle":"keep-on-truckin-mobile-apps-moving-on-down-the-road","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/truck_th.jpg","groupId":7989281,"channel":"","description":"Over the past couple of years, according to Fleet Owner, truckers have tapped in to an array of mobile business applications that are helping to strengthen a fleet\u2019s competitive advantage and assist with regulatory compliance.","dateTimeMS":1446223800000,"title":"Keep on Truckin\u2019 \u2013 Mobile Apps Moving on Down the Road","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=keep-on-truckin-mobile-apps-moving-on-down-the-road","target":"_blank","peerReviewed":false,"subType":"","id":54374614,"orderField":0},{"dateTime":"Monday, Nov 2, 2015","urlTitle":"the-resurgence-of-3d-printing-using-binders","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/gordon.png","groupId":54174376,"channel":"","description":"Although, the binder-on-plastic technology has fallen out of fashion, binder-on-sand and binder-on-metal are both seeing rapid growth and increased awareness.","dateTimeMS":1446480600000,"title":"The Resurgence of 3D Printing Using Binders","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=the-resurgence-of-3d-printing-using-binders","target":"_blank","peerReviewed":false,"subType":"","id":54377757,"orderField":0},{"dateTime":"Tuesday, Nov 3, 2015","urlTitle":"analyst-comment-19","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending October 30, 2015.","dateTimeMS":1446569820000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-comment-19","target":"_blank","peerReviewed":false,"subType":"","id":54379737,"orderField":0},{"dateTime":"Wednesday, Nov 4, 2015","urlTitle":"collect-but-protect-five-focus-areas-for-greater-user-privacy","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"Data stolen from many recent breaches can be aggregated to create a full portrait of your personal information, a portrait that can be used for nefarious purposes.\n\nPrivacy is dead. At least that\u2019s what it feels like.","dateTimeMS":1446673560000,"title":"Collect, But Protect! Five Focus Areas for Greater User Privacy","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=collect-but-protect-five-focus-areas-for-greater-user-privacy","target":"_blank","peerReviewed":false,"subType":"","id":54388106,"orderField":0},{"dateTime":"Thursday, Nov 5, 2015","urlTitle":"use-private-cloud-to-get-the-enterprise-applications-that-you-want","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"What do companies want today? Well, many want to be able to power their business with the most advanced technologies and innovative enterprise applications and platforms.","dateTimeMS":1446762720000,"title":"Use Private Cloud to Get the Enterprise Applications That You Want","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=use-private-cloud-to-get-the-enterprise-applications-that-you-want","target":"_blank","peerReviewed":false,"subType":"","id":54388127,"orderField":0},{"dateTime":"Friday, Nov 6, 2015","urlTitle":"when-a-data-breach-occurs-focus-on-the-how-not-the-who","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"There are certainly more important questions than \u201cwhodunit\u201d for IT executives when it comes to network breaches and data theft.","dateTimeMS":1446855240000,"title":"When a Data Breach Occurs, Focus on the How, Not the Who","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=when-a-data-breach-occurs-focus-on-the-how-not-the-who","target":"_blank","peerReviewed":false,"subType":"","id":54388154,"orderField":0},{"dateTime":"Monday, Nov 9, 2015","urlTitle":"analyst-comment-20","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending November 06, 2015.","dateTimeMS":1447098480000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-comment-20","target":"_blank","peerReviewed":false,"subType":"","id":54390499,"orderField":0},{"dateTime":"Thursday, Nov 12, 2015","urlTitle":"kinaxis-digital-transformation-and-the-supply-chain-laughing-all-the-way-to-market-success","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"You\u2019ve got to love a company that brags at its user conference that its motto is Learn, Laugh, Share, Connect. Don\u2019t hear that too often. What you also don\u2019t see very often is the other characteristic that makes the company in question, Kinaxis, unique: it\u2019s a highly profitable, cloud-only company. And when I say profitable, I mean profitable, as in a net profit margin of 16% of its $23.8 million in revenue last quarter.","dateTimeMS":1447355520000,"title":"Kinaxis, Digital Transformation, and the Supply Chain: Laughing all the Way to Market Success","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=kinaxis-digital-transformation-and-the-supply-chain-laughing-all-the-way-to-market-success","target":"_blank","peerReviewed":false,"subType":"","id":54394483,"orderField":0},{"dateTime":"Tuesday, Nov 10, 2015","urlTitle":"the-value-of-real-user-measurements-in-the-cloud-with-examples-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"So goes the old joke: \u2018The great thing about standards is everybody\u2019s got one.\u201d There is some truth to the fact that one man\u2019s best practices are another man\u2019s legacy architecture that needs to be deprecated.","dateTimeMS":1447172760000,"title":"The Value of Real User Measurements in the Cloud (With Examples!)","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=the-value-of-real-user-measurements-in-the-cloud-with-examples-","target":"_blank","peerReviewed":false,"subType":"","id":54394428,"orderField":0},{"dateTime":"Wednesday, Nov 11, 2015","urlTitle":"answering-the-hyperconverged-infrastructure-skeptics","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"There\u2019s no denying that hyperconverged infrastructure is a hard-to-ignore trend right now, promising to dramatically shift the way data center infrastructure is procured, deployed, and managed.","dateTimeMS":1447283820000,"title":"Answering the Hyperconverged Infrastructure Skeptics","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=answering-the-hyperconverged-infrastructure-skeptics","target":"_blank","peerReviewed":false,"subType":"","id":54394455,"orderField":0},{"dateTime":"Monday, Nov 16, 2015","urlTitle":"how-is-mobile-technology-impacting-the-food-and-beverage-supply-chain-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/keith-sm.jpg","groupId":54174062,"channel":"","description":"With mobile supply chain applications, business owners in the food and beverage industry have greater insight into their everyday workflow \u2013 accessing data on the fly, enabling them to make better decisions faster. Let\u2019s take a look at just how mobile technology is giving the food and beverage industry a leg up.","dateTimeMS":1447701060000,"title":"How is Mobile Technology Impacting the Food and Beverage Supply Chain?","type":"article","subCategories":"","url":"/web/all-things-supply-chain-analytics/content?g=54174062&type=article&urlTitle=how-is-mobile-technology-impacting-the-food-and-beverage-supply-chain-","target":"_blank","peerReviewed":false,"subType":"","id":54398158,"orderField":0},{"dateTime":"Tuesday, Nov 17, 2015","urlTitle":"practical-strategies-for-enhancing-your-company-s-cyber-security","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/cyber-attack.jpg","groupId":53319,"channel":"SECURITY","description":"Cyber attacks are proliferating at an incredible rate and now is the time for business owners and IT professionals to protect their organizations if they want to avoid catastrophes.","dateTimeMS":1447784820000,"title":"Practical Strategies for Enhancing Your Company\u2019s Cyber Security","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=practical-strategies-for-enhancing-your-company-s-cyber-security","target":"_blank","peerReviewed":false,"subType":"","id":54399227,"orderField":0},{"dateTime":"Thursday, Nov 19, 2015","urlTitle":"computer-graphics-is-where-all-the-elements-of-computer-meet-the-user","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/jpr.jpg","groupId":54397843,"channel":"","description":"This is the inaugural post of what I hope will be an interesting series on things that make good use of pixels. Things like game consoles, workstations, smartphones, PCs, supercomputers, tablets, arcades, CAVEs, VR headsets, smart glasses, and maybe even watches, as wells as the glue that makes them works such as APIs, libraries, and interfaces like DisplayPort and HDMI.","dateTimeMS":1447957920000,"title":"Computer graphics is where all the elements of computer meet the user","type":"article","subCategories":"","url":"/web/chasing-pixels-finding-gems/content?g=54397843&type=article&urlTitle=computer-graphics-is-where-all-the-elements-of-computer-meet-the-user","target":"_blank","peerReviewed":false,"subType":"","id":54405627,"orderField":0},{"dateTime":"Wednesday, Nov 18, 2015","urlTitle":"10-simple-css-design-tricks","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/css.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Everyone loves shortcuts. Whether you\u2019re a new CSS developer or a seasoned pro, it never hurts to learn some new, easier ways to do things. It\u2019s the trademark of our times: we want the best result possible in the least amount of time.","dateTimeMS":1447884480000,"title":"10 Simple CSS Design Tricks","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=10-simple-css-design-tricks","target":"_blank","peerReviewed":false,"subType":"","id":54403626,"orderField":0},{"dateTime":"Friday, Nov 20, 2015","urlTitle":"analyst-comment-21","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending November 13, 2015.","dateTimeMS":1448051040000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-comment-21","target":"_blank","peerReviewed":false,"subType":"","id":54410431,"orderField":0},{"dateTime":"Tuesday, Nov 24, 2015","urlTitle":"analyst-comment-22","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"CLOUD","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending November 20, 2015.`","dateTimeMS":1448386320000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=analyst-comment-22","target":"_blank","peerReviewed":false,"subType":"","id":54418225,"orderField":0},{"dateTime":"Wednesday, Nov 25, 2015","urlTitle":"cyber-security-engineering","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ebert-thumb.jpg","groupId":5954967,"channel":"","description":"Cyber security matters. Products are hacked, in order to misuse, abuse and confuse. Unlike other technologies which are mastered by specific teams and functions, security is a base technology which belongs to the body of knowledge of each single software developer.","dateTimeMS":1448479200000,"title":"Cyber Security Engineering","type":"article","subCategories":"","url":"/web/software-technologies/content?g=5954967&type=article&urlTitle=cyber-security-engineering","target":"_blank","peerReviewed":false,"subType":"","id":54428414,"orderField":0},{"dateTime":"Monday, Nov 30, 2015","urlTitle":"will-robo-advisors-invade-the-financial-world-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/advisor2.jpg","groupId":7989281,"channel":"","description":"While it\u2019s not likely that R2-D2 is going to sit down with you at home and help construct your portfolio, reinvest your dividends and even harvest your tax losses, the use of robo-advisers is nonetheless growing in popularity.","dateTimeMS":1448920080000,"title":"Will Robo-Advisors Invade the Financial World?","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=will-robo-advisors-invade-the-financial-world-","target":"_blank","peerReviewed":false,"subType":"","id":54480460,"orderField":0},{"dateTime":"Wednesday, Dec 2, 2015","urlTitle":"analyst-comment-23","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"BIG DATA","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending November 27, 2015.","dateTimeMS":1449076080000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=analyst-comment-23","target":"_blank","peerReviewed":false,"subType":"","id":54493422,"orderField":0},{"dateTime":"Thursday, Dec 3, 2015","urlTitle":"why-unused-software-is-costing-your-business","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"On average, companies are wasting 37% of their software spend \u2014 a proportion that would be deemed unacceptable in any other part of the business. In the U.S. alone, this amounts to $30 billion in wasted IT dollars. - See more at: http://techproessentials.com/why-unused-software-is-costing-your-business/#sthash.L4VG5QAQ.dpuf","dateTimeMS":1449164700000,"title":"Why Unused Software is Costing Your Business","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=why-unused-software-is-costing-your-business","target":"_blank","peerReviewed":false,"subType":"","id":54505191,"orderField":0},{"dateTime":"Thursday, Dec 3, 2015","urlTitle":"iot-frameworks-products-and-solutions","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ib2.png","groupId":53926943,"channel":"","description":"Let\u2019s look now at some of the available and emerging IoT frameworks, products and solutions.","dateTimeMS":1449184620000,"title":"IoT Frameworks, Products, and Solutions","type":"article","subCategories":"","url":"/web/sensing-iot/content?g=53926943&type=article&urlTitle=iot-frameworks-products-and-solutions","target":"_blank","peerReviewed":false,"subType":"","id":54518733,"orderField":0},{"dateTime":"Friday, Dec 4, 2015","urlTitle":"try-getting-your-work-done-when-tier-2-applications-go-down","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"Have you ever used a \u2018loaner\u2019 laptop while your work machine was getting fixed or after you had forgotten it at home?","dateTimeMS":1449273240000,"title":"Try Getting Your Work Done When \u2018Tier 2\u2032 Applications Go Down","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=try-getting-your-work-done-when-tier-2-applications-go-down","target":"_blank","peerReviewed":false,"subType":"","id":54541528,"orderField":0},{"dateTime":"Monday, Dec 7, 2015","urlTitle":"the-journey-to-data-driven-finance","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"As organizations adjust strategic investments with an eye toward capturing revenue growth, today\u2019s CFOs need every advantage to help their businesses make profitable decisions. In an environment of flat or decreasing budgets, the challenge is to move beyond typical finance functions to deliver insights and leadership to the business.","dateTimeMS":1449512400000,"title":"The Journey to Data-Driven Finance","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=the-journey-to-data-driven-finance","target":"_blank","peerReviewed":false,"subType":"","id":54553916,"orderField":0},{"dateTime":"Tuesday, Dec 8, 2015","urlTitle":"analyst-comment-24","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"BIG DATA","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending December 04, 2015.","dateTimeMS":1449596400000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=analyst-comment-24","target":"_blank","peerReviewed":false,"subType":"","id":54553991,"orderField":0},{"dateTime":"Wednesday, Dec 9, 2015","urlTitle":"what-does-amazon-have-in-store-for-2016-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/onlineret.jpg","groupId":53319,"channel":"INSIGHTS","description":"Amazon remains at the top of its game as we close out the 2015 holiday shopping season. But things in the tech world rarely remain the same for long, and if you want to survive, you have to constantly push for more. So what is Amazon doing to take its company into 2016 and beyond, and what does it mean for the world of online retail?","dateTimeMS":1449682440000,"title":"What Does Amazon Have In Store for 2016?","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=what-does-amazon-have-in-store-for-2016-","target":"_blank","peerReviewed":false,"subType":"","id":54564955,"orderField":0},{"dateTime":"Thursday, Dec 10, 2015","urlTitle":"mass-production","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/agile-thumb.jpg","groupId":8504655,"channel":"","description":"Mass production is scaling\u2019s handmaiden. Solving bigger or harder problems in software isn\u2019t a matter of working harder or of adding more people, but of working smarter. Adding more people rarely increases quality but instead just creates a glut of output.","dateTimeMS":1449767400000,"title":"Mass Production","type":"article","subCategories":"","url":"/web/agile-careers/content?g=8504655&type=article&urlTitle=mass-production","target":"_blank","peerReviewed":false,"subType":"","id":54577974,"orderField":0},{"dateTime":"Friday, Dec 11, 2015","urlTitle":"an-iot-device-to-protect-your-iot-devices","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"The Internet of Things (IoT) is still such a burgeoning term in and of itself \u2013 nevermind the technology \u2013 that it may seem cumbersome, worrisome, or disingenuous to have a newfangled, connected device layered on top of other newfangled, connected devices.","dateTimeMS":1449869640000,"title":"An IoT Device\u2026To Protect Your IoT Devices","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=an-iot-device-to-protect-your-iot-devices","target":"_blank","peerReviewed":false,"subType":"","id":54612044,"orderField":0},{"dateTime":"Monday, Dec 14, 2015","urlTitle":"big-data-success-doesn-t-come-from-big-teams","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"The idea that organizations will tolerate the productivity hits and maintenance nightmares of hand-coded scripts is preposterous. Organizations that lead the pack in delivering repeatable and sustainable success recognize that automation and intelligence are critical to delivering well-managed and trustworthy analytics using Hadoop.","dateTimeMS":1450136220000,"title":"Big Data Success Doesn\u2019t Come From Big Teams","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=big-data-success-doesn-t-come-from-big-teams","target":"_blank","peerReviewed":false,"subType":"","id":54612065,"orderField":0},{"dateTime":"Tuesday, Dec 15, 2015","urlTitle":"analyst-comment-25","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"MOBILE","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending December 11, 2015.","dateTimeMS":1450201380000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analyst-comment-25","target":"_blank","peerReviewed":false,"subType":"","id":54621489,"orderField":0},{"dateTime":"Wednesday, Dec 16, 2015","urlTitle":"the-long-slow-ineffective-arm-of-protecting-consumers-against-data-breaches","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"On December 9, 2015, it was announced that Wyndham Hotels and Resorts reached an agreement with the Federal Trade Commission (FTC), because \u201cthe company\u2019s security practices unfairly exposed the payment card information of hundreds of thousands of consumers to hackers in three separate data breaches.\u201d","dateTimeMS":1450309140000,"title":"The Long (Slow, Ineffective) Arm of Protecting Consumers Against Data Breaches","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=the-long-slow-ineffective-arm-of-protecting-consumers-against-data-breaches","target":"_blank","peerReviewed":false,"subType":"","id":54678819,"orderField":0},{"dateTime":"Thursday, Dec 17, 2015","urlTitle":"cloud-based-uc-the-choice-of-the-new-generation-of-business","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"There\u2019s a simple test that one can do to find out if a technology has made it \u2014 if it is now fully mature and ready for primetime. Just ask, \u201cIf you were starting a brand-new business, would you implement this technology?\u201d","dateTimeMS":1450389540000,"title":"Cloud-based UC: The Choice of the New Generation of Business","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=cloud-based-uc-the-choice-of-the-new-generation-of-business","target":"_blank","peerReviewed":false,"subType":"","id":54679014,"orderField":0},{"dateTime":"Friday, Dec 18, 2015","urlTitle":"the-it-year-in-review-2015-takin-care-of-business","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"Business\u201d was a word that came up quite a bit in the 2015 IT world. There was plenty of unassuming business being taken care of on the Information Technology side, business (sadly) not being taken care of on the IT security side, and a major, earth-shattering business deal primed to shake up the world of IT as we know it.","dateTimeMS":1450461240000,"title":"The IT Year in Review 2015: Takin\u2019 Care of Business","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=the-it-year-in-review-2015-takin-care-of-business","target":"_blank","peerReviewed":false,"subType":"","id":54679041,"orderField":0},{"dateTime":"Monday, Dec 21, 2015","urlTitle":"why-microsoft-s-focus-on-cloud-is-good-news-for-customers","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"The last few months have been a turning point for Microsoft, as Office 365 raced past Google Apps to become the top productivity suite in the enterprise market.","dateTimeMS":1450728060000,"title":"Why Microsoft\u2019s Focus on Cloud is Good News for Customers","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=why-microsoft-s-focus-on-cloud-is-good-news-for-customers","target":"_blank","peerReviewed":false,"subType":"","id":54679070,"orderField":0},{"dateTime":"Tuesday, Dec 22, 2015","urlTitle":"2016-new-frontiers-in-innovation","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/carint.JPG","groupId":53319,"channel":"INSIGHTS","description":"We live in what will perhaps be considered by historians as the golden age of technology. Innovations are happening at breakneck speed, and so are its mass adoptions. As we wrap up 2015 and look at what lies ahead, it is clear that our voracious appetite for content and the need for constant connectivity are only going to escalate. So in 2016 we will see a continued drumbeat for technologies that enhance the broader adoption of IoT, over-the-top (OTT) content, connected homes, smart cars and solutions that deliver rich content.","dateTimeMS":1450822500000,"title":"2016: New Frontiers in Innovation","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=2016-new-frontiers-in-innovation","target":"_blank","peerReviewed":false,"subType":"","id":54679445,"orderField":0},{"dateTime":"Thursday, Dec 24, 2015","urlTitle":"advances-in-affective-computing-expected-to-be-game-changers-in-many-verticals","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/epu.png","groupId":7989281,"channel":"","description":"Affective computing is nothing new \u2013 it has been around for awhile \u2013 over a decade, in fact. As defined by MIT\u2019s Media Lab, affective computing is computing \u201cthat relates to, arises from, or deliberately influences emotion or other affective phenomena.\u201d","dateTimeMS":1450983900000,"title":"Advances in Affective Computing Expected to be Game Changers in Many Verticals","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=advances-in-affective-computing-expected-to-be-game-changers-in-many-verticals","target":"_blank","peerReviewed":false,"subType":"","id":54690709,"orderField":0},{"dateTime":"Wednesday, Dec 23, 2015","urlTitle":"where-does-sharepoint-end-and-enterprise-content-management-begin-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"If you\u2019re like most organizations, you\u2019re probably using Microsoft SharePoint. This isn\u2019t all that surprising, given that SharePoint is integrated with the productivity tools that many organizations use to create content (Microsoft Office and Office 365), and that it provides some very convenient capabilities for storing, syncing, and sharing those files. As a first step, SharePoint is an easy choice.","dateTimeMS":1450905000000,"title":"Where Does SharePoint End, and Enterprise Content Management Begin?","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=where-does-sharepoint-end-and-enterprise-content-management-begin-","target":"_blank","peerReviewed":false,"subType":"","id":54799954,"orderField":0},{"dateTime":"Monday, Dec 28, 2015","urlTitle":"what-sd-wan-means-for-network-management","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"Just a few years ago, enterprise network management was much simpler. Configuration changes were rare \u2014 most equipment was configured and left as-is. If any change was needed, long and strict change management procedures were required. Then, changes were executed in manual or semi-automated network configuration updates, sufficient to maintain reliability and consistent service levels across the organization.","dateTimeMS":1451343780000,"title":"What SD-WAN Means for Network Management","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=what-sd-wan-means-for-network-management","target":"_blank","peerReviewed":false,"subType":"","id":54709878,"orderField":0},{"dateTime":"Wednesday, Dec 30, 2015","urlTitle":"are-your-analytics-tight-fit-or-loose-hanging-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"Amid growth in the analytics space these days, it\u2019s easy to get caught up in the allure of next-generation technology and what it can do for organizations. However, companies that stay focused on the analytical needs of their users and align the tools accordingly are dividends from those efforts.","dateTimeMS":1451499600000,"title":"Are Your Analytics Tight Fit or Loose Hanging?","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=are-your-analytics-tight-fit-or-loose-hanging-","target":"_blank","peerReviewed":false,"subType":"","id":54726848,"orderField":0},{"dateTime":"Tuesday, Dec 29, 2015","urlTitle":"fighting-data-urgency-analytics-in-the-palm-of-your-hand","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"Today\u2019s decisions are all too often a fight against time. But the most powerful weapon at our disposal may just fit in the palm of our hands. Mobile capabilities for the consumption (or creation) of business insight have taken center stage for companies looking to arm a diverse workforce with timely information.","dateTimeMS":1451407620000,"title":"Fighting Data Urgency: Analytics in the Palm of Your Hand","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=fighting-data-urgency-analytics-in-the-palm-of-your-hand","target":"_blank","peerReviewed":false,"subType":"","id":54726876,"orderField":0},{"dateTime":"Monday, Jan 4, 2016","urlTitle":"a-great-change-in-mindset-needed-for-a-more-secure-iot-environment","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"With the prevalent awareness of security flaws in IoT devices, manufacturers need to rethink their strategies for marketing their products, and have an entirely new perception on the issue of security.","dateTimeMS":1451949480000,"title":"A Great Change in Mindset Needed for a More Secure IoT Environment","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=a-great-change-in-mindset-needed-for-a-more-secure-iot-environment","target":"_blank","peerReviewed":false,"subType":"","id":54747179,"orderField":0},{"dateTime":"Tuesday, Jan 5, 2016","urlTitle":"enabling-mobile-first-unified-communications-through-the-cloud","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"For years now, one of the most complex and time-consuming tasks any IT department could take on was the on-premise implementation of a Unified Communications (UC) platform.","dateTimeMS":1452035580000,"title":"Enabling Mobile-First Unified Communications Through the Cloud","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=enabling-mobile-first-unified-communications-through-the-cloud","target":"_blank","peerReviewed":false,"subType":"","id":54757155,"orderField":0},{"dateTime":"Wednesday, Jan 6, 2016","urlTitle":"analyst-comment-26","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"NETWORKING","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending December 25, 2015 - January 01, 2016.","dateTimeMS":1452105240000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=analyst-comment-26","target":"_blank","peerReviewed":false,"subType":"","id":54773740,"orderField":0},{"dateTime":"Thursday, Jan 7, 2016","urlTitle":"ford-s-new-plan-for-the-internet-of-things","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/fordtech.jpg","groupId":53319,"channel":"INSIGHTS","description":"When you think about the forerunners of advancement in the Internet of Things (IoT), a digitally connected network of different devices and everyday objects, you might think of technological geniuses like the folks at Apple or Google, who have consistently pushed the boundaries of technological sophistication in the past. You might not think of Ford, an auto manufacturer, as being a mover in the industry, but the company recently announced plans to advance IoT networks with car-home communication.","dateTimeMS":1452193440000,"title":"Ford\u2019s New Plan for the Internet of Things","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=ford-s-new-plan-for-the-internet-of-things","target":"_blank","peerReviewed":false,"subType":"","id":54774316,"orderField":0},{"dateTime":"Friday, Jan 8, 2016","urlTitle":"say-halow-to-the-future-of-wifi-at-ces-2016","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"The Consumer Electronics Show (CES) is one of the most anticipated events of the year for true gadget nerds. Outside of company-specific events such as Apple\u2019s WWDC or Google I/O, CES is where we see the future of the technology that we will all use in the near future.","dateTimeMS":1452276960000,"title":"Say HaLow to the Future of WiFi at CES 2016","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=say-halow-to-the-future-of-wifi-at-ces-2016","target":"_blank","peerReviewed":false,"subType":"","id":54795014,"orderField":0},{"dateTime":"Monday, Jan 11, 2016","urlTitle":"iam-investing-for-success-are-you-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"In its research report, IAM Beyond Control, Compliance, and Cost: The Rise of the User, Aberdeen Group described how the strategic focus for enterprise identity and access management (IAM) systems has changed.","dateTimeMS":1452552900000,"title":"IAM Investing for Success \u2014 Are You?","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=iam-investing-for-success-are-you-","target":"_blank","peerReviewed":false,"subType":"","id":54797015,"orderField":0},{"dateTime":"Tuesday, Jan 12, 2016","urlTitle":"fighting-data-urgency-analytics-in-the-palm-of-your-ha-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"Today\u2019s decisions are all too often a fight against time. But the most powerful weapon at our disposal may just fit in the palm of our hands. Mobile capabilities for the consumption (or creation) of business insight have taken center stage for companies looking to arm a diverse workforce with timely information.","dateTimeMS":1452640500000,"title":"Fighting Data Urgency: Analytics in the Palm of Your Hand","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=fighting-data-urgency-analytics-in-the-palm-of-your-ha-1","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":54804371,"orderField":0},{"dateTime":"Wednesday, Jan 13, 2016","urlTitle":"back-to-school-week-with-salesforce-com","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"Salesforce.com kicked off the analyst season with the first analyst summit of the year, and aside from inciting back-to-school analogies from an overly-relaxed group of analysts, some clear wins and opportunities, and a few issues, emerged that will both set the bar for the competition and keep Salesforce execs from entertaining any notions of complacency.","dateTimeMS":1452719580000,"title":"Back to School Week with Salesforce.com","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=back-to-school-week-with-salesforce-com","target":"_blank","peerReviewed":false,"subType":"","id":54825875,"orderField":0},{"dateTime":"Thursday, Jan 14, 2016","urlTitle":"10-best-time-tracking-tools-to-manage-freelancers","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/freelancer.jpg","groupId":53319,"channel":"CAREERS","description":"Everyone who has ever worked a job knows that time is money. Employees log hours for a paycheck, and businesses track hours to ensure that work is getting done at a steady pace. It\u2019s in the interest of both parties to track time accurately and ensure that each gets the benefits of completed work hours.","dateTimeMS":1452789300000,"title":"10 Best Time Tracking Tools to Manage Freelancers","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=10-best-time-tracking-tools-to-manage-freelancers","target":"_blank","peerReviewed":false,"subType":"","id":54803590,"orderField":0},{"dateTime":"Friday, Jan 15, 2016","urlTitle":"why-an-enterprise-search-platform-should-be-your-company-s-next-investment","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/search.png","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"No matter what industry you\u2019re in, you have one thing in common with almost every other business on this planet: you\u2019ve been creating copious amounts of data at an exponential rate for the last 10 years, if not longer.","dateTimeMS":1452882840000,"title":"Why an Enterprise Search Platform Should Be Your Company\u2019s Next Investment","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=why-an-enterprise-search-platform-should-be-your-company-s-next-investment","target":"_blank","peerReviewed":false,"subType":"","id":54805084,"orderField":0},{"dateTime":"Monday, Jan 18, 2016","urlTitle":"what-is-blockchain-and-is-it-the-key-to-bitcoin-s-future-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"I\u2019ll admit that I\u2019m a bit of a blockhead when it comes to the term blockchain (I\u2019m also a blockhead for a host of other reasons, but I\u2019ll leave that for another day), a technology being brandied about quite a bit as a savior of industries including financial services. I decided to look into the technology behind the polarizing digital currency Bitcoin.","dateTimeMS":1453157940000,"title":"What is Blockchain, and is it the Key to Bitcoin\u2019s Future?","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=what-is-blockchain-and-is-it-the-key-to-bitcoin-s-future-","target":"_blank","peerReviewed":false,"subType":"","id":54810034,"orderField":0},{"dateTime":"Thursday, Jan 21, 2016","urlTitle":"designing-a-software-engineer-interviewing-strategy","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/softwhire.jpg","groupId":53319,"channel":"CAREERS","description":"Hiring software engineers is hard. A poor hire can easily drag down an entire team. But an excellent hire can be an order of magnitude more effective than everyone else--a \u201c10xer.\u201d How do you know if a given candidate is a 10xer or a total dud?","dateTimeMS":1453408560000,"title":"Designing a Software Engineer Interviewing Strategy","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=designing-a-software-engineer-interviewing-strategy","target":"_blank","peerReviewed":false,"subType":"","id":54817367,"orderField":0},{"dateTime":"Wednesday, Jan 20, 2016","urlTitle":"iam-focused-on-users-and-getting-results","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"In the blog IAM Investing for Success \u2014 Are You?, Aberdeen Group described insights from its Q4 2015 study on Identity and Access Management (IAM), which examined the use, experiences, and intentions of nearly 250 organizations from a diverse set of industries with respect to this important topic.","dateTimeMS":1453333920000,"title":"IAM Focused On Users, and Getting Results","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=iam-focused-on-users-and-getting-results","target":"_blank","peerReviewed":false,"subType":"","id":54817388,"orderField":0},{"dateTime":"Tuesday, Jan 19, 2016","urlTitle":"analyst-comment-27","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"STARTUPS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending January 15, 2016.","dateTimeMS":1453223400000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=analyst-comment-27","target":"_blank","peerReviewed":false,"subType":"","id":54818909,"orderField":0},{"dateTime":"Friday, Jan 22, 2016","urlTitle":"devops","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ebert-thumb.jpg","groupId":5954967,"channel":"","description":"This integrative approach helps teams deliver value in a faster and continuous way, reducing problems generated by miscommunication between team members and enhancing a faster resolution of problems.","dateTimeMS":1453483020000,"title":"DevOps","type":"article","subCategories":"","url":"/web/software-technologies/content?g=5954967&type=article&urlTitle=devops","target":"_blank","peerReviewed":false,"subType":"","id":54825657,"orderField":0},{"dateTime":"Monday, Jan 25, 2016","urlTitle":"lack-of-employee-education-means-insider-threats-won-t-stop-in-2016","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"As we move towards Data Protection Day this week and continue to navigate the constantly evolving security landscape where new malicious hacks are made each day, we often overlook the ones closest to home: insider threats.","dateTimeMS":1453742400000,"title":"Lack of Employee Education Means Insider Threats Won\u2019t Stop in 2016","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=lack-of-employee-education-means-insider-threats-won-t-stop-in-2016","target":"_blank","peerReviewed":false,"subType":"","id":54825698,"orderField":0},{"dateTime":"Tuesday, Jan 26, 2016","urlTitle":"analyst-comment-28","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"CLOUD","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending January 22, 2016.","dateTimeMS":1453825500000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=analyst-comment-28","target":"_blank","peerReviewed":false,"subType":"","id":54825825,"orderField":0},{"dateTime":"Wednesday, Jan 27, 2016","urlTitle":"is-computer-withdrawal-a-real-phenomenon-5-possible-signs","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/addiction.jpg","groupId":53319,"channel":"MOBILE","description":"Recent research suggests that computer and technology-based addiction and withdrawal may be real, physical phenomena.","dateTimeMS":1453916100000,"title":"Is Computer Withdrawal a Real Phenomenon? 5 Possible Signs","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=is-computer-withdrawal-a-real-phenomenon-5-possible-signs","target":"_blank","peerReviewed":false,"subType":"","id":54838418,"orderField":0},{"dateTime":"Thursday, Jan 28, 2016","urlTitle":"breaking-down-the-risk-of-industrial-control-systems-security","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"SECURITY","description":"RSA President Amit Yoran\u2019s has released predictions for 2016, which include the following thoughts about the increasing risk in our collective industrial control systems (ICS) security:","dateTimeMS":1454010420000,"title":"Breaking Down the Risk of Industrial Control Systems Security","type":"article","subCategories":"","url":"/web/aberdeen-group/security/content?g=6012563&type=article&urlTitle=breaking-down-the-risk-of-industrial-control-systems-security","target":"_blank","peerReviewed":false,"subType":"","id":54838447,"orderField":0},{"dateTime":"Tuesday, Feb 2, 2016","urlTitle":"play-serious-games-in-your-browser","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/jpr.jpg","groupId":54397843,"channel":"","description":"Three developments have taken place recently that makes it possible to play serious 3D games in a browser: on your PC, smartphone, or tablet, and one day your TV as well.","dateTimeMS":1454436660000,"title":"Play serious games in your browser","type":"article","subCategories":"","url":"/web/chasing-pixels-finding-gems/content?g=54397843&type=article&urlTitle=play-serious-games-in-your-browser","target":"_blank","peerReviewed":false,"subType":"","id":54843515,"orderField":0},{"dateTime":"Tuesday, Feb 2, 2016","urlTitle":"telematics-on-cusp-of-widespread-adoption","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"https://web.archive.org/web/20160702193337/https://www.computer.org/cms/Computer.org/ComputingNow/marketing/car22-th.jpg","groupId":7989281,"channel":"","description":"Telematics is nothing new \u2013 the technology\u2019s been around for decades \u2013 but the ubiquitous smartphone is now expected to drive telematics penetration in private hire vehicles and taxis to 21% globally by 2019","dateTimeMS":1454437020000,"title":"Telematics On Cusp of Widespread Adoption","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=telematics-on-cusp-of-widespread-adoption","target":"_blank","peerReviewed":false,"subType":"","id":54844822,"orderField":0},{"dateTime":"Wednesday, Feb 3, 2016","urlTitle":"analyst-comment-29","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"BIG DATA","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending January 29, 2016.","dateTimeMS":1454541000000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=analyst-comment-29","target":"_blank","peerReviewed":false,"subType":"","id":54849807,"orderField":0},{"dateTime":"Thursday, Feb 4, 2016","urlTitle":"on-premise-to-the-cloud-keeping-up-with-the-analytical-evolution","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"Given the natural progression of reporting and analysis to the interactivity and visual appeal of today\u2019s business intelligence (BI) tools, it\u2019s no surprise that the backdrop has been forced to evolve and expand as well.","dateTimeMS":1454632560000,"title":"On-Premise to the Cloud: Keeping up with the Analytical Evolution","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=on-premise-to-the-cloud-keeping-up-with-the-analytical-evolution","target":"_blank","peerReviewed":false,"subType":"","id":54853621,"orderField":0},{"dateTime":"Friday, Feb 5, 2016","urlTitle":"why-we-need-to-improve-ehr-software-systems","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/handgraphic.png","groupId":8206605,"channel":"","description":"Some of the patient care technology advances have not accomplished the promised end results and are in desperate need of improvement. Topping the list of needed replacements is today\u2019s electronic health records (EHRs) software systems.","dateTimeMS":1454710320000,"title":"Why We Need to Improve EHR Software Systems","type":"article","subCategories":"","url":"/web/the-doctor-is-in/content?g=8206605&type=article&urlTitle=why-we-need-to-improve-ehr-software-systems","target":"_blank","peerReviewed":false,"subType":"","id":54855892,"orderField":0},{"dateTime":"Monday, Feb 8, 2016","urlTitle":"microdisplay-technologies-for-smartglasses-poised-for-explosive-growth","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/zervos.png","groupId":54174376,"channel":"","description":"The market for smart glasses and functional contact lenses will be worth over $260 billion by 2026. And it will be diverse \u2013 encompassing augmented and virtual reality headsets to remarkable embedded functionalities in lenses.","dateTimeMS":1454950080000,"title":"Microdisplay Technologies for Smartglasses Poised for Explosive Growth","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=microdisplay-technologies-for-smartglasses-poised-for-explosive-growth","target":"_blank","peerReviewed":false,"subType":"","id":54858208,"orderField":0},{"dateTime":"Monday, Nov 23, 2015","urlTitle":"informatica-tackles-the-data-side-of-innovation-digital-transformation-big-data-and-whatever-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"There\u2019s much talk about embracing new technologies, and less, unfortunately, about the human capital and buyer behavior changes that must accompany any significant transformation.","dateTimeMS":1448301780000,"title":"Informatica Tackles the Data Side of Innovation, Digital Transformation, Big Data, and Whatever\u2026","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=informatica-tackles-the-data-side-of-innovation-digital-transformation-big-data-and-whatever-","target":"_blank","peerReviewed":false,"subType":"","id":54857759,"orderField":0},{"dateTime":"Tuesday, Feb 9, 2016","urlTitle":"analyst-comment-30","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"NETWORKING","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending February 05, 2016.","dateTimeMS":1455041040000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=analyst-comment-30","target":"_blank","peerReviewed":false,"subType":"","id":54858285,"orderField":0},{"dateTime":"Wednesday, Feb 10, 2016","urlTitle":"seven-keys-to-scaling-your-supplier-scorecarding-program","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/keith-sm.jpg","groupId":54174062,"channel":"","description":"A solid supplier scorecarding program can drive big cost savings in the supply chain.","dateTimeMS":1455141240000,"title":"Seven Keys to Scaling Your Supplier Scorecarding Program","type":"article","subCategories":"","url":"/web/all-things-supply-chain-analytics/content?g=54174062&type=article&urlTitle=seven-keys-to-scaling-your-supplier-scorecarding-program","target":"_blank","peerReviewed":false,"subType":"","id":54864656,"orderField":0},{"dateTime":"Thursday, Feb 11, 2016","urlTitle":"why-inadequate-iot-security-is-setting-regulators-on-collision-course-with-consumers-and-the-entire-open-source-moveme","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/swift-thumb.jpg","groupId":8459902,"channel":"","description":"It remains that rules set by regulators and lawmakers have consistently failed to keep up with the pace of technological change \u2013 and there\u2019s a real danger they could now threaten the development of the Internet of Things (IoT) and embedded computing.","dateTimeMS":1455211500000,"title":"Why Inadequate IoT Security Is Setting Regulators on Collision Course with Consumers and the Entire Open Source Movement","type":"article","subCategories":"","url":"/web/prpl-matters/content?g=8459902&type=article&urlTitle=why-inadequate-iot-security-is-setting-regulators-on-collision-course-with-consumers-and-the-entire-open-source-moveme","target":"_blank","peerReviewed":false,"subType":"","id":54865826,"orderField":0},{"dateTime":"Friday, Feb 12, 2016","urlTitle":"hacking-iot","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ib2.png","groupId":53926943,"channel":"","description":"Would the IoT introduce all the vulnerabilities of the digital world into our real world? Do we even know the scale? Each person/object may have multiple devices/sensors, each with a different aspect of exposure.","dateTimeMS":1455297420000,"title":"Hacking IoT","type":"article","subCategories":"","url":"/web/sensing-iot/content?g=53926943&type=article&urlTitle=hacking-iot","target":"_blank","peerReviewed":false,"subType":"","id":54957986,"orderField":0},{"dateTime":"Tuesday, Feb 16, 2016","urlTitle":"30-websites-your-startup-needs-in-2016","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/startup.jpg","groupId":53319,"channel":"STARTUPS","description":"All entrepreneurs dream of owning and operating their own startup and with the following list of different tools and services it can be more of a reality and take some of the burden off of becoming a new business owner.","dateTimeMS":1455642000000,"title":"30 Websites Your Startup Needs in 2016","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=30-websites-your-startup-needs-in-2016","target":"_blank","peerReviewed":false,"subType":"","id":54876602,"orderField":0},{"dateTime":"Wednesday, Feb 17, 2016","urlTitle":"re-platforming-business-transformation-people-and-partners-get-it-right-or-get-out-of-the-way","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"Every vendor, whether old guard freshening up for the cloud, or new guard playing defense against the dark arts, has a cloud platform strategy with two purported goals: offer value to customers and confer an easy way for partners to make up for the lost revenue implicit in the cloud\u2019s ability to sop up a lot of low-hanging fruit previously left for partners to pick.","dateTimeMS":1455731100000,"title":"Re-platforming, Business Transformation, People, and Partners: Get it Right or Get Out of the Way","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=re-platforming-business-transformation-people-and-partners-get-it-right-or-get-out-of-the-way","target":"_blank","peerReviewed":false,"subType":"","id":54884670,"orderField":0},{"dateTime":"Wednesday, Feb 17, 2016","urlTitle":"preview-of-encyclopedia-of-cloud-computing-part-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5970564.png","groupId":5970564,"channel":"","description":"The book covers broad range of topics aimed at helping you gain an informed and comprehensive understanding of the promises and the potential of cloud computing.","dateTimeMS":1455731400000,"title":"Preview of Encyclopedia of Cloud Computing \u2013 Part 1","type":"article","subCategories":"","url":"/web/irena-bojanova/content?g=5970564&type=article&urlTitle=preview-of-encyclopedia-of-cloud-computing-part-1","target":"_blank","peerReviewed":false,"subType":"","id":54884690,"orderField":0},{"dateTime":"Thursday, Feb 18, 2016","urlTitle":"4-ways-big-businesses-copy-startup-culture","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/foos.png","groupId":53319,"channel":"STARTUPS","description":"Across the country, big corporations are adjusting the way they interact with customers, come up with ideas, and motivate their employees. Instead of operating the way they always have, these businesses are taking a cue from startups and rethinking their workplace culture.","dateTimeMS":1455819960000,"title":"4 Ways Big Businesses Copy Startup Culture","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=4-ways-big-businesses-copy-startup-culture","target":"_blank","peerReviewed":false,"subType":"","id":54885184,"orderField":0},{"dateTime":"Friday, Feb 19, 2016","urlTitle":"analyst-comment-31","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"CAREERS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending February 12, 2016.","dateTimeMS":1455920220000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=analyst-comment-31","target":"_blank","peerReviewed":false,"subType":"","id":54889555,"orderField":0},{"dateTime":"Monday, Feb 22, 2016","urlTitle":"analyst-comment-32","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"SECURITY","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending February 19, 2016.","dateTimeMS":1456165380000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=analyst-comment-32","target":"_blank","peerReviewed":false,"subType":"","id":54900120,"orderField":0},{"dateTime":"Tuesday, Feb 23, 2016","urlTitle":"data-spinning-straw-into-gold-with-analytics","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"Who among us hasn\u2019t seen a drastic influx in the amount of business data related to our little corner of the world? At most mid-size and enterprise-level companies, there are obligations \u2014 if not requirements \u2014 to store that information. Are we also taking strides to make that data more searchable and discoverable?","dateTimeMS":1456264620000,"title":"Data = $$$: Spinning Straw into Gold with Analytics","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=data-spinning-straw-into-gold-with-analytics","target":"_blank","peerReviewed":false,"subType":"","id":54900147,"orderField":0},{"dateTime":"Wednesday, Feb 24, 2016","urlTitle":"5-ways-facebook-can-make-or-break-your-website","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/webdesign.jpg","groupId":53319,"channel":"STARTUPS","description":"You\u2019ve put hard work into building your website, but can people find it? Even with top search engine placement, if customers aren\u2019t searching for your business\u2019s product or service, they may not be able to find you. For today\u2019s businesses, the best way to get the word out is to find those potential customers online, where they spend the most time.","dateTimeMS":1456337100000,"title":"5 Ways Facebook Can Make or Break Your Website","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=5-ways-facebook-can-make-or-break-your-website","target":"_blank","peerReviewed":false,"subType":"","id":54900174,"orderField":0},{"dateTime":"Wednesday, Feb 24, 2016","urlTitle":"mettle-fatigue-vw-s-single-point-of-failure-ethics","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/mfthumb.png","groupId":53319,"channel":"INSIGHTS","description":"After a year of denials, Volkswagen admitted in September 2015 that multiple makes and models of its diesel vehicles contained defeat device software. The decisions leading to \u201cDieselgate\u201d involved a corruption of engineering ethics that the profession ought to address.","dateTimeMS":1456357680000,"title":"Mettle Fatigue: VW\u2019s Single-Point-of-Failure Ethics","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=mettle-fatigue-vw-s-single-point-of-failure-ethics","target":"_blank","peerReviewed":false,"subType":"","id":54902001,"orderField":0},{"dateTime":"Thursday, Feb 25, 2016","urlTitle":"how-open-hardware-based-iot-security-can-be-a-win-win-for-innovation-and-regulation","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/swift-thumb.jpg","groupId":8459902,"channel":"","description":"The Internet of Things is rapidly turning a new generation of products \u201csmart\u201d by adding computing power, network connectivity and sophisticated software. From cars to routers and drug infusion pumps to drones, they now offer a wealth of possibilities for tech savvy owners keen to push their device capabilities to the limits. But at the same time there are logical reasons why lawmakers and regulators need to lock down certain functionality \u2013 for the safety and well-being of their citizens.","dateTimeMS":1456434480000,"title":"How Open, Hardware-Based IoT Security Can Be a Win-Win for Innovation and Regulation","type":"article","subCategories":"","url":"/web/prpl-matters/content?g=8459902&type=article&urlTitle=how-open-hardware-based-iot-security-can-be-a-win-win-for-innovation-and-regulation","target":"_blank","peerReviewed":false,"subType":"","id":54902944,"orderField":0},{"dateTime":"Friday, Feb 26, 2016","urlTitle":"have-you-taken-your-itsm-to-the-next-level-and-what-the-heck-does-that-look-like-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"Leading \u2014 or Best-in-Class \u2014 organizations are taking their ITSM \u201cto the next level\u201d by working hard and striving to improve it at every stage of the game, leveraging the communication channels and technologies that their users rely on to make everyone much more productive.","dateTimeMS":1456526940000,"title":"Have You Taken Your ITSM to the \u2018Next Level\u2019 (And What the Heck Does That Look Like)?","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=have-you-taken-your-itsm-to-the-next-level-and-what-the-heck-does-that-look-like-","target":"_blank","peerReviewed":false,"subType":"","id":54908151,"orderField":0},{"dateTime":"Monday, Feb 29, 2016","urlTitle":"analyst-comment-33","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending February 26, 2016.","dateTimeMS":1456770480000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-comment-33","target":"_blank","peerReviewed":false,"subType":"","id":54915958,"orderField":0},{"dateTime":"Tuesday, Mar 1, 2016","urlTitle":"new-ways-to-avoid-annoying-ad-retargeting","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/target.jpg","groupId":53319,"channel":"CAREERS","description":"Advertisement retargeting has become so prevalent, consumers are beginning to feel as though their every move is being watched. In many ways, they\u2019re right. Businesses are gathering data on every customer interaction with their products and services, from the products they research online to the items they buy in their stores.","dateTimeMS":1456872420000,"title":"New Ways to Avoid Annoying Ad Retargeting","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=new-ways-to-avoid-annoying-ad-retargeting","target":"_blank","peerReviewed":false,"subType":"","id":54916424,"orderField":0},{"dateTime":"Wednesday, Mar 2, 2016","urlTitle":"asteroids-and-earthquakes-belong-in-the-movies-not-in-your-it-ops","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"While disaster for me in film is a guilty (embarrassing?) pleasure, I can\u2019t think of too many folks that enjoy disaster in real life. And nowhere is that more apparent than in an organization\u2019s IT operations.","dateTimeMS":1456944240000,"title":"Asteroids and Earthquakes Belong in the Movies, Not in Your IT Ops","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=asteroids-and-earthquakes-belong-in-the-movies-not-in-your-it-ops","target":"_blank","peerReviewed":false,"subType":"","id":54922439,"orderField":0},{"dateTime":"Thursday, Mar 3, 2016","urlTitle":"microsoft-tests-underwater-data-center-for-more-efficient-cooling","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/gordon.png","groupId":54174376,"channel":"","description":"Microsoft has tested a prototype of a self-contained data center that can operate below the surface of the ocean to reduce the need for expensive air-conditioning.","dateTimeMS":1457030880000,"title":"Microsoft Tests Underwater Data Center for More Efficient Cooling","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=microsoft-tests-underwater-data-center-for-more-efficient-cooling","target":"_blank","peerReviewed":false,"subType":"","id":54922459,"orderField":0},{"dateTime":"Friday, Mar 4, 2016","urlTitle":"facing-the-challenges-of-modernizing-mainframe-data","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"Over the last 25 years, mainframes have been a solid investment in term of reliability, performance, and security. It\u2019s estimated that within the insurance industry, half of all core applications are still on a mainframe. But for insurers and other data-intensive industries that rely on mainframe applications and data, those days are coming to an end.","dateTimeMS":1457135460000,"title":"Facing the Challenges of Modernizing Mainframe Data","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=facing-the-challenges-of-modernizing-mainframe-data","target":"_blank","peerReviewed":false,"subType":"","id":54926362,"orderField":0},{"dateTime":"Monday, Mar 7, 2016","urlTitle":"analyst-comment-34","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"MOBILE","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending March 04, 2016.","dateTimeMS":1457376300000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analyst-comment-34","target":"_blank","peerReviewed":false,"subType":"","id":54930775,"orderField":0},{"dateTime":"Tuesday, Mar 8, 2016","urlTitle":"it-support-staff-doesn-t-and-shouldn-t-care-about-your-privacy","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":53319,"channel":"SECURITY","description":"There\u2019s one area where most people don\u2019t think about privacy too much, and that\u2019s at work. And that\u2019s because this issue has been settled for a while. When using the web, email, or other services at work, there really isn\u2019t much privacy, especially from the IT workers tasked to support and protect these business systems.","dateTimeMS":1457463000000,"title":"IT Support Staff Doesn\u2019t (and Shouldn\u2019t) Care About Your Privacy","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=it-support-staff-doesn-t-and-shouldn-t-care-about-your-privacy","target":"_blank","peerReviewed":false,"subType":"","id":54932544,"orderField":0},{"dateTime":"Wednesday, Mar 9, 2016","urlTitle":"if-google-has-solved-go-then-what-s-next-for-artificial-intelligence-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/go.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Google, one of the leading authorities in the modern world of artificial intelligence development, has created an algorithm capable of defeating a human expert in the game of Go. If you\u2019re not familiar with Go, or the logistical hurdles of overcoming a human player with a machine, this may not seem very impressive to you. Suffice it to say, this is a massive breakthrough, and it\u2019s opening up new doors for the development of artificial intelligence.","dateTimeMS":1457549040000,"title":"If Google Has \"Solved\" Go, Then What's Next for Artificial Intelligence?","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=if-google-has-solved-go-then-what-s-next-for-artificial-intelligence-","target":"_blank","peerReviewed":false,"subType":"","id":54933339,"orderField":0},{"dateTime":"Wednesday, Mar 9, 2016","urlTitle":"hsa-foundation-unlocking-the-performance-and-power-efficiency-of-parallel-computing-engines","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/glossner.jpg","groupId":54930593,"channel":"","description":"Welcome to HSA Connections! On behalf of the Heterogeneous System Architecture (HSA) Foundation, I first want to thank IEEE for the opportunity to launch this blog. We appreciate being able to share HSA achievements with both the developer community and IEEE\u2019s diverse and prestigious global audience.","dateTimeMS":1457558640000,"title":"HSA Foundation: Unlocking the Performance and Power Efficiency of Parallel Computing Engines","type":"article","subCategories":"","url":"/web/hsa-connections/content?g=54930593&type=article&urlTitle=hsa-foundation-unlocking-the-performance-and-power-efficiency-of-parallel-computing-engines","target":"_blank","peerReviewed":false,"subType":"","id":54933682,"orderField":0},{"dateTime":"Thursday, Mar 10, 2016","urlTitle":"5-ways-to-make-your-customer-service-reps-sound-more-informed","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/cservice.jpg","groupId":53319,"channel":"STARTUPS","description":"In an era where customers can research anything online, the customer service experience has evolved. Instead of merely directing customers to products in stores and asking general questions, employees now serve as subject matter experts.","dateTimeMS":1457630580000,"title":"5 Ways to Make Your Customer Service Reps Sound More Informed","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=5-ways-to-make-your-customer-service-reps-sound-more-informed","target":"_blank","peerReviewed":false,"subType":"","id":54934787,"orderField":0},{"dateTime":"Friday, Mar 11, 2016","urlTitle":"productivity-enterprise-software-and-the-economics-of-digital-disruption","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"The New York Times ran an article recently that made the shocking claim that \u201cSilicon Valley hasn\u2019t saved us from a productivity slowdown.\u201d","dateTimeMS":1457739840000,"title":"Productivity, Enterprise Software, and The Economics of Digital Disruption","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=productivity-enterprise-software-and-the-economics-of-digital-disruption","target":"_blank","peerReviewed":false,"subType":"","id":54940791,"orderField":0},{"dateTime":"Monday, Mar 14, 2016","urlTitle":"five-steps-to-launch-a-supplier-scorecard","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/keith-sm.jpg","groupId":54174062,"channel":"","description":"Supplier scorecards are near universally accepted as a key tool for managing a more profitable supply chain.","dateTimeMS":1457973000000,"title":"Five steps to launch a supplier scorecard","type":"article","subCategories":"","url":"/web/all-things-supply-chain-analytics/content?g=54174062&type=article&urlTitle=five-steps-to-launch-a-supplier-scorecard","target":"_blank","peerReviewed":false,"subType":"","id":54944257,"orderField":0},{"dateTime":"Tuesday, Mar 15, 2016","urlTitle":"analyst-comment-35","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"BIG DATA","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending March 11,2016.","dateTimeMS":1458060600000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=analyst-comment-35","target":"_blank","peerReviewed":false,"subType":"","id":54947090,"orderField":0},{"dateTime":"Thursday, Mar 17, 2016","urlTitle":"augmented-reality-is-not-just-wearing-glasses","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/jpr.jpg","groupId":54397843,"channel":"","description":"In the very near future we will all be wearing AR glasses, just as we wear corrective and sun glasses today.","dateTimeMS":1458233700000,"title":"Augmented Reality Is Not Just Wearing Glasses","type":"article","subCategories":"","url":"/web/chasing-pixels-finding-gems/content?g=54397843&type=article&urlTitle=augmented-reality-is-not-just-wearing-glasses","target":"_blank","peerReviewed":false,"subType":"","id":54947818,"orderField":0},{"dateTime":"Wednesday, Mar 16, 2016","urlTitle":"primitives-and-elements-of-iot-trustworthiness","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ib2.png","groupId":53926943,"channel":"","description":"The National Institute of Standards and Technology (NIST) recently released a DRAFT Interagency Report 8063, \u201cPrimitives and Elements of Internet of Things (IoT) Trustworthiness\u201d. This report for first time offers a scientific foundation as to what the Internet of Things is.","dateTimeMS":1458146400000,"title":"Primitives and Elements of IoT Trustworthiness","type":"article","subCategories":"","url":"/web/sensing-iot/content?g=53926943&type=article&urlTitle=primitives-and-elements-of-iot-trustworthiness","target":"_blank","peerReviewed":false,"subType":"","id":54947548,"orderField":0},{"dateTime":"Friday, Mar 18, 2016","urlTitle":"a-warning-for-wearables-think-before-you-emote","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"https://web.archive.org/web/20160702193337/http://img.deusm.com/darkreading/john-havens.png","groupId":53319,"channel":"BIG DATA","description":"An examination of how wearable devices could become the modern equivalent of blogs broadcasting proprietary workplace information directly to the Internet of Things -- and beyond.","dateTimeMS":1458338400000,"title":"A Warning for Wearables: Think Before You Emote","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=a-warning-for-wearables-think-before-you-emote","target":"_blank","peerReviewed":false,"subType":"","id":54951134,"orderField":0},{"dateTime":"Monday, Mar 21, 2016","urlTitle":"analyst-comment-36","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"NETWORKING","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending March 18, 2016.","dateTimeMS":1458594720000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=analyst-comment-36","target":"_blank","peerReviewed":false,"subType":"","id":54953873,"orderField":0},{"dateTime":"Wednesday, Mar 23, 2016","urlTitle":"cloud-enabled-the-shift-in-connectivity","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":53319,"channel":"CLOUD","description":"BUSINESS SOLUTIONS The last decade has seen a surge in new technologies and new uses for those technologies, so much so that we\u2019re already feeling the shift in our society.","dateTimeMS":1458752700000,"title":"Cloud Enabled: The Shift in Connectivity","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=cloud-enabled-the-shift-in-connectivity","target":"_blank","peerReviewed":false,"subType":"","id":54959419,"orderField":0},{"dateTime":"Thursday, Mar 24, 2016","urlTitle":"breaking-down-the-risk-of-industrial-control-systems-securi-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"RSA President Amit Yoran\u2019s predictions for 2016 includes the following thoughts about the increasing risk in our collective industrial control systems (ICS) security.","dateTimeMS":1458852180000,"title":"Breaking Down the Risk of Industrial Control Systems Security","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=breaking-down-the-risk-of-industrial-control-systems-securi-1","target":"_blank","peerReviewed":false,"subType":"","id":54961090,"orderField":0},{"dateTime":"Friday, Mar 25, 2016","urlTitle":"the-rise-of-emerging-haptics","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/hayward.png","groupId":54174376,"channel":"","description":"Emerging haptics has been a major research priority in the automotive sector (for car interiors), in VR, AR and robotics (for adding touch, force and acceleration to the sensation), as well as in other consumer sectors (for making user interfaces more intelligent).","dateTimeMS":1458942360000,"title":"The Rise of Emerging Haptics","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=the-rise-of-emerging-haptics","target":"_blank","peerReviewed":false,"subType":"","id":54961519,"orderField":0},{"dateTime":"Monday, Mar 28, 2016","urlTitle":"solar-roads-to-power-lights-cars-and-houses","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"https://web.archive.org/web/20160702193337/https://www.computer.org/cms/Computer.org/ComputingNow/marketing/harrop.jpg","groupId":54174376,"channel":"","description":"Installing photovoltaics in roads? This seems a strange idea at first. It sounds expensive and unlikely to work unless the surface is cleaned, free of snow and ice and in direct sunlight \u2013 all too infrequent in most places. Indeed, roads are constantly dug up by utilities, repairmen and others.","dateTimeMS":1459197300000,"title":"Solar Roads to Power Lights, Cars and Houses","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=solar-roads-to-power-lights-cars-and-houses","target":"_blank","peerReviewed":false,"subType":"","id":54963615,"orderField":0},{"dateTime":"Tuesday, Mar 29, 2016","urlTitle":"computer-ed-is-key-to-tech-s-future","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":53319,"channel":"INSIGHTS","description":"Technologists should back expanded support for computer education in the latest budget request from the White House, says the president of the IEEE Computer Society.","dateTimeMS":1459276080000,"title":"Computer Ed is Key to Tech\u2019s Future","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=computer-ed-is-key-to-tech-s-future","target":"_blank","peerReviewed":false,"subType":"","id":54965105,"orderField":0},{"dateTime":"Tuesday, Mar 29, 2016","urlTitle":"e-textiles-on-the-cusp-of-rapid-growth-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/hayward.png","groupId":54174376,"channel":"","description":"While the majority of wearable technology products sold today still fit with the components-in-a-box design, 2015 was a record year for investment in smart clothing and e-textile products. To reach the masses, wearable technology must be useful, practical and fashionable, and seamless integration within textiles and clothing is seen as a key part of this.","dateTimeMS":1459276560000,"title":"E-Textiles on the Cusp of Rapid Growth?","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=e-textiles-on-the-cusp-of-rapid-growth-","target":"_blank","peerReviewed":false,"subType":"","id":54967807,"orderField":0},{"dateTime":"Wednesday, Mar 30, 2016","urlTitle":"biometrics-making-inroads-with-financial-institutions","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/biobanking_th.jpg","groupId":7989281,"channel":"","description":"While numerous financial institutions worldwide have embraced biometric technology, widespread acceptance and adoption by customers is still in its early stages.","dateTimeMS":1459377240000,"title":"Biometrics Making Inroads with Financial Institutions","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=biometrics-making-inroads-with-financial-institutions","target":"_blank","peerReviewed":false,"subType":"","id":54969716,"orderField":0},{"dateTime":"Wednesday, Mar 30, 2016","urlTitle":"robotics-industry-poised-for-rapid-growth","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/harrop.png","groupId":54174376,"channel":"","description":"Global Market Expected to Top $120 Billion by 2026.","dateTimeMS":1459377900000,"title":"Robotics Industry Poised for Rapid Growth","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=robotics-industry-poised-for-rapid-growth","target":"_blank","peerReviewed":false,"subType":"","id":54972731,"orderField":0},{"dateTime":"Thursday, Mar 31, 2016","urlTitle":"energy-independent-vehicles-creating-new-technology-and-a-substantial-global-business","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/harrop.jpg","groupId":54174376,"channel":"","description":"Formula One is significant in two ways. It is a major business in its own right -- approaching $14 billion -- and it pioneers vital new technologies in a car or bus near you from the disk brake to the flywheel kinetic energy recovery system and the supercapacitor hybrid powertrain.","dateTimeMS":1459466760000,"title":"Energy Independent Vehicles \u2013 Creating New Technology and a Substantial Global Business","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=energy-independent-vehicles-creating-new-technology-and-a-substantial-global-business","target":"_blank","peerReviewed":false,"subType":"","id":54972116,"orderField":0},{"dateTime":"Friday, Apr 1, 2016","urlTitle":"printed-and-flexible-electronics-in-vehicles-a-5-5bn-market-by-2026","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/zervos.png","groupId":54174376,"channel":"","description":"Printed and flexible electronics are beginning to proliferate, with a variety of components and devices coming to market. Several end-user verticals are expected to benefit from the host of advantages these technologies offer and the automotive sector is no exception.","dateTimeMS":1459548600000,"title":"Printed and Flexible Electronics in Vehicles \u2013 a $5.5bn Market by 2026","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=printed-and-flexible-electronics-in-vehicles-a-5-5bn-market-by-2026","target":"_blank","peerReviewed":false,"subType":"","id":54972790,"orderField":0},{"dateTime":"Monday, Apr 4, 2016","urlTitle":"ariba-infor-and-the-business-network-challenge-quantum-physics-big-transformations-and-big-barriers","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"As the enterprise software market embraces the concept of digital transformation with typical reckless, feckless abandon, it\u2019s interesting to see how one of the most transformative concepts \u2013 business networks \u2013 is evolving. What\u2019s clear from a look at two of the most well thought-out strategies, those of Infor (via its GT Nexus acquisition) and SAP (via its Ariba acquisition), is that there\u2019s no shortage of merit to what these two companies are doing and planning.","dateTimeMS":1459802820000,"title":"Ariba, Infor, and the Business Network Challenge: Quantum Physics, Big Transformations and Big Barriers","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=ariba-infor-and-the-business-network-challenge-quantum-physics-big-transformations-and-big-barriers","target":"_blank","peerReviewed":false,"subType":"","id":54977741,"orderField":0},{"dateTime":"Monday, Apr 4, 2016","urlTitle":"in-demand-cloud-computing-professionals-are-being-paid-top-dollar","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":53319,"channel":"CAREERS","description":"Cloud-computing services have become popular and affordable ways for companies to maintain their data, apps, and websites on off-site servers. There are shortages of cloud-computing experts around the world, particularly in China, India, South Africa, and the United States. Companies on the prowl for cloud-computing professionals include Amazon, Facebook, Google, Microsoft, and Oracle.","dateTimeMS":1459809480000,"title":"In-demand Cloud Computing Professionals Are Being Paid Top Dollar","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=in-demand-cloud-computing-professionals-are-being-paid-top-dollar","target":"_blank","peerReviewed":false,"subType":"","id":54977770,"orderField":0},{"dateTime":"Monday, Apr 4, 2016","urlTitle":"traction-motors-yes-gaining-traction","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/gonzalez.png","groupId":54174376,"channel":"","description":"There are about 200 companies making traction motors for electric vehicles. Concurrently, there are also about 200 companies that make the lithium-ion batteries that increasingly power them. However, whereas three types of lithium-ion battery chemistry and construction are taking almost all of the business, with traction motors the situation is more complex because the diversity of needs calls for many very different types of motor - from brushless outrunner motors for quadcopters to claw pole torque assist reversing alternators (TARA) for the new 48V mild hybrids that will be in volume production from 2017.","dateTimeMS":1459810920000,"title":"Traction Motors \u2013 Yes \u2013 Gaining Traction","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=traction-motors-yes-gaining-traction","target":"_blank","peerReviewed":false,"subType":"","id":54978545,"orderField":0},{"dateTime":"Tuesday, Apr 5, 2016","urlTitle":"prediction-using-propagation-from-flu-trends-to-cybersecurity","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/04/W_mex2016010084_100x100.jpg","groupId":53319,"channel":"","description":"Propagation-based concepts for predictive analytics pair epidemiological models with statistical topic models to improve prediction of flu trends and malware attacks.","dateTimeMS":1459891260000,"title":"Prediction Using Propagation: From Flu Trends to Cybersecurity","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=prediction-using-propagation-from-flu-trends-to-cybersecurity","target":"_blank","peerReviewed":false,"subType":"","id":54982742,"orderField":0},{"dateTime":"Tuesday, Apr 5, 2016","urlTitle":"automated-algorithmic-error-resilience-based-on-outlier-detection","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/04/W_mmi2016010046_100x100.jpg","groupId":53319,"channel":"","description":"A robust algorithm that exploits characteristic behavior of a class of applications employs automated algorithmic error resilience based on outlier detection.","dateTimeMS":1459891320000,"title":"Automated Algorithmic Error Resilience Based on Outlier Detection","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=automated-algorithmic-error-resilience-based-on-outlier-detection","target":"_blank","peerReviewed":false,"subType":"","id":54982773,"orderField":0},{"dateTime":"Tuesday, Apr 5, 2016","urlTitle":"wireless-noc-for-vfi-enabled-multicore-chip-design-performance-evaluation-and-design-trade-offs","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/04/W_ttc2016041323_100x100.jpg","groupId":53319,"channel":"","description":"Multiple Voltage Frequency Island (VFI)-based designs can reduce the energy dissipation in multicore chips and achieve significant energy savings subject to specific performance constraints. (with video extra)","dateTimeMS":1459891380000,"title":"Wireless NoC for VFI-Enabled Multicore Chip Design: Performance Evaluation and Design Trade-Offs","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=wireless-noc-for-vfi-enabled-multicore-chip-design-performance-evaluation-and-design-trade-offs","target":"_blank","peerReviewed":false,"subType":"","id":54983320,"orderField":0},{"dateTime":"Tuesday, Apr 5, 2016","urlTitle":"addressing-gender-gaps-in-teens-cybersecurity-engagement-and-self-efficacy","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/04/W_msp2016010072_100x100.jpg","groupId":53319,"channel":"","description":"A study comparing gender differences in confidence and interest among teens at a cybersecurity camp found that, although males initially scored higher, females caught up by week's end.","dateTimeMS":1459891380000,"title":"Addressing Gender Gaps in Teens' Cybersecurity Engagement and Self-Efficacy","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=addressing-gender-gaps-in-teens-cybersecurity-engagement-and-self-efficacy","target":"_blank","peerReviewed":false,"subType":"","id":54982827,"orderField":0},{"dateTime":"Tuesday, Apr 5, 2016","urlTitle":"evacsys-a-cloud-based-service-for-emergency-evacuation","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/04/W_mcd2016010060_100x100.jpg","groupId":53319,"channel":"","description":"In the wake of natural disasters, EvacSys uses cloud computing to process large volumes of real-time sensory data and compute appropriate escape routes for evacuees.","dateTimeMS":1459892820000,"title":"EvacSys: A Cloud-Based Service for Emergency Evacuation","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=evacsys-a-cloud-based-service-for-emergency-evacuation","target":"_blank","peerReviewed":false,"subType":"","id":54982874,"orderField":0},{"dateTime":"Tuesday, Apr 5, 2016","urlTitle":"common-pitfalls-of-benchmarking-big-data-systems","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/04/T_Common-Pitfalls_100x100.jpg","groupId":53319,"channel":"","description":"Five common pitfalls drawn from engineering and customer experiences at Cloudera, a leading big data vendor.","dateTimeMS":1459895100000,"title":"Common Pitfalls of Benchmarking Big Data Systems","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=common-pitfalls-of-benchmarking-big-data-systems","target":"_blank","peerReviewed":false,"subType":"","id":54983350,"orderField":0},{"dateTime":"Tuesday, Apr 5, 2016","urlTitle":"understanding-unsuccessful-executions-in-big-data-systems","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/04/T_Understanding-Unsuccessful_100x100.jpg","groupId":53319,"channel":"","description":"The authors describe the problem of unsuccessful executions in big-data systems, and highlight the critical importance of improving our knowledge on this subject.","dateTimeMS":1459895160000,"title":"Understanding Unsuccessful Executions in Big-Data Systems","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=understanding-unsuccessful-executions-in-big-data-systems","target":"_blank","peerReviewed":false,"subType":"","id":54983377,"orderField":0},{"dateTime":"Tuesday, Apr 5, 2016","urlTitle":"embrace-the-challenges-software-engineering-in-a-big-data-world","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/04/T_Embrace-the-Challenges_100x100.jpg","groupId":53319,"channel":"","description":"The authors discuss their experiences designing and developing data-intensive systems in support of crisis informatics research with Project EPIC.","dateTimeMS":1459895160000,"title":"Embrace the Challenges: Software Engineering in a Big Data World","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=embrace-the-challenges-software-engineering-in-a-big-data-world","target":"_blank","peerReviewed":false,"subType":"","id":54983504,"orderField":0},{"dateTime":"Tuesday, Apr 5, 2016","urlTitle":"research-directions-for-engineering-big-data-analytics-software","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/04/T_Research-Directions_100x100.jpg","groupId":53319,"channel":"","description":"This article explores the details of big data software, discusses the main problems encountered when engineering big data software, and proposes avenues for future research.","dateTimeMS":1459895220000,"title":"Research Directions for Engineering Big Data Analytics Software","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=research-directions-for-engineering-big-data-analytics-software","target":"_blank","peerReviewed":false,"subType":"","id":54983538,"orderField":0},{"dateTime":"Tuesday, Apr 5, 2016","urlTitle":"distribution-data-deployment-software-architecture-convergence-in-big-data-systems","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/04/T_Distribution-Data-Deployment_100x100.jpg","groupId":53319,"channel":"","description":"Distributed-software architecture quality attributes are tightly linked to both the data and deployment architectures for big data systems.","dateTimeMS":1459895280000,"title":"Distribution, Data, Deployment: Software Architecture Convergence in Big Data Systems","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=distribution-data-deployment-software-architecture-convergence-in-big-data-systems","target":"_blank","peerReviewed":false,"subType":"","id":54983565,"orderField":0},{"dateTime":"Wednesday, Apr 6, 2016","urlTitle":"energy-harvesting-steady-growth-and-sensible-increase-in-opportunities-forecasted","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/zervos.png","groupId":54174376,"channel":"","description":"Developments of energy harvesting technologies in 2015 were pretty uneven, with some showcasing growth in interest as well as applications and others failing to meet expectations but despite limited growth expected in 2016 , by 2025 the market for transducers and power conditioning is expected to reach over $12 billion.","dateTimeMS":1459958160000,"title":"Energy Harvesting, Steady Growth and Sensible Increase in Opportunities Forecasted","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=energy-harvesting-steady-growth-and-sensible-increase-in-opportunities-forecasted","target":"_blank","peerReviewed":false,"subType":"","id":54984757,"orderField":0},{"dateTime":"Thursday, Apr 7, 2016","urlTitle":"analyst-comment-37","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending April 01, 2016.","dateTimeMS":1460068980000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=analyst-comment-37","target":"_blank","peerReviewed":false,"subType":"","id":54998668,"orderField":0},{"dateTime":"Friday, Apr 8, 2016","urlTitle":"conductive-inks-and-paste-everything-is-changing","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/khasha.png","groupId":54174376,"channel":"","description":"Everything, literally everything, is changing in the conductive inks business. The traditional markets are experiencing upheaval in terms of requirements and product leadership, while various emerging markets are opening up new frontiers.","dateTimeMS":1460133300000,"title":"Conductive Inks and Paste: Everything is Changing","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=conductive-inks-and-paste-everything-is-changing","target":"_blank","peerReviewed":false,"subType":"","id":55000350,"orderField":0},{"dateTime":"Tuesday, Mar 22, 2016","urlTitle":"high-tech-careers-finding-the-job-you-want","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/htech.jpg","groupId":54960830,"channel":"","description":"As an Intel enterprise architect and technology strategist, Enrique G. Castro-Leon knows a thing or two about computer technology careers. With research interests that include cloud computing and IT-enabled enterprise service innovation, he recently co-authored a guest editor introduction for the November\u2013December 2015 IT Professional special issue on smart systems.","dateTimeMS":1458669300000,"title":"High-Tech Careers: Finding the Job You Want","type":"article","subCategories":"","url":"/web/computing-careers/content?g=54960830&type=article&urlTitle=high-tech-careers-finding-the-job-you-want","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55022980,"orderField":0},{"dateTime":"Monday, Apr 11, 2016","urlTitle":"the-hidden-costs-of-full-time-software-developers","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/outsource.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Software development is one of the hottest areas for outsourcing, with businesses realizing that they can easily assign projects to workers in remote areas and save money.","dateTimeMS":1460411640000,"title":"The Hidden Costs of Full-Time Software Developers","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=the-hidden-costs-of-full-time-software-developers","target":"_blank","peerReviewed":false,"subType":"","id":55005206,"orderField":0},{"dateTime":"Monday, Apr 11, 2016","urlTitle":"electrically-conductive-adhesives-enabling-low-temperature-electronics","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/gordon.png","groupId":54174376,"channel":"","description":"$1.2 billion of Electrically Conductive Adhesives (ECAs) are already selling each year, and they are becoming increasingly common to replace solders in a variety of functions, applications and industries.","dateTimeMS":1460412540000,"title":"Electrically Conductive Adhesives Enabling Low Temperature Electronics","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=electrically-conductive-adhesives-enabling-low-temperature-electronics","target":"_blank","peerReviewed":false,"subType":"","id":55005261,"orderField":0},{"dateTime":"Tuesday, Apr 12, 2016","urlTitle":"analyst-comment-38","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"MOBILE","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending April 08, 2016.","dateTimeMS":1460495280000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analyst-comment-38","target":"_blank","peerReviewed":false,"subType":"","id":55015866,"orderField":0},{"dateTime":"Wednesday, Apr 13, 2016","urlTitle":"are-europeans-more-data-driven-than-the-rest-of-u-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"Like any other technology implementation, nothing threatens effective business analytics more than the looming specter of \u201cshelfware.\u201d In the fight against underutilized technology, companies in Europe are leaning on their users and an increased propensity for data-driven decisions.","dateTimeMS":1460585340000,"title":"Are Europeans More Data-Driven than the Rest of Us?","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=are-europeans-more-data-driven-than-the-rest-of-u-1","target":"_blank","peerReviewed":false,"subType":"","id":55038327,"orderField":0},{"dateTime":"Monday, Apr 18, 2016","urlTitle":"analyst-comment-39","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"STARTUPS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending April 15, 2016.","dateTimeMS":1460999640000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=analyst-comment-39","target":"_blank","peerReviewed":false,"subType":"","id":55031028,"orderField":0},{"dateTime":"Thursday, Apr 14, 2016","urlTitle":"rethinking-storage-virtualization-the-flat-earth-approach","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"In 2014, virtualization surpassed 50 percent of all server workloads, according to Gartner, which believes it will reach 86 percent in 2016. That\u2019s phenomenal for a relatively young technology. But due to other shifts in technology and the demands they produce, it\u2019s a framework whose time has come.","dateTimeMS":1460656740000,"title":"Rethinking Storage Virtualization: The \u2018Flat Earth\u2019 Approach","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=rethinking-storage-virtualization-the-flat-earth-approach","target":"_blank","peerReviewed":false,"subType":"","id":55031055,"orderField":0},{"dateTime":"Tuesday, Apr 19, 2016","urlTitle":"finding-the-cybersecurity-job-you-want","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/cybersecurity.jpg","groupId":54960830,"channel":"","description":"Rakesh Verma is a professor of computer science at the University of Houston and director of its ReDAS (Reasoning and Data Analytics for Security) Laboratory. His research interests are formal methods and data analytics applied to natural-language understanding and cybersecurity. Thus, he is very knowledgeable about security-related careers. We asked Verma several questions about career opportunities in this increasingly important field.","dateTimeMS":1461090420000,"title":"Finding the Cybersecurity Job You Want","type":"article","subCategories":"","url":"/web/computing-careers/content?g=54960830&type=article&urlTitle=finding-the-cybersecurity-job-you-want","target":"_blank","peerReviewed":false,"subType":"","id":55031233,"orderField":0},{"dateTime":"Wednesday, Apr 20, 2016","urlTitle":"5-ways-to-convert-your-visitors","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/arrowbutton.jpg","groupId":53319,"channel":"STARTUPS","description":"Conversion is the name of the game for any website or business that is getting off the ground, and even for those that are well established. After all, it doesn\u2019t matter how much traffic you can drive to your site if you can\u2019t convert those visitors into customers or users.","dateTimeMS":1461174120000,"title":"5 Ways to Convert Your Visitors","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=5-ways-to-convert-your-visitors","target":"_blank","peerReviewed":false,"subType":"","id":55031982,"orderField":0},{"dateTime":"Monday, Apr 25, 2016","urlTitle":"technology-s-making-smart-clothing-even-smarter","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/fabricm.jpg","groupId":7989281,"channel":"","description":"A generation from now (or probably much less), your blue jeans might tell you that they really need to be washed. Or your blue blazer might complain that that hideous Christmas gift tie you got from Aunt Mabel just doesn\u2019t cut it with your dress shirt and slacks.","dateTimeMS":1461614340000,"title":"Technology\u2019s Making Smart Clothing Even Smarter","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=technology-s-making-smart-clothing-even-smarter","target":"_blank","peerReviewed":false,"subType":"","id":55038116,"orderField":0},{"dateTime":"Monday, Apr 25, 2016","urlTitle":"finding-the-internet-of-things-related-job-you-want","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/iotc.jpg","groupId":54960830,"channel":"","description":"For this ComputingEdge issue, we asked Jaroslaw Domaszewicz, an assistant professor in Warsaw University of Technology\u2019s (WUT\u2019s) Faculty of Electronics and Information Technology and its Institute of Telecommunications, about career opportunities related to the Internet of Things (IoT). Domaszewicz\u2019s research interests include the IoT, pervasive computing, middleware, and the interaction between people and smart objects, and he has led WUT\u2019s team in a number of European Union projects in these areas.","dateTimeMS":1461614640000,"title":"Finding the Internet of Things\u2013Related Job You Want","type":"article","subCategories":"","url":"/web/computing-careers/content?g=54960830&type=article&urlTitle=finding-the-internet-of-things-related-job-you-want","target":"_blank","peerReviewed":false,"subType":"","id":55038147,"orderField":0},{"dateTime":"Thursday, Apr 21, 2016","urlTitle":"securing-enterprise-networks-in-the-age-of-byod-and-the-iot","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"As if managing the BYOD phenomenon wasn\u2019t hard enough, Microsoft made it harder with its free Windows 10 upgrade. That wasn\u2019t Microsoft\u2019s intention, of course, and the company can\u2019t be blamed for the increasing challenge of managing employee devices with disparate software versions. After all, it\u2019s pretty great to get a new operating system for free.","dateTimeMS":1461270300000,"title":"Securing Enterprise Networks in the Age of BYOD and the IoT","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=securing-enterprise-networks-in-the-age-of-byod-and-the-iot","target":"_blank","peerReviewed":false,"subType":"","id":55038303,"orderField":0},{"dateTime":"Tuesday, Apr 26, 2016","urlTitle":"analyst-comment-40","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"BIG DATA","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending April 22, 2016.","dateTimeMS":1461688920000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=analyst-comment-40","target":"_blank","peerReviewed":false,"subType":"","id":55038962,"orderField":0},{"dateTime":"Wednesday, Apr 27, 2016","urlTitle":"ibm-s-grady-booch-receives-the-2016-ieee-cs-computer-pioneer-award","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"https://web.archive.org/web/20160702193337/https://s3-us-west-2.amazonaws.com/ieeecs.cdn.rockstars/images/headshots/booch.png","groupId":53319,"channel":"INSIGHTS","description":"Grady Booch, Chief Scientist for Software Engineering and Watson/M at IBM Research, has been selected to receive the IEEE Computer Society\u2019s 2016 Computer Pioneer Award.","dateTimeMS":1461780120000,"title":"IBM\u2019s Grady Booch Receives the 2016 IEEE-CS Computer Pioneer Award","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=ibm-s-grady-booch-receives-the-2016-ieee-cs-computer-pioneer-award","target":"_blank","peerReviewed":false,"subType":"","id":55043868,"orderField":0},{"dateTime":"Thursday, Apr 28, 2016","urlTitle":"exploring-how-cache-coherency-accelerates-heterogeneous-compute","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/parris2.jpg","groupId":54930593,"channel":"","description":"This blog focuses on some of the hardware innovations and changes that are relevant to shared virtual memory and cache coherency, which are components of the HSA hardware specification.","dateTimeMS":1461886020000,"title":"Exploring how Cache Coherency Accelerates Heterogeneous Compute","type":"article","subCategories":"","url":"/web/hsa-connections/content?g=54930593&type=article&urlTitle=exploring-how-cache-coherency-accelerates-heterogeneous-compute","target":"_blank","peerReviewed":false,"subType":"","id":55056393,"orderField":0},{"dateTime":"Friday, Apr 29, 2016","urlTitle":"9-tools-your-company-needs-in-2016","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/businesstools.png","groupId":53319,"channel":"STARTUPS","description":"If you\u2019re planning to improve operations using technology, here are a few tools you should have on your devices in 2016. These products will help you be more productive and informed as you run your company.","dateTimeMS":1461963120000,"title":"9 Tools Your Company Needs in 2016","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=9-tools-your-company-needs-in-2016","target":"_blank","peerReviewed":false,"subType":"","id":55045235,"orderField":0},{"dateTime":"Monday, May 2, 2016","urlTitle":"analyst-comment-41","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"SECURITY","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending April 29, 2016.","dateTimeMS":1462213080000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=analyst-comment-41","target":"_blank","peerReviewed":false,"subType":"","id":55051435,"orderField":0},{"dateTime":"Tuesday, May 3, 2016","urlTitle":"the-ibm-acs-project","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/05/W_man2016010060-100x100.jpg","groupId":53319,"channel":"","description":"The Advanced Computer Systems (ACS) project was one of two major IBM supercomputer efforts in the late 1960s, which pioneered high-speed integrated circuitry and other innovations.","dateTimeMS":1462299000000,"title":"The IBM ACS Project","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=the-ibm-acs-project","target":"_blank","peerReviewed":false,"subType":"","id":55051468,"orderField":0},{"dateTime":"Tuesday, May 3, 2016","urlTitle":"communication-and-privacy-under-surveillance","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/05/W_mco2016030010-100x100.jpg","groupId":53319,"channel":"","description":"The conflict between the FBI and Apple about installing back doors in iOS for surveillance brings concerns about privacy and trust to the forefront of users' minds.","dateTimeMS":1462299060000,"title":"Communication and Privacy under Surveillance","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=communication-and-privacy-under-surveillance","target":"_blank","peerReviewed":false,"subType":"","id":55051495,"orderField":0},{"dateTime":"Tuesday, May 3, 2016","urlTitle":"the-seven-veils-of-privacy","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/05/W_mic2016020086-100x100.jpg","groupId":53319,"channel":"","description":"Kieron O'Hara details a privacy framework of seven levels to help citizens think about when privacy violations are problematic, and why this differs across cultures and generations.","dateTimeMS":1462299120000,"title":"The Seven Veils of Privacy","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=the-seven-veils-of-privacy","target":"_blank","peerReviewed":false,"subType":"","id":55051822,"orderField":0},{"dateTime":"Tuesday, May 3, 2016","urlTitle":"the-hybrid-cloud-security-professional","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/05/W_mcd2016010082-100x100.jpg","groupId":53319,"channel":"","description":"The role of the cloud security professional in a hybrid cloud environment is explored along with the need for training and certification options.","dateTimeMS":1462299180000,"title":"The Hybrid Cloud Security Professional","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=the-hybrid-cloud-security-professional","target":"_blank","peerReviewed":false,"subType":"","id":55051849,"orderField":0},{"dateTime":"Tuesday, May 3, 2016","urlTitle":"gyrowand-an-approach-to-imu-based-raycasting-for-augmented-reality","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/05/W_mcg2016020090-100x100.jpg","groupId":53319,"channel":"","description":"Since pervasive tracking in head-mounted displays limits interaction, the authors introduce GyroWand, a raycasting technique for AR HMDs using inertial measurement unit (IMU) rotational data.","dateTimeMS":1462299180000,"title":"GyroWand: An Approach to IMU-Based Raycasting for Augmented Reality","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=gyrowand-an-approach-to-imu-based-raycasting-for-augmented-reality","target":"_blank","peerReviewed":false,"subType":"","id":55051876,"orderField":0},{"dateTime":"Tuesday, May 3, 2016","urlTitle":"ut-austin-villa-project-driven-research-in-ai-and-robotics","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/05/W_mex2016020094-100x100.jpg","groupId":53319,"channel":"","description":"UT Austin Villa is a robot soccer team that has won several RoboCup soccer championships since 2003 and has inspired research contributions in robotics and artificial intelligence.","dateTimeMS":1462299240000,"title":"UT Austin Villa: Project-Driven Research in AI and Robotics","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=ut-austin-villa-project-driven-research-in-ai-and-robotics","target":"_blank","peerReviewed":false,"subType":"","id":55051903,"orderField":0},{"dateTime":"Tuesday, May 3, 2016","urlTitle":"a-deep-intelligence-framework-for-online-video-processing","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/05/W_mso2016020044-100x100.jpg","groupId":53319,"channel":"","description":"Since video data has become the largest source of big data, a cloud framework is proposed to address efficiency and intelligent runtime video processing.","dateTimeMS":1462299300000,"title":"A Deep-Intelligence Framework for Online Video Processing","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=a-deep-intelligence-framework-for-online-video-processing","target":"_blank","peerReviewed":false,"subType":"","id":55053032,"orderField":0},{"dateTime":"Tuesday, May 3, 2016","urlTitle":"delivering-science-on-day-one","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/05/W_mcs2016020029-100x100.jpg","groupId":53319,"channel":"","description":"Argonne National Laboratory will unveil its new high-performance supercomputer, Theta, later this year. To test its potential, a select group of researchers is using it to conduct actual experiments.","dateTimeMS":1462299420000,"title":"Delivering Science on Day One","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=delivering-science-on-day-one","target":"_blank","peerReviewed":false,"subType":"","id":55052418,"orderField":0},{"dateTime":"Tuesday, May 3, 2016","urlTitle":"spammers-are-becoming-smarter-on-twitter","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/05/W_mit2016020066-100x100.jpg","groupId":53319,"channel":"","description":"While researchers develop various approaches to detect Twitter spam, spammers thwart their efforts with more complex spamming strategies: coordinated posting behavior, finite-state machine-based spam template, and passive spam.","dateTimeMS":1462299420000,"title":"Spammers Are Becoming \"Smarter\" on Twitter","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=spammers-are-becoming-smarter-on-twitter","target":"_blank","peerReviewed":false,"subType":"","id":55052056,"orderField":0},{"dateTime":"Tuesday, May 3, 2016","urlTitle":"resilient-chip-multiprocessors-with-mixed-grained-reconfigurability","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/05/W_mmi2016010035-100x100.jpg","groupId":53319,"channel":"","description":"This article presents a chip multiprocessor (CMP) design that mixes coarse- and fine-grained reconfigurability to increase core availability of safety-critical embedded systems in the presence of hard errors.","dateTimeMS":1462299480000,"title":"Resilient Chip Multiprocessors with Mixed-Grained Reconfigurability","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=resilient-chip-multiprocessors-with-mixed-grained-reconfigurability","target":"_blank","peerReviewed":false,"subType":"","id":55052083,"orderField":0},{"dateTime":"Tuesday, May 3, 2016","urlTitle":"a-communications-jamming-taxonomy","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/05/W_msp2016010047-100x100.jpg","groupId":53319,"channel":"","description":"A taxonomy helps delineate between jamming in the original electronic warfare sense and wireless cybersecurity attacks, classifying communication jammers' theoretical behaviors and characteristics.","dateTimeMS":1462299540000,"title":"A Communications Jamming Taxonomy","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=a-communications-jamming-taxonomy","target":"_blank","peerReviewed":false,"subType":"","id":55052110,"orderField":0},{"dateTime":"Tuesday, May 3, 2016","urlTitle":"where-has-my-battery-gone-a-novel-crowdsourced-solution-for-characterizing-energy-consumption","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/05/W_mpc2016010006-100x100.jpg","groupId":53319,"channel":"","description":"To understand and optimize battery use in complex smartphone applications, a novel crowdsourced solution is proposed for characterizing energy consumption of system settings, subsystem variables, and other context factors.","dateTimeMS":1462299600000,"title":"Where Has My Battery Gone?: A Novel Crowdsourced Solution for Characterizing Energy Consumption","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=where-has-my-battery-gone-a-novel-crowdsourced-solution-for-characterizing-energy-consumption","target":"_blank","peerReviewed":false,"subType":"","id":55053052,"orderField":0},{"dateTime":"Tuesday, May 3, 2016","urlTitle":"social-media-interaction-and-analytics-for-enhanced-educational-experiences","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/05/W_mmu2016010026-100x100.jpg","groupId":53319,"channel":"","description":"Researchers present an innovative system based on social media and high-quality multimedia content delivery designed to enhance the educational experiences of students in cultural centers and museums.","dateTimeMS":1462299720000,"title":"Social Media Interaction and Analytics for Enhanced Educational Experiences","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=social-media-interaction-and-analytics-for-enhanced-educational-experiences","target":"_blank","peerReviewed":false,"subType":"","id":55052164,"orderField":0},{"dateTime":"Tuesday, May 3, 2016","urlTitle":"temporal-consistency-maintenance-upon-partitioned-multiprocessor-platforms","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/05/W_Temporal-Consistency-Maintenance280x80.jpg","groupId":53319,"channel":"","description":"Maintaining timeliness and data freshness for real-time data objects has long been recognized as an important problem in real-time database research. Despite years of active research, most of the past work focuses on uniprocessor systems. In this paper, we study the workload-aware temporal consistency maintenance problem upon multiprocessor platforms.","dateTimeMS":1462299780000,"title":"Temporal Consistency Maintenance Upon Partitioned Multiprocessor Platforms","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=temporal-consistency-maintenance-upon-partitioned-multiprocessor-platforms","target":"_blank","peerReviewed":false,"subType":"","id":55052663,"orderField":0},{"dateTime":"Tuesday, May 3, 2016","urlTitle":"architecting-for-causal-intelligence-at-nanoscale","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/05/T_mco2015120054-100x100.jpg","groupId":53319,"channel":"","description":"Conventional Von Neumann microprocessors are inefficient for supporting machine intelligence. A new approach uses physical equivalence and emerging nanotechnology to achieve machine intelligence.","dateTimeMS":1462301100000,"title":"Architecting for Causal Intelligence at Nanoscale","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=architecting-for-causal-intelligence-at-nanoscale","target":"_blank","peerReviewed":false,"subType":"","id":55052502,"orderField":0},{"dateTime":"Tuesday, May 3, 2016","urlTitle":"ohmic-weave-memristor-based-threshold-gate-networks","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/05/T_mco2015120065-100x100.jpg","groupId":53319,"channel":"","description":"In industry, Boolean logic and CMOS fabrication dominate. But emerging technologies like memristors are making the implementation of threshold gates more efficient than CMOS.","dateTimeMS":1462301160000,"title":"Ohmic Weave: Memristor-Based Threshold Gate Networks","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=ohmic-weave-memristor-based-threshold-gate-networks","target":"_blank","peerReviewed":false,"subType":"","id":55052529,"orderField":0},{"dateTime":"Tuesday, May 3, 2016","urlTitle":"spinnaker-programming-model","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/05/T_SpiNNaker-Programming-Model-100x100.jpg","groupId":53319,"channel":"","description":"This paper describes the low-level foundation software developed so far to support the operation of the SpiNNaker system, a multi-core computing engine.","dateTimeMS":1462301220000,"title":"SpiNNaker\u2014Programming Model","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=spinnaker-programming-model","target":"_blank","peerReviewed":false,"subType":"","id":55052556,"orderField":0},{"dateTime":"Tuesday, May 3, 2016","urlTitle":"a-high-throughput-neural-network-accelerator","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/05/T_mmi2015030024-100x100.jpg","groupId":53319,"channel":"","description":"Recent advances in machine-learning show that neural network accelerators can achieve the rare combination of efficiency and broad application scope.","dateTimeMS":1462301280000,"title":"A High-Throughput Neural Network Accelerator","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=a-high-throughput-neural-network-accelerator","target":"_blank","peerReviewed":false,"subType":"","id":55052583,"orderField":0},{"dateTime":"Tuesday, May 3, 2016","urlTitle":"hfirst-a-temporal-approach-to-object-recognition","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/05/T_HFirst-A-Temporal-Approach-100x100.jpg","groupId":53319,"channel":"","description":"This paper introduces a spiking hierarchical model for object recognition that utilizes the precise timing information from biologically inspired asynchronous AER vision sensors.","dateTimeMS":1462301280000,"title":"HFirst: A Temporal Approach to Object Recognition","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=hfirst-a-temporal-approach-to-object-recognition","target":"_blank","peerReviewed":false,"subType":"","id":55052610,"orderField":0},{"dateTime":"Tuesday, May 3, 2016","urlTitle":"a-robot-learns-how-to-entice-an-insect","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/05/T_A-Robot-Learns-How-100x100.jpg","groupId":53319,"channel":"","description":"This article shows that a robot can learn, through trial and error, how to entice an insect into following a given trajectory without human aid.","dateTimeMS":1462301340000,"title":"A Robot Learns How to Entice an Insect","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=a-robot-learns-how-to-entice-an-insect","target":"_blank","peerReviewed":false,"subType":"","id":55052637,"orderField":0},{"dateTime":"Wednesday, May 4, 2016","urlTitle":"how-to-prevent-tech-from-destroying-your-work-life-balance","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/wlb.jpg","groupId":53319,"channel":"CAREERS","description":"New tech emerges all the time, purportedly to make our lives easier and keep us in closer connection with each other. Traditional mediums, like email and phone calls, are still around, but a bevy of new communication mediums have arisen to streamline conversations and break down the barriers that previous communication channels erected.\nThe trouble is, some of these barriers were a good thing. Are we losing them?","dateTimeMS":1462379160000,"title":"How to Prevent Tech From Destroying Your Work-Life Balance","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=how-to-prevent-tech-from-destroying-your-work-life-balance","target":"_blank","peerReviewed":false,"subType":"","id":55056023,"orderField":0},{"dateTime":"Friday, May 13, 2016","urlTitle":"prpl-security-group-and-imperas-address-iot-security-challenges-via-multi-domain-virtualization","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/simon.jpg","groupId":8459902,"channel":"","description":"Recent news shows that security is a key challenge to the wide scope and deployment of IoT, with varied consequences across many IoT markets. Imagine automotive hijacking. Power grid failure. Financial security breaches. Health care hacking. Consequences are severe: successful security measures in the IoT ecosystem will accelerate the explosion of its many markets while poorly implemented security will be a significant impediment to growth of IoT usage.","dateTimeMS":1463172540000,"title":"prpl Security Group and Imperas Address IoT Security Challenges via Multi-Domain Virtualization","type":"article","subCategories":"","url":"/web/prpl-matters/content?g=8459902&type=article&urlTitle=prpl-security-group-and-imperas-address-iot-security-challenges-via-multi-domain-virtualization","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55110880,"orderField":0},{"dateTime":"Tuesday, May 17, 2016","urlTitle":"analystperspectives-weekly-s-36","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"cms/computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending May13, 2016.","dateTimeMS":1463527860000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-36","target":"_blank","peerReviewed":false,"subType":"","id":55072258,"orderField":0},{"dateTime":"Wednesday, Jun 1, 2016","urlTitle":"got-game-analytics-may-help-those-weekend-duffers","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/game1.png","groupId":7989281,"channel":"","description":"If you constantly shank your drives into the rough, have a propensity for landing your ball in every other sand trap and have a knack for choking on those three-foot putts, well, golf analytics may offer some incremental improvements to your game, but playing on the PGA Tour will still be a bedtime fantasy.\n\nThe skinny, however, is that the analytics gleaned via wearable technology and cloud computing are bringing about a sea change in golf.","dateTimeMS":1464801060000,"title":"Got Game? Analytics May Help Those Weekend Duffers","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=got-game-analytics-may-help-those-weekend-duffers","target":"_blank","peerReviewed":false,"subType":"","id":55122106,"orderField":0},{"dateTime":"Wednesday, Jun 1, 2016","urlTitle":"5-tips-to-processing-payments-remotely","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/secure.jpg","groupId":53319,"channel":"SECURITY","description":"Today\u2019s busy professionals rarely sit at a desk for eight hours. Work is conducted in cafes, while waiting at the airport, or before leaving the house for the day. Mobile devices have freed business leaders to travel across the country and even to the other side of the globe. However, for entrepreneurs who don\u2019t have a bookkeeping team back home, processing incoming and outgoing invoices in a timely manner can be challenging.","dateTimeMS":1464800400000,"title":"5 Tips to Processing Payments Remotely","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=5-tips-to-processing-payments-remotely","target":"_blank","peerReviewed":false,"subType":"","id":55105140,"orderField":0},{"dateTime":"Thursday, Jun 2, 2016","urlTitle":"analystperspectiv-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"AnalystPerspectives Weekly Scan covers analyst commentary","dateTimeMS":1464854640000,"title":"AnalystPerspectives","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analystperspectiv-1","target":"_blank","peerReviewed":false,"subType":"","id":55106195,"orderField":0},{"dateTime":"Friday, Jun 3, 2016","urlTitle":"the-last-real-user-group-standing-why-asug-matters-to-sap-and-its-customers","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2.png","groupId":6416743,"channel":"","description":"The first time I ever attended a user group meeting was way back at the dawn of my career, when I was managing a pioneering print-on-demand/desktop publishing system for a specialty publisher. I went to the meeting to find out if the vendor was ever going to fix the latest version of its software, which was basically dead-on-arrival. To my surprise, the CEO took to the stage, apologized profusely, begged forgiveness, promised to fix the problem or else, and otherwise completely humbled himself in front of his irate customers.","dateTimeMS":1464941940000,"title":"The Last Real User Group Standing: Why ASUG Matters to SAP and Its Customers","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=the-last-real-user-group-standing-why-asug-matters-to-sap-and-its-customers","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55108292,"orderField":0},{"dateTime":"Wednesday, May 25, 2016","urlTitle":"four-software-security-findings","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/06/T-mco2016010084-100x100.jpg","groupId":53319,"channel":"","description":"Analyzing data from 78 firms using the Building Security In Maturity Model (BSIMM) revealed four truths about software security that will help firms protect and secure their assets.","dateTimeMS":1464201540000,"title":"Four Software Security Findings","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=four-software-security-findings","target":"_blank","peerReviewed":false,"subType":"","id":55086569,"orderField":0},{"dateTime":"Wednesday, May 25, 2016","urlTitle":"security-or-privacy-a-matter-of-perspective","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/06/T-mco2014110094-100x100.jpg","groupId":53319,"channel":"","description":"The Internet offers unprecedented potential for both liberty and protection, but can easily breed lawlessness and oppression\u2014blurring the line between safety and simple prying.","dateTimeMS":1464201540000,"title":"Security or Privacy? A Matter of Perspective","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=security-or-privacy-a-matter-of-perspective","target":"_blank","peerReviewed":false,"subType":"","id":55086596,"orderField":0},{"dateTime":"Wednesday, May 25, 2016","urlTitle":"protecting-patient-data-the-economic-perspective-of-healthcare-security","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/06/T-msp2015050090-100x100.jpg","groupId":53319,"channel":"","description":"Market mechanisms can nudge healthcare organizations toward effective and voluntary security actions. Regulatory intervention should focus on reinforcing the economic impact of information security.","dateTimeMS":1464201600000,"title":"Protecting Patient Data-The Economic Perspective of Healthcare Security","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=protecting-patient-data-the-economic-perspective-of-healthcare-security","target":"_blank","peerReviewed":false,"subType":"","id":55087623,"orderField":0},{"dateTime":"Wednesday, May 25, 2016","urlTitle":"the-eyes-have-it-surveillance-and-how-it-evolved","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/06/T-msp2014040074-100x100.jpg","groupId":53319,"channel":"","description":"This article presents a brief history of surveillance and discusses issues technologists should consider when building software and hardware to capture and analyze personal characteristics.","dateTimeMS":1464201660000,"title":"The Eyes Have It: Surveillance and How It Evolved","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=the-eyes-have-it-surveillance-and-how-it-evolved","target":"_blank","peerReviewed":false,"subType":"","id":55087650,"orderField":0},{"dateTime":"Wednesday, May 25, 2016","urlTitle":"personal-data-and-government-surveillance","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/06/T-msp2014040090-100x100.jpg","groupId":53319,"channel":"","description":"The fundamental intellectual challenge of cybersecurity might be understood by narrowing our focus to one class of tradeoffs: personal data and the government.","dateTimeMS":1464201660000,"title":"Personal Data and Government Surveillance","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=personal-data-and-government-surveillance","target":"_blank","peerReviewed":false,"subType":"","id":55087677,"orderField":0},{"dateTime":"Wednesday, May 25, 2016","urlTitle":"insecure-surveillance-technical-issues-with-remote-computer-searches","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/06/T-mco2016030014-100x100.jpg","groupId":53319,"channel":"","description":"Proposed changes to federal rules authorizing warrants for remote computer searches create serious security problems and potentially compromise criminal investigations.","dateTimeMS":1464201720000,"title":"Insecure Surveillance: Technical Issues with Remote Computer Searches","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=insecure-surveillance-technical-issues-with-remote-computer-searches","target":"_blank","peerReviewed":false,"subType":"","id":55087704,"orderField":0},{"dateTime":"Friday, Jun 3, 2016","urlTitle":"what-s-new-is-old","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/jpr.jpg","groupId":54397843,"channel":"","description":"Augmented reality (AR) systems come in a various models or designs, glasses, headsets, and helmets to name the most popular. AR helmets are used for industrial applications such as maintenance and repair, first responders such as firemen, rescue workers, and they are used by military pilots. AR helmets are also being introduced for motorcyclists and provide a head\u2019s up display (HUD) of road conditions and nearby attractions. BMW has demonstrated such a helmet, and Skully has sold a few. Inside the DOT/ECE certified helmet, the user has intelligent audio, helmet-to-helmet communication, hands-free calling, music streaming, and GPS navigation via Bluetooth to a cell phone,","dateTimeMS":1464980760000,"title":"What\u2019s New Is Old","type":"article","subCategories":"","url":"/web/chasing-pixels-finding-gems/content?g=54397843&type=article&urlTitle=what-s-new-is-old","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55110900,"orderField":0},{"dateTime":"Thursday, Jun 16, 2016","urlTitle":"cognitive-computing-set-to-make-significant-inroads-in-healthcare-indust-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/vrbicky.png","groupId":8206605,"channel":"","description":"The global healthcare cognitive computing market is poised for explosive growth.\n\nMarket research firm Grand View Research predicts it will top more than $5 billion by 2022. Grand Review Research also says significant factors driving the market are rapid growth in the scientific database, demand for personalized healthcare, and the need to reduce healthcare expenditure levels.","dateTimeMS":1466101740000,"title":"Cognitive Computing Set to Make Significant Inroads in Healthcare Industry","type":"article","subCategories":"","url":"/web/the-doctor-is-in/content?g=8206605&type=article&urlTitle=cognitive-computing-set-to-make-significant-inroads-in-healthcare-indust-1","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55126681,"orderField":0},{"dateTime":"Sunday, Jun 5, 2016","urlTitle":"sap-s-ginormous-sapphire-user-conference-sales-event","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/Josh greenbaum.JPG","groupId":6416743,"channel":"","description":"In case you don\u2019t know the drill, SAP\u2019s biggest challenge of all is to funnel everything that\u2019s good and true and important to the company into CEO Bill McDermott\u2019s keynote. The process is simple \u2013 start with a blank sheet, put some ideas on paper, and then watch as the jostling, politicking, and pitching begins to fill out Bill\u2019s time on stage.","dateTimeMS":1465116960000,"title":"SAP\u2019s ginormous SAPPHIRE user conference/sales event","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=sap-s-ginormous-sapphire-user-conference-sales-event","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55109582,"orderField":0},{"dateTime":"Monday, Jun 6, 2016","urlTitle":"rocm-do-you-speak-my-language-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ben1.jpg","groupId":54930593,"channel":"","description":"The open-source ROCm stack offers several programming-language choices designed to give you a range of developer tools.","dateTimeMS":1465197240000,"title":"ROCm: Do You Speak My Language?","type":"article","subCategories":"","url":"/web/hsa-connections/content?g=54930593&type=article&urlTitle=rocm-do-you-speak-my-language-","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55125278,"orderField":0},{"dateTime":"Sunday, Jun 5, 2016","urlTitle":"invest-in-the-right-battery-markets-new-opportunities","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/he.png","groupId":54174376,"channel":"","description":"There are significant investment opportunities now in various battery markets. According to an IDTechEx Research report, Flexible, Printed and Thin Film Batteries 2016-2026: Technologies, Markets, Players , the total market for thin, flexible and printed batteries will reach $471 million by 2026.","dateTimeMS":1465114860000,"title":"Invest in the right battery markets: New opportunities","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=invest-in-the-right-battery-markets-new-opportunities","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55109503,"orderField":0},{"dateTime":"Wednesday, Jun 8, 2016","urlTitle":"informatica-s-dilemma-how-to-sell-the-un-platform-in-the-midst-of-today-s-platform-wars","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/Josh greenbaum.JPG","groupId":6416743,"channel":"","description":"It\u2019s now standard operating procedure at virtually every conference I attend: the execs on stage are talking about a disrupted digital future and how they can enable it to an audience that\u2019s pretty much focused on how their vendor can help them do a better job today: The future can wait.","dateTimeMS":1465375320000,"title":"Informatica\u2019s Dilemma: How To Sell the Un-Platform in the Midst of Today\u2019s Platform Wars","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=informatica-s-dilemma-how-to-sell-the-un-platform-in-the-midst-of-today-s-platform-wars","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55113521,"orderField":0},{"dateTime":"Tuesday, Jun 7, 2016","urlTitle":"analystperspectives-weekly-scan-covers-analyst-commentary-from-the-week-ending-may-27-2016-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"HP and CSC make plans to merge in the enterprise services sector. Read these analyst discussions and more.","dateTimeMS":1465285620000,"title":"AnalystPerspectives Weekly Scan covers analyst commentary from the week ending May 27, 2016.","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analystperspectives-weekly-scan-covers-analyst-commentary-from-the-week-ending-may-27-2016-","target":"_blank","peerReviewed":false,"subType":"","id":55111170,"orderField":0},{"dateTime":"Wednesday, Jun 8, 2016","urlTitle":"contested-ontologies-of-software-the-story-of-gottschalk-v-benson-1963-1972","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/06/W-man2016010023-100x100.jpg","groupId":53319,"channel":"","description":"The 1972 US Supreme Court case, Gottschalk v. Benson, helped formulate software patent law and revealed the philosophical underpinning of what constitutes a computer program.","dateTimeMS":1465408380000,"title":"Contested Ontologies of Software: The Story of Gottschalk v. Benson, 1963-1972","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=contested-ontologies-of-software-the-story-of-gottschalk-v-benson-1963-1972","target":"_blank","peerReviewed":false,"subType":"","id":55113150,"orderField":0},{"dateTime":"Wednesday, Jun 8, 2016","urlTitle":"understanding-complex-cloud-patterns","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/06/W-mcd2016010008-100x100.jpg","groupId":53319,"channel":"","description":"As the popularity of cloud computing increases, understanding these complex cloud architectures, how they work, and the value they're likely to bring becomes a fundamental challenge.","dateTimeMS":1465408440000,"title":"Understanding Complex Cloud Patterns","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=understanding-complex-cloud-patterns","target":"_blank","peerReviewed":false,"subType":"","id":55113177,"orderField":0},{"dateTime":"Wednesday, Jun 8, 2016","urlTitle":"evaluating-existing-strategies-to-limit-video-game-playing-time","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/06/W-mcg2016020047-100x100.jpg","groupId":53319,"channel":"","description":"Researchers examine the effectiveness of policies, such as those passed in China and South Korea, that mandate systems limiting the amount of time players spend in video games.","dateTimeMS":1465408440000,"title":"Evaluating Existing Strategies to Limit Video Game Playing Time","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=evaluating-existing-strategies-to-limit-video-game-playing-time","target":"_blank","peerReviewed":false,"subType":"","id":55113204,"orderField":0},{"dateTime":"Wednesday, Jun 8, 2016","urlTitle":"brain-mri-tumor-segmentation-with-3d-intracranial-structure-deformation-features","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/06/W-mex2016020066-100x100.jpg","groupId":53319,"channel":"","description":"To improve brain tumor segmentation accuracy, an improved feature extraction component is proposed that takes advantage of the correlation between intracranial structure deformation and compression from brain tumor growth.","dateTimeMS":1465408500000,"title":"Brain MRI Tumor Segmentation with 3D Intracranial Structure Deformation Features","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=brain-mri-tumor-segmentation-with-3d-intracranial-structure-deformation-features","target":"_blank","peerReviewed":false,"subType":"","id":55113231,"orderField":0},{"dateTime":"Wednesday, Jun 8, 2016","urlTitle":"ensembling-classifiers-for-detecting-user-intentions-behind-web-queries","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/06/W-mic2016020008-100x100.jpg","groupId":53319,"channel":"","description":"User intentions behind Web search queries are provided to a machine learning algorithm that learns from these examples and then can classify unseen user queries, improving user experience.","dateTimeMS":1465408860000,"title":"Ensembling Classifiers for Detecting User Intentions behind Web Queries","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=ensembling-classifiers-for-detecting-user-intentions-behind-web-queries","target":"_blank","peerReviewed":false,"subType":"","id":55113258,"orderField":0},{"dateTime":"Wednesday, Jun 8, 2016","urlTitle":"skin-the-next-user-interface","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/06/W-mco2016040083-100x100.jpg","groupId":53319,"channel":"","description":"Although there are numerous technical and ethical challenges, making sensors compatible with human skin has the potential to offer an unprecedented level of directness and expressiveness in mobile computing.","dateTimeMS":1465421580000,"title":"Skin\u2014The Next User Interface","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=skin-the-next-user-interface","target":"_blank","peerReviewed":false,"subType":"","id":55113542,"orderField":0},{"dateTime":"Wednesday, Jun 8, 2016","urlTitle":"addressing-negative-racial-and-gendered-experiences-that-discourage-academic-careers-in-engineering","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/06/W-mcs2016020029-100x100.jpg","groupId":53319,"channel":"","description":"A new approach is needed within graduate mentoring programs to address how race and gender experiences of students and scholars impact their choices to pursue an academic career.","dateTimeMS":1465421640000,"title":"Addressing Negative Racial and Gendered Experiences That Discourage Academic Careers in Engineering","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=addressing-negative-racial-and-gendered-experiences-that-discourage-academic-careers-in-engineering","target":"_blank","peerReviewed":false,"subType":"","id":55113569,"orderField":0},{"dateTime":"Wednesday, Jun 8, 2016","urlTitle":"why-they-just-don-t-get-it-communicating-about-architecture-with-business-stakeholders","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/06/W-mso2016030013-100x100.jpg","groupId":53319,"channel":"","description":"Using best practices for visual communication, IT architects can help architecture stakeholders in understanding, analysis, and discussion of complex IT concepts.","dateTimeMS":1465421640000,"title":"Why They Just Don't Get It: Communicating about Architecture with Business Stakeholders","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=why-they-just-don-t-get-it-communicating-about-architecture-with-business-stakeholders","target":"_blank","peerReviewed":false,"subType":"","id":55113596,"orderField":0},{"dateTime":"Wednesday, Jun 8, 2016","urlTitle":"dynnav-toward-open-and-interoperable-navigation-services","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/06/W-mit2016020035-100x100.jpg","groupId":53319,"channel":"","description":"Although navigation devices have thus far been proprietary and closed, the Open Mobile Alliance Dynamic Navigation Enabler lets developers create novel navigation services across different information providers.","dateTimeMS":1465421700000,"title":"DynNav: Toward Open and Interoperable Navigation Services","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=dynnav-toward-open-and-interoperable-navigation-services","target":"_blank","peerReviewed":false,"subType":"","id":55113723,"orderField":0},{"dateTime":"Wednesday, Jun 8, 2016","urlTitle":"knights-landing-second-generation-intel-xeon-phi-product","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/06/W-mmi2016020034-100x100.jpg","groupId":53319,"channel":"","description":"The architecture of Knights Landing, the second-generation Intel Xeon Phi product family, targets high-performance computing, providing a significant increase in scalar and vector performance.","dateTimeMS":1465421760000,"title":"Knights Landing: Second-Generation Intel Xeon Phi Product","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=knights-landing-second-generation-intel-xeon-phi-product","target":"_blank","peerReviewed":false,"subType":"","id":55113750,"orderField":0},{"dateTime":"Wednesday, Jun 8, 2016","urlTitle":"cleaning-up-web-2-0-s-security-mess-at-least-partly","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/06/W-msp2016020048-100x100.jpg","groupId":53319,"channel":"","description":"Because Web 2.0 applications often result in novel exploits, data leaks, or identity theft, the solution is to understand the attacks and assess how best to prevent them.","dateTimeMS":1465421760000,"title":"Cleaning up Web 2.0's Security Mess-at Least Partly","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=cleaning-up-web-2-0-s-security-mess-at-least-partly","target":"_blank","peerReviewed":false,"subType":"","id":55113777,"orderField":0},{"dateTime":"Wednesday, Jun 8, 2016","urlTitle":"increasing-computer-literacy-with-the-bbc-micro-bit","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/06/W-mpc2016020005-100x100.jpg","groupId":53319,"channel":"","description":"Realizing the value of understanding core computer science concepts, the UK is providing its schools with the BBC micro:bit, putting pervasive computing at the center of computer science education.","dateTimeMS":1465421820000,"title":"Increasing Computer Literacy with the BBC micro:bit","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=increasing-computer-literacy-with-the-bbc-micro-bit","target":"_blank","peerReviewed":false,"subType":"","id":55113804,"orderField":0},{"dateTime":"Wednesday, Jun 8, 2016","urlTitle":"selecting-interesting-image-regions-to-automatically-create-cinemagraph","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/06/W-mmu2016010072-100x100.jpg","groupId":53319,"channel":"","description":"Developers present a novel framework for automatically creating cinemagraphs from video sequences, with specific emphasis on determining the composition of masks and layers in creating aesthetically pleasing cinemagraphs.","dateTimeMS":1465421880000,"title":"Selecting Interesting Image Regions to Automatically Create Cinemagraph","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=selecting-interesting-image-regions-to-automatically-create-cinemagraph","target":"_blank","peerReviewed":false,"subType":"","id":55113884,"orderField":0},{"dateTime":"Wednesday, Jun 8, 2016","urlTitle":"loss-aware-switch-design-and-non-blocking-detection-algorithm-for-intra-chip","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/06/W-ttc2016061789-100x100.jpg","groupId":53319,"channel":"","description":"As the number of on-chip processor cores increases, power-efficient solutions are sought for data communication between cores. The Helix-h non-blocking photonic switch is developed to improve physical-layer and network performance parameters for a wide range of silicon nano-photonic multicore interconnection topologies.","dateTimeMS":1465421880000,"title":"Loss-Aware Switch Design and Non-Blocking Detection Algorithm for Intra-Chip","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=loss-aware-switch-design-and-non-blocking-detection-algorithm-for-intra-chip","target":"_blank","peerReviewed":false,"subType":"","id":55113904,"orderField":0},{"dateTime":"Wednesday, Jun 15, 2016","urlTitle":"happy-trails-to-you-salesforce-com-gets-in-front-of-the-platform-ecosystem-challenge-if-someone-were-to-write-the-the-tech-event-manager-s-guide-to-en","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/greenbaum1.jpg","groupId":6416743,"channel":"","description":"If someone were to write the \u201cThe Tech Event Manager\u2019s Guide to Engaging a Millennial Audience\u201d, a look at Salesforce.com\u2019s recent TrailheaDX conference would be a great place to start. Similarly, if someone wanted to write the \u201cPlatform Vendors\u2019 Guide to Building an Engaged Developer Audience\u201d, that same TrailheaDX conference would also serve as an excellent model.","dateTimeMS":1465983600000,"title":"Happy Trails to You: Salesforce.com","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=happy-trails-to-you-salesforce-com-gets-in-front-of-the-platform-ecosystem-challenge-if-someone-were-to-write-the-the-tech-event-manager-s-guide-to-en","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55121010,"orderField":0},{"dateTime":"Wednesday, Jun 15, 2016","urlTitle":"very-large-lithium-ion-batteries-becoming-widespread","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/circle1.png","groupId":54174376,"channel":"","description":"Very large lithium-ion (Li-ion) battery banks were largely unknown 10 years ago. Now, it is tough to keep up with the variety of uses for them. On ships, where there were no such batteries, we are starting to see 1-5 MWh banks. Autonomous underwater vehicles, mining trucks and buses can sport ones of up to 350 kWh but it is in stationary applications that really big facilities have arrived. Here there is a multiplier effect with Li-ion gaining market share in growth markets.","dateTimeMS":1465977660000,"title":"Very Large Lithium-Ion Batteries Becoming Widespread","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=very-large-lithium-ion-batteries-becoming-widespread","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55119056,"orderField":0},{"dateTime":"Thursday, Jun 16, 2016","urlTitle":"analystperspectives-weekly-s-37","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"As the amount of data continues to grow, the analyst discussions also continue. Here are some of the headlines you will find in the Data, Big Data & Digital Assets discussions.","dateTimeMS":1466068080000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-37","target":"_blank","peerReviewed":false,"subType":"","id":55121441,"orderField":0},{"dateTime":"Friday, Jun 17, 2016","urlTitle":"holoportation","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/holo.jpg","groupId":53319,"channel":"BIG DATA","description":"holoportation is a new type of 3D capture technology that allows high-quality 3D models of people to be reconstructed, compressed and transmitted anywhere in the world in real time. When combined with mixed reality displays such as HoloLens, this technology allows users to see, hear, and interact with remote participants in 3D as if they are actually present in the same physical space. Communicating and interacting with remote users becomes as natural as face-to-face communication.","dateTimeMS":1466157480000,"title":"holoportation","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=holoportation","target":"_blank","peerReviewed":false,"subType":"","id":55122879,"orderField":0},{"dateTime":"Monday, Jun 20, 2016","urlTitle":"creating-a-new-generation-of-computing-device","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/head.PNG","groupId":53319,"channel":"BIG DATA","description":"Quantum computing is a field of research that applies the principles of quantum physics and new directions in materials science to building a new type of computers that use quantum effects in computation. Beyond creating quantum computers, the field also includes studies of algorithms that such computers can execute.","dateTimeMS":1466458920000,"title":"Creating a new generation of computing device","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=creating-a-new-generation-of-computing-device","target":"_blank","peerReviewed":false,"subType":"","id":55125665,"orderField":0},{"dateTime":"Tuesday, Jun 21, 2016","urlTitle":"analyst-perspectiv-7","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"The big news this week is Microsoft\u2019s acquisition of LinkedIn. Here are analyst conversations regarding this development.","dateTimeMS":1466528940000,"title":"Analyst Perspectives","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-perspectiv-7","target":"_blank","peerReviewed":false,"subType":"","id":55126434,"orderField":0},{"dateTime":"Wednesday, Jun 22, 2016","urlTitle":"le-blueprint-c-est-moi-the-counter-customization-revolution-comes-to-sap","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/greenbaum1.jpg","groupId":6416743,"channel":"","description":"Sometimes revolutions start with a shot heard round the world, and sometimes they start with a quiet nudge in a new direction. The latter form of revolution was nudged into being for SAP\u2019s HR customers last April in the form of eight words uttered by Mike Ettling, the president of SAP SuccessFactors, during an analyst summit in San Francisco. Ettling\u2019s eight words have been said before, but the fact that they come from a man who is re-writing what it means to be a cloud company, and thereby what it means for customers to consume cloud services, adds enormous gravitas to the moment.","dateTimeMS":1466589180000,"title":"Le Blueprint, C\u2019est Moi: the Counter-Customization Revolution comes to SAP","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=le-blueprint-c-est-moi-the-counter-customization-revolution-comes-to-sap","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55134264,"orderField":0},{"dateTime":"Thursday, Jun 9, 2016","urlTitle":"finding-the-big-data-job-you-want","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/bigdata_sm.jpg","groupId":54960830,"channel":"","description":"For this ComputingEdge issue, we asked Martin Petitclerc, senior software architect for Watson Analytics at IBM Canada, about career opportunities in the expanding field of big data. Petitclerc is an expert in areas such as matrix, relational, and hybrid online analytical processing (OLAP); the OLAP calculation engine; and advanced analysis using data mining.","dateTimeMS":1465504380000,"title":"Finding the Big Data Job You Want","type":"article","subCategories":"","url":"/web/computing-careers/content?g=54960830&type=article&urlTitle=finding-the-big-data-job-you-want","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55131916,"orderField":0},{"dateTime":"Thursday, Jun 23, 2016","urlTitle":"ito-alternatives-light-at-the-end-of-the-tunnel","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/mkt1.jpg","groupId":54174376,"channel":"","description":"The Transparent Conductive Industry (TCF) industry has recently experienced sluggish growth. The industry has transitioned from being supply-limited to being commoditized and demand-limited with supply currently outstripping demand. This is a commonplace characteristic of supply industry into consumer electronic devices: there is often a scramble for supplies as demand rapidly takes off but the industry soon over-invests, the capacity overshoots demand, and competition renders the component a commodity.","dateTimeMS":1466711580000,"title":"ITO ALTERNATIVES: LIGHT AT THE END OF THE TUNNEL","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=ito-alternatives-light-at-the-end-of-the-tunnel","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55138401,"orderField":0},{"dateTime":"Friday, Jun 24, 2016","urlTitle":"hsa-1-1-specification-bringing-heterogeneous-computing-to-wide-array-of-platforms","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/hsa.jpg","groupId":54930593,"channel":"","description":"Today's systems-on-chips (SoCs) are complicated amalgamations of multiple components such as CPUs, GPUs, DSPs, FPGAs, fabrics and fixed-function accelerators. Within each SoC, various open and proprietary IP blocks are integrated into one singular environment. Tying these unique components together into one streamlined SoC requires multiple (and distinct) toolchains, profiling methods and debug tools.","dateTimeMS":1466759880000,"title":"HSA 1.1 Specification Bringing Heterogeneous Computing to Wide Array of Platforms","type":"article","subCategories":"","url":"/web/hsa-connections/content?g=54930593&type=article&urlTitle=hsa-1-1-specification-bringing-heterogeneous-computing-to-wide-array-of-platforms","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55134284,"orderField":0},{"dateTime":"Monday, Jun 27, 2016","urlTitle":"devops-practice","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ebert-thumb.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"DevOps is an organizational shift where instead of distributed silo-like functions cross-functional teams work on continuous operational feature deliveries. Teams thus deliver value in a faster and continuous way, reducing problems generated by miscommunication between team members and enhancing a faster resolution of problems. It obviously means a culture shift towards collaboration between development, quality assurance and operations. At Vector we have supported a number of companies on improving efficiency with DevOps and continuous delivery. Here a brief case study from a domain with high safety and security requirements.","dateTimeMS":1467052500000,"title":"DevOps Practice","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=devops-practice","target":"_blank","peerReviewed":false,"subType":"","id":55139342,"orderField":0},{"dateTime":"Tuesday, Jun 28, 2016","urlTitle":"the-internet-of-things-iot-and-the-enterprise-the-future-today","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/greenbaum1.jpg","groupId":6416743,"channel":"","description":"The opportunities for IoT innovation abound. The ability, for example, to optimize the angle of the blades of a wind turbine in real time, or identify and track the contents of a pallet of parts as it moves through the supply chain, will change the underlying operations of every industry and every individual in ways that are only now beginning to be understood.","dateTimeMS":1467107580000,"title":"The Internet of Things (IoT) and the Enterprise: The Future Today","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=the-internet-of-things-iot-and-the-enterprise-the-future-today","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55139182,"orderField":0},{"dateTime":"Wednesday, Jun 29, 2016","urlTitle":"analystperspectives-weekly-s-38","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analyst7.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending June 24, 2016. \nWith Brexit events, analysts discuss possible effects.","dateTimeMS":1467192780000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-38","target":"_blank","peerReviewed":false,"subType":"","id":55140137,"orderField":0},{"dateTime":"Thursday, Jun 30, 2016","urlTitle":"driverless-cars-are-coming-a-paradigm-shift","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/neal.jpg","groupId":7989281,"channel":"","description":"An MIT study predicted last year that shared, self-driving cars may take so many vehicles off the road \u2013 perhaps 80% of them \u2013 that a new class of \u2018exurbs\u2019 in the U.S. may spring up within a decade.\n\n\u201cWith fewer cars, much of this space could be freed for other uses. Such reduction in car numbers would also dramatically lower the cost (and related energy consumption) of building and maintaining roads,\u201d said MIT\u2019s Matthew Claudel and Carlo Ratti. One engineering study, they noted, found that automation could quadruple capacity on any given highway \u2013 and fewer cars translate to less noise and a small environmental impact.\n\nThese self-driving vehicles will eventually blur the lines between public/private transportation modes.","dateTimeMS":1467279780000,"title":"Driverless Cars Are Coming \u2013 a Paradigm Shift","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=driverless-cars-are-coming-a-paradigm-shift","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55140791,"orderField":0},{"dateTime":"Friday, Aug 31, 2012","urlTitle":"global-software-engineering","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5954967.png","groupId":5954967,"channel":"","description":"Companies in IT and software business will fail if they don\u2019t master global software engineering. Prestigious journal Harvard Business Manager recently wrote that outsourcing with global IT services and software development ranks as one of the top business ideas of the past 100 years.","dateTimeMS":1346433300000,"title":"Global Software Engineering","type":"blogpost","subCategories":"","url":"/web/software-technologies/content?g=5954967&type=blogpost&urlTitle=global-software-engineering","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":5958634,"orderField":0},{"dateTime":"Sunday, Feb 24, 2013","urlTitle":"defining-cloud-computing","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5970564.png","groupId":5970564,"channel":"","description":"Cloud computing (CC) allows pay-per-use or charge-per-use access to applications, software development and deployment environments, and computing infrastructure. It provides optimized and efficient computing through enhanced collaboration, agility, scalability...","dateTimeMS":1361725200000,"title":"Defining Cloud Computing","type":"blogpost","subCategories":"","url":"/web/irena-bojanova/content?g=5970564&type=blogpost&urlTitle=defining-cloud-computing","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":5970943,"orderField":0},{"dateTime":"Friday, Oct 12, 2012","urlTitle":"better-estimation-means-better-projects","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5954967.png","groupId":5954967,"channel":"","description":"Estimating size or resources is one of the most important topics in software engineering and IT. You will not deliver according to expectations, if you don\u2019t plan. And, you cannot plan if you don\u2019t know the underlying dependencies and estimates.","dateTimeMS":1350053100000,"title":"Better Estimation Means Better Projects","type":"blogpost","subCategories":"","url":"/web/software-technologies/content?g=5954967&type=blogpost&urlTitle=better-estimation-means-better-projects","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":6159916,"orderField":0},{"dateTime":"Monday, Nov 19, 2012","urlTitle":"disaster-recovery-in-the-wake-of-hurricane-sandy:-a-personal-account","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"MOBILE","description":"First, let me set the record straight: I have not suffered (much) as a result of Hurricane Sandy. My story is about minor inconveniences and life disrupted in subtle ways \u2013 nothing as compared to the many folks who have truly suffered: loss of homes, health, livelihood, and even loved ones. To them all I wish a speedy return to safe shelter, dry clothes, hot food, and a warm bed.\n\nIt is a brief and inconsequential personal account and observation on a) the lack of preparedness in modern life for the breakdown of modern life as we know it, and b) the brilliant performance during the disaster and its aftermath of that little portable SoMoClo™ endpoint, the smartphone.","dateTimeMS":1353346800000,"title":"Disaster Recovery in the Wake of Hurricane Sandy: A Personal Account","type":"blogpost","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=blogpost&urlTitle=disaster-recovery-in-the-wake-of-hurricane-sandy%3A-a-personal-account","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":6405193,"orderField":0},{"dateTime":"Friday, Nov 23, 2012","urlTitle":"when-will-you-pay-back-your-technical-debt-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5954967.png","groupId":5954967,"channel":"","description":"Debt is bad. We hear this simple rule from parents when they educate their children on the proper use of money, from politicians when they try to control economy, and of course from our managers when we try to sell a proposal which needs investment. Expenses should be done from our earned money. On the other hand, success often stems from borrowed money. Apple was started in 1976 with borrowed money from an Intel executive. Later Steve Jobs borrowed millions from Bill Gates to turn around the loss-making Apple. There seems to be good and bad debt.","dateTimeMS":1353697200000,"title":"When Will You Pay Back Your Technical Debt?","type":"blogpost","subCategories":"","url":"/web/software-technologies/content?g=5954967&type=blogpost&urlTitle=when-will-you-pay-back-your-technical-debt-","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":6725197,"orderField":0},{"dateTime":"Monday, Jan 21, 2013","urlTitle":"bridging-the-twin-peaks-winning-with-requirements-and-architecture","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5954967.png","groupId":5954967,"channel":"","description":"Requirements and architecture of any system thus are highly interdependent. Projects without early architecture evaluation will overlook critical requirements. They will fail in prioritizing requirements. They face budget overruns and rework due to inappropriate and late design changes. This blog looks how to bridge the twin peaks of requirements and architecture.","dateTimeMS":1358792220000,"title":"Bridging the Twin Peaks - Winning with Requirements and Architecture","type":"blogpost","subCategories":"","url":"/web/software-technologies/content?g=5954967&type=blogpost&urlTitle=bridging-the-twin-peaks-winning-with-requirements-and-architecture","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7122465,"orderField":0},{"dateTime":"Friday, Feb 15, 2013","urlTitle":"happy-sailing","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"Call me Ray. Some years ago - never mind how long precisely - having little or no IT knowledge, and nothing particular to interest me, I thought I would take up a programming language. It is a way I have of...","dateTimeMS":1360956420000,"title":"Happy Sailing","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=happy-sailing","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7187493,"orderField":0},{"dateTime":"Tuesday, Feb 19, 2013","urlTitle":"data-modeling","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"The importance of Data Modeling","dateTimeMS":1361283120000,"title":"Data Modeling","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=data-modeling","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7191739,"orderField":0},{"dateTime":"Monday, Feb 25, 2013","urlTitle":"business-intelligence-and-big-data-part-i","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"Business Intelligence","dateTimeMS":1361800920000,"title":"Business Intelligence and Big Data - Part I","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=business-intelligence-and-big-data-part-i","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7203618,"orderField":0},{"dateTime":"Monday, Feb 25, 2013","urlTitle":"business-intelligence-and-big-data-part-ii","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"Business Intelligence and Big Data","dateTimeMS":1361802000000,"title":"Business Intelligence and Big Data - Part II","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=business-intelligence-and-big-data-part-ii","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7203633,"orderField":0},{"dateTime":"Tuesday, Mar 5, 2013","urlTitle":"web-application-security","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"A blog entry about web application security best practices.","dateTimeMS":1362486900000,"title":"Web Application Security","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=web-application-security","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7268184,"orderField":0},{"dateTime":"Friday, Mar 8, 2013","urlTitle":"mastering-functional-safety","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5954967.png","groupId":5954967,"channel":"SOFTWARE ENGINEERING","description":"We increasingly rely on complex electronic functions to ensure functional safety. These functions are realized by systems of sensors, actuators and interconnected electronic control units. To mitigate product liability risks associated with such systems as well as to ensure the high level of quality under varying operational conditions, significant improvements to engineering processes are necessary. This blog shows how to master functional safety.","dateTimeMS":1362759660000,"title":"Mastering Functional Safety","type":"blogpost","subCategories":"","url":"/web/software-technologies/content?g=5954967&type=blogpost&urlTitle=mastering-functional-safety","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7284741,"orderField":0},{"dateTime":"Monday, Mar 11, 2013","urlTitle":"big-data-processing-pipeline-&-challenges-infographic","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"An infographic on Big Data processing stages and challenges associated with each stage.","dateTimeMS":1363004940000,"title":"Big Data Processing Pipeline & Challenges Infographic","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=big-data-processing-pipeline-%26-challenges-infographic","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7290120,"orderField":0},{"dateTime":"Monday, Mar 25, 2013","urlTitle":"internet-of-things-and-big-data","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"Challenges of technology and privacy with IoT data","dateTimeMS":1364229360000,"title":"Internet of Things and Big Data","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=internet-of-things-and-big-data","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7316404,"orderField":0},{"dateTime":"Friday, Mar 29, 2013","urlTitle":"top-3-web-applications-security-threats-infographic","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"Top 3 Web Applications security threats and some advise as how to prevent or minimize their impacts.","dateTimeMS":1364584560000,"title":"Top 3 Web Applications Security Threats Infographic","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=top-3-web-applications-security-threats-infographic","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7327817,"orderField":0},{"dateTime":"Wednesday, Apr 10, 2013","urlTitle":"evaluating-initial-cloud-risks","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5970564.png","groupId":5970564,"channel":"","description":"The stages of the Cloud follow the evolution of sharing on the Internet: networking, network sharing, information sharing, resources sharing, and services sharing.","dateTimeMS":1365595200000,"title":"Evaluating Initial Cloud Risks","type":"blogpost","subCategories":"","url":"/web/irena-bojanova/content?g=5970564&type=blogpost&urlTitle=evaluating-initial-cloud-risks","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7341010,"orderField":0},{"dateTime":"Monday, Apr 8, 2013","urlTitle":"information-security:-risk-assessment-&-management","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"Information security is a 2 step process of risk assessment and risk management.","dateTimeMS":1365427020000,"title":"Information Security: Risk Assessment & Management","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=information-security%3A-risk-assessment-%26-management","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7344424,"orderField":0},{"dateTime":"Wednesday, Apr 24, 2013","urlTitle":"understanding-multi-tenancy-i","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5970564.png","groupId":5970564,"channel":"","description":"NIST has defined five essential cloud characteristics: on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service.","dateTimeMS":1366804800000,"title":"Understanding Multi-Tenancy I","type":"blogpost","subCategories":"","url":"/web/irena-bojanova/content?g=5970564&type=blogpost&urlTitle=understanding-multi-tenancy-i","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7360737,"orderField":0},{"dateTime":"Friday, May 3, 2013","urlTitle":"understanding-multi-tenancy-ii","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5970564.png","groupId":5970564,"channel":"","description":"Continuing our discussion on multi-tenancy, note that Gartner places multi-tenancy close to the peak of expectations in the Hype Cycle for Cloud Computing, shown on Figure 1.","dateTimeMS":1367582400000,"title":"Understanding Multi-Tenancy II","type":"blogpost","subCategories":"","url":"/web/irena-bojanova/content?g=5970564&type=blogpost&urlTitle=understanding-multi-tenancy-ii","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7372830,"orderField":0},{"dateTime":"Friday, Apr 26, 2013","urlTitle":"fighting-terror-with-predictive-analytics","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"Using predictive analytics to predict and prevent terrorism","dateTimeMS":1366993380000,"title":"Fighting Terror with Predictive Analytics","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=fighting-terror-with-predictive-analytics","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7375302,"orderField":0},{"dateTime":"Wednesday, May 8, 2013","urlTitle":"bob-metcalfe:-ethernet-at-forty","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/53319.png","groupId":53319,"channel":"NETWORKING","description":"Audio Podcast - Bob Metcalfe: Ethernet at Forty Author Charles Severance provides an audio recording of his Computing Conversations column, in which he discusses his interview with Bob Metcalfe about how the Ethernet local area network was created 40 years ago at Xerox Palo Alto Research Center","dateTimeMS":1368002340000,"title":"Bob Metcalfe: Ethernet at Forty","type":"podcast","subCategories":"","url":"/web/computingnow/content?g=53319&type=podcast&urlTitle=bob-metcalfe%3A-ethernet-at-forty","target":"_self","peerReviewed":false,"subType":"PODCAST","id":7405157,"orderField":0},{"dateTime":"Friday, May 10, 2013","urlTitle":"exploring-service-model-architecture","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5970564.png","groupId":5970564,"channel":"","description":"NIST lists three cloud service models: Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS) (please see the \"As discussed in the Defining Cloud Computing\" post and Figure 1).","dateTimeMS":1368192840000,"title":"Exploring Service Model Architecture","type":"blogpost","subCategories":"","url":"/web/irena-bojanova/content?g=5970564&type=blogpost&urlTitle=exploring-service-model-architecture","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7409690,"orderField":0},{"dateTime":"Monday, May 20, 2013","urlTitle":"addressing-cloud-security","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5970564.png","groupId":5970564,"channel":"","description":"Understanding cloud security risks is related to understanding the relationships and dependencies between cloud computing models. IaaS forms the foundation of the service model architecture, PaaS builds upon IaaS, and SaaS in turn builds upon PaaS; and information security issues and risks are inherited just as capabilities are.","dateTimeMS":1369066320000,"title":"Addressing Cloud Security","type":"blogpost","subCategories":"","url":"/web/irena-bojanova/content?g=5970564&type=blogpost&urlTitle=addressing-cloud-security","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7425131,"orderField":0},{"dateTime":"Thursday, Jun 20, 2013","urlTitle":"cloud-interoperability-and-portability","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5970564.png","groupId":5970564,"channel":"","description":"Interoperability and portability are closely related to the previously discussed Cloud elasticity and multi-tenancy. Any IaaS to SaaS cloud-implemented system should have as design goals both interoperability and portability to fully gain the benefits of the Cloud elastic environment. Although interoperability and portability are not unique for cloud and the related security aspects did not emerge with cloud computing, multi-tenancy (where data and applications of different customers/companies share platforms, storage, networks) brings the need of greater precautions than those required for traditional processing models.","dateTimeMS":1371729600000,"title":"Cloud Interoperability and Portability","type":"blogpost","subCategories":"","url":"/web/irena-bojanova/content?g=5970564&type=blogpost&urlTitle=cloud-interoperability-and-portability","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7487285,"orderField":0},{"dateTime":"Monday, Jul 1, 2013","urlTitle":"measuring-productivity","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5954967.png","groupId":5954967,"channel":"SOFTWARE ENGINEERING","description":"You cannot control what you cannot measure. This holds especially for software productivity, where many companies struggle how to measure and improve it. Often we in software and IT fail to understand that productivity relates to delivering value \u2013 as opposed to collecting features and increasing complexity. This blog will provide some guidance and hints for measuring productivity. Let me know of any further question or stimulus arising from this blog.","dateTimeMS":1372685940000,"title":"Measuring Productivity","type":"blogpost","subCategories":"","url":"/web/software-technologies/content?g=5954967&type=blogpost&urlTitle=measuring-productivity","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7510165,"orderField":0},{"dateTime":"Thursday, Jul 25, 2013","urlTitle":"cloud-interoperability-and-portability-ii","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5970564.png","groupId":5970564,"channel":"","description":"Being locked-in by a cloud provider is not what customers plan to experience. So, let\u2019s explore a bit more on the cloud portability and interoperability topic. The Open Cloud Manifesto explains data and applications interoperability and portability","dateTimeMS":1374753600000,"title":"Cloud Interoperability and Portability II","type":"blogpost","subCategories":"","url":"/web/irena-bojanova/content?g=5970564&type=blogpost&urlTitle=cloud-interoperability-and-portability-ii","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7537820,"orderField":0},{"dateTime":"Friday, Jul 26, 2013","urlTitle":"working-with-hadoop-:-a-practical-guide-\u2013-part-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"Part I of a practical experience with Hadoop. First the architecture.","dateTimeMS":1374863220000,"title":"Working with Hadoop : A practical Guide \u2013 Part 1","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=working-with-hadoop-%3A-a-practical-guide-%E2%80%93-part-1","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7552930,"orderField":0},{"dateTime":"Friday, Aug 2, 2013","urlTitle":"working-with-hadoop:-a-practical-guide-\u2013-part-2","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"Part two of working with Hadoop: its 2 components, HDFS and MapReduce, my choice distribution and online resources.","dateTimeMS":1375453200000,"title":"Working with Hadoop: A practical Guide \u2013 Part 2","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=working-with-hadoop%3A-a-practical-guide-%E2%80%93-part-2","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7566367,"orderField":0},{"dateTime":"Thursday, Aug 8, 2013","urlTitle":"cloud-interoperability-and-federation","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5970564.png","groupId":5970564,"channel":"","description":"Clouds today do not interoperate, resulting in absolute limitations in geographical coverage, resource functionality, and resource scalability. A cloud provider may not have resources where a cloud consumer needs them; a cloud provider may not offer the type of resource needed; and a cloud provider's resources cannot be infinitely elastic.","dateTimeMS":1375963200000,"title":"Cloud Interoperability and Federation","type":"blogpost","subCategories":"","url":"/web/irena-bojanova/content?g=5970564&type=blogpost&urlTitle=cloud-interoperability-and-federation","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7567139,"orderField":0},{"dateTime":"Thursday, Aug 15, 2013","urlTitle":"infor-who-name-recognition-is-the-name-of-the-game","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"INSIGHTS","description":"The renaissance of Infor continues apace, with more customers, more partners, more products, more cloud functionality, more go-lives. Pretty much by every measure, the company CEO Charles Phillips calls \"the world's largest startup\" continues to improve its market profile across the board.","dateTimeMS":1376568000000,"title":"Infor Who? Name Recognition is the Name of the Game","type":"blogpost","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=blogpost&urlTitle=infor-who-name-recognition-is-the-name-of-the-game","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7597191,"orderField":0},{"dateTime":"Tuesday, Aug 13, 2013","urlTitle":"working-with-hadoop:-a-practical-guide-\u2013-part-3","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"Installation and configuration of Cloudera's management server and clients.","dateTimeMS":1376419200000,"title":"Working with Hadoop: A practical Guide \u2013 Part 3","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=working-with-hadoop%3A-a-practical-guide-%E2%80%93-part-3","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7598125,"orderField":0},{"dateTime":"Monday, Aug 19, 2013","urlTitle":"working-with-hadoop:-a-practical-guide-\u2013-part-4","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"Hardware recommendations for your cluster & Hadoop's physical architecture explained","dateTimeMS":1376930400000,"title":"Working with Hadoop: A Practical Guide \u2013 Part 4","type":"podcast","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=podcast&urlTitle=working-with-hadoop%3A-a-practical-guide-%E2%80%93-part-4","target":"_self","peerReviewed":false,"subType":"PODCAST","id":7607545,"orderField":0},{"dateTime":"Friday, Aug 30, 2013","urlTitle":"working-with-hadoop:-part-5","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"Hadoop important files and commands","dateTimeMS":1377888600000,"title":"Working with Hadoop: Part 5","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=working-with-hadoop%3A-part-5","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7628804,"orderField":0},{"dateTime":"Friday, Sep 6, 2013","urlTitle":"native-apps-vs-html5-responsive-design:-a-diversion-of-sorts","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"HTML vs. iOS Native Apps: What makes more sense?","dateTimeMS":1378490400000,"title":"Native Apps vs. HTML5/Responsive Design: A diversion of sorts","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=native-apps-vs-html5-responsive-design%3A-a-diversion-of-sorts","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7637865,"orderField":0},{"dateTime":"Friday, Oct 11, 2013","urlTitle":"working-with-hadoop:-a-practical-guide-\u2013-part-6","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"Configuring Hadoop for a single node experiment","dateTimeMS":1381503660000,"title":"Working with Hadoop: A practical Guide \u2013 Part 6","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=working-with-hadoop%3A-a-practical-guide-%E2%80%93-part-6","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7710072,"orderField":0},{"dateTime":"Tuesday, Oct 15, 2013","urlTitle":"advancing-with-lifecycle-management","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5954967.png","groupId":5954967,"channel":"SOFTWARE ENGINEERING","description":"Rising cost pressure is forcing manufacturers and their suppliers to jointly and consistently master product development. Product and application life-cycle management (PLM and ALM) is the primary mechanism for integrating engineering processes, tools and people across the domains of system, software, hardware and mechanical engineering. This blog will provide some guidance and hints for successfully introducing PLM and ALM. Let me know of any further question or stimulus arising from this blog.","dateTimeMS":1381825500000,"title":"Advancing with Lifecycle Management","type":"blogpost","subCategories":"","url":"/web/software-technologies/content?g=5954967&type=blogpost&urlTitle=advancing-with-lifecycle-management","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7712627,"orderField":0},{"dateTime":"Tuesday, Nov 5, 2013","urlTitle":"cloud-computing-in-research-and-education","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5970564.png","groupId":5970564,"channel":"","description":"Cloud computing has huge potential to accelerate research, enhance collaboration, and enrich education. Educators, research administrators, IT directors, and research should realize and leverage cloud\u2019s potential in research, teaching, and learning. They can complement their current in-house cyberinfrastructure by deploying public, private, or hybrid clouds. In fact, as a recent survey reveals, some are already benefiting by embracing the clouds.","dateTimeMS":1383666300000,"title":"Cloud Computing in Research and Education","type":"blogpost","subCategories":"","url":"/web/irena-bojanova/content?g=5970564&type=blogpost&urlTitle=cloud-computing-in-research-and-education","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7748747,"orderField":0},{"dateTime":"Wednesday, Nov 6, 2013","urlTitle":"dynamic-microsoft:-from-ubiquitous-in-the-enterprise-to-truly-strategic","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"SOFTWARE ENGINEERING","description":"Last summer\u2019s reorganization at Microsoft didn\u2019t look good for Microsoft Dynamics, at least on paper. The enterprise software group was barely mentioned in outgoing CEO Steve Ballmer\u2019s letter to his staff, and the position of Dynamics head Kirill Tatarinov looked uncomfortably tenuous in a reorg that seemed to all but shout that Dynamics would be sold off to the highest bidder at the first opportunity. \nBefore I wrote this post, I had a chance to talk to Kirill, who told me I was 180 degrees off the mark. At last week\u2019s Dynamics Analyst summit, Kirill and his team proved their case. And then some.","dateTimeMS":1383732000000,"title":"Dynamic Microsoft: From Ubiquitous in the Enterprise to Truly Strategic","type":"blogpost","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=blogpost&urlTitle=dynamic-microsoft%3A-from-ubiquitous-in-the-enterprise-to-truly-strategic","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7752322,"orderField":0},{"dateTime":"Wednesday, Nov 13, 2013","urlTitle":"too-big-to-fail-how-about-too-big-to-succeed-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"INSIGHTS","description":"Achieving economies of scale is one of the axioms of modern business, a driver for mergers and acquisitions across all industries. This relatively simple concept helped drive a huge swath of industrial companies to impressive degrees of success: in many cases, buying at massive scale, building at massive scale, and delivering at massive scale has helped drive up revenues and profits, improve market share and share price, and improve share of wallet in accounts large and small. \nBut does this drive to bulk up always work as well as its proponents \u2013 many of whom are all too often conflicted by the huge fees they and their companies stand to gain in the M&A business \u2013 would have us believe? And what about the customers supposedly at the center of these transactions \u2013 is there anything in it for them?","dateTimeMS":1384336800000,"title":"Too Big to Fail? How about Too Big to Succeed?","type":"podcast","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=podcast&urlTitle=too-big-to-fail-how-about-too-big-to-succeed-","target":"_self","peerReviewed":false,"subType":"PODCAST","id":7762786,"orderField":0},{"dateTime":"Friday, Dec 13, 2013","urlTitle":"one-opentext:-e-pluribus-unum-enterprise-software-style","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"NETWORKING","description":"It\u2019s becoming the latest trend in enterprise software company evolution. After years of merger and acquisition, in which dozens of products and thousands of customers were dumped helter-skelter into a single corporate bucket, yet another agglomeration of disparate products, services, and technologies is trying to rationalize its offerings.\nThis time the company is OpenText, and the rationalized product set is code-named Red Oxygen, a collection of five suites of functionality that span search, analytics, archiving, publishing and presentment, social collaboration, process management, integration, content management, and a development and deployment platform.","dateTimeMS":1386929340000,"title":"One OpenText: E Pluribus Unum, Enterprise Software Style","type":"blogpost","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=blogpost&urlTitle=one-opentext%3A-e-pluribus-unum-enterprise-software-style","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7837496,"orderField":0},{"dateTime":"Wednesday, Jan 8, 2014","urlTitle":"with-friends-like-these\u2026-uncovering-responsibility-in-avon\u2019s-rollout-failure","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"INSIGHTS","description":"\u201cVictory has many fathers. Defeat is an orphan\u201d. President John Fitzgerald Kennedy, on the Bay of Pigs Fiasco\nIt\u2019s great line, and one that popular culture has changed to success has many fathers and failure is an orphan. JFK\u2019s line is a stirring example of a leader taking ultimate responsibility for what happened under his watch. But the truth, which any student of the art of failure knows well, is that it takes as many people to kill an undertaking as it does to make it succeed.","dateTimeMS":1389186000000,"title":"With Friends Like These\u2026. Uncovering Responsibility in Avon\u2019s Rollout Failure","type":"podcast","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=podcast&urlTitle=with-friends-like-these%E2%80%A6-uncovering-responsibility-in-avon%E2%80%99s-rollout-failure","target":"_self","peerReviewed":false,"subType":"PODCAST","id":7877061,"orderField":0},{"dateTime":"Wednesday, Jan 15, 2014","urlTitle":"the-new-year-in-sap-land:-selling-customer-success-part-i-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"MOBILE","description":"I\u2019ve realized recently that despite everything we analysts do and say about enterprise software company strategies, new products and technologies, trends, and all the other coins of the analyst realm, what matters most is how the sales force sells. If the field sales force can\u2019t get in front of the right influencer at the right time with the right mix of product and strategy, then every analysis, recommendation, critique and consulting gig geared towards fine tuning go-to-market strategies quickly goes to hell in a hand basket. The bottom line is no go-to-market strategy is so perfect that it can\u2019t die an ignominious death in the field.","dateTimeMS":1389780000000,"title":"The New Year in SAP-land: Selling Customer Success (Part I)","type":"podcast","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=podcast&urlTitle=the-new-year-in-sap-land%3A-selling-customer-success-part-i-","target":"_self","peerReviewed":false,"subType":"PODCAST","id":7898738,"orderField":0},{"dateTime":"Friday, Jan 17, 2014","urlTitle":"the-new-year-in-sap-land:-selling-customer-success-part-ii-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"BIG DATA","description":"Where we last left off, I was admonishing the SAP field to greater glory around the theme of customer success. Here\u2019s the rest of my letter to the SAP field: \n\nSell Value, Not Platforms: Now I\u2019m going to probably get yelled again by some of your execs, but trust me, there are going to be very few customers who see you walking in the door trying to sell a massive platform reboot and sob with relief at the prospect.","dateTimeMS":1389952800000,"title":"The New Year in SAP-land: Selling Customer Success (Part II)","type":"blogpost","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=blogpost&urlTitle=the-new-year-in-sap-land%3A-selling-customer-success-part-ii-","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7914815,"orderField":0},{"dateTime":"Monday, Feb 3, 2014","urlTitle":"cloud-computing-what-s-next-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5970564.png","groupId":5970564,"channel":"","description":"Cloud computing is no longer on the horizon; it\u2019s already here in a big way. Governments, business, industry, and individuals are increasingly using cloud computing for their information processing, and computational and developmental needs. They have begun to realize several benefits of cloud computing, including pay for the use, quick deployment of applications, variety of offerings from several cloud service providers, enhanced collaboration, agility, scalability, and availability.","dateTimeMS":1391409480000,"title":"Cloud Computing - What's Next?","type":"podcast","subCategories":"","url":"/web/irena-bojanova/content?g=5970564&type=podcast&urlTitle=cloud-computing-what-s-next-","target":"_self","peerReviewed":false,"subType":"PODCAST","id":7957431,"orderField":0},{"dateTime":"Monday, Feb 10, 2014","urlTitle":"satya-nadella-ceo:-good-news-for-microsoft-dynamics-bad-news-for-the-competition","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"CLOUD","description":"The ascendency of Satya Nadella to the top spot at Microsoft is welcome news to a wide range of internal and external stakeholders. He\u2019s an insider who knows not just where the skeletons are buried, but, more importantly, where the gemstones are buried too.","dateTimeMS":1392030780000,"title":"Satya Nadella, CEO: Good News for Microsoft Dynamics, Bad News for the Competition","type":"blogpost","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=blogpost&urlTitle=satya-nadella-ceo%3A-good-news-for-microsoft-dynamics-bad-news-for-the-competition","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7965685,"orderField":0},{"dateTime":"Tuesday, Feb 18, 2014","urlTitle":"prime-time-for-wearable-devices-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7989281.png","groupId":7989281,"channel":"MOBILE","description":"Welcome to NealNotes; this is my inaugural blog post. Not exactly Proustian prose, but there you have it \u2013 short/succinct. Going forward, I\u2019ll comment on various technology trends/issues/ideas, in short, whatever techles my fancy (sorry, inveterate punster too, even when borderline like that one).\nUnless you have successfully disengaged yourself from every conceivable 21st Century communications device, you\u2019ve probably been hearing a lot about wearable devices \u2013 that they\u2019re the next big trend/revolution/most stupendous technological invention since the cotton gin, ad nauseum.\nWell, not quite, but wearable devices were yakked about incessantly at CES 2014 last month and the overall buzz is getting louder.","dateTimeMS":1392759180000,"title":"Prime Time for Wearable Devices?","type":"blogpost","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=blogpost&urlTitle=prime-time-for-wearable-devices-","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8002705,"orderField":0},{"dateTime":"Thursday, Feb 20, 2014","urlTitle":"testing-training-succeeding\u2026-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"SOFTWARE ENGINEERING","description":"There are many nerdy little corners of enterprise software that don\u2019t get the big buzz effect of overly hyped concepts like \u201csocial\u201d and \u201cmobile\u201d, but never let inattention lure you into complacency. There are many factors that lead to project success or failure, and some of the more nerdy are in fact much more relevant to overall enterprise success than giving away iPads to your salespeople or trying to foist some collaboration software on an un-collaborative workforce.","dateTimeMS":1392887400000,"title":"Testing, Training, Succeeding\u2026.","type":"blogpost","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=blogpost&urlTitle=testing-training-succeeding%E2%80%A6-","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8005546,"orderField":0},{"dateTime":"Tuesday, Mar 11, 2014","urlTitle":"the-windows-phone-dilemma:-are-crapps-all-that-matter-or-can-dynamics-help-save-microsoft\u2019s-7-billion-nokia-bet-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"MOBILE","description":"It\u2019s almost ironic that using a Windows 8 phone is actually a major geek credential \u2013 albeit geek more in the mold of driving a DeLorean than tooling around in a state of the art Tesla. But as a Windows 8 phone user for the past five months, I can say that no one notices these days when you have a new iPhone, but running around with a Windows 8 phone certainly draws comment, a good deal of it polite, if not positive. Perceptions aside, my Nokia 928 and its software are a pretty damn good tool for work, and as a business tool it\u2019s pretty much on par with my old iPhone \u2013 albeit not a perfect one. And, if you put the larger form factor of the Nokia product line into the equation, the extra real-estate makes a huge difference in my day to day work and consumer life.","dateTimeMS":1394558940000,"title":"The Windows Phone Dilemma: Are Crapps All that Matter, or Can Dynamics Help Save Microsoft\u2019s $7 billion Nokia bet?","type":"blogpost","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=blogpost&urlTitle=the-windows-phone-dilemma%3A-are-crapps-all-that-matter-or-can-dynamics-help-save-microsoft%E2%80%99s-7-billion-nokia-bet-","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8058859,"orderField":0},{"dateTime":"Tuesday, Mar 11, 2014","urlTitle":"traceability","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5954967.png","groupId":5954967,"channel":"SOFTWARE ENGINEERING","description":"Ever corrected a problem and introduced two new defects? Introduced a last-minute change and accidentally removed an important feature? Growing governance concerns demand traceability between needs and solutions to preserve work product integrity. Traceability facilitates maintainability and dramatically reduces cost of rework. However without the right methodology and technology, traceability can be highly inefficient and thus rather decrease value.","dateTimeMS":1394561640000,"title":"Traceability","type":"blogpost","subCategories":"","url":"/web/software-technologies/content?g=5954967&type=blogpost&urlTitle=traceability","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8058899,"orderField":0},{"dateTime":"Wednesday, Mar 26, 2014","urlTitle":"internet-of-things-evolving-into-a-game-changer","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7989281.png","groupId":7989281,"channel":"MOBILE","description":"Unless you\u2019re completely off the technology grid (and in which case, you wouldn\u2019t be reading this post anyhow), you\u2019ve probably been bombarded by countless stories/mentions about the Internet of Things (IoT).\nWhether you\u2019re aware of it \u2013 like it or not \u2013 the IoT is already transforming our lives. Procter & Gamble, for instance, rolled out a web-enabled toothbrush at last month\u2019s Mobile World Congress in Barcelona. It links with your smartphone, records your brushing habits and even has an app providing mouth-care tips alongside news headlines.","dateTimeMS":1395820800000,"title":"Internet of Things Evolving Into a Game Changer","type":"blogpost","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=blogpost&urlTitle=internet-of-things-evolving-into-a-game-changer","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8099775,"orderField":0},{"dateTime":"Friday, Mar 28, 2014","urlTitle":"future-of-mobility-and-its-impact-to-cloud","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5970564.png","groupId":5970564,"channel":"CLOUD","description":"This week, I had the honor of co-hosting the \u201cFuture of Mobility and its Impact to Cloud\u201d breakout session at The Intersection of Cloud and Mobility Forum, which attracted more than 50 government and business experts in the fields of cloud, mobility, and measurement. Here I share some of my presentation main points, and the brainstorming questions. >>> Wearables, Scannables, Drivables, Flyables: Did your pill just call you?\u2014Don\u2019t be surprised! It all is coming in full speed. We will be able to monitor our health through wearables, get our houses on the phone, use the human body for data transmission, and sense the environment.","dateTimeMS":1395995400000,"title":"Future of Mobility and its Impact to Cloud","type":"blogpost","subCategories":"","url":"/web/irena-bojanova/content?g=5970564&type=blogpost&urlTitle=future-of-mobility-and-its-impact-to-cloud","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8109233,"orderField":0},{"dateTime":"Wednesday, Apr 16, 2014","urlTitle":"is-your-company-ready-to-deploy-business-intelligence-intelligently-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8151874.png","groupId":8151874,"channel":"INSIGHTS","description":"Although the majority of data-driven enterprises may have or use BI software or systems, a recent survey we took of IT executives revealed that there is a vast difference between having BI and using BI to the company\u2019s full advantage. There is an even larger chasm between the cost to implement BI and the value realized from those efforts. This is not good news for anyone whose bread-and-butter comes from demonstrating measurable results and ROI. But understanding the reasons why most companies aren\u2019t realizing the full value can help plot the course for the change and make the most of the marvelous tool that is business intelligence.","dateTimeMS":1397670180000,"title":"Is Your Company Ready to Deploy Business Intelligence Intelligently?","type":"blogpost","subCategories":"","url":"/web/major-bi-all-things-business-intelligence/content?g=8151874&type=blogpost&urlTitle=is-your-company-ready-to-deploy-business-intelligence-intelligently-","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8153729,"orderField":0},{"dateTime":"Friday, Apr 18, 2014","urlTitle":"getting-help-from-the-home-country-proving-essential-for-foreign-startups-in-the-u-s-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7989281.png","groupId":7989281,"channel":"NETWORKING","description":"It\u2019s challenging enough trying to generate some noise and buzz about your product/service/app if you\u2019re a U.S.-based startup. Cracking the U.S. market can be daunting. But if you\u2019re a foreign startup, the difficulties are manifold. \nFortunately, many countries and private organizations have realized this and have rolled out extensive programs and services to bolster the success rate for these nascent companies on this side of the pond.","dateTimeMS":1397808120000,"title":"Getting Help from the Home Country Proving Essential for Foreign Startups in the U.S.","type":"blogpost","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=blogpost&urlTitle=getting-help-from-the-home-country-proving-essential-for-foreign-startups-in-the-u-s-","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8157823,"orderField":0},{"dateTime":"Wednesday, Apr 23, 2014","urlTitle":"ngn-insights","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8150864.png","groupId":8150864,"channel":"NETWORKING","description":"Over 1.4 zettabytes. That\u2019s Cisco\u2019s projection for annual global IP traffic by the end of 2017. This translates to 120.6 exabytes per month, a more than 4x increase in the past five years, and an expected 3x increase over the next five years. If you think that this doesn\u2019t impact you, you should take a closer look. You, your company, even your household are all contributors to this explosive traffic growth. \nHow, you ask? Largely through public and private sector demand for mobile and cloud networking services, two of the most significant trends impacting the communications industry today.","dateTimeMS":1398240060000,"title":"NGN Insights","type":"podcast","subCategories":"","url":"/web/ngn-insights/content?g=8150864&type=podcast&urlTitle=ngn-insights","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8162343,"orderField":0},{"dateTime":"Wednesday, May 14, 2014","urlTitle":"it\u2019s-all-about-timing:-why-network-synchronization-matters","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8150864.png","groupId":8150864,"channel":"NETWORKING","description":"Ask anyone, and you know that most people dislike when their calls drop, or when the dreaded \u2018loading\u2019 icon disrupts their live stream of the playoff game. Carriers realize this, and know that network speed and reliability are driving forces behind consumer satisfaction in today\u2019s connected world. With the exabytes of data sent across today\u2019s networks, however, speed and reliability can be difficult to maintain consistently. \n\nWhat\u2019s less commonly known is the role that network timing and synchronization play in this whole equation. 4G LTE networks, for example, rely on highly accurate timing and synchronization for smooth cell-to-cell transfers of the mass of voice, video and mobile data.","dateTimeMS":1400044740000,"title":"It\u2019s All About Timing: Why Network Synchronization Matters","type":"blogpost","subCategories":"","url":"/web/ngn-insights/content?g=8150864&type=blogpost&urlTitle=it%E2%80%99s-all-about-timing%3A-why-network-synchronization-matters","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8190723,"orderField":0},{"dateTime":"Monday, May 19, 2014","urlTitle":"bi-and-your-business:-ignorance-is-not-bliss","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8151874.png","groupId":8151874,"channel":"BIG DATA","description":"Last month we talked about determining whether your company is ready to deploy business intelligence \u2018intelligently.\u2019 I mentioned that there\u2019s a considerable gap between the cost to implement BI and the value gleaned from those efforts \u2013 which isn\u2019t great for anyone whose bread-and-butter comes from demonstrating measurable results and ROI.\n\nAnd as a quick refresh, deploying BI intelligently begins with assessing your organization\u2019s BI goals \u2013 something a lot of companies don\u2019t do well. It\u2019s critical to link BI to your company\u2019s goals/key initiatives \u2013 this helps insure the relevance of decisions made, actions taken based on your BI system.","dateTimeMS":1400476140000,"title":"BI and Your Business: Ignorance Is Not Bliss","type":"blogpost","subCategories":"","url":"/web/major-bi-all-things-business-intelligence/content?g=8151874&type=blogpost&urlTitle=bi-and-your-business%3A-ignorance-is-not-bliss","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8202505,"orderField":0},{"dateTime":"Wednesday, May 21, 2014","urlTitle":"security-privacy-big-data-and-informatica:-making-data-safe-at-the-source-of-use","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"SECURITY","description":"It\u2019s hard to find a set of topics more relevant to the interplay of technology and society than security and privacy. From Glenn Greenwald\u2019s new book on NSA leaker Edward Snowden to the recent finding of a European Union court that Google has to drastically alter the persistence of user data in its services, the societal fallout from the Internet as it enters its Big Data phase is everywhere.","dateTimeMS":1400650320000,"title":"Security, Privacy, Big Data, and Informatica: Making Data Safe at the Source of Use","type":"blogpost","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=blogpost&urlTitle=security-privacy-big-data-and-informatica%3A-making-data-safe-at-the-source-of-use","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8205903,"orderField":0},{"dateTime":"Friday, May 23, 2014","urlTitle":"interoperability-key-to-success-of-health-information-exchanges","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8206605.png","groupId":8206605,"channel":"SOFTWARE ENGINEERING","description":"So with my inaugural post, I wanted to talk about health information exchanges (HIE) \u2013 key technological advances, what\u2019s lacking, what are some of the advantages to doctors and patients, and more.","dateTimeMS":1400821560000,"title":"Interoperability Key to Success of Health Information Exchanges","type":"blogpost","subCategories":"","url":"/web/the-doctor-is-in/content?g=8206605&type=blogpost&urlTitle=interoperability-key-to-success-of-health-information-exchanges","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8209639,"orderField":0},{"dateTime":"Thursday, May 29, 2014","urlTitle":"sap-ariba-and-the-future-of-b2b-networks","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"INSIGHTS","description":"Can the Internet of Highly Insecure Things Be Trusted to Run the One True Network?\nAs the dust settles on the recent changes at SAP, and with SAPPHIRE looming large, it\u2019s worth taking a look at what I think will be one of the most interesting, ambitious, and potentially lucrative bets SAP has made in a long time. The bet is on Ariba and its vision for a global, competitor-crushing, B2B network. At stake is nothing short of a major reconfiguration of the global economy, global trade, global service delivery, and pretty everything else that falls under the rubric of B2B commerce as we know it.","dateTimeMS":1401339600000,"title":"SAP, Ariba, and the Future of B2B Networks","type":"blogpost","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=blogpost&urlTitle=sap-ariba-and-the-future-of-b2b-networks","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8219402,"orderField":0},{"dateTime":"Friday, May 30, 2014","urlTitle":"uae-making-significant-inroads-in-utilizing-advanced-medical-technologies","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8206605.png","groupId":8206605,"channel":"","description":"The United Arab Emirates, a federation of seven states (Abu Dhabi, Dubai, Ajman, Fujairah, Ras al Khaimah, Sharjah and Umm al Qaiwain) formed in 1971, has grown over the past 15 years to become one of the Middle East\u2019s most important economic centers.\n\nConcurrent with this phenomenal growth have been major advancements in the healthcare arena. In fact, according to the World Health Organization (WHO), the UAE ranked first in life expectancy in 2009 (78 years), had the lowest infant mortality rate and was ranked third in having the lowest adult mortality rate among other Gulf Cooperation Council (GCC) countries.","dateTimeMS":1401426000000,"title":"UAE Making Significant Inroads in Utilizing Advanced Medical Technologies","type":"podcast","subCategories":"","url":"/web/the-doctor-is-in/content?g=8206605&type=podcast&urlTitle=uae-making-significant-inroads-in-utilizing-advanced-medical-technologies","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8219500,"orderField":0},{"dateTime":"Friday, May 30, 2014","urlTitle":"israeli-semiconductor-industry-continues-to-thrive-but-some-clouds-may-be-on-horizon","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7989281.png","groupId":7989281,"channel":"","description":"Back in 1974, Dov Frohman, one of Intel\u2019s first employees and the inventor of EPROM, erasable programmable read only memory, decided to leave Silicon Valley and return to Israel, his adopted home since 1949. Frohman was charged with helping Intel establish a small chip design center in Haifa, which at the time, was Intel\u2019s first outside the U.S.\nThe rest, as the cliché goes, is history. In a little over a generation, the Israeli semiconductor industry has grown to now employ more than 20,000; annual revenues are about US $5 billion.","dateTimeMS":1401476280000,"title":"Israeli Semiconductor Industry Continues to Thrive, but Some Clouds May Be on Horizon","type":"blogpost","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=blogpost&urlTitle=israeli-semiconductor-industry-continues-to-thrive-but-some-clouds-may-be-on-horizon","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8222951,"orderField":0},{"dateTime":"Tuesday, Jun 3, 2014","urlTitle":"secure-ethernet-everywhere:-future-proofing-iot-networks","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8150864.png","groupId":8150864,"channel":"SECURITY","description":"$19 trillion. That\u2019s the Internet of Things (IoT) market size as recently estimated by Cisco CEO John Chambers. According to Morgan Stanley forecasts, some 75 billion devices could be connected to the IoT by 2020, or 9.4 devices for each one of the eight billion people on earth. \n\nWhile much of the hype is on the consumer side and still coming to fruition, the industrial IoT is an entirely different animal and very real today. There are multiple industrial IoT applications where the embedded machine-to-machine (M2M) networking between \u2018smart objects\u2019 already exists. This includes a range of commercial, industrial and government applications, ranging from video surveillance and security, smart energy, intelligent transportation, digital signage, manufacturing automation and even automotive connectivity, to name a few. And these applications have far more exacting requirements than consumer-based IoT, the key ones of which we\u2019ll address.","dateTimeMS":1401772980000,"title":"Secure Ethernet Everywhere: Future-Proofing IoT Networks","type":"blogpost","subCategories":"","url":"/web/ngn-insights/content?g=8150864&type=blogpost&urlTitle=secure-ethernet-everywhere%3A-future-proofing-iot-networks","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8225193,"orderField":0},{"dateTime":"Wednesday, Jun 25, 2014","urlTitle":"internet-of-things-becoming-a-healthcare-game-changer","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8206605.png","groupId":8206605,"channel":"CLOUD","description":"The IoT is already resulting in significant changes in many areas of healthcare. To explore further, I reached out to a number of globally recognized IoT experts and posed a number of questions.","dateTimeMS":1403673420000,"title":"Internet of Things Becoming a Healthcare Game Changer","type":"blogpost","subCategories":"","url":"/web/the-doctor-is-in/content?g=8206605&type=blogpost&urlTitle=internet-of-things-becoming-a-healthcare-game-changer","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8279819,"orderField":0},{"dateTime":"Wednesday, Jun 25, 2014","urlTitle":"selfies:-evolving-technology-may-be-a-boon-for-business","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7989281.png","groupId":7989281,"channel":"MOBILE","description":"The \u2018selfie\u2019 phenomenon has grown exponentially. BGR, for instance, estimates more than 250 billion selfies will be taken worldwide this year.\nPeople from all walks of life have embraced selfies. In fact, The Guardian reports that UK farmers are posting \u2018felfies\u2019 \u2013 a selfie snapped on the farm.\n\u201cBut it\u2019s not just for fun \u2013 social media is a lifeline for people in a lonely profession\u2026the \u2018felfie\u2019 is taking off, with farmers posting photos of themselves next to their favorite sheep, cow or tractor,\u201d noted The Guardian.","dateTimeMS":1403726760000,"title":"Selfies: Evolving Technology May Be a Boon for Business","type":"podcast","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=podcast&urlTitle=selfies%3A-evolving-technology-may-be-a-boon-for-business","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8283819,"orderField":0},{"dateTime":"Tuesday, Jul 1, 2014","urlTitle":"the-rise-of-the-small-cells-&-a-\u2018brand-new-network\u2019-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8150864.png","groupId":8150864,"channel":"SECURITY","description":"According to Google Developer Advocate, Don Dodge, the Internet of Things (IoT) requires a \u2018brand new network.\u2019 He made some great points at the recent MIT Technology Review Digital Summit, but the linchpin of what he\u2019s really talking about here is small cells. That is, the femto-, pico- and microcells that carriers use to fill in the coverage and capacity gaps in their networks. These are the same small cells that have become so commonplace that AT&T actually has a whole commercial campaign essentially explaining small cells and how they\u2019re using them to improve their network.","dateTimeMS":1404192600000,"title":"The Rise of the Small Cells & A \u2018Brand New Network\u2019?","type":"blogpost","subCategories":"","url":"/web/ngn-insights/content?g=8150864&type=blogpost&urlTitle=the-rise-of-the-small-cells-%26-a-%E2%80%98brand-new-network%E2%80%99-","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8290921,"orderField":0},{"dateTime":"Thursday, Jul 10, 2014","urlTitle":"the-nexus-of-forces-at-world-cup-2014","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5970564.png","groupId":5970564,"channel":"","description":"The Nexus of Forces (defined as convergence and mutual reinforcement of social, mobile, cloud, and information) in combination with the Internet of Everything (IoE) had a game changing role at the World Cup in Brazil","dateTimeMS":1404969900000,"title":"The Nexus of Forces at World Cup 2014","type":"blogpost","subCategories":"","url":"/web/irena-bojanova/content?g=5970564&type=blogpost&urlTitle=the-nexus-of-forces-at-world-cup-2014","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8312399,"orderField":0},{"dateTime":"Tuesday, Jul 15, 2014","urlTitle":"computing-appliances-to-accelerate-deployment-of-new-hardware-and-software-technologies","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/53319.png","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"The advent of hyperscale semiconductor integration (HSI) is now driving development of a new generation of massivelyparallel processing (MPP) computer systems for enterprise computing.","dateTimeMS":1405431540000,"title":"Computing Appliances to Accelerate Deployment of New Hardware and Software Technologies","type":"blogpost","subCategories":"","url":"/web/computingnow/content?g=53319&type=blogpost&urlTitle=computing-appliances-to-accelerate-deployment-of-new-hardware-and-software-technologies","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8316062,"orderField":0},{"dateTime":"Wednesday, Jul 23, 2014","urlTitle":"organ-on-a-chip-could-aid-drug-discovery-be-the-shape-of-medicine-to-come","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7989281.png","groupId":7989281,"channel":"","description":"Culturing 3D human tissue on a microchip isn\u2019t new. Like system-on-a-chip (SoC), which shoehorns most of a digital computer into a single chip, an organ-on-a-chip is designed to replicate human organ functions (including activities and mechanics like blood and oxygen flow) on a transparent, flexible microchip. These microfluidic devices which, in effect, are 3D cell culture versions of real organs, already exist for artery, cartilage, gut, heart, kidney, and skin.","dateTimeMS":1406120400000,"title":"Organ-on-a-Chip Could Aid Drug Discovery, Be the Shape of Medicine to Come","type":"podcast","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=podcast&urlTitle=organ-on-a-chip-could-aid-drug-discovery-be-the-shape-of-medicine-to-come","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8337165,"orderField":0},{"dateTime":"Tuesday, Jul 22, 2014","urlTitle":"telemedicine-boosting-healthcare-in-rural-communities","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8206605.png","groupId":8206605,"channel":"","description":"Telemedicine has been around in some form for almost 40 years \u2013 and it\u2019s now increasingly becoming a cost-effective and indispensable tool for doctors, rural hospitals, and local and regional governmental agencies situated in rural areas.","dateTimeMS":1406034360000,"title":"Telemedicine Boosting Healthcare in Rural Communities","type":"podcast","subCategories":"","url":"/web/the-doctor-is-in/content?g=8206605&type=podcast&urlTitle=telemedicine-boosting-healthcare-in-rural-communities","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8337702,"orderField":0},{"dateTime":"Monday, Sep 1, 2014","urlTitle":"barriers-to-telehealth-adoption-slowly-coming-down","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8206605.png","groupId":8206605,"channel":"NETWORKING","description":"Telehealth. \nWe\u2019ve seen that word bandied about frequently. In brief, telehealth comprises not only physician-patient interactions but information and educational services that foster awareness of treatments, medical conditions, good health practices and diagnoses.\n\nAnd while telehealth is becoming more widespread, NTT DATA, a Tokyo-based IT services provider, indicated in its Trends in Telehealth white paper published earlier this year that \u201cthe healthcare industry is historically a late adopter of technology and this has proven to be a barrier to all new solutions that rely on technology.\u201d","dateTimeMS":1409588640000,"title":"Barriers to Telehealth Adoption Slowly Coming Down","type":"blogpost","subCategories":"","url":"/web/the-doctor-is-in/content?g=8206605&type=blogpost&urlTitle=barriers-to-telehealth-adoption-slowly-coming-down","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8401929,"orderField":0},{"dateTime":"Monday, Sep 1, 2014","urlTitle":"3d-printing-opening-the-doors-to-counterfeiters","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7989281.png","groupId":7989281,"channel":"","description":"Last year architects in Amsterdam started constructing a 3D printed home. Aircraft manufacturers are honing ways to build 3D printed planes. And 3D printing is now wending its way through the fashion industry. A 3D printed dress designed by Michael Schmidt (designed on an iPad), was printed for a private runway event \u2013 it was printed in 17 parts on an EOS P350 3D printer.\n\n\u201c3D printing presents tremendous opportunities for businesses,\u201d said Simon Jones, a partner at DLA Piper in London, a global law firm. \u201cManufacturers will no longer need to own large production facilities halfway around the world, because they can print products on demand or sell licenses to print them locally. This will have a huge impact on the supply chain; it will benefit the environment as there will be less waste, and companies will no longer need to spend a fortune gearing up to make a product and hoping its stock sells.\u201d\n\nSo the sky\u2019s the limit for 3D printing.\n\nAnd for counterfeiters too.","dateTimeMS":1409589000000,"title":"3D Printing Opening the Doors to Counterfeiters","type":"blogpost","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=blogpost&urlTitle=3d-printing-opening-the-doors-to-counterfeiters","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8401945,"orderField":0},{"dateTime":"Monday, Sep 1, 2014","urlTitle":"acumatica-living-the-channel-challenge-in-the-midmarket","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"","description":"Acumatica -- Living the Channel Challenge in the Midmarket","dateTimeMS":1409589840000,"title":"Acumatica -- Living the Channel Challenge in the Midmarket","type":"blogpost","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=blogpost&urlTitle=acumatica-living-the-channel-challenge-in-the-midmarket","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8401969,"orderField":0},{"dateTime":"Monday, Sep 15, 2014","urlTitle":"successfactor\u2019s-success-factors:-questions-in-search-of-answers","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"BIG DATA","description":"I\u2019m heading to the SuccessFactors user conference, SuccessConnect, in Las Vegas this week and, as a prelude to the conference, here\u2019s some of the questions I\u2019m looking to have answered during the course of the conference.","dateTimeMS":1410758820000,"title":"SuccessFactor\u2019s Success Factors: Questions in Search of Answers","type":"blogpost","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=blogpost&urlTitle=successfactor%E2%80%99s-success-factors%3A-questions-in-search-of-answers","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8418929,"orderField":0},{"dateTime":"Wednesday, Sep 17, 2014","urlTitle":"understanding-the-supply-chain-data-continu-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8151874.png","groupId":8151874,"channel":"BIG DATA","description":"I will be the first to admit that there are lots of different ways to categorize data. And I would like to add, that there is not necessarily one right way to do it. But at the end of the day, understanding the totality of a problem is easier if you find a way to break it down into component parts, categories, or summarize the information.","dateTimeMS":1410930840000,"title":"Understanding the Supply Chain Data Continuum","type":"blogpost","subCategories":"","url":"/web/major-bi-all-things-business-intelligence/content?g=8151874&type=blogpost&urlTitle=understanding-the-supply-chain-data-continu-1","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8427588,"orderField":0},{"dateTime":"Thursday, Sep 18, 2014","urlTitle":"successfactors-workday-and-sap-\u2013-answers-and-more","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"CLOUD","description":"SuccessFactors\u2019 user conference, SuccessConnect, has come and gone, and the four questions I posed in my previous post about the challenges facing SuccessFactors and SAP were largely answered. But, as in any good dialectic, one good answer is just the starting point for another good question\u2026.. I\u2019ll start with the Workday question/answer in this post, and continue with answers to my other three questions in a subsequent post.","dateTimeMS":1411019100000,"title":"SuccessFactors, Workday, and SAP \u2013 Answers and More","type":"podcast","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=podcast&urlTitle=successfactors-workday-and-sap-%E2%80%93-answers-and-more","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8427605,"orderField":0},{"dateTime":"Tuesday, Sep 23, 2014","urlTitle":"even-without-larry-oracle\u2019s-problems-will-continue","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"CLOUD","description":"The fundamental problems plaguing Oracle won\u2019t go away with Larry moving into an executive chairman role, this is more lipstick on a pig than a serious attempt to get the company back on course. The problem is that shuffling the deck chairs does nothing for dealing with the company\u2019s three fundamental problems. Until these are addressed, I think it\u2019s safe to assume there will be no turnaround any time soon.","dateTimeMS":1411451520000,"title":"Even without Larry, Oracle\u2019s Problems Will Continue","type":"blogpost","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=blogpost&urlTitle=even-without-larry-oracle%E2%80%99s-problems-will-continue","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8436218,"orderField":0},{"dateTime":"Friday, Oct 3, 2014","urlTitle":"smart-cities:-the-future-is-now","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7989281.png","groupId":7989281,"channel":"NETWORKING","description":"With the world\u2019s population now exceeding seven billion, many municipalities in both emerging markets and developed nations are paying closer attention on how they manage their infrastructure and resources.\n\nA number of larger cities are well on their way to becoming smart cities. Market research firm Frost & Sullivan succinctly sums up how these cities are now being defined \u2013 built on solutions and technology leading to the adoption of at least five of eight smart parameters \u2013 smart energy, smart building, smart mobility, smart healthcare, smart infrastructure, smart technology, smart governance and smart education, and smart citizen.","dateTimeMS":1412312520000,"title":"Smart Cities: The Future Is Now","type":"blogpost","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=blogpost&urlTitle=smart-cities%3A-the-future-is-now","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8453096,"orderField":0},{"dateTime":"Thursday, Oct 2, 2014","urlTitle":"bringing-telemedicine-to-the-workplace","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8206605.png","groupId":8206605,"channel":"INSIGHTS","description":"While telemedicine in the workplace to date has been used more by large businesses, this is thankfully beginning to change as technology costs decrease and support increases.\n\nBusinesses of all sizes are realizing that the benefits of telemedicine in the workplace are considerable:\n\nØ Fewer expensive visits to the emergency room;\n\nØ Better employee retention;\n\nØ Reduced employee time away from the job.\n\nAnd some companies have particularly been proactive in introducing telemedicine in the workplace. Way back in 2011, noted Modern Healthcare, Cisco expanded its use of telemedicine to reach employees at other locations and to connect San Jose, CA-based workers to specialists.","dateTimeMS":1412226180000,"title":"Bringing Telemedicine to the Workplace","type":"blogpost","subCategories":"","url":"/web/the-doctor-is-in/content?g=8206605&type=blogpost&urlTitle=bringing-telemedicine-to-the-workplace","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8454024,"orderField":0},{"dateTime":"Tuesday, Oct 7, 2014","urlTitle":"why-you-should-care-about-mobile-security","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8150864.png","groupId":8150864,"channel":"SECURITY","description":"A recent WIRED article claimed that millennials don\u2019t care about mobile security. But like it or not, the fact is that that security in mobile networks is a growing concern, and clearly an issue that\u2019s not going away anytime soon. As my colleague, Martin Nuss, pointed out in a panel discussion at CTIA Super Mobility Week last month, the explosion in 4G networks driven by small cell deployment, coupled with the tremendous growth in BYOD, has created a global IT security threat that needs urgent attention.","dateTimeMS":1412660220000,"title":"Why You Should Care About Mobile Security","type":"blogpost","subCategories":"","url":"/web/ngn-insights/content?g=8150864&type=blogpost&urlTitle=why-you-should-care-about-mobile-security","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8458272,"orderField":0},{"dateTime":"Friday, Oct 10, 2014","urlTitle":"hp\u2019s-breakup-is-oracle\u2019s-future","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"INSIGHTS","description":"The news that Meg Whitman is finally pulling the plug on the Sisyphian task of trying to resurrect HP has profound implications for the future of Oracle, and not just because the mess that Whitman was unable to unravel was an HP made functionally unmanageable by a previous HP CEO: Mark Hurd, now co-CEO of Oracle. I think Oracle has been on the leadership skids for a while, but Hurd\u2019s track record at HP, the end-game of which is now being played out in the breakup of the once-vaunted tech leader, provides a good roadmap for how Oracle ends up on the chopping block like HP.","dateTimeMS":1412973600000,"title":"HP\u2019s Breakup is Oracle\u2019s Future","type":"blogpost","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=blogpost&urlTitle=hp%E2%80%99s-breakup-is-oracle%E2%80%99s-future","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8465801,"orderField":0},{"dateTime":"Monday, Nov 17, 2014","urlTitle":"understanding-the-supply-chain-distribution-continuum","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8151874.png","groupId":8151874,"channel":"","description":"Distribution or dissemination of information is probably one of the most critical aspects of supply chain business intelligence and information management. The reason is that the cost associate with data collection, data cleansing and analytics is incurred up front in the information management process, while the benefits that are derived from the former can only be realized if the information is in the hands of the right people.","dateTimeMS":1416205440000,"title":"Understanding The Supply Chain Distribution Continuum","type":"blogpost","subCategories":"","url":"/web/major-bi-all-things-business-intelligence/content?g=8151874&type=blogpost&urlTitle=understanding-the-supply-chain-distribution-continuum","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8476975,"orderField":0},{"dateTime":"Thursday, Oct 23, 2014","urlTitle":"how-telemedicine-can-help-treat-ebola-and-other-infectious-diseases","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8206605.png","groupId":8206605,"channel":"INSIGHTS","description":"While President Obama\u2019s naming last week of a new \u2018Ebola czar\u2019 (Ron Klain, a former White House advisor) to oversee the federal government\u2019s response to the outbreak, here and abroad, is a positive step, much more is needed to help combat the contagious disease.\nThere are tools to treat Ebola and other infectious diseases remotely - in particular \u2013 telemedicine.","dateTimeMS":1414041840000,"title":"How Telemedicine Can Help Treat Ebola and Other Infectious Diseases","type":"blogpost","subCategories":"","url":"/web/the-doctor-is-in/content?g=8206605&type=blogpost&urlTitle=how-telemedicine-can-help-treat-ebola-and-other-infectious-diseases","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8483050,"orderField":0},{"dateTime":"Friday, Oct 24, 2014","urlTitle":"can-salesforce-com-deliver-the-complex-business-processes-it-aspires-to-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"CLOUD","description":"It\u2019s hard to slog through mega-conferences like Dreamforce, and not just because 135,000 people are way too much for San Francisco and its Moscone Center to handle. The sheer girth of Salesforce.com is also a factor: the company has become an immensely complicated and multifaceted company, maybe too much so for a single conference. Regardless, Dreamforce reminds me of why I don\u2019t see my favorite bands in a coliseum setting: The volume needed to fill a coliseum washes out the undertones and overtones that make music a rich and complex listening experience, instead leaving the listener to sort through a lot of random, washed out noise.","dateTimeMS":1414129020000,"title":"Can Salesforce.com Deliver the Complex Business Processes it Aspires To?","type":"blogpost","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=blogpost&urlTitle=can-salesforce-com-deliver-the-complex-business-processes-it-aspires-to-","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8483514,"orderField":0},{"dateTime":"Thursday, Oct 30, 2014","urlTitle":"microsoft-hones-its-enterprise-message","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"INSIGHTS","description":"There\u2019s always a lot to say about Microsoft, and, like any big company, it\u2019s usually a mix of good or bad. Having spent two days last week at the Microsoft Dynamics analyst event, I think that when it comes to the enterprise, most of what there is to say about Microsoft isn\u2019t just good: Microsoft\u2019s enterprise story just gets better and better, and while there are holes and issues abounding, the old maxim that Microsoft eventually gets it right was very much in evidence last week (with one notable, and important exception).","dateTimeMS":1414689060000,"title":"Microsoft Hones Its Enterprise Message","type":"blogpost","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=blogpost&urlTitle=microsoft-hones-its-enterprise-message","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8492856,"orderField":0},{"dateTime":"Thursday, Oct 30, 2014","urlTitle":"classroom-technology-changing-the-way-kids-\u2013-and-adults-learn","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7989281.png","groupId":7989281,"channel":"INSIGHTS","description":"Textbook.\n20th Century definition: A manual of instruction in any branch of study.\n21st Century definition: Ancient learning methodology, last used by aging baby boomers. Killed lots of trees. Replaced by e-Books that are usually interactive and often open or free to use and sometimes edit.","dateTimeMS":1414689540000,"title":"Classroom Technology Changing the Way Kids \u2013 And Adults Learn","type":"blogpost","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=blogpost&urlTitle=classroom-technology-changing-the-way-kids-%E2%80%93-and-adults-learn","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8492870,"orderField":0},{"dateTime":"Thursday, Nov 13, 2014","urlTitle":"understanding-the-supply-chain-collaboration-continuum","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8151874.png","groupId":8151874,"channel":"","description":"Collaboration of information and timing and are two extremely critical aspects of supply chain business intelligence and information management. Not getting data to the appropriate decision makers renders the information nominally useless. Not giving it to the right people, or right group of people, via the right mechanism also means that data loses value. \nThe truth is that moving information between humans is much more difficult to do in some cases than it is to calculate reports and analytics that need to be disseminated. This is because collaboration between humans is a behavioral issue, and no amount of technology thrown at the problem can make people silos disappear.","dateTimeMS":1415859120000,"title":"Understanding the Supply Chain Collaboration Continuum","type":"blogpost","subCategories":"","url":"/web/major-bi-all-things-business-intelligence/content?g=8151874&type=blogpost&urlTitle=understanding-the-supply-chain-collaboration-continuum","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8506101,"orderField":0},{"dateTime":"Monday, Nov 10, 2014","urlTitle":"one-minute-guide-to-understanding-the-supply-chain-analytics-continuum","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8151874.png","groupId":8151874,"channel":"","description":"Analytics are now an integral part of any supply chain information management system. Modern computing power and advances in analytical software have made powerful analytics not only possible, but practical for most businesses sitting on top of a cornucopia of supply chain data. Analytics run the gambit from historical data dumps to models that suggest the best course of action based on a set of probable outcomes.","dateTimeMS":1415600700000,"title":"One minute Guide to Understanding the Supply Chain Analytics Continuum","type":"podcast","subCategories":"","url":"/web/major-bi-all-things-business-intelligence/content?g=8151874&type=podcast&urlTitle=one-minute-guide-to-understanding-the-supply-chain-analytics-continuum","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8506121,"orderField":0},{"dateTime":"Tuesday, Nov 18, 2014","urlTitle":"women-of-the-supply-chain:-responsibility-collaboration-and-bathroom-lines","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"","description":"Hanging out with Kinaxis, the relatively small and always interesting supply chain vendor from Ottawa, Canada, never fails to be an eye-opening experience. It\u2019s not just that I get to meet with a vendor and a loyal cadre of customers who are collectively pushing the envelope on all things supply chain, it\u2019s that sometimes they\u2019re pushing an envelope I hadn\u2019t seen before in my peregrinations in the supply chain world. \nThis year\u2019s Kinexions user conference was no different. What I heard from Kinaxis about taking Rapid Response, its in-memory supply chain planning product, further into the realm of collaboration by pushing users to self-identify their areas of responsibility represented an excellent strategic direction on the part of Kinaxis","dateTimeMS":1416290520000,"title":"Women of the Supply Chain: Responsibility, Collaboration and Bathroom Lines","type":"blogpost","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=blogpost&urlTitle=women-of-the-supply-chain%3A-responsibility-collaboration-and-bathroom-lines","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8518713,"orderField":0},{"dateTime":"Monday, Dec 1, 2014","urlTitle":"high-tech-ordering-becoming-the-norm-at-both-mainstream-and-fast-food-restaurants","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7989281.png","groupId":7989281,"channel":"MOBILE","description":"It\u2019s probably not too far fetched now to predict that in the near future \u2013 at least within the next decade or so according to some studies and experts \u2013 you might be served by R2D2, or a similar robotic food service entity.\nYes, numerous restaurants, especially those of the fast-food variety, are rapidly embracing","dateTimeMS":1417446600000,"title":"High-Tech Ordering Becoming the Norm at Both Mainstream and Fast-Food Restaurants","type":"blogpost","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=blogpost&urlTitle=high-tech-ordering-becoming-the-norm-at-both-mainstream-and-fast-food-restaurants","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8535233,"orderField":0},{"dateTime":"Tuesday, Dec 2, 2014","urlTitle":"net-neutrality-\u2013-confusion-content-and-the-meaning-of-free","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"MOBILE","description":"There is perhaps no contemporary issue at the intersection of technology and public policy that is more contentious and conflicted than net neutrality. The issue itself has probably accounted for its own increase in Internet traffic over the last couple of years as opinions, jeremiads, official proclamations, and even HBO\u2019s John Oliver, have weighed in on the issue.","dateTimeMS":1417540860000,"title":"Net Neutrality \u2013 Confusion, Content, and the Meaning of Free","type":"podcast","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=podcast&urlTitle=net-neutrality-%E2%80%93-confusion-content-and-the-meaning-of-free","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8535305,"orderField":0},{"dateTime":"Wednesday, Dec 10, 2014","urlTitle":"windows-phone-looks-doomed:-does-this-mean-trouble-for-windows-10-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"MOBILE","description":"I think it\u2019s pretty fair to say that counting Microsoft out in a market it has made a commitment to is a classic rookie mistake that serves as the epitaph for too many forgotten companies. If at first you don\u2019t succeed, try try again is a time-honored mantra in Redmond. And it\u2019s pretty evident that Windows Phone is one of those areas where Microsoft has made big commitments \u2013 including but hardly limited to its $7.2 billion purchase of Nokia\u2019s phone business \u2013 and where the company is on the record as committed to try try again.","dateTimeMS":1418222040000,"title":"Windows Phone Looks Doomed: Does this Mean Trouble for Windows 10?","type":"blogpost","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=blogpost&urlTitle=windows-phone-looks-doomed%3A-does-this-mean-trouble-for-windows-10-","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8545327,"orderField":0},{"dateTime":"Friday, Feb 13, 2015","urlTitle":"s-4-hana-it-s-not-r-3-and-it-s-not-1992-either-part-i-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"","description":"So, smooth sailing for S/4 HANA?\u2013 Not likely, certainly nothing like the good old days when R/3 was the biggest and the baddest modern, client/server, enterprise software product on the market, marauding through the global economy like a rum-soaked buccaneer.","dateTimeMS":1423838700000,"title":"S/4 HANA: It\u2019s not R/3, and it\u2019s not 1992 either (part II)","type":"blogpost","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=blogpost&urlTitle=s-4-hana-it-s-not-r-3-and-it-s-not-1992-either-part-i-1","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":51934827,"orderField":0},{"dateTime":"Wednesday, Apr 22, 2015","urlTitle":"scott-galloway-on-the-four-horsemen-amazon-apple-facebook-google","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"Future of Apple, Google, Amazon and Facebook","dateTimeMS":1429711080000,"title":"Scott Galloway on The Four Horsemen: Amazon/Apple/Facebook & Google","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=scott-galloway-on-the-four-horsemen-amazon-apple-facebook-google","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":54013662,"orderField":0},{"dateTime":"Wednesday, Apr 22, 2015","urlTitle":"node-to-self-get-ready-for-asynchronous-programming-part-i","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"Node.js introduction","dateTimeMS":1429711260000,"title":"Node to Self: Get Ready for Asynchronous Programming - Part I","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=node-to-self-get-ready-for-asynchronous-programming-part-i","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":54013901,"orderField":0},{"dateTime":"Thursday, Apr 30, 2015","urlTitle":"node-to-self-get-ready-for-asynchronous-programming-part-ii","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"Installing and configuring Node.js and NPM.","dateTimeMS":1430405580000,"title":"Node to Self: Get Ready for Asynchronous Programming - Part II","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=node-to-self-get-ready-for-asynchronous-programming-part-ii","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":54026390,"orderField":0},{"dateTime":"Friday, May 8, 2015","urlTitle":"node-to-self-get-ready-for-asynchronous-programming-part-iii","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"mongoDB Installation & Configuration","dateTimeMS":1431100260000,"title":"Node to Self: Get Ready for Asynchronous Programming - Part III","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=node-to-self-get-ready-for-asynchronous-programming-part-iii","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":54042281,"orderField":0},{"dateTime":"Thursday, May 28, 2015","urlTitle":"node-to-self-get-ready-for-asynchronous-programming-part-iiii","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"Connect node.js to mongoDB","dateTimeMS":1432835040000,"title":"Node to Self: Get Ready for Asynchronous Programming - Part IIII","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=node-to-self-get-ready-for-asynchronous-programming-part-iiii","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":54084119,"orderField":0}]}; _.each(initialContentList.list, function (listItem, itemIndex) { addToCollection(listItem); }); populateContentListContainer_13wM(contentCollection_13wM, false, 0, displayThisManyItems_13wM); } function getRemainingContent_13wM() { var url = "/web/computingnow/rest/-/api/" + "contentList"; var initialChunk = 50; var asyncChunk = 200; var totalRecords = 200; for ( var count = initialChunk; count 0 ) { scrollMovement_13wM("DOWN", scrollDuration_13wM, "SCROLLBAR"); } else { scrollMovement_13wM("UP", scrollDuration_13wM, "SCROLLBAR"); } lastPositionForDirectionalScroll = currentPosition; }); });
SPONSORED VIDEO
VARIDESK Sit to Stand Desks
The human body was designed to move. But over the years we've been moving less and sitting more. Sitting has become our new way of life and, collectively, we're starting to pay for it. We are out of balance.
Computer magazine, the IEEE Computer Society's flagship publication, covers all aspects of computer science, computer engineering, computing technology, and applications.
IEEE Annals of the History of Computing covers computer history with scholarly articles by leading computer scientists and historians, as well as first-hand accounts.
Cloud Computing magazine is committed to the timely publication of peer-reviewed articles that provide innovative research ideas, applications results, and case studies in all areas of cloud computing.
IEEE Computer Graphics and Applications magazine bridges the theory and practice of computer graphics, from specific algorithms to full system implementations.
Computing in Science & Engineering addresses the need for efficient algorithms, system software, and computer architecture to address large computational problems in the hard sciences.
IEEE Intelligent Systems magazine covers the theory and application of systems that perceive, reason, learn, and act intelligently.
IEEE Internet Computing is a crossroads for researchers and industry developers, providing journal-quality exploration and review of emerging and maturing Internet technologies and applications.
IT Professional magazine examines emerging technologies, security issues, data management techniques, and systems integration challenges and how they affect the enterprise.
IEEE Micro focuses on the technologies of computers and peripherals � systems, components, and subassemblies, as well as communications and software.
IEEE MultiMedia magazine serves readers who are interested in harmoniously using multiple media types to create new experiences.
IEEE Pervasive Computing explores pervasive, mobile, and ubiquitous computing for developers, researchers, and educators.
IEEE Security & Privacy presents research articles, case studies, tutorials, and columns for workers at all levels of the information security industry.
IEEE Software offers pioneering ideas, expert analyses, and thoughtful overviews for professional developers and managers who need to keep up with rapid technology change.