RESET
'); overlayDIV.data("fullURL", listItemModel.attributes.url); overlayDIV.data("target", listItemModel.attributes.target); overlayDIV.css({"width":"100%", "height":"100%"}); overlayDIV.click(function() { var fullURL = $(this).data("fullURL"); var target = $(this).data("target"); $(".overlayScreen_13wM").css({"opacity":"0", "filter":"alpha(opacity = 0)"}); $(this).css({"opacity":"0.3", "filter":"alpha(opacity = 30)"}); if ( type == "supplement" || target == "_blank" ) { $("#externalLinkForm_13wM").attr("action", fullURL); $("#externalLinkForm_13wM").submit(); } else { $("#contentAndControlsContainer").fadeOut(300, function() { var encodedTitle = escape(listItemModel.attributes.urlTitle); var url = "/web/computingnow/rest/-/api/" + listItemModel.attributes.type + "/" + listItemModel.attributes.groupId + "/" + encodedTitle; $.ajax({ type: 'POST', url: url, success: function(data) { var jsonData = eval('(' + data + ')'); var status = jsonData.status; var body = jsonData.body; var title = jsonData.title; var displayDate = jsonData.displayDate; var creator = jsonData.creator; var urlTitle = jsonData.urlTitle; var comments = jsonData.commentArray; var pageTitle = jsonData.pageTitle; var articleSource = jsonData.articleSource; var headerImagePath = jsonData.headerImagePath; var commentParentId = jsonData.commentParentId; var commentParentType = jsonData.commentParentType; var peerReviewed = jsonData.peerReviewed; $("#CONTENT_" + pageModeTarget_13wM).alternateScroll("remove"); if ( articleSource == "CSDL" ) { var headerImageObj = $('Header Image'); headerImageObj.attr("id","contentContainerheaderImage"); $("#CONTENT_" + pageModeTarget_13wM).html(body); if ( peerReviewed ) { var peerReviewedObj = $('
'); peerReviewedObj.css("display","block"); $("#CONTENT_" + pageModeTarget_13wM).prepend(peerReviewedObj); if ($(".peerReviewedIcon_LargeRight").length > 0) { $(".peerReviewedIcon_LargeRight").hide(); } } else { if ($(".peerReviewedIcon_LargeRight").length > 0) { $(".peerReviewedIcon_LargeRight").hide(); } if ($(".peerReviewedIcon_CSDL_LargeRight").length > 0) { $(".peerReviewedIcon_CSDL_LargeRight").hide(); } } $("#CONTENT_" + pageModeTarget_13wM).prepend(headerImageObj); $("#CONTENT_TITLE_" + pageModeTarget_13wM).hide(); $("#CONTENT_CREATORDISPLAYDATE_" + pageModeTarget_13wM).hide(); $(".html-pdf").hide(); $(".html-adobe").hide(); $("td:contains('Download Content')").parent().hide(); $("#fontChanger").hide(); } else { $("#CONTENT_" + pageModeTarget_13wM).html(body); $("#CONTENT_TITLE_" + pageModeTarget_13wM).html(title); $("#CONTENT_TITLE_" + pageModeTarget_13wM).show(); $("#CONTENT_CREATORDISPLAYDATE_" + pageModeTarget_13wM).html(creator + " " + displayDate); $("#CONTENT_CREATORDISPLAYDATE_" + pageModeTarget_13wM).show(); $("#fontChanger").show(); if ( peerReviewed ) { $(".peerReviewedIcon_LargeRight").show(); } else { $(".peerReviewedIcon_LargeRight").hide(); } if ($(".peerReviewedIcon_CSDL_LargeRight").length > 0) { $(".peerReviewedIcon_CSDL_LargeRight").hide(); } } $("#contentAndControlsContainer").fadeIn(300); $("#CONTENT_" + pageModeTarget_13wM).alternateScroll(); if ( peerReviewed ) { var peerReviewedObjTop = $("#contentContainerheaderImage").height() + 20; $(".peerReviewedIcon_CSDL_LargeRight").css("top", peerReviewedObjTop+"px"); } intialDimensions(); document.title = pageTitle; $("#shareWithLinkList").attr("data-url", fullURL); $(".numberedPage").remove(); if ( articleSource != "CSDL" ) { $(".alt-scroll-content, .alt-scroll-content p").jfontsize({ btnMinusMaxHits: 2, btnPlusMaxHits: 5, sizeChange: 2 }); $(".jfontsize-button").click(function() { intialDimensions(); $(".numberedPage").remove(); appendNumberedButtons(); }); } if ( totalInnerContentHeight >= divHeight ) { appendNumberedButtons(); enableViewAs = true; } else { $("#viewAs").attr("src", "/ieeecs-ContentContainer-portlet/images/viewAsOnlyOne.png"); enableViewAs = false; var newContentHeight = $(".alt-scroll-content").height(); $("#CONTENT_").height(newContentHeight + 100); } if ( hideNavButtons.toUpperCase() == "NO" && totalNumberOfPages > 1 ) { $("#contentNavHolder").show(); } else { $("#contentNavHolder").hide(); } hideShowButtons(); populateComments(commentParentId, commentParentType); document.title = title; window.history.pushState({"html":body,"pageTitle":pageTitle},"", fullURL); } }); }); } }); htmlObj.append(overlayDIV); } } } function populateTitle_13wM(titleText) { if ( hideTitle_13wM == "NO" ) { $("#titleText_13wM").html(titleText); } } function populteFilteredTitle_13wM(titleText) { if ( titleText == "" ) { $("#filterResultsMessage_13wM").hide(); $("#filterResultsMessage_13wM").html(""); } else { $("#filterResultsMessage_13wM").html(titleText); $("#filterResultsMessage_13wM").show(); } } function getCurrentTop_13wM() { return $("#contentListContainer_13wM").scrollTop(); } var lastPosition_13wM = -1; function scrollMovement_13wM(direction, duration, controlType) { var currentPosition = getCurrentTop_13wM(); var totalContentHeight = $("#scrollableListContent_13wM").height(); var appendContentOffset = scrollMovementValue_13wM * 2; var nextElementSetZone = totalContentHeight - appendContentOffset; var newPosition = 0; if ( direction == "UP" ) { newPosition = currentPosition - scrollMovementValue_13wM; if ( newPosition nextElementSetZone ) { var start = lastItemDisplayed_13wM; var end = lastItemDisplayed_13wM + itemsPerPage_13wM; if ( filterIsOn_13wM ) { populateContentListContainer_13wM(filterCollection_13wM, false, start, end); } else { populateContentListContainer_13wM(contentCollection_13wM, false, start, end); } } if ( controlType == "BUTTON" || controlType == "TOUCH" ) { newPosition = currentPosition + scrollMovementValue_13wM; $("#contentListContainer_13wM").scrollTo(newPosition+"px", duration); } lastPosition_13wM = currentPosition; if ( lastPosition_13wM == currentPosition && totalContentHeight - scrollMovementValue_13wM == currentPosition ) { $("#paginationMessage_13wM").html("You've reached the bottom of the list."); $("#paginationMessage_13wM").fadeIn(100, function() { $("#paginationMessage_13wM").fadeOut(1000, function() { $("#paginationMessage_13wM").html(""); }); }); } } } $("#prevPage_13wM").click(function() { scrollMovement_13wM("UP", scrollDuration_13wM, "BUTTON"); }); $("#nextPage_13wM").click(function() { scrollMovement_13wM("DOWN", scrollDuration_13wM, "BUTTON"); }); $("#filterValue_13wM").keyup(function(e) { var code = (e.keyCode ? e.keyCode : e.which); if ( (code >= 48 && code = 65 && code = 3 ) { filterCollection_13wM = new ListItemCollection(); var filterArray = contentCollection_13wM.filter(function(event) { var currentTitle = event.get("title").toUpperCase(); var currentDescription = event.get("description").toUpperCase(); var currentSubType = event.get("subType").toUpperCase(); var currentChannel = event.get("channel").toUpperCase(); var currentPeerReviewed = event.get("peerReviewed"); return currentTitle.indexOf(filterValue) > -1 || currentDescription.indexOf(filterValue) > -1 || currentSubType.indexOf(filterValue) > -1 || currentChannel.indexOf(filterValue) > -1 || (filterValue.toUpperCase().substring(0,4) == "PEER" && currentPeerReviewed); }); var filterSize = filterArray.length; if ( filterSize > 0 ) { filterIsOn_13wM = true; for (var i in filterArray) { filterCollection_13wM.add(filterArray[i]); } populateContentListContainer_13wM(filterCollection_13wM, true, 0, displayThisManyItems_13wM); populteFilteredTitle_13wM(filteredTitle_13wM.replace("$",filterSize)); } else { $("#scrollableListContent_13wM").html(""); var html = new EJS({element: 'emptyResults_13wM'}).render(); var htmlObj = $(html); $("#scrollableListContent_13wM").append(htmlObj); populteFilteredTitle_13wM(""); } } } function getInitialContent_13wM() { var initialContentList = {"javaClass":"java.util.ArrayList","list":[{"dateTime":"Monday, Oct 29, 2012","urlTitle":"q2-2012-technology-purchase-index-tpi-update","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=6126686&t=1496745141282","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"The TPI for overall technology purchases increased 1.9% between Q42011 and Q22012 reflecting slow but steady growth in the planned IT purchase intentions for business, education and institutions in the United States and Canada.","dateTimeMS":1351494000000,"title":"Q2 2012 Technology Purchase Index (TPI) Update","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=q2-2012-technology-purchase-index-tpi-update","target":"_self","peerReviewed":false,"subType":"","id":7336717,"orderField":0},{"dateTime":"Tuesday, Dec 11, 2012","urlTitle":"scada-systems:-challenges-for-forensics-investigators","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=6599854&t=1496745141291","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Gary Kessler interviews Irfan Ahmed about SCADA (supervisory control and data acquisition) systems.","dateTimeMS":1355230800000,"title":"SCADA Systems: Challenges for Forensics Investigators","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=scada-systems%3A-challenges-for-forensics-investigators","target":"_self","peerReviewed":false,"subType":"","id":7336679,"orderField":0},{"dateTime":"Friday, Feb 22, 2013","urlTitle":"new-directions-in-computer-science","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Computer science is undergoing a fundamental change. Over the last 40 years the field was concerned with making computers useful. Focus was on programming languages, compilers, operating systems, data structures and algorithms. These are still important topics but with the merging of computing and communication, the emergence of social networks, and the large amount of information in digital form, focus is shifting to applications such as the structure of networks and extracting information from large data sets. This talk will give a brief vision of the future and then an introduction to the science base that is forming to support these new directions in computer science.","dateTimeMS":1361527260000,"title":"New Directions in Computer Science","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=new-directions-in-computer-science","target":"_self","peerReviewed":false,"subType":"VIDEO","id":7336774,"orderField":0},{"dateTime":"Thursday, Feb 28, 2013","urlTitle":"video:-towards-a-theory-of-trust-in-networks-of-humans-and-computers","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/images/thumbnails/100x100/JeannetteWing.jpg","groupId":53319,"channel":"NETWORKING","description":"Jeannette M. Wing's Keynote Speech on the 14th Computing in the 21st Century Conference.","dateTimeMS":1362056400000,"title":"Video: Towards a Theory of Trust in Networks of Humans and Computers","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=video%3A-towards-a-theory-of-trust-in-networks-of-humans-and-computers","target":"_self","peerReviewed":false,"subType":"VIDEO","id":7352552,"orderField":0},{"dateTime":"Friday, Apr 5, 2013","urlTitle":"computing-conversations:-pooja-sankar-on-the-piazza-collaboration-system","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/images/thumbnails/100x100/ComputingConversations.jpg","groupId":53319,"channel":"NETWORKING","description":"Computer magazine's multimedia editor Charles Severance interviews Pooja Sankar about the Piazza online collaboration system that was developed to help students, particularly women, studying science and engineering subjects feel less isolated.","dateTimeMS":1365163200000,"title":"Computing Conversations: Pooja Sankar on the Piazza Collaboration System","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=computing-conversations%3A-pooja-sankar-on-the-piazza-collaboration-system","target":"_self","peerReviewed":false,"subType":"VIDEO","id":7340788,"orderField":0},{"dateTime":"Tuesday, Jun 11, 2013","urlTitle":"computing-conversations:-bob-metcalfe-on-the-first-ethernet-lan","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/images/thumbnails/100x100/ComputingConversations.jpg","groupId":53319,"channel":"NETWORKING","description":"Computer magazine's multimedia editor Charles Severance interviews Bob Metcalfe about the creation of the first Ethernet local area network 40 years ago at Xerox Palo Alto Research Center.","dateTimeMS":1370952000000,"title":"Computing Conversations: Bob Metcalfe on the First Ethernet LAN","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=computing-conversations%3A-bob-metcalfe-on-the-first-ethernet-lan","target":"_self","peerReviewed":false,"subType":"VIDEO","id":7475586,"orderField":0},{"dateTime":"Thursday, Jul 11, 2013","urlTitle":"privacy-and-online-social-networks:-can-colorless-green-ideas-sleep-furiously","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/images/thumbnails/100x100/connected-nodes-on-earth-100x100.jpg","groupId":53319,"channel":"SECURITY","description":"One definition of privacy is the selective revelation of information about oneself. With billions of people using social media, it's increasingly difficult for users to control what they're disclosing and to whom. Current privacy protection measures block leakages via privacy settings that are syntactic in nature, but existing solutions don't attempt to cover all the entities who might end up receiving the data, ensure the need for or use of the data collected, determine the duration of data retention, or reveal if the data is merged with external information to reveal the user's full identity. The title of the article is from linguist Noam Chomsky, who used it to distinguish between syntax and semantics. Virtually all privacy solutions thus far handle issues relating only to the first hop of the personal data flow from a user. The gap can only be filled by examining the semantics behind the multihop flow of user data over time. This article surveys the state of the art and presents some potential directions in moving from a syntactic approach to a more holistic semantics-based approach.","dateTimeMS":1373515200000,"title":"Privacy and online social networks: can colorless green ideas sleep furiously?","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=privacy-and-online-social-networks%3A-can-colorless-green-ideas-sleep-furiously","target":"_self","peerReviewed":true,"subType":"","id":7510492,"orderField":0},{"dateTime":"Tuesday, Jul 2, 2013","urlTitle":"the-rise-and-fall-of-the-ivory-tower","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/images/shared/MusingsFromTheIvoryTower-100x100.jpg","groupId":7512968,"channel":"","description":"Welcome to \"Musings from the Ivory Tower,\" my blog that will appear regularly in Computing Now \u2014 or at least as regularly as I feel compelled to rant about something new that catches my eye or ruins my day.","dateTimeMS":1372788840000,"title":"The Rise and Fall of the Ivory Tower","type":"article","subCategories":"","url":"/web/musings-from-the-ivory-tower/content?g=7512968&type=article&urlTitle=the-rise-and-fall-of-the-ivory-tower","target":"_self","peerReviewed":false,"subType":"BLOG POST","id":7612703,"orderField":0},{"dateTime":"Wednesday, Aug 14, 2013","urlTitle":"software-defined-networking:-on-the-verge-of-a-breakthrough-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/images/thumbnails/100x100/software2-puzzle-code-100x100.jpg","groupId":53319,"channel":"SECURITY","description":"Many experts predict that software-defined networking, a technology that's been highly touted for several years, will finally begin gaining ground in the marketplace.","dateTimeMS":1376481600000,"title":"Software-Defined Networking: On the Verge of a Breakthrough?","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=software-defined-networking%3A-on-the-verge-of-a-breakthrough-","target":"_self","peerReviewed":false,"subType":"NEWS","id":7571046,"orderField":0},{"dateTime":"Thursday, Aug 22, 2013","urlTitle":"publications-of-the-future-rantings-and-ravings","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/images/shared/MusingsFromTheIvoryTower-100x100.jpg","groupId":7512968,"channel":"","description":"In this, my second blog post, I'd like to elaborate on some of the matters I introduced last month, related to the quality of scholarly publications. In my first post, I lamented about the probability of a future in which there may be a decreasing number of higher education authors and readers of scholarly articles. This month I'd like to continue that discussion, but focus on other matters that I think may affect the nature of scholarly publications in the future.","dateTimeMS":1377179160000,"title":"Publications of the Future - Rantings and Ravings","type":"article","subCategories":"","url":"/web/musings-from-the-ivory-tower/content?g=7512968&type=article&urlTitle=publications-of-the-future-rantings-and-ravings","target":"_self","peerReviewed":false,"subType":"BLOG POST","id":7612684,"orderField":0},{"dateTime":"Friday, Aug 30, 2013","urlTitle":"errant-hashtag:-the-good-of-the-city","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=7626655&t=1496745141373","groupId":53319,"channel":"NETWORKING","description":"Podcast - Author David Alan Grier expands on his Errant Hashtag column, in which he discusses how the idea of \"smart cities\" makes more sense than the idea of \"smart homes.\"","dateTimeMS":1377853260000,"title":"Errant Hashtag: The Good of the City","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=errant-hashtag%3A-the-good-of-the-city","target":"_self","peerReviewed":false,"subType":"PODCAST","id":7627617,"orderField":0},{"dateTime":"Friday, Oct 4, 2013","urlTitle":"open-or-not-open-that-is-the-question-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/images/shared/MusingsFromTheIvoryTower-100x100.jpg","groupId":7512968,"channel":"","description":"If you\u2019re a faculty member with teaching responsibilities and don't know about \"open,\u201d it's time you found out. Even if you\u2019re a taxpayer and not a faculty member \u2014 or certainly if you\u2019re both \u2014 and don't know about it, it's time you found out.","dateTimeMS":1380895680000,"title":"Open, or Not Open. That is the Question.","type":"article","subCategories":"","url":"/web/musings-from-the-ivory-tower/content?g=7512968&type=article&urlTitle=open-or-not-open-that-is-the-question-","target":"_self","peerReviewed":false,"subType":"BLOG POST","id":7697485,"orderField":0},{"dateTime":"Thursday, Oct 10, 2013","urlTitle":"president-s-corner:-who-we-are","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=7702100&t=1496745141389","groupId":53319,"channel":"INSIGHTS","description":"IEEE Computer Society President David Alan Grier discusses the importance of the Computer Society's relationship with IEEE. From Computer's October 2013 issue.","dateTimeMS":1381395600000,"title":"President's Corner: Who We Are","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=president-s-corner%3A-who-we-are","target":"_self","peerReviewed":false,"subType":"VIDEO","id":7702098,"orderField":0},{"dateTime":"Monday, Oct 28, 2013","urlTitle":"touchdevelop-helps-students-build-their-first-apps","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=7733391&t=1496745141398","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"More than 500 students from 17 Seattle schools participated in App Day 2013 -- a fun opportunity for students to gain first-hand computer programming experience with the help of Microsoft's TouchDevelop platform, which easily allows you to build apps on the iPad, iPhone, Android, PC, Mac and Windows Phone.","dateTimeMS":1382950800000,"title":"TouchDevelop helps students build their first apps","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=touchdevelop-helps-students-build-their-first-apps","target":"_self","peerReviewed":false,"subType":"VIDEO","id":7733389,"orderField":0},{"dateTime":"Tuesday, Nov 12, 2013","urlTitle":"analyst-perspectives","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=7762979&t=1496745141406","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending November 01, 2013.","dateTimeMS":1384250400000,"title":"Analyst Perspectives","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=analyst-perspectives","target":"_self","peerReviewed":false,"subType":"","id":7763002,"orderField":0},{"dateTime":"Friday, Nov 15, 2013","urlTitle":"analyst-perspectives-weekly-scan","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=7765142&t=1496745141415","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"This issue of Analyst Perspectives Weekly Scan covers analyst commentary from the week ending November 08, 2013.","dateTimeMS":1384511580000,"title":"Analyst Perspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=analyst-perspectives-weekly-scan","target":"_self","peerReviewed":false,"subType":"","id":7765140,"orderField":0},{"dateTime":"Thursday, Nov 21, 2013","urlTitle":"analyst-perspectives-weekly-sc-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=7780439&t=1496745141423","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"This issue of Analyst Perspectives Weekly Scan covers analyst commentary from the week ending November 15, 2013.","dateTimeMS":1385028000000,"title":"Analyst Perspectives - Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=analyst-perspectives-weekly-sc-1","target":"_self","peerReviewed":false,"subType":"","id":7780437,"orderField":0},{"dateTime":"Tuesday, Nov 26, 2013","urlTitle":"andrew-tanenbaum:-writing-the-book-on-networks-video","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi53","groupId":53319,"channel":"NETWORKING","description":"Author Charles Severance interviews Andrew Tanenbaum about how he came to write one of the key books in the computer science field. From Computer's December 2013 issue.","dateTimeMS":1385460000000,"title":"Andrew Tanenbaum: Writing the Book on Networks Video","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=andrew-tanenbaum%3A-writing-the-book-on-networks-video","target":"_self","peerReviewed":false,"subType":"VIDEO","id":7958584,"orderField":0},{"dateTime":"Monday, Dec 2, 2013","urlTitle":"analystperspectives-weekly-scan-week-ending-november-22-2013","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending November 22, 2013.","dateTimeMS":1385978400000,"title":"AnalystPerspectives Weekly Scan - week ending November 22, 2013","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=analystperspectives-weekly-scan-week-ending-november-22-2013","target":"_self","peerReviewed":false,"subType":"","id":7799900,"orderField":0},{"dateTime":"Friday, Dec 6, 2013","urlTitle":"analystperspectives-weekly-scan","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=7826419&t=1496745141449","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending November 29, 2013.","dateTimeMS":1386324000000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=analystperspectives-weekly-scan","target":"_self","peerReviewed":false,"subType":"","id":7826417,"orderField":0},{"dateTime":"Monday, Dec 9, 2013","urlTitle":"using-fuel-cells-to-make-data-centers-more-efficient-more-sustainable","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=7826480&t=1496745141457","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Data centers are playing an increasingly important role in powering 21st-century computing, and that trend seems likely to intensify over the foreseeable future. One of the keys to making data centers efficient is to improve their rate of availability, but that typically entails significant additional costs in infrastructure. But what if improved service availability could be achieved while reducing infrastructure costs?","dateTimeMS":1386583200000,"title":"Using Fuel Cells to Make Data Centers More Efficient, More Sustainable","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=using-fuel-cells-to-make-data-centers-more-efficient-more-sustainable","target":"_self","peerReviewed":false,"subType":"","id":7826478,"orderField":0},{"dateTime":"Wednesday, Dec 11, 2013","urlTitle":"bill-eklow-on-micoroprocessor-reliability","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Distinguished manufacturing engineer at Cisco Systems, Bill Eklow examines application-enabled defects with microprocessors. He describes several approaches that can be used to identify and mitigate application-level errors. This video is part of the Computing Now \"Industry Perspective\" series for December 2013.","dateTimeMS":1386756120000,"title":"Bill Eklow on Micoroprocessor Reliability","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=bill-eklow-on-micoroprocessor-reliability","target":"_self","peerReviewed":false,"subType":"VIDEO","id":7826946,"orderField":0},{"dateTime":"Tuesday, Dec 10, 2013","urlTitle":"analystperspectives-weekly-scan-week-ending-december-6-2013","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=7836671&t=1496745141474","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending December 06, 2013.","dateTimeMS":1386706680000,"title":"AnalystPerspectives Weekly Scan - week ending December 6, 2013","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=analystperspectives-weekly-scan-week-ending-december-6-2013","target":"_self","peerReviewed":false,"subType":"","id":7836696,"orderField":0},{"dateTime":"Thursday, Dec 19, 2013","urlTitle":"analystperspectives-weekly-sc-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending December 13, 2013.","dateTimeMS":1387447200000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=analystperspectives-weekly-sc-1","target":"_self","peerReviewed":false,"subType":"","id":7850989,"orderField":0},{"dateTime":"Thursday, Jan 9, 2014","urlTitle":"analystperspectives-weekly-scan-december-20-27-2013","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi7","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the weeks ending December 20-27, 2013.","dateTimeMS":1389271260000,"title":"AnalystPerspectives Weekly Scan December 20-27, 2013","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=analystperspectives-weekly-scan-december-20-27-2013","target":"_self","peerReviewed":false,"subType":"","id":7877404,"orderField":0},{"dateTime":"Tuesday, Jan 14, 2014","urlTitle":"hacking-to-build-diverse-teams-of-technological-innovators","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi10","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Technology can play a key role in finding solutions to big problems. First, we have to build diverse teams of innovators to lead the way. Hackathons provide a great opportunity for anyone to experience coding and see how technology can be used to address serious issues. As I contemplate my New Year's resolutions, I hope to do all that I can to encourage everyone who has an interest in computing to participate in a hackathon\u2014as either a hacker or a sponsor.","dateTimeMS":1389702780000,"title":"Hacking to build diverse teams of technological innovators","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=hacking-to-build-diverse-teams-of-technological-innovators","target":"_self","peerReviewed":false,"subType":"","id":7877533,"orderField":0},{"dateTime":"Monday, Jan 13, 2014","urlTitle":"analystperspectives-weekly-sc-2","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi12","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending January 03, 2014.","dateTimeMS":1389618000000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=analystperspectives-weekly-sc-2","target":"_self","peerReviewed":false,"subType":"","id":7878696,"orderField":0},{"dateTime":"Thursday, Jan 16, 2014","urlTitle":"analystperspectives-weekly-scan-week-ending-january-10-2014-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi31","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending January 10, 2014.","dateTimeMS":1389866400000,"title":"AnalystPerspectives Weekly Scan - week ending January 10, 2014.","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=analystperspectives-weekly-scan-week-ending-january-10-2014-","target":"_self","peerReviewed":false,"subType":"","id":7898797,"orderField":0},{"dateTime":"Wednesday, Jan 22, 2014","urlTitle":"analystperspectives-weekly-sc-3","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi33","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending January 17, 2014.","dateTimeMS":1390384800000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=analystperspectives-weekly-sc-3","target":"_self","peerReviewed":false,"subType":"","id":7924302,"orderField":0},{"dateTime":"Wednesday, Jan 29, 2014","urlTitle":"analystperspectives-weekly-scan-from-the-week-ending-january-24-2014-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi41","groupId":53319,"channel":"SECURITY","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending January 24, 2014.","dateTimeMS":1390991340000,"title":"AnalystPerspectives Weekly Scan from the week ending January 24, 2014.","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=analystperspectives-weekly-scan-from-the-week-ending-january-24-2014-","target":"_self","peerReviewed":false,"subType":"","id":7945520,"orderField":0},{"dateTime":"Tuesday, Feb 4, 2014","urlTitle":"analystperspectives-weekly-scan-from-the-week-ending-january-31-2014","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi58","groupId":53319,"channel":"SECURITY","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending January 31, 2014.","dateTimeMS":1391497200000,"title":"AnalystPerspectives Weekly Scan from the week ending January 31, 2014","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=analystperspectives-weekly-scan-from-the-week-ending-january-31-2014","target":"_self","peerReviewed":false,"subType":"","id":55172253,"orderField":0},{"dateTime":"Thursday, Feb 6, 2014","urlTitle":"community-empowerment-and-growing-more-women-in-tech","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi63","groupId":53319,"channel":"INSIGHTS","description":"Almost a year ago, I moved to Bend, a town in the Cascade Mountains of central Oregon. This former timber town (it was once home to two of the world\u2019s largest pine mills) has reinvented itself as an outdoor recreation mecca and, according to Entrepreneur Magazine, the most entrepreneurial city in the United States. Today, Bend has more than 40 technology companies and one the highest densities of startups per capita in the nation.","dateTimeMS":1391666700000,"title":"Community empowerment and growing more women in tech","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=community-empowerment-and-growing-more-women-in-tech","target":"_self","peerReviewed":false,"subType":"","id":55171410,"orderField":0},{"dateTime":"Wednesday, Feb 12, 2014","urlTitle":"analystperspectives-weekly-scan-week-ending-february-7-2014","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi70","groupId":53319,"channel":"NETWORKING","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending February 07, 2014.","dateTimeMS":1392195660000,"title":"AnalystPerspectives Weekly Scan - Week Ending February 7, 2014","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=analystperspectives-weekly-scan-week-ending-february-7-2014","target":"_self","peerReviewed":false,"subType":"","id":7982033,"orderField":0},{"dateTime":"Wednesday, Feb 19, 2014","urlTitle":"analystperspectives-week-ending-february-14-2014-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi81","groupId":53319,"channel":"SECURITY","description":"AnalystPerspectives Weekly Scan covers analyst commentary from the week ending February 14, 2014.","dateTimeMS":1392800400000,"title":"AnalystPerspectives - week ending February 14, 2014.","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=analystperspectives-week-ending-february-14-2014-","target":"_self","peerReviewed":false,"subType":"","id":55172093,"orderField":0},{"dateTime":"Wednesday, Feb 26, 2014","urlTitle":"analystperspectives-week-ending-february-21-2014-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi107","groupId":53319,"channel":"SECURITY","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending February 21, 2014.","dateTimeMS":1393405200000,"title":"AnalystPerspectives week ending February 21, 2014.","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=analystperspectives-week-ending-february-21-2014-","target":"_self","peerReviewed":false,"subType":"","id":55172213,"orderField":0},{"dateTime":"Monday, Mar 10, 2014","urlTitle":"len-kleinrock:-the-first-two-packets-on-the-internet-video","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi130","groupId":53319,"channel":"NETWORKING","description":"Author Charles Severance interviews Len Kleinrock about the Internet's humble beginnings. From Computer's March 2014 issue.","dateTimeMS":1394439420000,"title":"Len Kleinrock: The First Two Packets on the Internet Video","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=len-kleinrock%3A-the-first-two-packets-on-the-internet-video","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8119401,"orderField":0},{"dateTime":"Wednesday, Mar 12, 2014","urlTitle":"the-next-disruption-in-digital-learning","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/images/shared/MusingsFromTheIvoryTower-100x100.jpg","groupId":7512968,"channel":"","description":"The next disruption in digital learning is already here, but like the future, it's not evenly distributed. This disruption represents the integration of eLearning, publishing, and digital media, and the form of this disruption is the new EPUB 3 format developed for digital publications by the International Digital Publishing Forum (IDPF). At a technical level, EPUB 3 provides an open content framework for structuring, packaging, and mobile delivery of HTML5 content in a way that's accessible to diverse users in diverse environments.","dateTimeMS":1394649660000,"title":"The Next Disruption in Digital Learning","type":"article","subCategories":"","url":"/web/musings-from-the-ivory-tower/content?g=7512968&type=article&urlTitle=the-next-disruption-in-digital-learning","target":"_self","peerReviewed":false,"subType":"BLOG POST","id":53946088,"orderField":0},{"dateTime":"Friday, Mar 14, 2014","urlTitle":"analystperspectives-weekly-sc-4","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi135","groupId":53319,"channel":"MOBILE","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending February 08, 2013.","dateTimeMS":1394784000000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analystperspectives-weekly-sc-4","target":"_self","peerReviewed":false,"subType":"","id":55171653,"orderField":0},{"dateTime":"Tuesday, Mar 25, 2014","urlTitle":"computing-conversations:-doug-van-houweling-on-building-the-nsfnet","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"NETWORKING","description":"Author Charles Severance provides an audio recording of his Computing Conversations column, in which he discusses his interview with Doug Van Houweling about how the NSFNet went from connecting a few supercomputers to becoming \"the Internet.\"","dateTimeMS":1395737880000,"title":"Computing Conversations: Doug Van Houweling on Building the NSFNet","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=computing-conversations%3A-doug-van-houweling-on-building-the-nsfnet","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8097730,"orderField":0},{"dateTime":"Thursday, Apr 10, 2014","urlTitle":"heartbleed:-how-did-it-escape-detection-for-so-long-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi189","groupId":53319,"channel":"SECURITY","description":"The past few days have been choc-a-block with discussions of Heartbleed\u2013what it is and how it works, and what the average user should do about it. (For the former, here is a particularly understandable explanation. The answer to the latter: wait until sites are fixed, and THEN change your password. If it\u2019s a high-value site, changing your password before the patch has been installed and a new key/certificate has been generated is counterproductive, as it may make your new password more vulnerable rather than less. Ed Felten provides good advice both for the average user and for website operators on what they should do.","dateTimeMS":1397166600000,"title":"Heartbleed: How Did It Escape Detection For So Long?","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=heartbleed%3A-how-did-it-escape-detection-for-so-long-","target":"_self","peerReviewed":false,"subType":"","id":55161600,"orderField":0},{"dateTime":"Monday, Apr 21, 2014","urlTitle":"wwt-brings-astronomy-to-life-for-children-of-all-ages","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"BIG DATA","description":"The night sky holds a special fascination for children worldwide. They gaze at the moon and stars shining overhead, and wonder what they are and how they got there. This natural curiosity is dampened, however, for children who live in urban areas, where air and light pollution dim the celestial show. With only a pale version of the night sky visible to them, their natural fascination with the heavens can wane, their attention turning to the brighter displays of video games. And while we have nothing against video games, we at Microsoft Research are pleased to offer youngsters the chance to be captivated again by the stories written on the canvas of the sky. Thanks to Microsoft Research\u2019s WorldWide Telescope (WWT), anyone can see the night sky in all its glory and be enraptured by endlessly fascinating tours of the heavens.","dateTimeMS":1398106740000,"title":"WWT brings astronomy to life for children of all ages","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=wwt-brings-astronomy-to-life-for-children-of-all-ages","target":"_self","peerReviewed":false,"subType":"","id":8160622,"orderField":0},{"dateTime":"Friday, May 9, 2014","urlTitle":"quick-answers-from-large-data","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi202","groupId":53319,"channel":"BIG DATA","description":"Tempe is an interactive system for exploring large data sets. It accelerates faster machine learning by facilitating quick, iterative feature engineering and data understanding. Tempe is a combination of three technologies:\n\nTrill: a high-speed, temporal, progressive-relational stream-processing engine 100 times faster than StreamInsight.\nWINQ: a layer that emulates LINQ but provides progressive queries\u2014providing \u201cbest effort\u201d partial answers.\nStat: an interactive, C# integrated development environment that enables users to visualize progressive answers.\nThe combination of these technologies enables users to try and discard queries quickly, enabling much faster exploration of large data sets.","dateTimeMS":1399621440000,"title":"Quick Answers From Large Data","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=quick-answers-from-large-data","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8162945,"orderField":0},{"dateTime":"Thursday, May 8, 2014","urlTitle":"when-urban-air-quality-meets-big-data","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi203","groupId":53319,"channel":"BIG DATA","description":"Urban air quality -- the concentration of PM2.5 -- is of great importance in protecting human health. While there are limited air-quality-monitor-stations in a city, air quality varies by location significantly and is influenced by multiple complex factors, such as traffic flow and land use. Consequently, people cannot know the air quality of a location without a monitoring station. This project infers real-time, fine-grained air-quality information throughout a city, based on air-quality data reported by existing monitor stations and a variety of data sources observed in the city, such as meteorology, traffic flow, human mobility, the structure of road networks, and points of interest. This fine-grained air-quality information could help people figure out when and where to go jogging\u2014or when they should shut the window or put on a face mask in locations where air quality is already a daily issue. This could lead to long-term solutions in predicting forthcoming air quality and identifying the root cause of air pollution.","dateTimeMS":1399539060000,"title":"When Urban Air Quality Meets Big Data","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=when-urban-air-quality-meets-big-data","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8193213,"orderField":0},{"dateTime":"Tuesday, May 6, 2014","urlTitle":"errant-hashtag:-real-change","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi205","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Author David Alan Grier expands on his Errant Hashtag column, discussing how The change that software has wrought is a change to how we organize ourselves.","dateTimeMS":1399348860000,"title":"Errant Hashtag: Real Change","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=errant-hashtag%3A-real-change","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8172174,"orderField":0},{"dateTime":"Wednesday, May 7, 2014","urlTitle":"toward-compressive-camera-networks","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi206","groupId":53319,"channel":"BIG DATA","description":"A video demonstration of how compressive sensing lets researchers reconstruct high-resolution data from fewer samples, which could alleviate the data deluge in large-scale multimodal camera networks.","dateTimeMS":1399435260000,"title":"Toward Compressive Camera Networks","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=toward-compressive-camera-networks","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8172602,"orderField":0},{"dateTime":"Monday, May 12, 2014","urlTitle":"computing-conversations:-nathaniel-borenstein-on-mime","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi207","groupId":53319,"channel":"NETWORKING","description":"Author Charles Severance provides an audio recording of his Computing Conversations column, in which he discusses his interview with Nathaniel Borenstein about how mail evolved from plaintext to multimedia.","dateTimeMS":1399871160000,"title":"Computing Conversations: Nathaniel Borenstein on MIME","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=computing-conversations%3A-nathaniel-borenstein-on-mime","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8172630,"orderField":0},{"dateTime":"Friday, May 16, 2014","urlTitle":"how-search-can-help-in-a-medical-crisis","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi230","groupId":53319,"channel":"MOBILE","description":"One day, a woman named Lisa is walking her dog, Lucky, when she meets an elderly neighbor. Suddenly, the neighbor falls unconscious and stops breathing.\n\nWhat would you do in this scenario? These days, many people\u2019s initial reaction would be to reach for their mobile phones and seek help. But today\u2019s search engines don\u2019t offer pertinent assistance for such a situation. You can go to Wikipedia or the Mayo Clinic site, but those resources are designed for relaxed information seeking, not for urgent settings such as the one above.","dateTimeMS":1400216460000,"title":"How Search Can Help in a Medical Crisis","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=how-search-can-help-in-a-medical-crisis","target":"_self","peerReviewed":false,"subType":"","id":55172073,"orderField":0},{"dateTime":"Thursday, May 15, 2014","urlTitle":"analystperspectives-weekly-sc-9","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi231","groupId":53319,"channel":"SECURITY","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending May 09, 2014.","dateTimeMS":1400142540000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=analystperspectives-weekly-sc-9","target":"_self","peerReviewed":false,"subType":"","id":8196113,"orderField":0},{"dateTime":"Tuesday, May 20, 2014","urlTitle":"mobile-engagement-is-driving-enterprise-it-transformations","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi234","groupId":53319,"channel":"MOBILE","description":"As the IT market becomes increasingly cloud- and mobile-led, enterprises grapple with how to evolve their IT infrastructure while balancing the costs and challenges of transforming their IT strategies to conform to industry regulations.","dateTimeMS":1400562120000,"title":"Mobile engagement is driving enterprise IT transformations","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=mobile-engagement-is-driving-enterprise-it-transformations","target":"_self","peerReviewed":false,"subType":"","id":8202796,"orderField":0},{"dateTime":"Thursday, May 22, 2014","urlTitle":"analystperspectives-weekly-s-10","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi236","groupId":53319,"channel":"MOBILE","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending May 16, 2014.","dateTimeMS":1400734920000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-10","target":"_self","peerReviewed":false,"subType":"","id":8219932,"orderField":0},{"dateTime":"Monday, Jun 2, 2014","urlTitle":"computing-and-the-law:-privacy-and-big-data","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"BIG DATA","description":"Authors Brian M. Gaff, Heather Egan Sussman, and Jennifer Geetter provide an audio recording of the Computing and the Law column, in which they discuss how big data's explosive growth has prompted the US government to release new reports that address the issues\u2014particularly related to privacy\u2014resulting from this growth.","dateTimeMS":1401692460000,"title":"Computing and the Law: Privacy and Big Data","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=computing-and-the-law%3A-privacy-and-big-data","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8224216,"orderField":0},{"dateTime":"Wednesday, Jun 4, 2014","urlTitle":"errant-hashtag:-peace-in-our-time","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"NETWORKING","description":"Author David Alan Grier expands on his Errant Hashtag column, discussing the First and Second Great Wars of Internet Governance.","dateTimeMS":1401860220000,"title":"Errant Hashtag: Peace in Our Time","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=errant-hashtag%3A-peace-in-our-time","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8225586,"orderField":0},{"dateTime":"Thursday, Jun 5, 2014","urlTitle":"expanding-the-frontiers-of-smartphone-ecosystems","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi265","groupId":53319,"channel":"MOBILE","description":"A video demonstration of Smart AppStore, which offers five important features for today's smartphone users: biometric authentication, multilevel authorization, gesture recognition and navigation, user-tailored reputation scores, and identity management.","dateTimeMS":1401944460000,"title":"Expanding the Frontiers of Smartphone Ecosystems","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=expanding-the-frontiers-of-smartphone-ecosystems","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8225912,"orderField":0},{"dateTime":"Monday, Jun 9, 2014","urlTitle":"analystperspectives-weekly-s-12","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi271","groupId":53319,"channel":"CLOUD","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending May 30, 2014.","dateTimeMS":1402326420000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-12","target":"_self","peerReviewed":false,"subType":"","id":8238738,"orderField":0},{"dateTime":"Monday, Jun 9, 2014","urlTitle":"requirements:-beyond-anecdotal-thinking:-deepening-our-understanding-for-achieving-quality-goa-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"SECURITY","description":"Author Jane Cleland-Huang provides an audio recording of her Requirements column, in which she discusses the importance of making informed decisions about how much time and effort to invest in analyzing security needs and specifying product-level security requirements.","dateTimeMS":1402290900000,"title":"Requirements: Beyond Anecdotal Thinking: Deepening Our Understanding for Achieving Quality Goals","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=requirements%3A-beyond-anecdotal-thinking%3A-deepening-our-understanding-for-achieving-quality-goa-1","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8238783,"orderField":0},{"dateTime":"Wednesday, Jun 11, 2014","urlTitle":"tools-of-the-trade:-service-orchestration-with-rundeck","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Author Diomidis Spinellis provides an audio recording of his On Computing column, in which he discusses how managing and controlling a serviceís provision is tricky, but tools for service orchestration, like Rundeck, can make our lives easier. From IEEE Software's July/August 2014 issue.","dateTimeMS":1402464060000,"title":"Tools of the Trade: Service Orchestration with Rundeck","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=tools-of-the-trade%3A-service-orchestration-with-rundeck","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8239109,"orderField":0},{"dateTime":"Thursday, Jun 12, 2014","urlTitle":"analystperspectives-weekly-s-13","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi274","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending June 06, 2014.","dateTimeMS":1402595100000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-13","target":"_self","peerReviewed":false,"subType":"","id":8244746,"orderField":0},{"dateTime":"Monday, Jun 16, 2014","urlTitle":"seeking-answers-amid-world-cup-excitement","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/53319.png","groupId":53319,"channel":"INSIGHTS","description":"\u201cSports are extremely predictable,\u201d he explains, \u201cbut the World Cup is much more idiosyncratic. It\u2019s more like politics in that way. We know a lot about how a generic Brazil team would do against a generic Croatia team, similar to the way I know how a generic Republican candidate will do against a generic Democratic candidate. Yet it is a whole lot less certain than how the New York Yankees are going to do against the Seattle Mariners with 60 baseball games of data already in the books.\n\n\u201cThat being said, over time, we learn more and more ways to get the data we need to answer the idiosyncratic events in a purely data-driven way.\u201d","dateTimeMS":1402904700000,"title":"Seeking Answers amid World Cup Excitement","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=seeking-answers-amid-world-cup-excitement","target":"_self","peerReviewed":false,"subType":"","id":8283250,"orderField":0},{"dateTime":"Tuesday, Jun 17, 2014","urlTitle":"analystperspectives-weekly-s-14","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi278","groupId":53319,"channel":"CLOUD","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending June 13, 2014.","dateTimeMS":1403012160000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-14","target":"_self","peerReviewed":false,"subType":"","id":55171450,"orderField":0},{"dateTime":"Tuesday, Jun 24, 2014","urlTitle":"a-flexible-pinhole-camera-model-for-coherent-non-uniform-sampling","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/53319.png","groupId":53319,"channel":"BIG DATA","description":"a pinhole camera model that allows modulating the sampling rate over the field of view with great flexibility. This flexible pinhole camera or FPC is defined by a viewpoint (i.e. eye) and by a sampling map that specifies the sampling locations on the image plane. The sampling map is constructed from known regions of interest with interactive and automatic approaches. The FPC provides an inexpensive 3-D projection operation which allows rendering complex datasets quickly, in feed-forward fashion, by projection followed by rasterization.","dateTimeMS":1403586060000,"title":"A Flexible Pinhole Camera Model for Coherent Non-Uniform Sampling","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=a-flexible-pinhole-camera-model-for-coherent-non-uniform-sampling","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8283210,"orderField":0},{"dateTime":"Thursday, Jun 26, 2014","urlTitle":"analystperspectives-weekly-s-15","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi282","groupId":53319,"channel":"MOBILE","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending June 20, 2014.","dateTimeMS":1403760660000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-15","target":"_self","peerReviewed":false,"subType":"","id":8279978,"orderField":0},{"dateTime":"Wednesday, Jul 2, 2014","urlTitle":"analystperspectives-weekly-s-16","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi292","groupId":53319,"channel":"MOBILE","description":"Our News of the Week in Review begins with a variety of Data, Big Data & Digital Assets applications. Here is a sampling from this week\u2019s articles:","dateTimeMS":1404277740000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-16","target":"_self","peerReviewed":false,"subType":"","id":55167190,"orderField":0},{"dateTime":"Thursday, Jul 3, 2014","urlTitle":"andrew-s-tanenbaum:-the-impact-of-minix","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi304","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Author Charles Severance interviews Andrew S. Tanenbaum about the \nmotivation, development, and market impact of the MINIX operating system.","dateTimeMS":1404394980000,"title":"Andrew S. Tanenbaum: The Impact of MINIX","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=andrew-s-tanenbaum%3A-the-impact-of-minix","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8297824,"orderField":0},{"dateTime":"Monday, Jul 7, 2014","urlTitle":"the-financial-challenges-of-cloud-pure-plays:-what-they-can-learn-from-software-vendors","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi305","groupId":53319,"channel":"CLOUD","description":"There is little doubt that a fundamental change is happening in the way enterprises consume IT. Technological advancements that enable cloud deployments of enterprise software are driving the change. While the technology changes are notable, they also carry with them a business model change. Customers can now purchase IT in a more incremental and flexible way, changing the sales model from blue-suit selling to add-to-cart selling.","dateTimeMS":1404710340000,"title":"The financial challenges of cloud pure plays: What they can learn from software vendors","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=the-financial-challenges-of-cloud-pure-plays%3A-what-they-can-learn-from-software-vendors","target":"_self","peerReviewed":false,"subType":"","id":8300634,"orderField":0},{"dateTime":"Thursday, Jul 10, 2014","urlTitle":"analystperspectives-weekly-s-17","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi311","groupId":53319,"channel":"MOBILE","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending July 04, 2014.","dateTimeMS":1404968760000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-17","target":"_self","peerReviewed":false,"subType":"","id":8310538,"orderField":0},{"dateTime":"Wednesday, Jul 16, 2014","urlTitle":"tools-of-the-trade:-service-orchestration-with-runde-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi312","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Author Diomidis Spinellis provides an audio recording of his On Computing column, in which he discusses how managing and controlling a serviceís provision is tricky, but tools for service orchestration, like Rundeck, can make our lives easier. From IEEE Software's July/August 2014 issue.","dateTimeMS":1405487340000,"title":"Tools of the Trade: Service Orchestration with Rundeck","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=tools-of-the-trade%3A-service-orchestration-with-runde-1","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8314630,"orderField":0},{"dateTime":"Thursday, Jul 17, 2014","urlTitle":"conjecture-proof-leads-to-polya-prize","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi313","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"It was almost a year ago that you might have learned the astounding news that a team of two researchers from Yale University and one from Microsoft Research had announced a proof of a riddle that had eluded mathematicians for more than half a century.\n\nThe Kadison-Singer conjecture, first proposed by Richard Kadison and Isadore Singer in 1959, pertains to the mathematical foundations of quantum mechanics.","dateTimeMS":1405574220000,"title":"Conjecture Proof Leads to Pólya Prize","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=conjecture-proof-leads-to-polya-prize","target":"_self","peerReviewed":false,"subType":"","id":8314688,"orderField":0},{"dateTime":"Tuesday, Jul 22, 2014","urlTitle":"chasing-the-impossible-dream:-gps-based-locations-indoors","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi314","groupId":53319,"channel":"MOBILE","description":"Conventional wisdom holds that the use of GPS satellites to enable indoor mapping is a non-starter. GPS receivers, it is said, simply don\u2019t work indoors, for a variety of reasons. While Earth\u2019s outdoors environment has been mapped extensively, indoor localization of places such as shopping malls or department stores remains an elusive dream.","dateTimeMS":1406006760000,"title":"Chasing the Impossible Dream: GPS-Based Locations Indoors","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=chasing-the-impossible-dream%3A-gps-based-locations-indoors","target":"_self","peerReviewed":false,"subType":"","id":8314909,"orderField":0},{"dateTime":"Wednesday, Jul 23, 2014","urlTitle":"catapult:-moving-beyond-cpus-in-the-cloud","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi315","groupId":53319,"channel":"NETWORKING","description":"Operating a datacenter at web scale requires managing many conflicting requirements. The ability to deliver computation at a high level and speed is a given, but because of the demands such a facility must meet, a datacenter also needs flexibility. Additionally, it must be efficient in its use of power, keeping costs as low as possible.","dateTimeMS":1406093760000,"title":"Catapult: Moving Beyond CPUs in the Cloud","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=catapult%3A-moving-beyond-cpus-in-the-cloud","target":"_self","peerReviewed":false,"subType":"","id":8314936,"orderField":0},{"dateTime":"Monday, Jul 14, 2014","urlTitle":"sap\u2019s-\u2018run-simple\u2019-message-is-on-target-but-not-a-current-reality","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"CLOUD","description":"TBR believes SAP is hitting on the right notes as businesses seek to easily use IT to meet goals. At the same time, IT buyers are demanding increased simplicity from their IT environments. SAP is reacting to and driving change. The pace of change has increased dramatically, reflected in public cloud business growing at over five times the overall rate of IT growth. SAP is also driving disruptive change, looking to use innovation to upset competitors and expand its addressable markets.","dateTimeMS":1405312860000,"title":"SAP\u2019s \u2018Run Simple\u2019 message is on target but not a current reality","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=sap%E2%80%99s-%E2%80%98run-simple%E2%80%99-message-is-on-target-but-not-a-current-reality","target":"_self","peerReviewed":false,"subType":"","id":8314963,"orderField":0},{"dateTime":"Tuesday, Jul 15, 2014","urlTitle":"software-defined-networking-has-moved-beyond-hype-but-obstacles-remain-to-its-widespread-adoption","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"NETWORKING","description":"Once a nascent technology understood only by networking visionaries, software-defined networking (SDN) has moved beyond the hype and into real-world network deployments. In 2012 and most of 2013, networking suppliers were primarily focused on communicating their SDN strategies and showcasing initial solutions. Over the last six to 12 months, however, TBR has witnessed not only a maturation of these solutions, but also the implementation of customer deployments as proof that SDN may transform the networking industry similar to how virtualization transformed the server industry over the last decade. Unlike in 2013, when SDN deployments were found only in the data centers of large cloud providers such as Google and Amazon, customers in other verticals such as retail and manufacturing are now using the technology in their production networks.","dateTimeMS":1405403520000,"title":"Software-defined networking has moved beyond hype, but obstacles remain to its widespread adoption","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=software-defined-networking-has-moved-beyond-hype-but-obstacles-remain-to-its-widespread-adoption","target":"_self","peerReviewed":false,"subType":"","id":8314990,"orderField":0},{"dateTime":"Friday, Jul 18, 2014","urlTitle":"next-steps-in-device-proliferation:-toward-a-consumer-internet-of-things-iot-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"MOBILE","description":"As the smartphone and tablet markets saturate and mature, device vendors and consumers are looking toward new smart connected devices that will expand the frontiers of usefulness and entertainment value, while driving growth for device vendors, software developers, software vendors and other adjacent market sectors. While \u201cwearables,\u201d portable devices that often interface with users\u2019 smartphones, have attracted the greatest attention, TBR believes the larger potential market is in fixed devices in the home. The leader in this category is the Nest thermostat, offered by the Nest Labs, now a subsidiary of Google. We think the consumer IoT will complement and often lead the commercial IoT, and together, they will fuel a wave of innovation and expansion in all segments of IT.","dateTimeMS":1405662900000,"title":"Next Steps in Device Proliferation: Toward a Consumer Internet of Things (IoT)","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=next-steps-in-device-proliferation%3A-toward-a-consumer-internet-of-things-iot-","target":"_self","peerReviewed":false,"subType":"","id":8315019,"orderField":0},{"dateTime":"Monday, Jul 21, 2014","urlTitle":"outcome-based-software-buying-creates-new-cy14-opportunities-for-oem-partners","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Enterprise applications customers are increasingly looking for simple-to-deploy solutions that solve defined business problems. Further, they demand the solutions be up and running in shorter and shorter periods of time. Gone are the days when a vendor could expect a long, drawn-out sales process followed by a lengthy systems integration process. Inspired by the instant gratification of their daily lives as consumers, enterprise customers increasingly want the \u201cadd to cart\u201d ease to be extended into enterprise software purchases.","dateTimeMS":1405918860000,"title":"Outcome-based software buying creates new CY14 opportunities for OEM partners","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=outcome-based-software-buying-creates-new-cy14-opportunities-for-oem-partners","target":"_self","peerReviewed":false,"subType":"","id":8315046,"orderField":0},{"dateTime":"Thursday, Jul 24, 2014","urlTitle":"network-equipment-suppliers-will-work-to-make-the-dream-of-network-virtualization-a-reality-in-2014","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi320","groupId":53319,"channel":"NETWORKING","description":"Transformation within the networking industry is occurring rapidly, as networks continue to evolve to fulfill their role as the delivery mechanism for a rapidly growing number of enterprise applications, particularly those being delivered via the cloud and mobile devices.\nAs expected, most of the major network hardware suppliers, including Avaya, Cisco, Dell, HP and Huawei, had a strong presence at Interop Las Vegas 2014, and software vendors such as F5, VMware and Citrix have emerged as major players within the networking ecosystem. One notable exception was Juniper, whose presence was limited to leading a handful of workshops, as the company did not have a booth in the vendor exhibition hall \u2014 further evidence Juniper is de-emphasizing its enterprise business as it focuses on cutting costs in the short term and charting a course for long-term growth.","dateTimeMS":1406221320000,"title":"Network equipment suppliers will work to make the dream of network virtualization a reality in 2014","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=network-equipment-suppliers-will-work-to-make-the-dream-of-network-virtualization-a-reality-in-2014","target":"_self","peerReviewed":false,"subType":"","id":8315075,"orderField":0},{"dateTime":"Friday, Jul 25, 2014","urlTitle":"changing-malware-attack-rates-guide-new-strategies-for-security-vendors","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"SECURITY","description":"Every day cybercriminals launch sophisticated malware attacks against organizations designed to steal valuable data or disable critical services to inflict damage on the organization. The number of malware attacks is increasing, but recent research from Technology Business Research Inc. (TBR) indicates the rate of increase varies significantly depending on the organization; malware attack rates are increasing more rapidly for some organizations and leveling off for others. Security vendors and service providers must adjust their strategies to adapt to changing attack rates.","dateTimeMS":1406264880000,"title":"Changing malware attack rates guide new strategies for security vendors","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=changing-malware-attack-rates-guide-new-strategies-for-security-vendors","target":"_self","peerReviewed":false,"subType":"","id":8315115,"orderField":0},{"dateTime":"Monday, Jul 28, 2014","urlTitle":"growth-areas-such-as-cloud-big-data-security-and-it-consolidation-will-help-atos-ramp-up-revenue-through-2016","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"CLOUD","description":"TBR Perspective \nAtos\u2019 2016 Ambition plan sets a clear strategy for the firm\u2019s growth: Leverage strengths in managed services (MS) and consulting & systems integration (C&SI), commit to disruptive and innovative offerings (with cloud computing as a key growth area), expand reach in North America and emerging geographies, and enhance its position in the payment market through Worldline. With its strategy in place, the firm is in execution mode to overcome its growth challenges, as 2013 revenue declined 0.9% year-to-year at constant scope and exchange rates. Atos is positioning as an end-to-end consult-design-build-run service provider, consolidating its previously separate consulting and technology services with its SI service line and tightening the relationship with the MS service line. Atos\u2019 strategy to align its C&SI business by its four core vertical markets and begin to develop industry-specialized MS offerings will help the firm increase the value and attractiveness of its portfolio. The firm\u2019s investments to augment its traditional portfolio with offerings around technology trends such as cloud, big data and analytics, mobility, smart utilities, and digital security will help support long-term revenue growth and accelerate global expansion. While 2014 will be a year of recovery for the firm, with a difficult 1H14 but anticipated growth improvement in 2H14, the 2016 Ambition plan will enable the firm to reach its three-year target to increase organic revenue by 2% to 3% CAGR from 2014 to 2016.","dateTimeMS":1406524440000,"title":"Growth areas such as cloud, big data, security and IT consolidation will help Atos ramp up revenue through 2016","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=growth-areas-such-as-cloud-big-data-security-and-it-consolidation-will-help-atos-ramp-up-revenue-through-2016","target":"_self","peerReviewed":false,"subType":"","id":8315142,"orderField":0},{"dateTime":"Tuesday, Jul 29, 2014","urlTitle":"salesforce-com-and-its-ecosystem-evolve-to-address-industry-demands","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi323","groupId":53319,"channel":"MOBILE","description":"Salesforce.com relies on ISV Platform partners to develop and sell industry-specific applications\nSalesforce1 is the driving force behind the company\u2019s industry applications play. Salesforce.com is taking a similar approach as Amazon Web Services (AWS) and Microsoft by leaving partners white spaces to build, sell and service industry-specific applications. While Salesforce and its platform competitors have the technical expertise and agility to build industry-specific applications in-house, building and supporting these applications increases R&D and sales and marketing costs \u2014 costs that Salesforce.com, in TBR\u2019s opinion, is trying to reduce. Instead, leveraging partners to drive the majority of industry growth and ensure simple integration enables Salesforce.com to enter the industry applications market while improving profitability and leaving the risk to partners.","dateTimeMS":1406614680000,"title":"Salesforce.com and its ecosystem evolve to address industry demands","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=salesforce-com-and-its-ecosystem-evolve-to-address-industry-demands","target":"_self","peerReviewed":false,"subType":"","id":8351834,"orderField":0},{"dateTime":"Wednesday, Jul 30, 2014","urlTitle":"opportunities-evolving-from-cyber-supply-chain-security-concerns","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi324","groupId":53319,"channel":"SECURITY","description":"Just a few years ago, security breaches were typically enabled by vulnerabilities in the breached organization\u2019s IT infrastructure. Today, however, many security breaches are the consequence of vulnerabilities in the IT infrastructures of the affected organization\u2019s business partners, including the wholesalers, retailers, payment processors and other partners in the organization\u2019s cyber supply chain. This has led to heightened expectations for strong security controls at cyber supply chain partner organizations, a primary topic of discussion at the SecureWorld Boston 2014 conference.\nIncreased focus on cyber supply chain security has altered the way organizations evaluate security solutions and justify security expenditures. It has impacted the way security vendors and service providers engage with customers, placed more demands on cloud service providers and created opportunities for auditors and cyber insurance companies.","dateTimeMS":1406701320000,"title":"Opportunities evolving from cyber supply chain security concerns","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=opportunities-evolving-from-cyber-supply-chain-security-concerns","target":"_self","peerReviewed":false,"subType":"","id":8351854,"orderField":0},{"dateTime":"Tuesday, Jul 1, 2014","urlTitle":"analystperspectives-weekly-s-18","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi362","groupId":53319,"channel":"MOBILE","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending July 25, 2014.","dateTimeMS":1404192720000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-18","target":"_self","peerReviewed":false,"subType":"","id":8351875,"orderField":0},{"dateTime":"Thursday, Jul 31, 2014","urlTitle":"analystperspectives-weekly-s-19","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi363","groupId":53319,"channel":"MOBILE","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending July 25, 2014.","dateTimeMS":1406785020000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-19","target":"_self","peerReviewed":false,"subType":"","id":8351904,"orderField":0},{"dateTime":"Monday, Aug 4, 2014","urlTitle":"how-might-climate-change-affect-our-food-supply-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi365","groupId":53319,"channel":"BIG DATA","description":"t\u2019s no easy question to answer, but prudence demands that we try. Thus, Microsoft and the United States Department of Agriculture (USDA) have teamed up to tackle \u201cfood resilience,\u201d one of several themes that make up the White House\u2019s Climate Data Initiative.","dateTimeMS":1407131340000,"title":"How might climate change affect our food supply?","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=how-might-climate-change-affect-our-food-supply-","target":"_self","peerReviewed":false,"subType":"","id":8351963,"orderField":0},{"dateTime":"Tuesday, Aug 5, 2014","urlTitle":"analystperspectives-weekly-s-20","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi383","groupId":53319,"channel":"MOBILE","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending August 01, 2014.","dateTimeMS":1407250020000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-20","target":"_self","peerReviewed":false,"subType":"","id":55171470,"orderField":0},{"dateTime":"Wednesday, Aug 6, 2014","urlTitle":"computing-conversations:-elizabeth-fong-on-sql-standards","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi384","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Author Charles Severance provides an audio recording of his Computing Conversations column, in which he discusses his interview with Elizabeth Fong about how the standards were created for the Structured Query Language (SQL) database.","dateTimeMS":1407304980000,"title":"Computing Conversations: Elizabeth Fong on SQL Standards","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=computing-conversations%3A-elizabeth-fong-on-sql-standards","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8365587,"orderField":0},{"dateTime":"Thursday, Aug 14, 2014","urlTitle":"analystperspectives-weekly-s-21","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi390","groupId":53319,"channel":"SECURITY","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending August 08, 2014.","dateTimeMS":1407995400000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-21","target":"_self","peerReviewed":false,"subType":"","id":8375307,"orderField":0},{"dateTime":"Monday, Aug 18, 2014","urlTitle":"requirements:-privacy-requirements-in-an-age-of-increased-sharing","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi397","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Author Travis Breaux provides an audio recording of the Requirements column, in which he discusses the increasing importance of privacy in emerging software ecosystems, legal and standards compliance, and software design practice.","dateTimeMS":1408369860000,"title":"Requirements: Privacy Requirements in an Age of Increased Sharing","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=requirements%3A-privacy-requirements-in-an-age-of-increased-sharing","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8384420,"orderField":0},{"dateTime":"Tuesday, Aug 19, 2014","urlTitle":"analystperspectives-weekly-s-22","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi399","groupId":53319,"channel":"SECURITY","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending August 15, 2014.","dateTimeMS":1408456800000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-22","target":"_self","peerReviewed":false,"subType":"","id":8384294,"orderField":0},{"dateTime":"Wednesday, Aug 20, 2014","urlTitle":"quantum-computing-101","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi401","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"An introduction to the mind-bending world of quantum computing. Learn how Microsoft is blending quantum physics with computer science.","dateTimeMS":1408556880000,"title":"Quantum Computing 101","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=quantum-computing-101","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8386793,"orderField":0},{"dateTime":"Thursday, Aug 21, 2014","urlTitle":"stopping-bugs-before-they-sneak-into-software","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi402","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Software development is not for the faint-hearted. Programmers often work long hours, typing code while staring at computer monitors. Computer software can include millions of lines of code, so given the nature and the volume of the work involved, mistakes are unavoidable.","dateTimeMS":1408597500000,"title":"Stopping Bugs Before They Sneak into Software","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=stopping-bugs-before-they-sneak-into-software","target":"_self","peerReviewed":false,"subType":"","id":8387026,"orderField":0},{"dateTime":"Tuesday, Aug 26, 2014","urlTitle":"computing-conversations:-nii-quaynor-on-bringing-the-internet-to-africa","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi403","groupId":53319,"channel":"NETWORKING","description":"Author Charles Severance provides an audio recording of his Computing Conversations column, in which he discusses his interview with Nii Quaynor about how the story of bringing the Internet to Africa is one of cooperation and collaboration for the common good.","dateTimeMS":1409061540000,"title":"Computing Conversations: Nii Quaynor on Bringing the Internet to Africa","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=computing-conversations%3A-nii-quaynor-on-bringing-the-internet-to-africa","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8392973,"orderField":0},{"dateTime":"Wednesday, Aug 27, 2014","urlTitle":"science-fiction-prototyping:-my-summer-with-a-robot","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi404","groupId":53319,"channel":"MOBILE","description":"Futurist Brian David Johnson expands on his Science Fiction Prototyping column, speaking with Julie Hubschman about how she spent the summer with Jimmy the Robot, a walking, talking, tweeting science fiction prototype.","dateTimeMS":1409115960000,"title":"Science Fiction Prototyping: My Summer with a Robot","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=science-fiction-prototyping%3A-my-summer-with-a-robot","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8393000,"orderField":0},{"dateTime":"Friday, Sep 5, 2014","urlTitle":"analystperspectives-weekly-s-24","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi417","groupId":53319,"channel":"SECURITY","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending August 29, 2014.","dateTimeMS":1409894700000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-24","target":"_self","peerReviewed":false,"subType":"","id":55172233,"orderField":0},{"dateTime":"Monday, Sep 8, 2014","urlTitle":"vmware-is-enabling-it-and-process-transformation-to-drive-high-profile-customer-engagements","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi418","groupId":53319,"channel":"NETWORKING","description":"\u201cNo Limits\u201d was the theme for VMware\u2019s partner, developer and customer conference VMworld 2014, encapsulating the transformational opportunities cloud, mobile and big data disruptors are creating for businesses.","dateTimeMS":1410152580000,"title":"VMware is enabling IT and process transformation to drive high-profile customer engagements","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=vmware-is-enabling-it-and-process-transformation-to-drive-high-profile-customer-engagements","target":"_self","peerReviewed":false,"subType":"","id":8408065,"orderField":0},{"dateTime":"Tuesday, Sep 9, 2014","urlTitle":"requirements-engineering-means-business-success","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi420","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Business success means to deliver the right solutions at the right time to the right markets. Requirements Engineering is the discipline within systems and software engineering that bridges the entire life cycle and thus determines success or failure of a product or project. This blog provides a fresh look on requirements engineering, and why you need to improve it...","dateTimeMS":1410240780000,"title":"Requirements Engineering Means Business Success","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=requirements-engineering-means-business-success","target":"_self","peerReviewed":false,"subType":"","id":8477278,"orderField":0},{"dateTime":"Wednesday, Sep 10, 2014","urlTitle":"software-defined-storage-redefines-modern-data-management","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi421","groupId":53319,"channel":"NETWORKING","description":"Data center transformation is no longer an option for only the brave or well-funded. Software-defined storage (SDS) is transforming data management into a simpler, less costly and more approachable option for customers compared to traditional models. Because the SDS approach is progressing more rapidly and at a more customer-accessible level than other technologies, such as networking, it will help define the overall software-defined data center movement that is in motion.","dateTimeMS":1410325560000,"title":"Software-defined storage redefines modern data management","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=software-defined-storage-redefines-modern-data-management","target":"_self","peerReviewed":false,"subType":"","id":8414217,"orderField":0},{"dateTime":"Friday, Sep 12, 2014","urlTitle":"disruptive-technologies-will-prove-instrumental-to-effectively-dealing-with-emerging-government-challe","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi422","groupId":53319,"channel":"NETWORKING","description":"The conference topics revolved around how to take advantage of cross-organizational collaboration and disruptive technologies such as predictive analytics to improve government services delivery through more efficient and innovative IT technology enablement.","dateTimeMS":1410497160000,"title":"Disruptive technologies will prove instrumental to effectively dealing with emerging government challe","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=disruptive-technologies-will-prove-instrumental-to-effectively-dealing-with-emerging-government-challe","target":"_self","peerReviewed":false,"subType":"","id":8414244,"orderField":0},{"dateTime":"Friday, Sep 19, 2014","urlTitle":"analystperspectives-weekly-s-25","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi427","groupId":53319,"channel":"MOBILE","description":"As Apple unveils its latest iPhone and Apple Watch, analysts fill the Mobile & Broadband section with thoughts and opinions. Here are just a few:","dateTimeMS":1411103400000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-25","target":"_self","peerReviewed":false,"subType":"","id":55171490,"orderField":0},{"dateTime":"Monday, Sep 22, 2014","urlTitle":"tableau-conference-2014:-sir-mix-a-lot-was-only-the-beginning-see-more-at:-http:-techproessentials-com-tableau-conference-2014-sir-mix-a-lot-was-only-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi428","groupId":53319,"channel":"BIG DATA","description":"CEO and co-founder Christian Chabot kicked things off in front of a crowd of over 5,500 customers and partners. The theme of the opening keynote was \u201cThe Art of Analytics.\u201d Mr. Chabot likened an analyst\u2019s design process for data visualization to the creative process of an artist with a blank canvas or a sculptor with a slab or marble. Visualization software, he drove home, should \u201cunleash the creative power of data\u201d and has the power to \u201cremove the drudgery\u201d of analysis. - See more at: http://techproessentials.com/tableau-conference-2014-sir-mix-a-lot-was-only-the-beginning/#sthash.xdqJQqIr.dpuf","dateTimeMS":1411363080000,"title":"Tableau Conference 2014: Sir Mix-a-Lot Was Only the Beginning - See more at: http://techproessentials.com/tableau-conference-2014-sir-mix-a-lot-was-only-the-beginning/#sthash.cLKAwIqj.dpuf","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=tableau-conference-2014%3A-sir-mix-a-lot-was-only-the-beginning-see-more-at%3A-http%3A-techproessentials-com-tableau-conference-2014-sir-mix-a-lot-was-only-","target":"_self","peerReviewed":false,"subType":"","id":8433567,"orderField":0},{"dateTime":"Wednesday, Sep 24, 2014","urlTitle":"not-so-simple-security","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi429","groupId":53319,"channel":"SECURITY","description":"The announcement of the creation of Simply Secure \u2013 \u201ca new organization focused on making open source security tools simpler and easier for people to use\u201d \u2013 is an interesting attempt to change the forces that have up to now been slowing or blocking the adoption of security in consumer-facing devices and applications.","dateTimeMS":1411534860000,"title":"Not So Simple Security","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=not-so-simple-security","target":"_self","peerReviewed":false,"subType":"","id":8436233,"orderField":0},{"dateTime":"Thursday, Sep 25, 2014","urlTitle":"analystperspectives-weekly-s-26","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi431","groupId":53319,"channel":"BIG DATA","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending September 19, 2014.","dateTimeMS":1411621800000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-26","target":"_self","peerReviewed":false,"subType":"","id":8438503,"orderField":0},{"dateTime":"Monday, Sep 29, 2014","urlTitle":"catching-fire-in-the-cloud:-infor-takes-on-customer-stasis-workday-and-salesforce-com","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"","description":"It\u2019s year four in the Charles Phillips era at Infor, and the more things change the more they remain the same. The changes are impressive \u2013 new functionality across a wide swath of its legacy product lines, a new release of Infor XI, its next generation suite, a focus on industry-specific clouds that is such a good idea that I expect it will attract copycats from all over the market, a dedicated data science consulting team, new capabilities for defining and delivering best practices in implementations \u2013 it\u2019s a long list, and it all looks good.","dateTimeMS":1411967880000,"title":"Catching Fire in the Cloud: Infor Takes on Customer Stasis, Workday, and Salesforce.com","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=catching-fire-in-the-cloud%3A-infor-takes-on-customer-stasis-workday-and-salesforce-com","target":"_self","peerReviewed":false,"subType":"","id":53950881,"orderField":0},{"dateTime":"Monday, Oct 6, 2014","urlTitle":"analystperspectives-weekly-s-27","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi456","groupId":53319,"channel":"MOBILE","description":"AnalystPerspectives Weekly Scan covers analyst commentary from the week ending September 26, 2014.","dateTimeMS":1412573940000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-27","target":"_self","peerReviewed":false,"subType":"","id":8454514,"orderField":0},{"dateTime":"Thursday, Oct 9, 2014","urlTitle":"prpl-matters","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/swift-thumb.jpg","groupId":8459902,"channel":"","description":"Welcome to the inaugural post of prpl Matters \u2013 an ongoing series of perspectives by myself and other prpl Foundation members, addressing the challenges of bringing the Internet of things (IoT) ecosystem to fruition. The posts will address how technologists from a range of sectors and business interests can more rapidly move toward far greater success through collaborative efforts on key underlying areas of interest and value to all.","dateTimeMS":1412887740000,"title":"Security: The Ultimate Barrier to IoT Success","type":"article","subCategories":"","url":"/web/prpl-matters/content?g=8459902&type=article&urlTitle=prpl-matters","target":"_self","peerReviewed":false,"subType":"BLOG POST","id":53951446,"orderField":0},{"dateTime":"Monday, Oct 13, 2014","urlTitle":"-how-far-can-we-trust-big-data-analytics-google-hangout","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi462","groupId":53319,"channel":"BIG DATA","description":"Stuart Williams, Vice President, TBRI serves as the moderator leading discussions on usage and limits of big data analytics. He talks with Greg Arnold, LinkedIn, Senior Director of Data Engineering and Mike Ames, SAS, Director of Data Science.","dateTimeMS":1413228480000,"title":"\"How Far Can We Trust Big Data Analytics?\" Google+ Hangout","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=-how-far-can-we-trust-big-data-analytics-google-hangout","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8468079,"orderField":0},{"dateTime":"Tuesday, Oct 14, 2014","urlTitle":"analystperspectives-weekly-s-28","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi463","groupId":53319,"channel":"CLOUD","description":"AnalystPerspectives Weekly Scan covers analyst commentary from the week ending October 10, 2014.","dateTimeMS":1413291780000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-28","target":"_self","peerReviewed":false,"subType":"","id":55171430,"orderField":0},{"dateTime":"Thursday, Oct 16, 2014","urlTitle":"operator-focus-in-north-america-shifting-from-lte-coverage-to-densification-and-monetization","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi464","groupId":53319,"channel":"MOBILE","description":"With LTE now deployed pervasively across North America and gaining momentum in Latin America, industry focus is shifting toward how to densify these networks to handle the exponential increase in data traffic and how to monetize this powerful new network infrastructure. The private 2014 4G Americas Analyst Forum focused on these topics and others, and provided a unique view into how operators and vendors plan to address the major challenges the industry faces. Several of the sessions covered included how to better leverage Wi-Fi and cellular together, what 5G will look like, and what obstacles are slowing the take-off of the M2M market.","dateTimeMS":1413471600000,"title":"Operator focus in North America shifting from LTE coverage to densification and monetization","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=operator-focus-in-north-america-shifting-from-lte-coverage-to-densification-and-monetization","target":"_self","peerReviewed":false,"subType":"","id":8473547,"orderField":0},{"dateTime":"Friday, Oct 17, 2014","urlTitle":"requirements:-requirements-in-a-global-world","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi465","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Author Jane Cleland-Huang provides an audio recording of the Requirements column, coauthored with Paula Laurent, in which she discusses how the challenges of eliciting requirements in global projects can be addressed through deliberate upfront planning processes that take into consideration people, technology, meeting locations, communication, workflow processes, and documentation needs.","dateTimeMS":1413557580000,"title":"Requirements: Requirements in a Global World","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=requirements%3A-requirements-in-a-global-world","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8475682,"orderField":0},{"dateTime":"Tuesday, Oct 21, 2014","urlTitle":"one-minute-guide-to-understanding-the-supply-chain-analytics-continuum","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":53319,"channel":"BIG DATA","description":"Analytics are now an integral part of any supply chain information management system. Modern \ncomputing power and advances in analytical software have made powerful analytics not only possible, \nbut practical for most businesses sitting on top of a cornucopia of supply chain data. Analytics run the \ngambit from historical data dumps to models that suggest the best course of action based on a set of \nprobable outcomes.","dateTimeMS":1413870960000,"title":"One minute Guide to Understanding the Supply Chain Analytics Continuum","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=one-minute-guide-to-understanding-the-supply-chain-analytics-continuum","target":"_self","peerReviewed":false,"subType":"","id":8488472,"orderField":0},{"dateTime":"Monday, Oct 27, 2014","urlTitle":"understanding-the-supply-chain-collaboration-continuum","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi468","groupId":53319,"channel":"BIG DATA","description":"Collaboration of information and timing and are two extremely critical aspects of supply chain business intelligence and information management. Not getting data to the appropriate decision makers renders the information nominally useless. Not giving it to the right people, or right group of people, via the right mechanism also means that data loses value.","dateTimeMS":1414386840000,"title":"Understanding the Supply Chain Collaboration Continuum","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=understanding-the-supply-chain-collaboration-continuum","target":"_self","peerReviewed":false,"subType":"BLOG POST","id":8476949,"orderField":0},{"dateTime":"Wednesday, Oct 29, 2014","urlTitle":"analystperspectives-weekly-s-29","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi481","groupId":53319,"channel":"BIG DATA","description":"Analyst commentary.","dateTimeMS":1414615800000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-29","target":"_self","peerReviewed":false,"subType":"","id":8483532,"orderField":0},{"dateTime":"Thursday, Oct 30, 2014","urlTitle":"tbr-perspective:-symantec\u2019s-move-will-disrupt-security-and-storage-landscapes","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi483","groupId":53319,"channel":"SECURITY","description":"Symantec\u2019s decision to split into two (as yet unnamed) companies was a much needed move to get Symantec back on track to competitive growth rates in the fast-moving security and storage software markets. Once renowned as an endpoint security vendor, the new Symantec security company is preparing to re-emerge as a stronger security vendor with a broader portfolio and a renewed focus on addressing the key drivers (such as zero-day threats) for businesses\u2019 and consumers\u2019 IT security decisions.","dateTimeMS":1414688400000,"title":"TBR perspective: Symantec\u2019s move will disrupt security and storage landscapes","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=tbr-perspective%3A-symantec%E2%80%99s-move-will-disrupt-security-and-storage-landscapes","target":"_self","peerReviewed":false,"subType":"","id":8493186,"orderField":0},{"dateTime":"Monday, Nov 3, 2014","urlTitle":"analystperspectives-weekly-s-30","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi484","groupId":53319,"channel":"MOBILE","description":"AnalystPerspectives Weekly Scan covers analyst commentary.","dateTimeMS":1414994460000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-30","target":"_self","peerReviewed":false,"subType":"","id":8494446,"orderField":0},{"dateTime":"Wednesday, Nov 5, 2014","urlTitle":"analystperspectives-weekly-s-31","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi501","groupId":53319,"channel":"CLOUD","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending October 31, 2014.","dateTimeMS":1415235120000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-31","target":"_self","peerReviewed":false,"subType":"","id":8501311,"orderField":0},{"dateTime":"Thursday, Nov 6, 2014","urlTitle":"engility\u2019s-acquisition-of-tasc-diversifies-its-customer-base-and-adds-high-value-solutions-to-its-portfolio-\u2014-all-acquired-for-a-bargain-price","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi502","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"In 2009 Northrop Grumman sold TASC to private equity backers General Atlantic LLC and Kohlberg Kravis Roberts & Co. for $1.65 billion. The agreed-on price for TASC to Engility, nearly $550 million less than what TASC\u2019s owners paid five years ago, likely reflects how challenging the federal IT environment has been since 2009. Additionally, TASC employs about 4,000 employees versus 5,000 at the time of the spin-off from Northrop. TASC\u2019s projected revenue contribution to Engility in 2014 of $1.1 billion is down 31% from $1.6 billion in 2009 and implies a nearly flat 1x multiplier for the acquisition price.","dateTimeMS":1415257020000,"title":"Engility\u2019s acquisition of TASC diversifies its customer base and adds high-value solutions to its portfolio \u2014 all acquired for a bargain price","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=engility%E2%80%99s-acquisition-of-tasc-diversifies-its-customer-base-and-adds-high-value-solutions-to-its-portfolio-%E2%80%94-all-acquired-for-a-bargain-price","target":"_self","peerReviewed":false,"subType":"","id":8501338,"orderField":0},{"dateTime":"Friday, Nov 7, 2014","urlTitle":"advancing-cloud-computing","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi503","groupId":53319,"channel":"SECURITY","description":"This Web extra features Ed Amoroso, AT&T\u2019s Chief Security Officer, discussing practical methods for securing the cloud. From IT Professional's November/December 2014 Guest Editors' Introduction, \"Advancing Cloud Computing,\" by Irena Bojanova, Vladimir Dimitrov, and Fulvio Corno.","dateTimeMS":1415340180000,"title":"Advancing Cloud Computing","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=advancing-cloud-computing","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8501367,"orderField":0},{"dateTime":"Tuesday, Nov 11, 2014","urlTitle":"analystperspectives-weekly-s-32","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi505","groupId":53319,"channel":"CLOUD","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending November 07, 2014.","dateTimeMS":1415716500000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-32","target":"_self","peerReviewed":false,"subType":"","id":8509588,"orderField":0},{"dateTime":"Thursday, Nov 20, 2014","urlTitle":"errant-hashtag:-the-external-environment","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi513","groupId":53319,"channel":"MOBILE","description":"David Alan Grier provides an audio recording of his Errant Hashtag column, in which he discusses how amateur software developers might lack precise technical skills but bring detailed knowledge of their environments to the table.","dateTimeMS":1416464460000,"title":"Errant Hashtag: The External Environment","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=errant-hashtag%3A-the-external-environment","target":"_self","peerReviewed":false,"subType":"","id":8518932,"orderField":0},{"dateTime":"Monday, Nov 24, 2014","urlTitle":"analystperspectives-weekly-s-33","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi516","groupId":53319,"channel":"MOBILE","description":"News of the Week - Analysts Insights\nUpdates in the Mobile & Broadband market this week have analysts talking.","dateTimeMS":1416840840000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-33","target":"_self","peerReviewed":false,"subType":"","id":55171633,"orderField":0},{"dateTime":"Tuesday, Nov 25, 2014","urlTitle":"third-international-women\u2019s-hackathon-continues-into-december","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi517","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"t the hackathon kickoff (which took place in Phoenix, Arizona, during the 2014 Grace Hopper Celebration of Women in Computing), participants around the world worked on these challenges, connecting virtually with one another. Those of us in Arizona were excited to link up with female hackers in India, Japan, Nepal, England, South Africa, Turkey, Pakistan, Bangladesh, Brazil, Kenya, and Trinidad & Tobago. (","dateTimeMS":1416938520000,"title":"Third International Women\u2019s Hackathon continues into December","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=third-international-women%E2%80%99s-hackathon-continues-into-december","target":"_self","peerReviewed":false,"subType":"","id":8530979,"orderField":0},{"dateTime":"Friday, Nov 28, 2014","urlTitle":"data-visualization-for-the-internet-of-things","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi519","groupId":53319,"channel":"BIG DATA","description":"The Internet of Things (IoT) is a mediocre phrase. It\u2019s not creative or clever, and it doesn\u2019t exactly roll off the tongue. It is only because the phenomenon\u2019s potential is so great that it can get away with such a lackluster name. Every day, more machines, sensors, and devices are talking to data systems, and eventually, to analytics users. This data is complex, vast, and fast-moving. The IoT represents a new approach to thinking about devices and data generation, and so a new analytical approach is required as well.","dateTimeMS":1417155480000,"title":"Data Visualization for the Internet of Things","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=data-visualization-for-the-internet-of-things","target":"_self","peerReviewed":false,"subType":"","id":8531164,"orderField":0},{"dateTime":"Wednesday, Dec 3, 2014","urlTitle":"analystperspectives-weekly-s-34","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi534","groupId":53319,"channel":"SECURITY","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending November 28, 2014.","dateTimeMS":1417638900000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-34","target":"_self","peerReviewed":false,"subType":"","id":8538185,"orderField":0},{"dateTime":"Wednesday, Jan 28, 2015","urlTitle":"sustainable-pace","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/agile-thumb.jpg","groupId":8504655,"channel":"","description":"Sustainable pace is a crap concept: We usually view it as the pace at which we should work, more or less. And while the \u201cmore\u201d should happen infrequently and only in small amounts the \u201cless\u201d rarely enters our consciousness. It does make sense for physical activity. I run a marathon at sustainable pace because to work less is to diminish the sense of accomplishment. That doesn't mean that I'll feel as whole and happy at the end as if I\u2019d been having a nice walk on the beach sipping Pina Coladas. And, yes, the Puritan work ethic aside, I deserve that once in a while, too.","dateTimeMS":1422475200000,"title":"Working at a Sustainable Pace","type":"article","subCategories":"","url":"/web/agile-careers/content?g=8504655&type=article&urlTitle=sustainable-pace","target":"_self","peerReviewed":false,"subType":"BLOG POST","id":50896460,"orderField":0},{"dateTime":"Wednesday, Dec 10, 2014","urlTitle":"analystperspectives-weekly-s-35","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi542","groupId":53319,"channel":"BIG DATA","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending December 05, 2014.","dateTimeMS":1418196060000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-35","target":"_self","peerReviewed":false,"subType":"","id":8545386,"orderField":0},{"dateTime":"Wednesday, Dec 10, 2014","urlTitle":"inspired-by-games","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/hoffman.png","groupId":8545555,"channel":"","description":"Technology is born of inspiration, of dreaming the impossible. But there is still an opportunity to use technology to solve societal challenges. Games have this potential. Inspired By Games is focused on showcasing new applications, innovative game design and leading-edge technology in the hope of inspiring others to break rules, cross boundaries, collaborate across the globe and explore cross-disciplinary applications of the arts, culture, science, enterprise, and education.","dateTimeMS":1418239680000,"title":"Inspired by Games","type":"article","subCategories":"","url":"/web/inspired-by-games/content?g=8545555&type=article&urlTitle=inspired-by-games","target":"_self","peerReviewed":false,"subType":"BLOG POST","id":54260471,"orderField":0},{"dateTime":"Tuesday, Dec 16, 2014","urlTitle":"requirements:-toward-meaningful-industrial\u2013academic-partnerships","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi555","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Author Jane Cleland-Huang provides an audio recording of the Requirements column in which she discusses the Ready-Set-Transfer panel at the 2014 IEEE International Requirements Engineering Conference.","dateTimeMS":1418746020000,"title":"Requirements: Toward Meaningful Industrial\u2013Academic Partnerships","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=requirements%3A-toward-meaningful-industrial%E2%80%93academic-partnerships","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8551610,"orderField":0},{"dateTime":"Wednesday, Dec 17, 2014","urlTitle":"software-engineering-for-internet-computing:-internetware-and-beyond","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi557","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"IEEE Software Multimedia Editor Davide Falessi interviews Antonia Bertolino, Hong Mei, and Tao Xie, guest editors of the magazine\u2019s January/February 2015 issue on Software Engineering for Internet Computing: Internetware and Beyond.","dateTimeMS":1418852040000,"title":"Software Engineering for Internet Computing: Internetware and Beyond","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=software-engineering-for-internet-computing%3A-internetware-and-beyond","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8558217,"orderField":0},{"dateTime":"Thursday, Dec 18, 2014","urlTitle":"cloud-computing-helps-make-sense-of-cloud-forests","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi558","groupId":53319,"channel":"CLOUD","description":"The researchers want to unravel the impact of micro-climate variation in the cloud forest ecosystem. Essentially, they want to understand how the forest works\u2014how carbon dioxide, water, nitrogen, and other nutrients cycle through plants, animals, and microorganisms in this complex ecosystem. To do so, they\u2019ve placed some 700 sensors in 15 forest plots, locating the devices at levels throughout the forest, from beneath the soil to the top of the canopy.","dateTimeMS":1418887560000,"title":"Cloud computing helps make sense of cloud forests","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=cloud-computing-helps-make-sense-of-cloud-forests","target":"_self","peerReviewed":false,"subType":"","id":8559126,"orderField":0},{"dateTime":"Friday, Dec 19, 2014","urlTitle":"grady-booch:-of-boilers-bit-and-bots","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi559","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Author Grady Booch provides an audio recording of his On Computing column, in which he discusses how parallels exist between the Industrial Revolution and our current computing revolution regarding risk, transparency, and responsibility. Grady then examines some of these parallels, their implications for society, and individual developer\u2019s responsibilities.","dateTimeMS":1418968860000,"title":"Grady Booch: Of Boilers, Bit, and Bots","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=grady-booch%3A-of-boilers-bit-and-bots","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8559147,"orderField":0},{"dateTime":"Friday, Dec 26, 2014","urlTitle":"saying-goodbye-and-good-riddance-to-passwords","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi560","groupId":53319,"channel":"SECURITY","description":"There are a lot of things about modern Internet security that come up short when it comes to providing real protection but easily the biggest offender is passwords. We use passwords for everything, from logging into our mail and social networks to our banks and medical records. And the not so big secret is that, for the vast majority of people, passwords provide no security at all.","dateTimeMS":1419574800000,"title":"Saying Goodbye and Good Riddance to Passwords","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=saying-goodbye-and-good-riddance-to-passwords","target":"_self","peerReviewed":false,"subType":"","id":8560047,"orderField":0},{"dateTime":"Monday, Dec 29, 2014","urlTitle":"centralizing-national-flood-data-in-the-cloud-can-help-reduce-loss-of-life-and-property","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi561","groupId":53319,"channel":"CLOUD","description":"Researchers from the University of Texas partnered with other researchers, federal agencies, and first responders to create the National Flood Interoperability Experiment (NFIE). They used Microsoft Azure to build a new national flood data-modeling and mapping system with the potential to provide life- and cost-saving information to the public. The goals of the NFIE include standardizing data, demonstrating a scalable solution, and helping to close the gap between national flood forecasting and local emergency response.","dateTimeMS":1419834300000,"title":"Centralizing national flood data in the cloud can help reduce loss of life and property","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=centralizing-national-flood-data-in-the-cloud-can-help-reduce-loss-of-life-and-property","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8560076,"orderField":0},{"dateTime":"Tuesday, Dec 30, 2014","urlTitle":"xim-1-3-extends-photo-sharing-to-the-big-screen-on-multiple-platforms","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/image/computingnow/csi562","groupId":53319,"channel":"CLOUD","description":"Xim is a free app that gives you the ability to create a temporary, ad hoc network between multiple phones so you can share photos with others\u2014whether remote or in the same room, without relinquishing your personal mobile device. Friends can follow along synchronously on their own devices or browser interface, and can even control the pace of photos or pinch and zoom while you provide color commentary. With version 1.3 you can share your photos on the big screen via streaming media devices.","dateTimeMS":1419921060000,"title":"Xim 1.3 Extends Photo-Sharing to the Big Screen on Multiple Platforms","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=xim-1-3-extends-photo-sharing-to-the-big-screen-on-multiple-platforms","target":"_self","peerReviewed":false,"subType":"VIDEO","id":8560105,"orderField":0},{"dateTime":"Thursday, Jan 15, 2015","urlTitle":"tpcps-gain-new-appreciation-as-it-security-solution","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/webcontent/TPCPs-small-image.png","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Contemporary information technology isn't adequate to secure the valuable information these systems are entrusted to manage, as recent security breaches at US corporations and government agencies demonstrate. There are two reasons for this. First, public and private networks, based on Ethernet and the TCP/IP protocol, weren?t designed to protect information, but to make it easy to share information. Second, the architecture of the modern IT infrastructure was established long before cybercrime became the global nemesis that it is today, and therefore the issues of security and trust weren?t well understood or taken into account.","dateTimeMS":1421335740000,"title":"TPCPs Gain New Appreciation as IT Security Solution","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=tpcps-gain-new-appreciation-as-it-security-solution","target":"_blank","peerReviewed":false,"subType":"","id":47967906,"orderField":0},{"dateTime":"Tuesday, Jan 20, 2015","urlTitle":"2015-looking-to-be-a-great-year-for-cloud-adoption","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/cloud-computing-thumbnail.jpg","groupId":53319,"channel":"CLOUD","description":"In 2014, the cloud market rang in at $156 billion. In 2015, projected cloud spend is set at over 180 billion. With cloud spending eventually topping off at $235 billion in 2017, it seems evident that the growing trend in business is overall cloud adoption.","dateTimeMS":1421771280000,"title":"2015 Looking to Be a Great Year for Cloud Adoption","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=2015-looking-to-be-a-great-year-for-cloud-adoption","target":"_blank","peerReviewed":false,"subType":"","id":47964088,"orderField":0},{"dateTime":"Wednesday, Jan 21, 2015","urlTitle":"interoperable-e-participation","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/compute-outlook.jpg","groupId":53319,"channel":"BIG DATA","description":"Interoperable e-Participation\n\nComputer magazine Editor in Chief Sumi Helal interviews Constantinos Patsakis about a cryptographic protocol that guarantees citizens privacy through data aggregation and fosters e-participation in a scalable and interoperable way. From Computer's January 2015 issue.","dateTimeMS":1421848740000,"title":"Interoperable e-Participation","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=interoperable-e-participation","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":47967177,"orderField":0},{"dateTime":"Thursday, Jan 22, 2015","urlTitle":"sap-and-culture-clash-marshaling-weapons-in-the-war-of-business-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"SAP\u2019s annual sales kickoff meeting season, FKOM, is under way, with the North American and European versions kicking off this week. FKOM is where the new strategies, products, alliances, and services are all pressure-tested on that thin, white-shirted line of sales people who have the unenviable job of syncing the year\u2019s marketing strategy with the desperate desires of SAP\u2019s customers, and then getting them to actually write a check. It\u2019s a mating ritual that is equal parts science and art, and its quarterly execution is one of the software industry\u2019s greatest and most mystical natural wonders.","dateTimeMS":1421936940000,"title":"SAP and Culture Clash: Marshaling Weapons in the \u201cWar of Business\u201d","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=sap-and-culture-clash-marshaling-weapons-in-the-war-of-business-","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":54201559,"orderField":0},{"dateTime":"Friday, Jan 23, 2015","urlTitle":"what-is-errant-hashtag-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/grier.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"David Alan Grier starts off the new year by taking a moment to define \"Errant Hashtag,\" his monthly column and video that appears in Computer magazine each month.","dateTimeMS":1422024480000,"title":"What Is Errant Hashtag?","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=what-is-errant-hashtag-","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":47977420,"orderField":0},{"dateTime":"Monday, Jan 26, 2015","urlTitle":"startup-advice-get-your-story-straight","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/whurley-thumb.jpg","groupId":53319,"channel":"STARTUPS","description":"Open source advocate William Hurley, known as whurley, got his start working for large companies--in research and development at Apple and as a master inventor for IBM. But where he found his real success was in co-founding new companies--first security management company Symbiot, then Chaotic Moon, an Austin-based mobile software design and development studio, and now Honest Dollar, a stealth financial technology startup that will launch this year at SxSW in Austin.","dateTimeMS":1422300720000,"title":"Startup Advice: Get Your Story Straight","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=startup-advice-get-your-story-straight","target":"_blank","peerReviewed":false,"subType":"","id":50274959,"orderField":0},{"dateTime":"Saturday, Jan 24, 2015","urlTitle":"software-engineering-for-internet-computing-internetware-and-beyond","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/sw.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"IEEE Software Multimedia Editor Davide Falessi interviews Antonia Bertolino, Hong Mei, and Tao Xie, guest editors of the magazine\u2019s January/February 2015 issue on Software Engineering for Internet Computing: Internetware and Beyond.","dateTimeMS":1422154140000,"title":"Software Engineering for Internet Computing: Internetware and Beyond","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=software-engineering-for-internet-computing-internetware-and-beyond","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":49748356,"orderField":0},{"dateTime":"Wednesday, Jan 28, 2015","urlTitle":"computing-and-the-law-ip-issues-for-startups","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/computinglaw.jpg","groupId":53319,"channel":"STARTUPS","description":"IP expert Brian M. Gaff discusses the myriad issues that most startups face before even opening their doors, including getting financing, hiring the right people, finding office space, and--importantly--getting the companyís intellectual property under control and adequately protected.","dateTimeMS":1422453420000,"title":"Computing and the Law: IP Issues for Startups","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=computing-and-the-law-ip-issues-for-startups","target":"_blank","peerReviewed":false,"subType":"PODCAST","id":50247298,"orderField":0},{"dateTime":"Tuesday, Jan 27, 2015","urlTitle":"startup-rock-stars-set-for-march-24-in-san-francisco","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/srs-thumb.jpg","groupId":53319,"channel":"STARTUPS","description":"Startup Rock Stars will provide valuable information for those running, or thinking of running, a startup \u2013 no matter what stage of investment. Visit http://www.computer.org/Startup to see the full list of Rock Stars speakers.","dateTimeMS":1422360660000,"title":"Startup Rock Stars Set for March 24 in San Francisco","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=startup-rock-stars-set-for-march-24-in-san-francisco","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":50274918,"orderField":0},{"dateTime":"Tuesday, Jan 27, 2015","urlTitle":"what-s-different-about-windows-10-analysts-weigh-in","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/windows10.png","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Analysts discuss the pros and cons of Microsoft's new Windows 10 OS.","dateTimeMS":1422373620000,"title":"What's Different About Windows 10: Analysts Weigh In","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=what-s-different-about-windows-10-analysts-weigh-in","target":"_blank","peerReviewed":false,"subType":"","id":49917419,"orderField":0},{"dateTime":"Wednesday, Jan 28, 2015","urlTitle":"enough-consumer-coolness-it-s-time-to-make-a-case-for-windows-10-in-the-enterprise","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"While the biggest selling point of Windows 10 \u2013 a single code base for building apps that run across every possible device \u2013 was definitely part of the messaging of the event, the evidence that Microsoft knows what this really means for the enterprise, or even what makes enterprise users tick, was missing in action. Again.","dateTimeMS":1422457740000,"title":"Enough Consumer Coolness: It\u2019s Time to Make a Case for Windows 10 in the Enterprise","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=enough-consumer-coolness-it-s-time-to-make-a-case-for-windows-10-in-the-enterprise","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":54201539,"orderField":0},{"dateTime":"Wednesday, Jan 28, 2015","urlTitle":"canadian-startups-recognized-in-techvibes-annual-contest","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/canada-thumb.jpg","groupId":53319,"channel":"STARTUPS","description":"A friendly buying and selling platform, a quick-and-easy online store builder, and the maker of connected urban bikes were among the members of the Canadian startup community singled out for kudos in Techvibes' 2014 Canadian Startup Awards.","dateTimeMS":1422453480000,"title":"Canadian Startups Recognized in Techvibes Annual Contest","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=canadian-startups-recognized-in-techvibes-annual-contest","target":"_blank","peerReviewed":false,"subType":"","id":50247258,"orderField":0},{"dateTime":"Thursday, Jan 29, 2015","urlTitle":"crowdfunding-takes-off-like-a-rocket","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/meece-thumb.jpg","groupId":53319,"channel":"STARTUPS","description":"Brian Meece started out as a ukelele player. Now he's CEO of the online crowdfunding platform RocketHub. Launched in 2010 by Meece and actor/producer Jed Cohen, tech writer Vladimir Vukicevic, and later musician/linguist Alon Hillel-Tuch, the site hosts users from around the world who post campaigns to raise funds and awareness for projects and endeavors.","dateTimeMS":1422551820000,"title":"Crowdfunding Takes Off Like a Rocket","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=crowdfunding-takes-off-like-a-rocket","target":"_blank","peerReviewed":false,"subType":"","id":51896853,"orderField":0},{"dateTime":"Monday, Feb 2, 2015","urlTitle":"fix-it-the-pattern-goal-of-leaving-the-system-more-whole","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/agile-thumb.jpg","groupId":8504655,"channel":"","description":"Christopher Alexander tells us that each pattern is an act of repair that should leave the system more Whole than when we started. That\u2019s the pattern agenda: that every person contribute just a bit every day to making the world more Whole.","dateTimeMS":1422893880000,"title":"Fix it: The Pattern Goal of Leaving the System More Whole","type":"article","subCategories":"","url":"/web/agile-careers/content?g=8504655&type=article&urlTitle=fix-it-the-pattern-goal-of-leaving-the-system-more-whole","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":51900358,"orderField":0},{"dateTime":"Monday, Mar 9, 2015","urlTitle":"two-heads-are-better-than-one","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/agile-thumb.jpg","groupId":8504655,"channel":"","description":"To me, pair development is a no-brainer. It\u2019s more fun than working alone, and you get a little of the benefit of the wisdom of the crowds but without the overhead of ineffective meetings and quality gates that method usually brings.","dateTimeMS":1425900300000,"title":"Two Heads Are Better than One","type":"article","subCategories":"","url":"/web/agile-careers/content?g=8504655&type=article&urlTitle=two-heads-are-better-than-one","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":53932470,"orderField":0},{"dateTime":"Thursday, Apr 2, 2015","urlTitle":"bread-on-the-waters","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/agile-thumb.jpg","groupId":8504655,"channel":"","description":"Innovation has given rise to a whole raft of departments and initiatives, in many industries, aimed at technology transfer. It\u2019s about monetizing ideas.","dateTimeMS":1427988540000,"title":"Bread on the Waters","type":"article","subCategories":"","url":"/web/agile-careers/content?g=8504655&type=article&urlTitle=bread-on-the-waters","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":51905277,"orderField":0},{"dateTime":"Monday, Feb 2, 2015","urlTitle":"startup-advice-howard-leonhardt-says-make-an-impact-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/leonhardt-thumb.jpg","groupId":53319,"channel":"STARTUPS","description":"Howard Leonhardt is an inventor, serial entrepreneur, patent holder, winemaker, and baseball team owner. But what's brought him a different kind of fulfillment is seeing how the cardiac products he's developed have saved human lives.","dateTimeMS":1422903840000,"title":"Startup Advice: Howard Leonhardt Says 'Make an Impact'","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=startup-advice-howard-leonhardt-says-make-an-impact-","target":"_blank","peerReviewed":false,"subType":"","id":53906875,"orderField":0},{"dateTime":"Tuesday, Feb 3, 2015","urlTitle":"industry-waits-for-new-crowdfunding-rules","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/crowdfunding-thumb.jpg","groupId":53319,"channel":"STARTUPS","description":"When the US JOBS Act was passed in April 2012 with overwhelming bipartisan support, it was heralded as a historic victory. No longer would Wall Street have exclusive control of startup fundraising. Instead, startups would be able to reach out to regular people as investors. But two years later, the US Securities and Exchange Commission (SEC) has yet to finalize rules on two of the act's key provisions.","dateTimeMS":1422987840000,"title":"Industry Waits for New Crowdfunding Rules","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=industry-waits-for-new-crowdfunding-rules","target":"_blank","peerReviewed":false,"subType":"","id":51910176,"orderField":0},{"dateTime":"Tuesday, Feb 3, 2015","urlTitle":"guido-van-rossum-welcome-to-python-programming","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/guido.jpg","groupId":53319,"channel":"STARTUPS","description":"Guido van Rossum, the Dutch computer programmer best known as the author of the Python programming language, offers a quick Python introduction to computer programming students.","dateTimeMS":1422988860000,"title":"Guido van Rossum: Welcome to Python Programming","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=guido-van-rossum-welcome-to-python-programming","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":53906895,"orderField":0},{"dateTime":"Wednesday, Feb 4, 2015","urlTitle":"take-the-startup-rock-stars-google-hangout-quiz","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/startups-thumb.jpg","groupId":53319,"channel":"STARTUPS","description":"During this Hangout, which comes one month before the in-person March 24th Startup Rock Stars event in San Francisco, California, speakers will share their Top 10 tips for helping make sure the venture you start gets off on the right foot\u2014and succeeds.","dateTimeMS":1423043580000,"title":"Take the Startup Rock Stars Google Hangout Quiz","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=take-the-startup-rock-stars-google-hangout-quiz","target":"_blank","peerReviewed":false,"subType":"EVENT","id":53933324,"orderField":0},{"dateTime":"Tuesday, Feb 17, 2015","urlTitle":"what-software-trends-are-important-for-product-development-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ebert-thumb.jpg","groupId":5954967,"channel":"","description":"To be successful in the software business, you continuously need to push efficiency and competitiveness. We talked to our clients from various industries, to identify where they are and what software technology trends are important for product development.","dateTimeMS":1424181660000,"title":"What Software Trends Are Important for Product Development?","type":"article","subCategories":"","url":"/web/software-technologies/content?g=5954967&type=article&urlTitle=what-software-trends-are-important-for-product-development-","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":53920377,"orderField":0},{"dateTime":"Friday, Feb 6, 2015","urlTitle":"ensuring-privacy-in-a-personal-health-record-system","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/feb computer.jpg","groupId":53319,"channel":"SECURITY","description":"Guest editor Alf Weaver interviews Jingquan Li about his article \"Ensuring Privacy in a Personal Health Record System\" and balancing personalization, privacy, and security, from Computer's February 2015 issue on Computing in Healthcare.","dateTimeMS":1423227300000,"title":"Ensuring Privacy in a Personal Health Record System","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=ensuring-privacy-in-a-personal-health-record-system","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":53906935,"orderField":0},{"dateTime":"Friday, Feb 6, 2015","urlTitle":"cloud-report-vcloud-air-platform-9-and-more-on-hybrid-clouds","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ap-thumb.jpg","groupId":53319,"channel":"CLOUD","description":"Various cloud developments are a popular topic this week. Here are just a few of the conversations to be found in the Cloud Computing section of Analyst Perspectives","dateTimeMS":1423230900000,"title":"Cloud Report: vCloud Air, Platform 9, and More on Hybrid Clouds","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=cloud-report-vcloud-air-platform-9-and-more-on-hybrid-clouds","target":"_blank","peerReviewed":false,"subType":"NEWS","id":51918878,"orderField":0},{"dateTime":"Monday, Feb 9, 2015","urlTitle":"ap-apple-s-impact-on-the-mobile-market","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ap-thumb.jpg","groupId":53319,"channel":"MOBILE","description":"In the Mobile & Broadband section, Apple\u2019s impact on the market is just one of many topics you will find.","dateTimeMS":1423491360000,"title":"AP: Apple's Impact on the Mobile Market","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=ap-apple-s-impact-on-the-mobile-market","target":"_blank","peerReviewed":false,"subType":"","id":53906915,"orderField":0},{"dateTime":"Saturday, Feb 7, 2015","urlTitle":"where-will-the-big-data-jobs-be-in-2015-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ap-thumb.jpg","groupId":53319,"channel":"CAREERS","description":"In the IT Management and Human Resources section, analysts discuss skills, staffing and security issues.","dateTimeMS":1423319700000,"title":"Where Will the Big Data Jobs Be in 2015?","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=where-will-the-big-data-jobs-be-in-2015-","target":"_blank","peerReviewed":false,"subType":"","id":51919004,"orderField":0},{"dateTime":"Monday, Feb 9, 2015","urlTitle":"computing-and-the-law-byod-omg-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/computinglaw.jpg","groupId":53319,"channel":"SECURITY","description":"Author Brian M. Gaff provides an audio recording of his Computing and the Law column, in which he discusses how bring your own device (BYOD) allows employees to bring personally owned technology to their workplaces and use it in connection with their jobs.","dateTimeMS":1423492920000,"title":"Computing and the Law: BYOD? OMG!","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=computing-and-the-law-byod-omg-","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":53906855,"orderField":0},{"dateTime":"Tuesday, Feb 10, 2015","urlTitle":"the-role-location-plays-in-software-development","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/grier.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Author David Alan Grier expands on his Errant Hashtag column, in which he discusses how location plays an important role in software development and how nine cities hold 40 percent of the U.S. software market, with particular specialties clustered in specific areas. From Computer's February 2015 issue.","dateTimeMS":1423580100000,"title":"The Role Location Plays in Software Development","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=the-role-location-plays-in-software-development","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":51919069,"orderField":0},{"dateTime":"Tuesday, Feb 10, 2015","urlTitle":"technical-achievement-award-recipients-how-did-they-get-there-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/taa.jpg","groupId":53319,"channel":"INSIGHTS","description":"The five prominent technologists who received 2014 IEEE Computer Society Technical Achievement Awards have one thing on common: they've all been on the research trail for many years.","dateTimeMS":1423597800000,"title":"Technical Achievement Award Recipients: How Did They Get There?","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=technical-achievement-award-recipients-how-did-they-get-there-","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":53906835,"orderField":0},{"dateTime":"Tuesday, Feb 10, 2015","urlTitle":"incubation-and-innovation-at-tek-mountain","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/tek2.jpg","groupId":53319,"channel":"STARTUPS","description":"Audrey Speicher, director of Tek Mountain, talks about the model business incubator in Wilmington, North Carolina, that fosters an entrepreneurial spirit by providing a physical space and work atmosphere conducive to interaction and innovation.","dateTimeMS":1423573680000,"title":"Incubation and Innovation at Tek Mountain","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=incubation-and-innovation-at-tek-mountain","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":51925675,"orderField":0},{"dateTime":"Wednesday, Feb 11, 2015","urlTitle":"s4-hana-it-s-not-r-3-and-it-s-not-1992-either-part-1-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"There\u2019s a lot to unpack from SAP\u2019s S4 HANA announcement of last week, but if I could only highlight the essence of what the announcement means for SAP and its customers, it\u2019s this: SAP needs to make sure every customer understands how the versions of SAP they are running today will lead them to S4 HANA, in what time frame and at what cost.","dateTimeMS":1423660260000,"title":"S/4HANA: It\u2019s Not R/3, and It\u2019s Not 1992 Either (Part 1)","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=s4-hana-it-s-not-r-3-and-it-s-not-1992-either-part-1-","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":54201519,"orderField":0},{"dateTime":"Thursday, Feb 12, 2015","urlTitle":"what-the-open-plan-office-trend-is-doing-to-it-security","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/open-thumb.jpg","groupId":53319,"channel":"SECURITY","description":"Across the country, cubicle walls are coming down as businesses seek to take advantage of the cost-saving benefits associated with open-plan offices. While employees have been very vocal in their collective disdain for the latest workplace trend, it doesn\u2019t appear to be going anywhere soon. In fact, more than 75 percent of U.S. offices now feature an open plan, according to research by Milwaukee design firm Kahler Slater, which means many Americans have no choice but to learn to work in this new environment.","dateTimeMS":1423742520000,"title":"What the Open-Plan Office Trend is Doing to IT Security","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=what-the-open-plan-office-trend-is-doing-to-it-security","target":"_blank","peerReviewed":false,"subType":"","id":53906795,"orderField":0},{"dateTime":"Thursday, Feb 12, 2015","urlTitle":"s-4-hana-it-s-not-r-3-and-it-s-not-1992-either-part-2-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"Part 2 of S/4 HANA: It\u2019s Not R/3, and It\u2019s Not 1992 Either (Part 2)","dateTimeMS":1423754640000,"title":"S/4HANA: It\u2019s Not R/3, and It\u2019s Not 1992 Either (Part 2)","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=s-4-hana-it-s-not-r-3-and-it-s-not-1992-either-part-2-","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":54201499,"orderField":0},{"dateTime":"Friday, Feb 13, 2015","urlTitle":"the-practice-and-future-of-release-engineering","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/swmm.png","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Davide Falessi speaks with IEEE Software Guest Editors Bram Adams and Foutse Khomh about release engineering and its value to the software industry.","dateTimeMS":1423842000000,"title":"The Practice and Future of Release Engineering","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=the-practice-and-future-of-release-engineering","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":51938733,"orderField":0},{"dateTime":"Friday, Feb 13, 2015","urlTitle":"tbr-2015-cloud-predictions-fragmented-capabilities","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/ComputingNow/marketing/tbr.png","groupId":53319,"channel":"CLOUD","description":"Cloud stands at a tipping point between the broad horizontal public platforms that drove the market and the fragmented private and hybrid capabilities that will form its future. The market is shifting to provide services that are customizable for the individual end customer, whether adding security, performance, features or management.","dateTimeMS":1423826940000,"title":"TBR 2015 Cloud Predictions: Fragmented Capabilities","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=tbr-2015-cloud-predictions-fragmented-capabilities","target":"_blank","peerReviewed":false,"subType":"","id":51939023,"orderField":0},{"dateTime":"Monday, Feb 16, 2015","urlTitle":"rise-of-the-alternative-network-provider","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/tbr.png","groupId":53319,"channel":"NETWORKING","description":"Incumbent telecom operators in the U.S. face a new category of competitors that play by a different set of rules. These alternative network providers aim to disrupt the traditional telecom business model by lowering access costs and improving the user experience. Their motivations differ from incumbent telcos, which focus on monetizing their connectivity solutions. Rather, these alternative network providers view access as a sunk cost necessary to drive their other initiatives, such as digital advertising and e-commerce. The stakes are high because these market dynamics will shift the balance of power, money, and landscape makeup in coming years. Only the strongest and most nimble incumbent operators will survive the coming shakeout.","dateTimeMS":1424107620000,"title":"Rise of the Alternative Network Provider","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=rise-of-the-alternative-network-provider","target":"_blank","peerReviewed":false,"subType":"","id":53905504,"orderField":0},{"dateTime":"Monday, Feb 16, 2015","urlTitle":"social-engineering-what-your-business-needs-to-know-to-protect-itself","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/social-thumb.jpg","groupId":53319,"channel":"SECURITY","description":"Pet names, children\u2019s names, and dates remain the most popular inspirations for passwords, despite the fact that these are the worst passwords a person can choose.","dateTimeMS":1424109480000,"title":"Social Engineering: What Your Business Needs to Know to Protect Itself","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=social-engineering-what-your-business-needs-to-know-to-protect-itself","target":"_blank","peerReviewed":false,"subType":"","id":51939302,"orderField":0},{"dateTime":"Monday, Nov 24, 2014","urlTitle":"requirements-engineering-means-business-success","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ebert-thumb.jpg","groupId":5954967,"channel":"SOFTWARE ENGINEERING","description":"Business success means to deliver the right solutions at the right time to the right markets. Requirements Engineering is the discipline within systems and software engineering that bridges the entire life cycle and thus determines success or failure of a product or project. This blog provides a fresh look on requirements engineering, and why you need to improve it...","dateTimeMS":1416841140000,"title":"Requirements Engineering Means Business Success","type":"article","subCategories":"","url":"/web/software-technologies/software engineering/content?g=5954967&type=article&urlTitle=requirements-engineering-means-business-success","target":"_blank","peerReviewed":false,"subType":"","id":54825677,"orderField":0},{"dateTime":"Tuesday, Feb 17, 2015","urlTitle":"companies-turn-to-existing-employees-for-big-data-skills","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/datacareer.jpg","groupId":53319,"channel":"CAREERS","description":"Amazing strides have been made in trying to close the big data skills gap. Although companies are still fine-tuning their ideas on what type of skill sets will be needed to form the big data teams to incorporate analytics into business processes, sort and analyze structured and unstructured data, and monetize existing data, those with graduate degrees or doctorates in statistics--the bonafide data scientists--will certainly be an important part of the team.","dateTimeMS":1424186400000,"title":"Companies Turn to Existing Employees for Big Data Skills","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=companies-turn-to-existing-employees-for-big-data-skills","target":"_blank","peerReviewed":false,"subType":"","id":53888703,"orderField":0},{"dateTime":"Tuesday, Feb 17, 2015","urlTitle":"google-hangout-what-s-happening-in-2015-for-3d-printing-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/3dq.jpg","groupId":53319,"channel":"STARTUPS","description":"Experts agree that 3D printing will be established as one of the truly disruptive technologies of our generation, but what are the hottest trends and the challenges?\n\nWatch video of the Google+ Hangout to hear speakers from Rock Stars of 3D Printing sharing their thoughts on the 3D revolution.\n\nAnd to attend the live March 17 event in San Jose, Calif., visit http://www.computer.org/3dprinting. \n\nHangut speakers include:\n\n\u2022 Brian David Johnson, Futurist and Director, Future Casting and Experience Research | Intel\n\n\u2022 Cliff Waldman, Director of Economic Studies | Manufacturers Alliance for Productivity and Innovation (MAPI)\n\n\u2022 Brian Gaff, Partner | McDermott Will & Emery, LLP\n\n\u2022 Joshua Greenbaum, Analyst | Enterprise Applications Consulting (Moderator)\n\nFor more information on the IEEE Computer Society's Rock Stars event series, visit www.computer.org/rockstars.","dateTimeMS":1424197320000,"title":"Google Hangout: What's Happening in 2015 for 3D Printing?","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=google-hangout-what-s-happening-in-2015-for-3d-printing-","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":53905237,"orderField":0},{"dateTime":"Wednesday, Feb 18, 2015","urlTitle":"requirements-injecting-value-thinking-into-prioritization-decisions","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/swrequirements.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Author Jane Cleland-Huang provides an audio recording of her Requirements column in IEEE Software's March/April 2015 issue, in which she discusses an approach that injects value-thinking into feature prioritization by using story mapping.","dateTimeMS":1424268720000,"title":"Requirements: Injecting Value-Thinking into Prioritization Decisions","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=requirements-injecting-value-thinking-into-prioritization-decisions","target":"_blank","peerReviewed":false,"subType":"PODCAST","id":53894769,"orderField":0},{"dateTime":"Thursday, Feb 19, 2015","urlTitle":"grady-booch-all-watched-over-by-machines-of-loving-grace","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/oncomputing2.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Author Grady Booch provides an audio recording of his On Computing column from IEEE Software's March/April issue, in which he discusses how we must come to grips with a number of practical and ethical conundrums as machines of our own creation become our companions, helpmates, and servants.","dateTimeMS":1424348220000,"title":"Grady Booch: All Watched Over by Machines of Loving Grace","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=grady-booch-all-watched-over-by-machines-of-loving-grace","target":"_blank","peerReviewed":false,"subType":"PODCAST","id":53895140,"orderField":0},{"dateTime":"Friday, Feb 20, 2015","urlTitle":"guest-editors-introduction-the-practice-and-future-of-release-engineering","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/swcoverma.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"IEEE Software Multimedia Editor Davide Falessi speaks with Guest Editors Bram Adams and Foutse Khomh about release engineering and its value to the software industry. (From IEEE Software's March/April 2015 issue).","dateTimeMS":1424435760000,"title":"Guest Editors' Introduction: The Practice and Future of Release Engineering","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=guest-editors-introduction-the-practice-and-future-of-release-engineering","target":"_blank","peerReviewed":false,"subType":"PODCAST","id":53895227,"orderField":0},{"dateTime":"Friday, Feb 20, 2015","urlTitle":"computing-and-the-law-the-significance-of-prior-art","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/computinglaw.jpg","groupId":53319,"channel":"STARTUPS","description":"If you're starting a new company, you may want to learn more about protecting the intellectual property you're developing. And an important foundation for patents is understanding prior art. \n\nAuthor Brian M. Gaff provides an audio recording of the Computing and the Law column, in which he discusses the significance of prior art, an understanding of which is critical whether you\u2019re writing a patent application or embroiled in patent litigation.","dateTimeMS":1424443980000,"title":"Computing and the Law: The Significance of Prior Art","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=computing-and-the-law-the-significance-of-prior-art","target":"_blank","peerReviewed":false,"subType":"PODCAST","id":53895275,"orderField":0},{"dateTime":"Thursday, Feb 19, 2015","urlTitle":"startups-are-not-just-for-ki-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/kids-thumb.jpg","groupId":53319,"channel":"STARTUPS","description":"Many of today's biggest technology companies were founded by kids barely out of high school. Bill Gates learned programming at 13 and left Harvard University as a junior to start Microsoft, a company that now has 78,000 employees worldwide and $50 billion in annual revenue.","dateTimeMS":1424348100000,"title":"Startups Are Not Just for Kids","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=startups-are-not-just-for-ki-1","target":"_blank","peerReviewed":false,"subType":"","id":53905261,"orderField":0},{"dateTime":"Wednesday, Feb 18, 2015","urlTitle":"what-to-expect-in-mobile-in-2015","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ap-thumb.jpg","groupId":53319,"channel":"MOBILE","description":"As preparations get underway for Mobile World Congress 2015, we get things started by sharing some highlights from the Mobile & Broadband section","dateTimeMS":1424277060000,"title":"What to Expect in Mobile in 2015","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=what-to-expect-in-mobile-in-2015","target":"_blank","peerReviewed":false,"subType":"","id":53905282,"orderField":0},{"dateTime":"Monday, Feb 23, 2015","urlTitle":"what-s-your-place-in-the-smart-revolution-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/rsstvid.jpg","groupId":53319,"channel":"NETWORKING","description":"Whether you're building smart cars, dealing with the smart grid, want to control a smart home, or are manufacturing the latest smart clothing, you deal with the same confronting challenges as everyone in the \u201csmart technologies\u201d movement. \n\nAttend Rock Stars of SmartTech on May 12 in Raleigh to get actionable answers and insights. Register at http://www.computer.org/smarttech.","dateTimeMS":1424702400000,"title":"What's Your Place in the Smart Revolution?","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=what-s-your-place-in-the-smart-revolution-","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":53904221,"orderField":0},{"dateTime":"Monday, Feb 23, 2015","urlTitle":"hipaa-compliance-and-3-more-reasons-to-trust-the-cloud","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/cloud-thumb.jpg","groupId":53319,"channel":"INSIGHTS","description":"It takes a leap of faith to trust things you can\u2019t see. Especially if those things are supposed to be protecting your business data.\n\nBusinesses in the healthcare field have to be cautious about data protection because of HIPAA laws and other privacy regulations that govern health information.","dateTimeMS":1424702700000,"title":"HIPAA Compliance and 3 More Reasons to Trust the Cloud","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=hipaa-compliance-and-3-more-reasons-to-trust-the-cloud","target":"_blank","peerReviewed":false,"subType":"","id":53904242,"orderField":0},{"dateTime":"Tuesday, Feb 24, 2015","urlTitle":"a-new-era-of-tech-incubator-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/incubators-thumb.jpg","groupId":53319,"channel":"STARTUPS","description":"If you thought tech incubators were a thing of the past, think again. In multiple cities around the world, new incubators are cropping up while longstanding ones are churning away and even expanding.\nSome have long lists of successful companies they\u2019ve nurtured over the years. Others are around as a result of economic stimulus efforts and/or to capitalize on recent trends. And some focus on specific criteria, such as startups run by college students or select areas of technology, while others have broader interests. But no matter what differentiates them from each other, these incubators have one common goal: to foster the growth of early-stage startups.","dateTimeMS":1424820600000,"title":"A New Era of Tech Incubators?","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=a-new-era-of-tech-incubator-1","target":"_blank","peerReviewed":false,"subType":"","id":53909484,"orderField":0},{"dateTime":"Wednesday, Feb 25, 2015","urlTitle":"car-hacking-how-safe-are-you-behind-the-wheel-in-today-s-digital-society-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/carhack-thumb.jpg","groupId":7989281,"channel":"","description":"The complexity of today\u2019s cars is staggering \u2013 being mechanically inclined doesn\u2019t cut it these days \u2013 you have to be a bit of a computer whiz too in order to service new model cars.","dateTimeMS":1424865720000,"title":"Car Hacking: How Safe Are You Behind the Wheel in Today\u2019s Digital Society?","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=car-hacking-how-safe-are-you-behind-the-wheel-in-today-s-digital-society-","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":53910417,"orderField":0},{"dateTime":"Wednesday, Feb 25, 2015","urlTitle":"top-10-trends-in-internet-of-things","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ap-thumb.jpg","groupId":53319,"channel":"INSIGHTS","description":"The Internet of Things tops off our News for the Week in Review. See what the analysts are saying about IoT trends for 2015.","dateTimeMS":1424872380000,"title":"Top 10 Trends in Internet of Things","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=top-10-trends-in-internet-of-things","target":"_blank","peerReviewed":false,"subType":"","id":53910308,"orderField":0},{"dateTime":"Thursday, Feb 26, 2015","urlTitle":"is-cloud-opening-the-door-to-data-analytics-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ap-thumb.jpg","groupId":53319,"channel":"INSIGHTS","description":"The relationship between the cloud and data is getting some serious attention. Read what the analysts are saying.","dateTimeMS":1424952600000,"title":"Is Cloud Opening the Door to Data Analytics?","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=is-cloud-opening-the-door-to-data-analytics-","target":"_blank","peerReviewed":false,"subType":"","id":53910377,"orderField":0},{"dateTime":"Friday, Feb 27, 2015","urlTitle":"the-role-of-public-comprehensive-universities-in-closing-the-innovation-deficit","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/innovation.jpg","groupId":53319,"channel":"STARTUPS","description":"Computer magazine Advisory Panel member Alf Weaver interviews Chancellor Gary L. Miller about an ambitious initiative by the University of North Carolina Wilmington that demonstrates how public non-research universities can help close the US innovation deficit by encouraging local entrepreneurship and regional economic development.","dateTimeMS":1425050940000,"title":"The Role of Public Comprehensive Universities in Closing the Innovation Deficit","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=the-role-of-public-comprehensive-universities-in-closing-the-innovation-deficit","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":53914064,"orderField":0},{"dateTime":"Friday, Feb 27, 2015","urlTitle":"5-top-web-hosting-models-explained","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/cloudhosting-thumb.jpg","groupId":53319,"channel":"CLOUD","description":"If you\u2019re new to the world of web hosting, you may need a crash course in order to fully understand various terms like dedicated hosting, shared hosting, managed hosting, cloud hosting, and so on.","dateTimeMS":1425056580000,"title":"5 Top Web Hosting Models Explained","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=5-top-web-hosting-models-explained","target":"_blank","peerReviewed":false,"subType":"","id":53915410,"orderField":0},{"dateTime":"Tuesday, Mar 3, 2015","urlTitle":"pros-and-cons-of-dedicated-hosting","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/road-thumb.jpg","groupId":53319,"channel":"CLOUD","description":"Like any other web hosting service, dedicated hosting solutions have some benefits and some downsides. Nevertheless, in some particular cases, some of the pros can also prove to be cons in the end.","dateTimeMS":1425384480000,"title":"Pros and Cons of Dedicated Hosting","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=pros-and-cons-of-dedicated-hosting","target":"_blank","peerReviewed":false,"subType":"","id":53915390,"orderField":0},{"dateTime":"Monday, Mar 2, 2015","urlTitle":"what-we-can-learn-from-steve-jobs","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/jobs-thumb.jpg","groupId":53319,"channel":"STARTUPS","description":"Steve Jobs wasn\u2019t exactly an IT person\u2014he didn\u2019t have a programming or computer science background\u2014yet there\u2019s much to learn from this great innovator. He redefined the IT user experience, creating products and services loved by millions around the world. He reshaped not only the IT industry but others as well\u2014the music industry with the iPod; the cell phone industry with the iPhone; the movie industry with his Pixar Animation Studios films; and the computing industry with the original Mac, the Mac OS X, and the iPad.","dateTimeMS":1425314640000,"title":"What We Can Learn from Steve Jobs","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=what-we-can-learn-from-steve-jobs","target":"_blank","peerReviewed":false,"subType":"","id":53917792,"orderField":0},{"dateTime":"Thursday, Mar 5, 2015","urlTitle":"horvitz-it-s-important-to-pursue-artificial-intelligence","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/horwitz.jpg","groupId":53319,"channel":"INSIGHTS","description":"In this excerpt from a Microsoft Research Luminaries interview, Eric Horvitz, Distinguished Scientist and Managing Director, Microsoft Research Redmond, explains why it's important to pursue Artificial Intelligence.","dateTimeMS":1425558120000,"title":"Horvitz: It's Important to Pursue Artificial Intelligence","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=horvitz-it-s-important-to-pursue-artificial-intelligence","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":53924526,"orderField":0},{"dateTime":"Wednesday, Mar 4, 2015","urlTitle":"implementing-enterprise-saas-if-it-s-easy-it-s-because-you-re-not-trying","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"Back in the early stages of the SaaS market, so many months ago, it seemed obvious that the SaaS market would one day undergo a major transformation as the easy wins based on taking on-premise capabilities and flipping them to the cloud \u2013 pretty much the business model of Salesforce.com in the early days\u2013 gave way to an era of greater complexity and value. At one time it was the value-added cloud capabilities of business networks and the like that were supposed to lead the SaaS world to the promised land by using the cloud to conduct business in ways that simply hadn\u2019t been possible in the on-premise world. \nWrong. So far, anyway.","dateTimeMS":1425484860000,"title":"Implementing Enterprise SaaS: If it\u2019s Easy, it\u2019s Because You\u2019re Not Trying","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=implementing-enterprise-saas-if-it-s-easy-it-s-because-you-re-not-trying","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":54201479,"orderField":0},{"dateTime":"Friday, Mar 6, 2015","urlTitle":"gordon-bell-reflects-on-race-to-build-the-fastest-computer","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/bell-thumb.jpg","groupId":53319,"channel":"INSIGHTS","description":"Gordon Bell talks about the race to build the world's fastest supercomputer as he accepts the IEEE Computer Society's 2014 Seymour Cray Award for designing several computer systems that changed the world of high performance computing, the two most important being the PDP-6 and the VAX-11/780.","dateTimeMS":1425647580000,"title":"Gordon Bell Reflects on Race to Build the Fastest Computer","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=gordon-bell-reflects-on-race-to-build-the-fastest-computer","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":53929719,"orderField":0},{"dateTime":"Monday, Mar 9, 2015","urlTitle":"what-is-parallelism-and-why-should-we-care-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/leiserson-thumb.jpg","groupId":53319,"channel":"INSIGHTS","description":"Charles Leiserson talks about the need to get rid of bloat and inefficiency, build scalable systems, and work on making our computer systems better behaved as he accepts the ACM and IEEE Computer Society 2014 Ken Kennedy Award for his influence on parallel computing systems and their adoption into mainstream use through scholarly research and development.","dateTimeMS":1425901140000,"title":"What Is Parallelism and Why Should We Care?","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=what-is-parallelism-and-why-should-we-care-","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":53929781,"orderField":0},{"dateTime":"Wednesday, Mar 11, 2015","urlTitle":"what-s-the-2022-outlook-for-supercomputing-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/mat-thumb.jpg","groupId":53319,"channel":"INSIGHTS","description":"Satoshi Matsuoka talks about the 2022 outlook for supercomputing as he accepts the IEEE Computer Society 2014 Sidney Fernbach Award. He received the award for his work on advanced infrastructural platforms, large-scale supercomputers, and heterogeneous GPU/CPU supercomputers.","dateTimeMS":1426071720000,"title":"What's the 2022 Outlook for Supercomputing?","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=what-s-the-2022-outlook-for-supercomputing-","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":53929896,"orderField":0},{"dateTime":"Tuesday, Mar 10, 2015","urlTitle":"will-wearables-be-the-next-mobile-payment-devices-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ap-thumb.jpg","groupId":53319,"channel":"MOBILE","description":"Mobile payment is a popular topic among analysts this week. Here are some of the articles you will find in the Financial Services section.\n\n\nCashless Britain \u2013 Not Coming to a Town Near You Soon | Celent - Wed, 04 Mar 2015 |Gareth Lodge\nWearables: The Next Mobile Payment Device? | eMarketer - Tue, 03 Mar 2015 \nMobile Payment Fraud Is a Growing Problem | Gartner - Wed, 04 Mar 2015 \nAnalyst View: Paypal embraces NFC in a move to strengthen its mobile payments play in bricks and mortar retail | Ovum - Tue, 03 Mar 2015 |Eden Zoller\nPayPal\u2019s acquisition of Paydiant and embrace of NFC signal a fresh drive in bricks and mortar retail | Ovum - Tue, 03 Mar 2015 |Eden Zoller","dateTimeMS":1425994740000,"title":"Will Wearables Be the Next Mobile Payment Devices?","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=will-wearables-be-the-next-mobile-payment-devices-","target":"_blank","peerReviewed":false,"subType":"","id":53941750,"orderField":0},{"dateTime":"Tuesday, Mar 10, 2015","urlTitle":"ibm-interconnect-delivers-clear-view-into-long-term-strategy","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/tbr-thumb.jpg","groupId":53319,"channel":"CLOUD","description":"InterConnect is a new customer event that integrates and replaces three smaller and product-focused IBM customer events: Pulse (mobile development), Innovate (software development) and Impact (cloud computing). The three-day analyst track portion of the conference, titled A New Way, had three core stories: A New Way to Think, A New Way to Work and A New Way Forward. LeBlanc has emerged as the single cloud leader IBM needs, appearing at the event with other solution-area senior vice presidents including Mike Rhodin, who leads IBM\u2019s market-making Watson cognitive computing group, and Bob Picciano, who leads IBM Analytics.","dateTimeMS":1426006260000,"title":"IBM InterConnect Delivers Clear View into Long-term Strategy","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=ibm-interconnect-delivers-clear-view-into-long-term-strategy","target":"_blank","peerReviewed":false,"subType":"","id":53941770,"orderField":0},{"dateTime":"Wednesday, Mar 11, 2015","urlTitle":"cloud-computing-week-in-review","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ap-thumb.jpg","groupId":53319,"channel":"CLOUD","description":"Here are some discussions from the cloud marketplace, with more to be found in the Cloud Computing section.","dateTimeMS":1426080360000,"title":"Cloud Computing Week in Review","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=cloud-computing-week-in-review","target":"_blank","peerReviewed":false,"subType":"","id":53941818,"orderField":0},{"dateTime":"Monday, Mar 16, 2015","urlTitle":"defining-the-internet-of-things","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ib2.png","groupId":53926943,"channel":"","description":"The Internet of Things is a reality now. Much is here and more is coming in full speed. We are already able to monitor our health through wearables, get our houses and cars on the phone, use our human bodies for data transmission, and sense the environment.","dateTimeMS":1426505160000,"title":"Defining the Internet of Things","type":"article","subCategories":"","url":"/web/sensing-iot/content?g=53926943&type=article&urlTitle=defining-the-internet-of-things","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":54859800,"orderField":0},{"dateTime":"Tuesday, Mar 31, 2015","urlTitle":"what-are-the-components-of-iot-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ib2.png","groupId":53926943,"channel":"","description":"Most definitions of the Internet of Things include physical objects or devices (also called \u201cthings\u201d) that can sense and/or affect the physical environment, as shown in Figure 1. By 2020, it is expected that the IoT will comprise 50 billion devices, as shown in Figure 3. The IoT also includes virtual objects, such as electronic tickets, agendas, books, and wallets.","dateTimeMS":1427800500000,"title":"What Are the Components of IoT?","type":"article","subCategories":"","url":"/web/sensing-iot/content?g=53926943&type=article&urlTitle=what-are-the-components-of-iot-","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":54871410,"orderField":0},{"dateTime":"Tuesday, Mar 17, 2015","urlTitle":"future-information-ownership-rights-keeping-lawyers-happy-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/sorel.png","groupId":7512968,"channel":"","description":"Publishers are beginning to recognize the need to \u201cpublish\u201d big data sets so that interested communities can access and share source data from which they can carry out their research, etc.","dateTimeMS":1426590240000,"title":"Future Information Ownership Rights (Keeping Lawyers Happy)","type":"article","subCategories":"","url":"/web/musings-from-the-ivory-tower/content?g=7512968&type=article&urlTitle=future-information-ownership-rights-keeping-lawyers-happy-","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":53953154,"orderField":0},{"dateTime":"Friday, Mar 13, 2015","urlTitle":"the-malware-of-things","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/malware.jpg","groupId":53319,"channel":"SECURITY","description":"It\u2019s easy to get frustrated with the security problems we all face with our connected devices: shouldn\u2019t a PC/laptop/phone/tablet/whatever be secure by design? Is it really that hard?","dateTimeMS":1426265460000,"title":"The Malware of Things","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=the-malware-of-things","target":"_blank","peerReviewed":false,"subType":"","id":53946037,"orderField":0},{"dateTime":"Thursday, Jan 29, 2015","urlTitle":"ces-a-showcase-for-offbeat-gadgets","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/picobrew-thumb.jpg","groupId":7989281,"channel":"","description":"This marked my 10th consecutive year at International CES, and as regular as the day\u2019s sunset, there will always be on display various gadgets that make you scratch your head and wonder what the inventors were thinking. And with others, you still scratch your head as well and think \u2013 what a clever idea! Why didn\u2019t I think of that?","dateTimeMS":1422543600000,"title":"CES a Showcase for Offbeat Gadgets","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=ces-a-showcase-for-offbeat-gadgets","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":53948635,"orderField":0},{"dateTime":"Monday, Mar 16, 2015","urlTitle":"dreaming-big-at-sxswedu","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/bigdreams-thimb.jpg","groupId":53319,"channel":"INSIGHTS","description":"SXSWedu will screen \"Big Dream,\" an inspiring film that tells the intimate stories of seven young women who are breaking barriers as they follow their passion in science, technology, engineering, and math\u2014the acronymically named STEM fields","dateTimeMS":1426513620000,"title":"Dreaming Big at SXSWedu","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=dreaming-big-at-sxswedu","target":"_blank","peerReviewed":false,"subType":"","id":53948589,"orderField":0},{"dateTime":"Thursday, Mar 19, 2015","urlTitle":"what-the-analysts-say-about-the-apple-watch","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ap-thumb.jpg","groupId":53319,"channel":"MOBILE","description":"The Apple watch was a popular topic among analysts last week. Here are some conversations that about the company's new wearable","dateTimeMS":1426762200000,"title":"What the Analysts Say about the Apple Watch","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=what-the-analysts-say-about-the-apple-watch","target":"_blank","peerReviewed":false,"subType":"","id":53952919,"orderField":0},{"dateTime":"Wednesday, Mar 18, 2015","urlTitle":"on-big-data-and-the-iot-interview-with-bill-franks-part-1-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/zicari.jpg","groupId":53319,"channel":"BIG DATA","description":"Roberto V. Zicari,editor of ODBMS.org, spoke with Bill Franks, Chief Analytics Officer for Teradata, about data warehouses, Hadoop, the Internet of Things, and Teradata`s perspective on the world of big data.","dateTimeMS":1426674240000,"title":"On Big Data and the IoT: Interview with Bill Franks (Part 1)","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=on-big-data-and-the-iot-interview-with-bill-franks-part-1-","target":"_blank","peerReviewed":false,"subType":"INTERVIEW","id":53951110,"orderField":0},{"dateTime":"Thursday, Mar 19, 2015","urlTitle":"on-big-data-and-the-iot-interview-with-bill-franks-part-2-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/zicari.jpg","groupId":53319,"channel":"BIG DATA","description":"Roberto V. Zicari, editor of ODBMS.org, spoke with Bill Franks, Chief Analytics Officer for Teradata, about data warehouses, Hadoop, the Internet of Things, and Teradata`s perspective on the world of big data. Roberto is Full Professor of Database and Information Systems at Frankfurt University. He was for over 15 years the representative of the OMG in Europe.","dateTimeMS":1426763340000,"title":"On Big Data and the IoT: Interview with Bill Franks (Part 2)","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=on-big-data-and-the-iot-interview-with-bill-franks-part-2-","target":"_blank","peerReviewed":false,"subType":"","id":53951090,"orderField":0},{"dateTime":"Wednesday, Mar 18, 2015","urlTitle":"connectivity-security-standards-3-iot-keywords","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/swift-thumb.jpg","groupId":8459902,"channel":"","description":"In truth, the Internet of Things might be better called the Internet of Everything.","dateTimeMS":1426677900000,"title":"Connectivity, Security, Standards: 3 IoT Keywords","type":"article","subCategories":"","url":"/web/prpl-matters/content?g=8459902&type=article&urlTitle=connectivity-security-standards-3-iot-keywords","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":53952944,"orderField":0},{"dateTime":"Friday, Mar 20, 2015","urlTitle":"10-tips-for-finding-success-in-consulting","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/consulting-thumb.jpg","groupId":53319,"channel":"INSIGHTS","description":"Many computing professionals, at some point in their careers, consider establishing a consulting business. Consulting offers an opportunity to leave the traditional workplace, work independently, and become your own boss.","dateTimeMS":1426861080000,"title":"10 Tips for Finding Success in Consulting","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=10-tips-for-finding-success-in-consulting","target":"_blank","peerReviewed":false,"subType":"","id":53960417,"orderField":0},{"dateTime":"Monday, Mar 23, 2015","urlTitle":"healthcare-it-expands","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/hit-thumb.jpg","groupId":53319,"channel":"MOBILE","description":"Healthcare, one of the largest and most vital sectors of the US economy, dragged its feet when other industries embraced information technologies and still creates many of its records by hand. But that may be finally changing. Bolstered by funding from the economic stimulus package, the industry is gearing up to computerize patients\u2019 medical records and create a nationwide infrastructure to facilitate the transmission and exchange of records among patients, doctors, hospitals, pharmacies, and others.","dateTimeMS":1427102880000,"title":"Healthcare IT Expands","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=healthcare-it-expands","target":"_blank","peerReviewed":false,"subType":"","id":53959963,"orderField":0},{"dateTime":"Tuesday, Mar 24, 2015","urlTitle":"cryptographer-s-challenge-keeping-genetic-secrets-while-advancing-genetic-research","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/lauter.jpg","groupId":53319,"channel":"SECURITY","description":"Kristin Lauter is solving a problem you may not even know you have: She's working to keep your most personal data private and secure.","dateTimeMS":1427196480000,"title":"Cryptographer's Challenge: Keeping Genetic Secrets While Advancing Genetic Research","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=cryptographer-s-challenge-keeping-genetic-secrets-while-advancing-genetic-research","target":"_blank","peerReviewed":false,"subType":"","id":53961915,"orderField":0},{"dateTime":"Wednesday, Mar 25, 2015","urlTitle":"cloud-storage-only-as-risky-as-you-make-it","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ap-thumb.jpg","groupId":53319,"channel":"CLOUD","description":"Confidentiality and security are always top concerns when an organization considers leveraging the cloud to store their information, and certainly legitimate ones. In this wek's Analyst Perspectives, analysts talk about managing risks and other issues related to cloud computing.","dateTimeMS":1427287620000,"title":"Cloud Storage Only As Risky As You Make It","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=cloud-storage-only-as-risky-as-you-make-it","target":"_blank","peerReviewed":false,"subType":"","id":53963195,"orderField":0},{"dateTime":"Friday, Mar 27, 2015","urlTitle":"ibm-and-twitter-offer-another-piece-of-the-analytics-puzzle","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ap-thumb.jpg","groupId":53319,"channel":"BIG DATA","description":"Here are this week's analyst headlines from the Big Data space:","dateTimeMS":1427457480000,"title":"IBM and Twitter Offer Another Piece of the Analytics Puzzle","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=ibm-and-twitter-offer-another-piece-of-the-analytics-puzzle","target":"_blank","peerReviewed":false,"subType":"","id":53968084,"orderField":0},{"dateTime":"Thursday, Mar 26, 2015","urlTitle":"a-z-video-maria-ebling-on-pervasive-computing","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/ComputingNow/marketing/maria.jpg","groupId":53319,"channel":"MOBILE","description":"Pervasive computing thrives at the intersection of many areas of computer science, including distributed systems, human-computer interaction, and artifical intelligence, says Maria R. Ebling, IEEE Pervasive Computing Editor in Chief. Ebling, a research staff member at the IBM T.J. Watson Research Center, spoke about P=Pervasive as part of IBM's A-Z Video Series.","dateTimeMS":1427382840000,"title":"A-Z Video: Maria Ebling on Pervasive Computing","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=a-z-video-maria-ebling-on-pervasive-computing","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":53966077,"orderField":0},{"dateTime":"Tuesday, Apr 7, 2015","urlTitle":"what-do-we-know-about-software-development-in-startups-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/startupsd-thumb.jpg","groupId":53319,"channel":"STARTUPS","description":"Startups are newly created companies with little or no history of facing high volatility in technologies and markets. In the US alone, 476,000 new businesses are established each month, accounting for nearly 20 percent of job creation. As such, startups are an important factor in the economy.","dateTimeMS":1428406860000,"title":"What Do We Know about Software Development in Startups?","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=what-do-we-know-about-software-development-in-startups-","target":"_blank","peerReviewed":false,"subType":"","id":53989224,"orderField":0},{"dateTime":"Wednesday, Apr 8, 2015","urlTitle":"how-will-technologies-change-by-2022-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/2022.jpg","groupId":53319,"channel":"STARTUPS","description":"Nine technical leaders of the IEEE Computer Society joined forces to write a technical report, entitled IEEE CS 2022, symbolically surveying 23 potential technologies that could change the landscape of computer science and industry by the year 2022.","dateTimeMS":1428492180000,"title":"How Will Technologies Change by 2022?","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=how-will-technologies-change-by-2022-","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":53989204,"orderField":0},{"dateTime":"Monday, Apr 6, 2015","urlTitle":"accidents-will-happen","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/grier.jpg","groupId":53319,"channel":"SECURITY","description":"In \"Accidents Will Happen,\" Grier discusses self-driving cars, automotive information systems, and their tremendous security risks--illustrating how we tend to think about functionality first and consider security problems only as an afterthought.","dateTimeMS":1428320640000,"title":"Accidents Will Happen","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=accidents-will-happen","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":53989244,"orderField":0},{"dateTime":"Wednesday, May 13, 2015","urlTitle":"computing-and-the-law-important-ip-cases-in-2015","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/computinglaw.jpg","groupId":53319,"channel":"STARTUPS","description":"Author Brian M. Gaff, a partner in McDermott Will & Emery LLP, discusses several 2015 intellectual property cases that raise important patent, copyright, and trademark law issues.","dateTimeMS":1431493980000,"title":"Computing and the Law: Important IP Cases in 2015","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=computing-and-the-law-important-ip-cases-in-2015","target":"_blank","peerReviewed":false,"subType":"PODCAST","id":54055308,"orderField":0},{"dateTime":"Friday, Apr 10, 2015","urlTitle":"introducing-the-student-design-showcase","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/byrd.jpg","groupId":53319,"channel":"INSIGHTS","description":"IEEE Computer Society Board of Governors member Greg Byrd is looking for student projects to feature in his new Student Design Showcase column in Computer.","dateTimeMS":1428643620000,"title":"Introducing the Student Design Showcase","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=introducing-the-student-design-showcase","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":53996554,"orderField":0},{"dateTime":"Sunday, Mar 29, 2015","urlTitle":"devops-breaking-down-barriers-to-benefit-bottom-lines","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/devops-thumb.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"DevOps--a merging of \"development\" and \"operations\"--is rapidly changing how software is produced and released. By as early as next year, market-research firm Gartner expects DevOps to move from a niche strategy to the mainstream, embraced by fully a quarter of Global 2000 companies.","dateTimeMS":1427667000000,"title":"DevOps: Breaking Down Barriers to Benefit Bottom Lines","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=devops-breaking-down-barriers-to-benefit-bottom-lines","target":"_blank","peerReviewed":false,"subType":"","id":53970916,"orderField":0},{"dateTime":"Tuesday, Mar 31, 2015","urlTitle":"drones-poised-for-commercial-takeoff","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/drone3.jpg","groupId":7989281,"channel":"","description":"Unless you\u2019re completely cut off from civilization (in which case you wouldn\u2019t be reading this), drones are rapidly buzzzzzzzing their way into our lives. And the global market and impact is enormous. The Consumer Electronics Association, for instance, estimates about 425,000 drones will be sold this year, amounting to about $130 million in sales. By 2018, the annual market is expected to top $1 billion.","dateTimeMS":1427797260000,"title":"Drones Poised for Commercial Takeoff","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=drones-poised-for-commercial-takeoff","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":53973816,"orderField":0},{"dateTime":"Wednesday, Apr 1, 2015","urlTitle":"6-steps-to-prevent-your-business-from-being-hacked","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/cyber-thumb.jpg","groupId":53319,"channel":"SECURITY","description":"Cybersecurity is essential for business owners in 2015. There have been numerous security breaches of major companies just in the last few months, including Anthem Insurance Agency, Sony, and Target.","dateTimeMS":1427874120000,"title":"6 Steps to Prevent Your Business from Being Hacked","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=6-steps-to-prevent-your-business-from-being-hacked","target":"_blank","peerReviewed":false,"subType":"","id":53975948,"orderField":0},{"dateTime":"Friday, Apr 3, 2015","urlTitle":"how-silver-nanowire-technology-is-improving-touchscreen-capability","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/cambrios1.jpg","groupId":53319,"channel":"MOBILE","description":"Demand for new electronic applications is driving opportunities for transparent conductors\u2014and the need for a cost-effective material that conforms to bends and curves, is flexible, and foldable.","dateTimeMS":1428074760000,"title":"How Silver Nanowire Technology Is Improving Touchscreen Capability","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=how-silver-nanowire-technology-is-improving-touchscreen-capability","target":"_blank","peerReviewed":false,"subType":"","id":53989264,"orderField":0},{"dateTime":"Monday, Apr 13, 2015","urlTitle":"mining-domain-knowledge","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/swrequirements.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Author Jane Cleland-Huang provides an audio recording of the Requirements column, in which she discusses how basic data-mining skills can be useful for processing domain documents early during requirements engineering. From IEEE Software's May/June 2015 issue.","dateTimeMS":1428933900000,"title":"Mining Domain Knowledge","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=mining-domain-knowledge","target":"_blank","peerReviewed":false,"subType":"PODCAST","id":53996530,"orderField":0},{"dateTime":"Wednesday, Apr 15, 2015","urlTitle":"anarchy-and-order","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/oncomputing2.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Author Grady Booch provides an audio recording of his On Computing column, in which he discusses how computing amplifies the actions of governments, but can also temper its behavior by enabling mechanisms for private communication as well as for open and transparent communication by the people of a nation.","dateTimeMS":1429075020000,"title":"Anarchy and Order","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=anarchy-and-order","target":"_blank","peerReviewed":false,"subType":"PODCAST","id":54002000,"orderField":0},{"dateTime":"Thursday, Apr 16, 2015","urlTitle":"guest-editors-introduction-trends-in-systems-and-software-variability","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/sw4.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Davide Falessi speaks with IEEE Software Guest Editors Rafael Capilla and Rich Hilliard about the state of the art and practice in system and software variability. From IEEE Software's May/June 2015 issue.","dateTimeMS":1429176480000,"title":"Guest Editors' Introduction: Trends in Systems and Software Variability","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=guest-editors-introduction-trends-in-systems-and-software-variability","target":"_blank","peerReviewed":false,"subType":"PODCAST","id":54002746,"orderField":0},{"dateTime":"Friday, Apr 17, 2015","urlTitle":"smart-networked-systems-and-societies-a-research-agenda","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ram.jpg","groupId":53319,"channel":"NETWORKING","description":"Ram D. Sriram, chief of the Software and Systems Division, Information Technology Laboratory, at the US National Institute of Standards and Technology, discusses a research agenda for fulfilling the promise of the Internet of Things.","dateTimeMS":1429296300000,"title":"Smart Networked Systems and Societies: A Research Agenda","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=smart-networked-systems-and-societies-a-research-agenda","target":"_blank","peerReviewed":false,"subType":"VIDEO","id":54006618,"orderField":0},{"dateTime":"Sunday, May 17, 2015","urlTitle":"latest-analyst-news-about-sap","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ap-thumb.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Analysts are covering the latest news from SAP. Here are just some of the articles you will find in the Enterprise Applications section.","dateTimeMS":1431840000000,"title":"Latest Analyst News About SAP","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=latest-analyst-news-about-sap","target":"_blank","peerReviewed":false,"subType":"","id":54063360,"orderField":0},{"dateTime":"Tuesday, May 12, 2015","urlTitle":"why-wearable-technology-is-fleetin","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/Alton.jpg","groupId":53319,"channel":"MOBILE","description":"Wearable technology has attracted a ton of buzz in the past few years, with special attention over the past few months as Apple readies the official release of the Apple Watch. Consumers, digital marketers, and businesses have all been resetting their expectations and looking to wearable devices as the future of technology, but in reality, these types of devices may only be a short-term fad.","dateTimeMS":1431408300000,"title":"Why Wearable Technology Is Fleeting","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=why-wearable-technology-is-fleetin","target":"_blank","peerReviewed":false,"subType":"","id":54063340,"orderField":0},{"dateTime":"Friday, May 1, 2015","urlTitle":"analyst-commentary","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"BIG DATA","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending April 24, 2015.","dateTimeMS":1430496840000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=analyst-commentary","target":"_blank","peerReviewed":false,"subType":"","id":54189545,"orderField":0},{"dateTime":"Saturday, May 9, 2015","urlTitle":"procrastination","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/agile-thumb.jpg","groupId":8504655,"channel":"","description":"I haven\u2019t met anyone who hasn\u2019t, at some point, felt a little guilty about putting off some chore. I\u2019ve been there, too, I often rationalize procrastination by claiming that I work well under pressure. I actually think that\u2019s true sometimes.\nPutting off chores is one thing; putting off decisions is another. Hey, they\u2019re just decisions so delay doesn\u2019t hurt anything, right? I can wait until I\u2019m forced to make the decision and make it then. Much like the \u201cworking under pressure\u201d excuse, I can justify such an approach with a \u201cno harm, no foul\u201d attitude.","dateTimeMS":1431148380000,"title":"Procrastination","type":"article","subCategories":"","url":"/web/agile-careers/content?g=8504655&type=article&urlTitle=procrastination","target":"_blank","peerReviewed":false,"subType":"","id":54065831,"orderField":0},{"dateTime":"Wednesday, May 6, 2015","urlTitle":"the-future-of-personal-communications-a-holistic-approach-to-keeping-up-with-consumer-demand","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/cloud-computing-thumbnail.jpg","groupId":53319,"channel":"CLOUD","description":"In today's digital personal communications age, the average person goes through 35GB of data each day, from storing music, photos and movies to uploading sales presentations. As products like Apple's iPhone and Google's Android have caused mass mobile appeal, there will be a big need for new technologies that not only allow these personal \"pocket\" computers to help us effectively manage our daily lives, but provide ample security and storage. \n\nAnd contrary to what legions of cloud providers state, the cloud is not the universal solution for digital communications storage.","dateTimeMS":1430896800000,"title":"The Future of Personal Communications: A Holistic Approach to Keeping up With Consumer Demand","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=the-future-of-personal-communications-a-holistic-approach-to-keeping-up-with-consumer-demand","target":"_blank","peerReviewed":false,"subType":"","id":54042525,"orderField":0},{"dateTime":"Friday, May 15, 2015","urlTitle":"analyst-perspectiv-3","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"BIG DATA","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending May 08, 2015.","dateTimeMS":1431708360000,"title":"Analyst Perspectives","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=analyst-perspectiv-3","target":"_blank","peerReviewed":false,"subType":"","id":54189525,"orderField":0},{"dateTime":"Tuesday, May 19, 2015","urlTitle":"code-hunt-creating-a-community-with-a-game","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/Capture.jpg","groupId":53319,"channel":"SECURITY","description":"Launched a year ago, Code Hunt is a coding game that challenges players first to deduce a hidden problem from clues presented as unit tests and then to write a program to solve it. The game has been enormously successful, attracting more than 150,000 players from around the world and achieving amazing stickiness\u201499 percent of players return to the game within a week.","dateTimeMS":1432014720000,"title":"Code Hunt: creating a community with a game","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=code-hunt-creating-a-community-with-a-game","target":"_blank","peerReviewed":false,"subType":"","id":54067300,"orderField":0},{"dateTime":"Wednesday, May 20, 2015","urlTitle":"the-internet-of-things-is-causing-a-sea-change-in-manufacturing-that-s-putting-it-mildly-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/neal.jpg","groupId":7989281,"channel":"","description":"In a report issued last year by PWC, \u201cThe Internet of Things\u201d What It Means for US Manufacturing,\u201d the company said \u201cover the next decade, manufacturers could stand to capture about $4 trillion of value from the IoT through increased revenues and lower costs.\u201d\n\nThat\u2019s a lot of pocket change.","dateTimeMS":1432150260000,"title":"Internet of Things Upending Manufacturing","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=the-internet-of-things-is-causing-a-sea-change-in-manufacturing-that-s-putting-it-mildly-","target":"_blank","peerReviewed":false,"subType":"","id":54078859,"orderField":0},{"dateTime":"Tuesday, May 26, 2015","urlTitle":"analyst-perspectiv-4","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"CLOUD","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending May 15, 2015.\nThis week there are acquisitions, partnerships and more.","dateTimeMS":1432617000000,"title":"Analyst Perspectives","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=analyst-perspectiv-4","target":"_blank","peerReviewed":false,"subType":"","id":54189565,"orderField":0},{"dateTime":"Saturday, May 30, 2015","urlTitle":"the-current-and-future-state-of-the-cloud","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/cloud computing thumbnail.jpg","groupId":53319,"channel":"CLOUD","description":"What is going to happen in the cloud computing industry within the following few years? According to QuoteColo, cloud spending will continue to increase around the globe, and cloud based technologies will continue to play an important part in the creation and management of the future IT markets and products.\nBut we don\u2019t necessarily have to look that far into the future; some of the big industry players are already pushing up new cloud based technologies.","dateTimeMS":1432995000000,"title":"The Current and Future State of the Cloud","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=the-current-and-future-state-of-the-cloud","target":"_blank","peerReviewed":false,"subType":"","id":54086779,"orderField":0},{"dateTime":"Saturday, May 30, 2015","urlTitle":"infographic-the-current-and-future-state-of-the-cloud","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/cloud-thumb.jpg","groupId":53319,"channel":"CLOUD","description":"Infographic - The Current and Future State of the Cloud","dateTimeMS":1432995420000,"title":"Infographic - The Current and Future State of the Cloud","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=infographic-the-current-and-future-state-of-the-cloud","target":"_blank","peerReviewed":false,"subType":"","id":54086799,"orderField":0},{"dateTime":"Monday, Jun 1, 2015","urlTitle":"hololens-as-metaphor-the-virtually-real-future-of-microsoft","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"Test driving the HoloLens, Microsoft\u2019s soon-to-be released augmented reality headset, it\u2019s easy to forget the challenges facing Satya Nadella as his first year on the job starts to take shape.","dateTimeMS":1433140020000,"title":"HoloLens as Metaphor: The Virtually Real Future of Microsoft","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=hololens-as-metaphor-the-virtually-real-future-of-microsoft","target":"_blank","peerReviewed":false,"subType":"","id":54201079,"orderField":0},{"dateTime":"Friday, Jun 19, 2015","urlTitle":"sap-and-the-magic-of-success-laying-the-groundwork-for-the-inevitable-future-of-business","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"Sometimes covering SAP and its innovations reminds me of what it\u2019s like being the parent of school-aged children. Good parents complain endlessly.","dateTimeMS":1434735120000,"title":"SAP and the Magic of Success \u2013 Laying the Groundwork for the Inevitable Future of Business","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=sap-and-the-magic-of-success-laying-the-groundwork-for-the-inevitable-future-of-business","target":"_blank","peerReviewed":false,"subType":"","id":54200492,"orderField":0},{"dateTime":"Friday, Jun 19, 2015","urlTitle":"descaling-your-scrum","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/agile-thumb.jpg","groupId":8504655,"channel":"","description":"Every now and then I must remove scale from my teapot. It accumulates with use and slows the heating of the water over time. It may change the flavour of the water a bit but doesn\u2019t otherwise make a whole lot of difference other than to create lime as a byproduct of making tea.\nBusiness that scale their organisations are a lot like that.","dateTimeMS":1434734880000,"title":"Descaling your Scrum","type":"article","subCategories":"","url":"/web/agile-careers/content?g=8504655&type=article&urlTitle=descaling-your-scrum","target":"_blank","peerReviewed":false,"subType":"","id":54144551,"orderField":0},{"dateTime":"Wednesday, Jun 10, 2015","urlTitle":"how-the-patent-purchase-promotion-could-revolutionize-the-tech-wor-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/patent.JPG","groupId":53319,"channel":"STARTUPS","description":"Google has been on the forefront of new technology for decades. Most of the attention the company has generated has come as the result of the products it has developed\u2014Google Search revolutionized the accessibility of the web, Google Maps brought us easier directions and mapping, Google Chrome greatly improved on its contemporaries, and the Android operating system is making waves in basic computing.\n\nBut Google is enabling the development of technology in many other ways. It allows its workers to dedicate a portion of their time to personal pet projects, enabling some of the most creative tech geniuses in the world to come up with new ideas. It funds and purchases young tech startups, giving new resources and more stability to promising new ideas. It even partners and integrates with other tech firms, marrying its technology with those of others in an effort to enable the greatest possible user experience.\n\nNow, the search engine giant is looking to launch a new patent-related program that could work wonders in enabling the development of new technologies at a faster and more efficient rate.\n\nThe Program","dateTimeMS":1433978400000,"title":"How the Patent Purchase Promotion Could Revolutionize the Tech World","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=how-the-patent-purchase-promotion-could-revolutionize-the-tech-wor-1","target":"_blank","peerReviewed":false,"subType":"","id":54114984,"orderField":0},{"dateTime":"Friday, Jun 12, 2015","urlTitle":"analyst-perspectiv-5","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending June 05, 2015.","dateTimeMS":1434102300000,"title":"Analyst Perspectives","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=analyst-perspectiv-5","target":"_blank","peerReviewed":false,"subType":"","id":54141046,"orderField":0},{"dateTime":"Tuesday, Sep 1, 2015","urlTitle":"descaling-your-scrum-part-2","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/agile-thumb.jpg","groupId":8504655,"channel":"","description":"Waterfall seemed like it was well-attuned to developing simple or perhaps complicated systems. Such systems can be master-planned from the outset, with work done by specialized teams. There is feedback but success does not depend on efficient feedback, because it is so rarely needed. And because each stage (analysis, design, implementation, test) was held to be largely independent and simple, the work was partitionable. You could scale each part independently to achieve the maximum throughput.","dateTimeMS":1441142100000,"title":"Descaling your Scrum Part 2","type":"article","subCategories":"","url":"/web/agile-careers/content?g=8504655&type=article&urlTitle=descaling-your-scrum-part-2","target":"_blank","peerReviewed":false,"subType":"","id":54277499,"orderField":0},{"dateTime":"Monday, Jun 22, 2015","urlTitle":"analyst-perspectiv-6","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"MOBILE","description":"AnalystPerspectives Weekly Scan\nConversations including the Internet of Things, connected cars and more.","dateTimeMS":1434995520000,"title":"Analyst Perspectives","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analyst-perspectiv-6","target":"_blank","peerReviewed":false,"subType":"","id":54146986,"orderField":0},{"dateTime":"Tuesday, Jun 23, 2015","urlTitle":"is-it-time-now-for-smart-guns-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/smartgun1_thumb.jpg","groupId":7989281,"channel":"","description":"The tragic Charleston shooting last week has again brought the national conversation about gun control front and center. Concurrent with that has been a lot of Internet chatter about smart gun technology.","dateTimeMS":1435083180000,"title":"Is It Time Now for Smart Guns?","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=is-it-time-now-for-smart-guns-","target":"_blank","peerReviewed":false,"subType":"","id":54160342,"orderField":0},{"dateTime":"Wednesday, Jun 24, 2015","urlTitle":"-all-or-nothing-self-driving-car-is-a-blessing-and-a-curse","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"https://web.archive.org/web/20170606103214/http://computer.org/cms/Computer.org/ComputingNow/marketing/self.jpgcomputer.org","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Beginning this summer, Google is going to roll out its self-driving car prototypes onto real American roads. It\u2019s a big step forward for autonomous, self-driving cars, though this technology has been experimented with and tested for the past several years. In this test, a handful of prototypes will travel throughout Mountain View, California, each with a human safety driver aboard, to rigorously test their feasibility as real-world vehicles.","dateTimeMS":1435186920000,"title":"\"All or Nothing\" Self-Driving Car Is a Blessing and a Curse","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=-all-or-nothing-self-driving-car-is-a-blessing-and-a-curse","target":"_blank","peerReviewed":false,"subType":"","id":54154299,"orderField":0},{"dateTime":"Sunday, Jun 28, 2015","urlTitle":"analyst-commentary-20150626","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"SECURITY","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending June 19, 2015.","dateTimeMS":1435534380000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=analyst-commentary-20150626","target":"_blank","peerReviewed":false,"subType":"","id":54189585,"orderField":0},{"dateTime":"Monday, Jun 29, 2015","urlTitle":"telemedicine-enhancing-health-wearables","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/aetw1.jpg","groupId":8206605,"channel":"","description":"While wearable health tech is still in its early days, its popularity is growing and the general public is beginning to understand the benefits. And this bodes well for the continued growth of telemedicine.","dateTimeMS":1435614600000,"title":"Telemedicine Enhancing Health Wearables","type":"article","subCategories":"","url":"/web/the-doctor-is-in/content?g=8206605&type=article&urlTitle=telemedicine-enhancing-health-wearables","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":54160393,"orderField":0},{"dateTime":"Wednesday, Jul 1, 2015","urlTitle":"fully-open-source-software-will-help-realize-the-full-benefits-of-the-internet-of-everything","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/prplkathy2.jpg","groupId":8459902,"channel":"","description":"Each day more devices are added to the repertoire of smart technology, continuing to expand the Internet of Everything (IoE), creating a demand for a broad ecosystem in which technology leaders may collaborate.","dateTimeMS":1435789620000,"title":"Fully Open Source Software Will Help Realize the Full Benefits of the Internet of Everything","type":"article","subCategories":"","url":"/web/prpl-matters/content?g=8459902&type=article&urlTitle=fully-open-source-software-will-help-realize-the-full-benefits-of-the-internet-of-everything","target":"_blank","peerReviewed":false,"subType":"","id":54169179,"orderField":0},{"dateTime":"Thursday, Jul 2, 2015","urlTitle":"analyst-commenta-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"SECURITY","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending June 26, 2015.","dateTimeMS":1435869840000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=analyst-commenta-1","target":"_blank","peerReviewed":false,"subType":"","id":54169977,"orderField":0},{"dateTime":"Monday, Jul 6, 2015","urlTitle":"6-vital-tips-for-hiring-a-great-programmer","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/prg-thumb.jpg","groupId":53319,"channel":"CAREERS","description":"Hiring a new programmer for your team is a big commitment, and you want to be as sure as possible that whomever you hire will work. Know what you are looking for, and do not rush into anything unless it feels right on both sides.","dateTimeMS":1436220000000,"title":"6 Vital Tips for Hiring a Great Programmer","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=6-vital-tips-for-hiring-a-great-programmer","target":"_blank","peerReviewed":false,"subType":"","id":54174546,"orderField":0},{"dateTime":"Tuesday, Jul 7, 2015","urlTitle":"using-procurement-analytics-to-simplify-your-supplier-reconciliation","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/keith-sm.jpg","groupId":54174062,"channel":"","description":"Ask finance managers to name a necessary evil of their responsibilities and many will cite reconciling goods received against invoices not received (\u201cGR-NI\u201d). The GR-NI issue is time-consuming to manage but not exactly mission critical to finding new business. Because of that it often gets demoted to the lowest of priorities. Not dealing with GR-NI, however, creates financial liabilities and can introduce significant risk to your business operations.","dateTimeMS":1436289180000,"title":"Using Procurement Analytics to Simplify Your Supplier Reconciliation","type":"article","subCategories":"","url":"/web/all-things-supply-chain-analytics/content?g=54174062&type=article&urlTitle=using-procurement-analytics-to-simplify-your-supplier-reconciliation","target":"_blank","peerReviewed":false,"subType":"","id":54180325,"orderField":0},{"dateTime":"Monday, Jul 13, 2015","urlTitle":"exploring-unmet-opportunities-in-the-24-billion-wearable-technology-industry","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/raghu-sm.jpg","groupId":54174376,"channel":"","description":"Given its rising popularity and expansion in the marketplace, we\u2019ve decided to focus our first piece on one of today\u2019s hottest markets: wearables. In this post, you\u2019ll find some key trends, where the market\u2019s heading, a few examples of popular wearables and additional information about the unexplored opportunities in this market.","dateTimeMS":1436810580000,"title":"Exploring Unmet Opportunities in the $24 Billion Wearable Technology Industry","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=exploring-unmet-opportunities-in-the-24-billion-wearable-technology-industry","target":"_blank","peerReviewed":false,"subType":"","id":54214363,"orderField":0},{"dateTime":"Friday, Jul 10, 2015","urlTitle":"analyst-commenta-2","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"SECURITY","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending July 03, 2015.","dateTimeMS":1436558400000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=analyst-commenta-2","target":"_blank","peerReviewed":false,"subType":"","id":54178692,"orderField":0},{"dateTime":"Tuesday, Jul 14, 2015","urlTitle":"iot-and-the-ever-expanding-web","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ib2.png","groupId":53926943,"channel":"","description":"In 1992, there were about as many devices hooked up to the Internet as there were people living in San Jose. Today, there are three times more connected devices than there are human beings on the planet.","dateTimeMS":1436910480000,"title":"IoT and the Ever Expanding Web","type":"article","subCategories":"","url":"/web/sensing-iot/content?g=53926943&type=article&urlTitle=iot-and-the-ever-expanding-web","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":54859740,"orderField":0},{"dateTime":"Wednesday, Jul 15, 2015","urlTitle":"big-data-and-the-bright-and-messy-future","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/bigdata_sm.jpg","groupId":53319,"channel":"BIG DATA","description":"It began with a simple problem: how do I figure out who is accessing my web site and what they are viewing? I should take a step back, actually, because it began even before that with the grand challenge of trying to crawl and index an exponentially growing number of websites in the early 21st Century. But that challenge was unique to Google and a few other players, while analyzing web site access was more ubiquitous among the burgeoning social media sites that were coming of age around the same time.","dateTimeMS":1436988840000,"title":"Big Data and the Bright and Messy Future","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=big-data-and-the-bright-and-messy-future","target":"_blank","peerReviewed":false,"subType":"","id":54184762,"orderField":0},{"dateTime":"Thursday, Jul 16, 2015","urlTitle":"silver-nanowire-conductors-not-your-grand-dad-s-touchscreen","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/touch.jpg","groupId":53319,"channel":"MOBILE","description":"While there seems to be a constant stream of technical breakthroughs in computing systems, particularly in processors, memory and faster interfaces, revolutionary changes are also occurring in display and touch technology.","dateTimeMS":1437064260000,"title":"Silver Nanowire Conductors: Not Your Grand Dad's Touchscreen","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=silver-nanowire-conductors-not-your-grand-dad-s-touchscreen","target":"_blank","peerReviewed":false,"subType":"","id":54189631,"orderField":0},{"dateTime":"Friday, Jul 17, 2015","urlTitle":"analyst-commenta-3","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"SECURITY","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending July 10, 2015.","dateTimeMS":1437153420000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=analyst-commenta-3","target":"_blank","peerReviewed":false,"subType":"","id":54189272,"orderField":0},{"dateTime":"Friday, Jul 17, 2015","urlTitle":"big-data-analytics-outsource-or-in-house-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/bigdata.jpg","groupId":53319,"channel":"BIG DATA","description":"According to IDC, the 1.8 zettabytes \u2013 that\u2019s 1.8 trillion gigabytes \u2013 of information created last year will grow by a factor of nine over the next five years. While the storage of massive amounts of data on big computers is not a new idea, what has changed is the need and expectation of mining that data for decision support. That\u2019s what we call big data analytics and all experts agree that the ability to analyze big data will be the difference between success and failure in almost every type of business in the coming years.","dateTimeMS":1437153840000,"title":"Big Data Analytics: Outsource or In-House?","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=big-data-analytics-outsource-or-in-house-","target":"_blank","peerReviewed":false,"subType":"","id":54189751,"orderField":0},{"dateTime":"Monday, Jul 20, 2015","urlTitle":"better-decisions-through-big-data","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/bigdsecure.jpg","groupId":53319,"channel":"SECURITY","description":"Companies and governments increasingly rely on \u2018big data\u2019 to operate efficiently and competitively. Analytics and security must keep pace. What research underpins the latest big data-enabled advances?","dateTimeMS":1437417600000,"title":"Better Decisions through Big Data","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=better-decisions-through-big-data","target":"_blank","peerReviewed":false,"subType":"","id":54194424,"orderField":0},{"dateTime":"Tuesday, Jul 21, 2015","urlTitle":"want-more-actionable-information-from-your-bi-support-your-it-team-s-need-for-data-warehouse-automation","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/keith-sm.jpg","groupId":54174062,"channel":"","description":"If your organization is relatively new to BI but has successfully built some new reports with one of the great visualization tools on the market, you will soon find yourselves in need of a better data organization environment.","dateTimeMS":1437521280000,"title":"Want more actionable information from your BI? Support your IT team\u2019s need for data warehouse automation","type":"article","subCategories":"","url":"/web/all-things-supply-chain-analytics/content?g=54174062&type=article&urlTitle=want-more-actionable-information-from-your-bi-support-your-it-team-s-need-for-data-warehouse-automation","target":"_blank","peerReviewed":false,"subType":"","id":54199008,"orderField":0},{"dateTime":"Wednesday, Jul 22, 2015","urlTitle":"what-s-next-for-salesforce-com-how-about-a-private-equity-play-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"The rumors keep coming, fueled by highly speculative analysis like this latest stab in the dark from Fortune, that Salesforce.com is for sale.","dateTimeMS":1437587640000,"title":"What\u2019s next for Salesforce.com? How About a Private Equity Play?","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=what-s-next-for-salesforce-com-how-about-a-private-equity-play-","target":"_blank","peerReviewed":false,"subType":"","id":54200472,"orderField":0},{"dateTime":"Thursday, Jul 23, 2015","urlTitle":"analyst-commenta-4","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"CLOUD","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending July 17, 2015.","dateTimeMS":1437669660000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=analyst-commenta-4","target":"_blank","peerReviewed":false,"subType":"","id":54202471,"orderField":0},{"dateTime":"Monday, Jul 27, 2015","urlTitle":"expanding-opportunities-in-3d-metals-printing","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/gordon.png","groupId":54174376,"channel":"","description":"3D printing of metals is facilitating the transition to additive manufacturing from rapid prototyping. Printing in plastics has its place in prototyping and education, but metal printing has allowed the technology to be adopted for part production in the aerospace, orthopedic, dental and jewelry industries and is now being developed for the oil and gas, printed electronics, and general engineering industries.","dateTimeMS":1438012440000,"title":"Expanding Opportunities in 3D Metals Printing","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=expanding-opportunities-in-3d-metals-printing","target":"_blank","peerReviewed":false,"subType":"","id":54227960,"orderField":0},{"dateTime":"Tuesday, Jul 28, 2015","urlTitle":"shooting-the-messenger-anti-drone-defense-systems-becoming-big-business","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/dscn.jpg","groupId":7989281,"channel":"","description":"Pundits for the past year or so have been lauding about the wonderful things that drones will do for us \u2013 now we\u2019re trying to figure out how to shoot \u2018em all down.","dateTimeMS":1438120140000,"title":"Shooting the Messenger: Anti-Drone Defense Systems Becoming Big Business","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=shooting-the-messenger-anti-drone-defense-systems-becoming-big-business","target":"_blank","peerReviewed":false,"subType":"","id":54208263,"orderField":0},{"dateTime":"Wednesday, Jul 29, 2015","urlTitle":"my-experience-joining-toptal-a-day-in-the-life-of-picante-verde","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/alejandro.jpg","groupId":53319,"channel":"CAREERS","description":"His website sounds like a forum for salsa recipes.\n\nThe URL for his personal Facebook page reads more like a fan site for green pepper enthusiasts than the profile of an ace computer programmer.","dateTimeMS":1438208400000,"title":"My Experience Joining Toptal - A Day in the Life of Picante Verde","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=my-experience-joining-toptal-a-day-in-the-life-of-picante-verde","target":"_blank","peerReviewed":false,"subType":"","id":54216049,"orderField":0},{"dateTime":"Friday, Jul 31, 2015","urlTitle":"move-to-48-volt-vehicle-systems-accelerates-as-power-demand-increases","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/harrop.jpg","groupId":54174376,"channel":"","description":"Conventional vehicles with an internal combustion engine as the sole traction power have become more electric over the years \u2013 as customers demand more and more electrical and electronic devices.","dateTimeMS":1438375980000,"title":"Move to 48-Volt Vehicle Systems Accelerates as Power Demand Increases","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=move-to-48-volt-vehicle-systems-accelerates-as-power-demand-increases","target":"_blank","peerReviewed":false,"subType":"","id":54218087,"orderField":0},{"dateTime":"Wednesday, Aug 5, 2015","urlTitle":"automate-the-boring-but-essential-parts-of-your-data-warehouse","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/keith-sm.jpg","groupId":54174062,"channel":"","description":"Companies realize that data warehouses are not going to be replaced by Hadoop or in-memory solutions. A 2014 Gartner survey found that only 3% of IT leaders believe that big data or in-memory systems can replace their existing data warehouse infrastructure. That\u2019s a dramatic drop over recent years. As such, DWA is getting a fresh look as a better way to build and manage a data warehouse.","dateTimeMS":1438818300000,"title":"Automate the boring but essential parts of your data warehouse","type":"article","subCategories":"","url":"/web/all-things-supply-chain-analytics/content?g=54174062&type=article&urlTitle=automate-the-boring-but-essential-parts-of-your-data-warehouse","target":"_blank","peerReviewed":false,"subType":"","id":54227415,"orderField":0},{"dateTime":"Thursday, Aug 6, 2015","urlTitle":"avoiding-commoditization-in-wearable-technology","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/hayward.png","groupId":54174376,"channel":"","description":"In 2015 the global wearable technology market will be $24.2 billion, based on surveys conducted by IDTechEx Research. However, the majority of this \u2013 74% - is for already mature wearables \u2013 the humble electronic wristwatch, earphones, blood glucose test strips and the like.","dateTimeMS":1438880400000,"title":"Avoiding Commoditization in Wearable Technology","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=avoiding-commoditization-in-wearable-technology","target":"_blank","peerReviewed":false,"subType":"","id":54227940,"orderField":0},{"dateTime":"Tuesday, Aug 11, 2015","urlTitle":"ieee-computer-society-and-at-t-joined-together-to-create-an-encryption-challenge-and-we-have-a-winner-who-cracked-the-code-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/wwii.jpg","groupId":53319,"channel":"SECURITY","description":"Matthew Williams solved the #crackthecode challenge which was based on the 72nd anniversary of the game-changing Sigsaly encryption system launched in WWII.","dateTimeMS":1439311620000,"title":"IEEE Computer Society and AT&T joined together to create an Encryption Challenge, and We Have a Winner who Cracked the Code!","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=ieee-computer-society-and-at-t-joined-together-to-create-an-encryption-challenge-and-we-have-a-winner-who-cracked-the-code-","target":"_blank","peerReviewed":false,"subType":"","id":54236306,"orderField":0},{"dateTime":"Wednesday, Aug 12, 2015","urlTitle":"looking-into-the-future","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ebert-thumb.jpg","groupId":5954967,"channel":"","description":"Where is software heading as a business? I have spoken with many software business leaders around the world. They pointed to five success factors that will advance software business. They left unaddressed whether we evolve to humanity 2.0 \u2013 or a post-human society.","dateTimeMS":1439402100000,"title":"Looking into the Future","type":"article","subCategories":"","url":"/web/software-technologies/content?g=5954967&type=article&urlTitle=looking-into-the-future","target":"_blank","peerReviewed":false,"subType":"","id":54239765,"orderField":0},{"dateTime":"Friday, Aug 14, 2015","urlTitle":"sensors-for-wearable-technology-enabling-product-differentiation","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/hayward.png","groupId":54174376,"channel":"","description":"It\u2019s no secret that wearable technology has garnered a lot of attention the past few years. The driving factor has been the adaption of technology that has been widely used in other consumer electronics areas into a form factor that can be worn on the body.","dateTimeMS":1439592660000,"title":"Sensors for Wearable Technology- Enabling Product Differentiation","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=sensors-for-wearable-technology-enabling-product-differentiation","target":"_blank","peerReviewed":false,"subType":"","id":54286188,"orderField":0},{"dateTime":"Thursday, Aug 20, 2015","urlTitle":"seizing-the-data-at-hp-big-data-conference-2015","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/bigdata.jpg","groupId":53319,"channel":"BIG DATA","description":"Ken Rudin, Director of Analytics at Facebook, closed things out in the Day 2 keynote. He debunked four prominent and popular myths about Big Data:\n\n Big Data=Hadoop\n Big Data provides better answers\n Data Science is a science\n Actionable insights are the goal\n\nMr. Rudin spoke about the great challenge of hiring the right people to create a successful analytical culture. Finding individuals who are academically talented and business-savvy is no easy task.","dateTimeMS":1440094020000,"title":"Seizing the Data at HP Big Data Conference 2015","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=seizing-the-data-at-hp-big-data-conference-2015","target":"_blank","peerReviewed":false,"subType":"","id":54249692,"orderField":0},{"dateTime":"Friday, Aug 21, 2015","urlTitle":"the-intangible-future-and-the-rise-of-the-internet-file-system","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"Just a few years ago, we still printed out our photos, bought music on CDs, and movies on DVDs. Books, magazines, and newspapers were all printed on paper. Most people had external hard drives for backup and transferring files. We owned our media and entertainment and had full control over our real and digital lives. Does anyone remember holding up a map while driving, looking up a number in a phonebook, or using an encyclopedia? It feels awfully far away and almost unimaginable.","dateTimeMS":1440201900000,"title":"The Intangible Future and the Rise of the Internet File System","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=the-intangible-future-and-the-rise-of-the-internet-file-system","target":"_blank","peerReviewed":false,"subType":"","id":54261206,"orderField":0},{"dateTime":"Tuesday, Aug 18, 2015","urlTitle":"rethinking-software-testing-in-a-devops-world","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"Faster time to market. Some say it\u2019s not the next big thing; it\u2019s the only thing. Still, even with everyone pushing for DevOps, Agile and Continuous Integration, there is one key component that consistently gets lost in the shuffle \u2014 software testing.","dateTimeMS":1439931000000,"title":"Rethinking Software Testing in a DevOps World","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=rethinking-software-testing-in-a-devops-world","target":"_blank","peerReviewed":false,"subType":"","id":54250642,"orderField":0},{"dateTime":"Tuesday, Aug 25, 2015","urlTitle":"the-runaway-growth-of-games-and-the-work-ahead-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/meloni.png","groupId":8545555,"channel":"","description":"The games market has exploded in the past seven years, expanding across an array of platforms that includes PCs, consoles, and mobiles devices. In 2009, mobile gaming barely made a dent in this market, but today it is one of the fastest growing segments. Advances in graphics quality and player engagement have fueled this growth.","dateTimeMS":1440541380000,"title":"The runaway growth of Games and the work ahead\u2026","type":"article","subCategories":"","url":"/web/inspired-by-games/content?g=8545555&type=article&urlTitle=the-runaway-growth-of-games-and-the-work-ahead-","target":"_blank","peerReviewed":false,"subType":"","id":54261226,"orderField":0},{"dateTime":"Monday, Aug 24, 2015","urlTitle":"harnessing-the-business-possibilities-of-the-internet-of-things","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"The Internet of Things (IoT) has captured many headlines over the past year, and that\u2019s because it has captured the imagination of everyone from startup entrepreneurs to heads of well-established enterprises. What started as an Internet-controlled toaster at the 2009 Interop Conference has now blossomed into a multi-billion-dollar world of possibility.","dateTimeMS":1440454140000,"title":"Harnessing the Business Possibilities of the Internet of Things","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=harnessing-the-business-possibilities-of-the-internet-of-things","target":"_blank","peerReviewed":false,"subType":"","id":54260492,"orderField":0},{"dateTime":"Wednesday, Aug 26, 2015","urlTitle":"progress-for-new-products-enabled-by-flexible-battery-technology","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/raghu-sm.jpg","groupId":54174376,"channel":"","description":"Thin, flexible batteries have been available for more than 15 years, but have only had limited commercial success. This is not surprising, since they have been more expensive, offer lower capacity and have a shorter shelf life than regular button cell or larger batteries.","dateTimeMS":1440603660000,"title":"Progress for New Products Enabled by Flexible Battery Technology","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=progress-for-new-products-enabled-by-flexible-battery-technology","target":"_blank","peerReviewed":false,"subType":"","id":54264805,"orderField":0},{"dateTime":"Friday, Aug 28, 2015","urlTitle":"50-tools-your-startup-probably-needs","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/startup.jpeg","groupId":53319,"channel":"STARTUPS","description":"Your startup is all about disruptive, game-changing ideas. However, to make that idea into a business you not only need your strategy, but you also need many tools to build your business out. Think about adding these 50 tools.","dateTimeMS":1440801840000,"title":"50 Tools Your Startup Probably Needs","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=50-tools-your-startup-probably-needs","target":"_blank","peerReviewed":false,"subType":"","id":54774372,"orderField":0},{"dateTime":"Monday, Aug 31, 2015","urlTitle":"mobile-ad-revenues-steadily-increasing-but-challenges-abound","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/yah.png","groupId":7989281,"channel":"","description":"Advertisers have been salivating for years at the promise of mobile advertising. Gartner, for instance, predicts that by 2017, annual mobile advertising revenues will be almost $42 billion. Display formats making up most of that chunk, but video (driven by tablets and growth in tablet ownership) will show the highest growth.","dateTimeMS":1441038420000,"title":"Mobile Ad Revenues Steadily Increasing but Challenges Abound","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=mobile-ad-revenues-steadily-increasing-but-challenges-abound","target":"_blank","peerReviewed":false,"subType":"","id":54273009,"orderField":0},{"dateTime":"Wednesday, Sep 2, 2015","urlTitle":"wearable-technology-in-medical-applications-and-healthcare","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/hayward.png","groupId":54174376,"channel":"","description":"The medical and healthcare sector, primarily characterized as \u201cdigital health,\u201d represents the single largest opportunity for the wearable technology industry. Patients want it, some physicians are embracing it, insurance companies are starting to fund some of it, regulators are approving some of it and companies \u2015 big and small \u2015 all want in.","dateTimeMS":1441238520000,"title":"Wearable Technology in Medical Applications and Healthcare","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=wearable-technology-in-medical-applications-and-healthcare","target":"_blank","peerReviewed":false,"subType":"","id":54277998,"orderField":0},{"dateTime":"Wednesday, Sep 2, 2015","urlTitle":"analyst-comment-10","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending August 28, 2015.","dateTimeMS":1441228260000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-comment-10","target":"_blank","peerReviewed":false,"subType":"","id":54280426,"orderField":0},{"dateTime":"Friday, Sep 4, 2015","urlTitle":"growth-potential-of-rfid-in-china-looks-promising","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/raghu-sm.jpg","groupId":54174376,"channel":"","description":"The development of RFID (Radio Frequency Identification) in China has long been heavily supported by the Chinese government and can be readily seen in large projects, such as national identification cards, passports and subway ticket applications.","dateTimeMS":1441402620000,"title":"Growth Potential of RFID in China Looks Promising","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=growth-potential-of-rfid-in-china-looks-promising","target":"_blank","peerReviewed":false,"subType":"","id":54286209,"orderField":0},{"dateTime":"Tuesday, Sep 8, 2015","urlTitle":"racing-to-the-top-as-paas-and-iaas-commoditize-the-quest-to-provide-business-value-add-in-the-cloud-intensifies","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"At a press/analyst meeting last spring, Salesforce.com CEO Marc Benioff was asked whether he had any plans to build out an Amazon AWS-like capability to complement the rest of his cloud strategy. His scoffing reply was right on the money. Competing with AWS and other commodity-level cloud services was \u201ca race to the bottom,\u201d Benioff replied. Case closed.","dateTimeMS":1441748520000,"title":"Racing to the Top: As PaaS and IaaS Commoditize, The Quest to Provide Business Value-add in the Cloud Intensifies","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=racing-to-the-top-as-paas-and-iaas-commoditize-the-quest-to-provide-business-value-add-in-the-cloud-intensifies","target":"_blank","peerReviewed":false,"subType":"","id":54291595,"orderField":0},{"dateTime":"Thursday, Sep 10, 2015","urlTitle":"analyst-comment-11","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending September 04, 2015.","dateTimeMS":1441914300000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-comment-11","target":"_blank","peerReviewed":false,"subType":"","id":54297897,"orderField":0},{"dateTime":"Wednesday, Sep 9, 2015","urlTitle":"flexible-barrier-manufacturing-poised-for-takeoff","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/zervos.png","groupId":54174376,"channel":"","description":"A large opportunity lies in the development of devices in a flexible form factor that can operate without deterioration in performance, allowing them to be more robust, lightweight and versatile in their use \u2015 such as in wearable technology. This is specifically related to flexible OLED displays, and other devices using organic materials (such as OPV), where the organic materials deteriorate very quickly with exposure to oxygen and water.","dateTimeMS":1441820880000,"title":"Flexible Barrier Manufacturing Poised for Takeoff","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=flexible-barrier-manufacturing-poised-for-takeoff","target":"_blank","peerReviewed":false,"subType":"","id":54312221,"orderField":0},{"dateTime":"Friday, Sep 11, 2015","urlTitle":"iot-standardization-it-s-a-war","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ib2.png","groupId":53926943,"channel":"","description":"While developing products and solutions, the Internet of Stuff firms are racing over the creation of tech standards. Will the standards-based bodies and the industry leaders compete or collaborate?","dateTimeMS":1442009640000,"title":"IoT Standardization: It\u2019s a War","type":"article","subCategories":"","url":"/web/sensing-iot/content?g=53926943&type=article&urlTitle=iot-standardization-it-s-a-war","target":"_blank","peerReviewed":false,"subType":"","id":54859720,"orderField":0},{"dateTime":"Monday, Sep 14, 2015","urlTitle":"analyst-comment-12","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending September 11, 2015.","dateTimeMS":1442249580000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-comment-12","target":"_blank","peerReviewed":false,"subType":"","id":54305269,"orderField":0},{"dateTime":"Tuesday, Sep 15, 2015","urlTitle":"15-tips-to-stay-motivated-while-working-from-home","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/wfh.jpg","groupId":53319,"channel":"CAREERS","description":"A number of employees are starting to use the ability to work from home as an opportunity to curate their ideal working environment, no matter where in the world that is.","dateTimeMS":1442331600000,"title":"15 Tips To Stay Motivated While Working From Home","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=15-tips-to-stay-motivated-while-working-from-home","target":"_blank","peerReviewed":false,"subType":"","id":54306331,"orderField":0},{"dateTime":"Friday, Sep 18, 2015","urlTitle":"why-millions-are-invested-in-thin-flexible-sensors","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/chansin.png","groupId":54174376,"channel":"","description":"Traditionally, sensors have been built as rigid components, but recent announcements \u2013 and the emerging markets \u2015 indicate we will see more flexible sensors in the future.","dateTimeMS":1442607300000,"title":"Why Millions Are Invested in Thin Flexible Sensors","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=why-millions-are-invested-in-thin-flexible-sensors","target":"_blank","peerReviewed":false,"subType":"","id":54312759,"orderField":0},{"dateTime":"Thursday, Sep 17, 2015","urlTitle":"don-t-let-an-out-of-date-corporate-network-lead-to-disasters","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"Disasters can come in many shapes and sizes. At your local movie theater, big budget disaster flicks can include earthquakes, tsunamis, and even aliens and rampaging dinosaurs. But in the world of business technology, while disaster may seem more mundane and not come with expensive special effects, the costs of technology-related disasters can be very big budget as well.","dateTimeMS":1442532360000,"title":"Don\u2019t Let an Out-of-Date Corporate Network Lead to Disasters","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=don-t-let-an-out-of-date-corporate-network-lead-to-disasters","target":"_blank","peerReviewed":false,"subType":"","id":54312908,"orderField":0},{"dateTime":"Wednesday, Sep 23, 2015","urlTitle":"analyst-comment-13","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending September 18, 2015.","dateTimeMS":1443025440000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-comment-13","target":"_blank","peerReviewed":false,"subType":"","id":54321137,"orderField":0},{"dateTime":"Thursday, Sep 24, 2015","urlTitle":"when-the-iot-attacks-four-examples-of-the-highest-security-stakes-we-ve-seen","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"Remember the good old days? The days when a security breach just meant your credit card data was stolen from the local convenience store and used for a $2,000 propane tank shopping spree a couple thousand miles away?","dateTimeMS":1443119520000,"title":"When the IoT Attacks: Four Examples of the Highest Security Stakes We\u2019ve Seen","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=when-the-iot-attacks-four-examples-of-the-highest-security-stakes-we-ve-seen","target":"_blank","peerReviewed":false,"subType":"","id":54321164,"orderField":0},{"dateTime":"Monday, Sep 21, 2015","urlTitle":"the-devil-s-dictionary-for-it-and-it-security-two-factor-authentication","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"Access Denied. (But I typed in the credentials right). Access Denied. (You\u2019ve got to be kidding me. One more time.). Access Denied. (That\u2019s it\u2026this computer is going out the window).","dateTimeMS":1442864340000,"title":"The Devil\u2019s Dictionary for IT and IT Security: Two-Factor Authentication","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=the-devil-s-dictionary-for-it-and-it-security-two-factor-authentication","target":"_blank","peerReviewed":false,"subType":"","id":54321191,"orderField":0},{"dateTime":"Tuesday, Sep 22, 2015","urlTitle":"the-future-of-networking-will-be-written-by-the-leaders","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"One of my favorite bands of all time is The Clash, and a famous quote attributed to their late band leader Joe Strummer is that \u201cthe future is unwritten.\u201d And in most cases that is very true. For example, few people in 2005 could have successfully predicted many of the trends and realities of today, whether in the everyday world or in the realm of technology.","dateTimeMS":1442965800000,"title":"The Future of Networking Will Be Written By the Leaders","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=the-future-of-networking-will-be-written-by-the-leaders","target":"_blank","peerReviewed":false,"subType":"","id":54321720,"orderField":0},{"dateTime":"Friday, Sep 25, 2015","urlTitle":"techpro-stat-of-the-week-data-breaches-and-downtime","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"Recent Aberdeen research has shown a 30-60% growth in network security services for SMBs, and for good reason. The costs of data breaches and downtime in this edition of Stat of the Week demonstrate that it\u2019s not cheap for an SMB to not be secure.","dateTimeMS":1443207060000,"title":"TechPro Stat of the Week: Data Breaches and Downtime","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=techpro-stat-of-the-week-data-breaches-and-downtime","target":"_blank","peerReviewed":false,"subType":"","id":54322334,"orderField":0},{"dateTime":"Monday, Sep 28, 2015","urlTitle":"10-online-invoicing-services-for-small-business-owners","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/invoice.jpg","groupId":53319,"channel":"INSIGHTS","description":"The benefits of online services for small business owners have been often noted, including reducing paper, adding efficiency and speed, and cutting costs. While there are online services for small business owners like project management, collaborative tools, marketing and accounting, one of the most advantageous online services has been online invoicing.","dateTimeMS":1443469200000,"title":"10 Online Invoicing Services for Small Business Owners","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=10-online-invoicing-services-for-small-business-owners","target":"_blank","peerReviewed":false,"subType":"","id":54324273,"orderField":0},{"dateTime":"Tuesday, Sep 29, 2015","urlTitle":"a-matter-of-life-and-death-why-we-must-take-iot-flaws-seriously","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/swift-thumb.jpg","groupId":8459902,"channel":"","description":"You\u2019re probably getting desensitized by now to the ever-lengthening list of data breach headlines which have saturated the news for the past couple of years. Targeted attacks, persistent threats and the like usually end up with the hackers capturing sensitive IP, customer information or trade secrets. The result? Economic damage, board level sackings and a heap of bad publicity for the breached organization. But that\u2019s usually where it ends.","dateTimeMS":1443551340000,"title":"A Matter of Life and Death: Why We Must Take IoT Flaws Seriously","type":"article","subCategories":"","url":"/web/prpl-matters/content?g=8459902&type=article&urlTitle=a-matter-of-life-and-death-why-we-must-take-iot-flaws-seriously","target":"_blank","peerReviewed":false,"subType":"","id":54329040,"orderField":0},{"dateTime":"Tuesday, Sep 29, 2015","urlTitle":"farmers-embracing-technology-to-improve-agriculture","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/agriculture.gif","groupId":7989281,"channel":"","description":"Tractor cabs that look like airplane cockpits. Cow heat detection devices. Crop-monitoring drones. Robot milking machines. Sensors that continuously measure everything from nitrogen content to livestock biometrics.","dateTimeMS":1443567780000,"title":"Farmers Embracing Technology to Improve Agriculture","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=farmers-embracing-technology-to-improve-agriculture","target":"_blank","peerReviewed":false,"subType":"","id":54328775,"orderField":0},{"dateTime":"Wednesday, Sep 30, 2015","urlTitle":"analyst-comment-14","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending September 25, 2015.","dateTimeMS":1443633480000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-comment-14","target":"_blank","peerReviewed":false,"subType":"","id":54330338,"orderField":0},{"dateTime":"Thursday, Oct 1, 2015","urlTitle":"reflections-on-fcc-proposal-on-modular-transmitters-and-electronic-labels-for-wireless-devices","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/schultz.jpg","groupId":8459902,"channel":"","description":"Over the last few weeks a discussion has flourished over the FCC\u2019s Notification of Proposed Rule Making (NPRM) on modular transmitters and electronic labels for wireless devices. Some folks have felt that the phrasing has been too Chicken-Little-like and that the FCC\u2019s proposal doesn\u2019t affect the ability to install free, libre or open source operating system. The FCC in fact says their proposal has no effect on open source operating systems or open source in general. The FCC is undoubtedly wrong.","dateTimeMS":1443721200000,"title":"Reflections on FCC Proposal on Modular Transmitters and Electronic Labels for Wireless Devices","type":"article","subCategories":"","url":"/web/prpl-matters/content?g=8459902&type=article&urlTitle=reflections-on-fcc-proposal-on-modular-transmitters-and-electronic-labels-for-wireless-devices","target":"_blank","peerReviewed":false,"subType":"","id":54330379,"orderField":0},{"dateTime":"Friday, Oct 2, 2015","urlTitle":"mapping-the-2-5-billion-3d-printing-industry","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/harrop.png","groupId":54174376,"channel":"","description":"The 3D printing industry will grow from $2.5 billion in 2015 to $20 billion in 2025. This growth is due to both improvements in existing printing technologies and the development of completely new technologies.","dateTimeMS":1443819480000,"title":"Mapping the $2.5 Billion 3D Printing Industry","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=mapping-the-2-5-billion-3d-printing-industry","target":"_blank","peerReviewed":false,"subType":"","id":54332238,"orderField":0},{"dateTime":"Tuesday, Oct 6, 2015","urlTitle":"upcoming-gbr-webinar-learn-5-proven-design-hacks-that-work-to-build-great-products","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/meloni.png","groupId":8545555,"channel":"","description":"Grab your lunch this Wednesday, October 7th at 12pm PST \u2013 Join us as we learn more about key design hacks and the powerful step-by-step GettngToAlpha program perfected by Amy Jo Kim, CEO of Shufflebrain.","dateTimeMS":1444169100000,"title":"UPCOMING GBR WEBINAR: Learn 5 Proven Design Hacks That Work To Build Great Products","type":"article","subCategories":"","url":"/web/inspired-by-games/content?g=8545555&type=article&urlTitle=upcoming-gbr-webinar-learn-5-proven-design-hacks-that-work-to-build-great-products","target":"_blank","peerReviewed":false,"subType":"","id":54339339,"orderField":0},{"dateTime":"Monday, Oct 5, 2015","urlTitle":"analyst-comment-15","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending October 02, 2015.","dateTimeMS":1444078620000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-comment-15","target":"_blank","peerReviewed":false,"subType":"","id":54339433,"orderField":0},{"dateTime":"Wednesday, Oct 7, 2015","urlTitle":"the-security-challenges-threatening-to-tear-the-internet-of-things-apart","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/swift-thumb.jpg","groupId":8459902,"channel":"","description":"The Internet of Things (IoT) has the power to transform our lives, making us more productive at work, and happier and safer at home. But it\u2019s also developing at such a rate that it threatens to outstrip our ability to adequately secure it.","dateTimeMS":1444256820000,"title":"The Security Challenges Threatening to Tear the Internet of Things Apart","type":"article","subCategories":"","url":"/web/prpl-matters/content?g=8459902&type=article&urlTitle=the-security-challenges-threatening-to-tear-the-internet-of-things-apart","target":"_blank","peerReviewed":false,"subType":"","id":54341998,"orderField":0},{"dateTime":"Thursday, Oct 8, 2015","urlTitle":"asia-next-frontier-for-flexible-electronics-manufacturing-equipment","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/raghu-sm.jpg","groupId":54174376,"channel":"","description":"Equipment makers are turning to Asia. There is an impending transition from equipment for development and prototyping purposes to buying equipment for higher volume manufacture. Here, the equipment focus is different: It is not about making state- of-the-art transistors using printing, but doing simpler things, reliably, that can be used in commercial products today.","dateTimeMS":1444340940000,"title":"Asia Next Frontier for Flexible Electronics Manufacturing Equipment","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=asia-next-frontier-for-flexible-electronics-manufacturing-equipment","target":"_blank","peerReviewed":false,"subType":"","id":54345528,"orderField":0},{"dateTime":"Friday, Oct 9, 2015","urlTitle":"can-microsoft-s-renaissance-return-it-to-the-top-of-the-tech-world-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"When Microsoft announced their new lineup of products, including a lot of impressive hardware, it turned a lot of people\u2019s heads. For anyone who follows tech, it\u2019s pretty hard to not compare this to Apple\u2019s recent product announcements and come to the conclusion that Microsoft is, at least right now, doing more interesting things than Apple.","dateTimeMS":1444420980000,"title":"Can Microsoft\u2019s Renaissance Return it to the Top of the Tech World?","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=can-microsoft-s-renaissance-return-it-to-the-top-of-the-tech-world-","target":"_blank","peerReviewed":false,"subType":"","id":54345555,"orderField":0},{"dateTime":"Monday, Oct 12, 2015","urlTitle":"how-to-fix-the-internet-of-broken-things","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/swift-thumb.jpg","groupId":8459902,"channel":"","description":"The Internet of Things is already permeating every part of our lives \u2013 from healthcare to aviation, automobiles to telecoms. But its security is fundamentally broken.","dateTimeMS":1444674120000,"title":"How to Fix the Internet of Broken Things","type":"article","subCategories":"","url":"/web/prpl-matters/content?g=8459902&type=article&urlTitle=how-to-fix-the-internet-of-broken-things","target":"_blank","peerReviewed":false,"subType":"","id":54348139,"orderField":0},{"dateTime":"Tuesday, Oct 13, 2015","urlTitle":"the-real-death-of-windows-phone-american-style-part-i-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"Microsoft\u2019s five-year Windows Phone freefall is living, or dying, proof that there are only so many second chances in tech, even for the kings of second chances, and it\u2019s finally time to throw in the towel on another great phone OS that never lived up to its potential. (ah, Palm OS, we hardly knew ya too.)","dateTimeMS":1444777500000,"title":"The (Real) Death of Windows Phone, American-style (Part I)","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=the-real-death-of-windows-phone-american-style-part-i-","target":"_blank","peerReviewed":false,"subType":"","id":54351330,"orderField":0},{"dateTime":"Friday, Oct 16, 2015","urlTitle":"is-data-prep-the-key-to-analytical-success-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"Analytics \u2013 Everyone wants it, a lot of people use it, few people use it well. Despite the appeal and seeming ubiquity of business analytics today, the experience of the typical business user leaves a lot to be desired.","dateTimeMS":1445022600000,"title":"Is Data Prep the Key to Analytical Success?","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=is-data-prep-the-key-to-analytical-success-","target":"_blank","peerReviewed":false,"subType":"","id":54357184,"orderField":0},{"dateTime":"Monday, Oct 19, 2015","urlTitle":"10-marketplace-companies-to-keep-your-eye-on-in-2016","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/cart.jpg","groupId":53319,"channel":"INSIGHTS","description":"It\u2019s not an easy task too incorporate a business model into this space. However, when it is done correctly, the potential market share to be captured is enormous. Here are 10 marketplace companies to keep your eye on in 2016.","dateTimeMS":1445275260000,"title":"10 Marketplace Companies to Keep Your Eye on in 2016","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=10-marketplace-companies-to-keep-your-eye-on-in-2016","target":"_blank","peerReviewed":false,"subType":"","id":54357212,"orderField":0},{"dateTime":"Wednesday, Oct 14, 2015","urlTitle":"analyst-comment-16","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending October 09, 2015.","dateTimeMS":1444861920000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-comment-16","target":"_blank","peerReviewed":false,"subType":"","id":54357267,"orderField":0},{"dateTime":"Thursday, Oct 15, 2015","urlTitle":"protecting-the-network-from-advanced-layer-7-ddos-attacks","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"Because your website and the supporting systems, applications, and so on are exposed to the outside world, they are ripe targets for sophisticated attacks designed either to exploit uncorrected flaws or to change the way these systems work. As application development continues to move to the cloud, such attacks will continue to be difficult to defend against.","dateTimeMS":1444930140000,"title":"Protecting the Network from Advanced \u2018Layer 7\u2032 DDoS Attacks","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=protecting-the-network-from-advanced-layer-7-ddos-attacks","target":"_blank","peerReviewed":false,"subType":"","id":54357334,"orderField":0},{"dateTime":"Tuesday, Oct 20, 2015","urlTitle":"the-real-death-of-windows-phone-american-style-part-ii-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"(When we last left our tragic hero, Windows Phone, there was no carrier support for the new Lumias that just hit the market, which means\u2026)","dateTimeMS":1445382720000,"title":"The (Real) Death of Windows Phone, American-style (Part II)","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=the-real-death-of-windows-phone-american-style-part-ii-","target":"_blank","peerReviewed":false,"subType":"","id":54359347,"orderField":0},{"dateTime":"Wednesday, Oct 21, 2015","urlTitle":"8-tasks-you-should-automate-at-work","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/productive.jpg","groupId":53319,"channel":"CAREERS","description":"Why work harder when you can work smarter instead? Think of all the time you spend completing tedious tasks at work. Now imagine the extra time you\u2019d have to dedicate to work that is more important and more interesting if you didn\u2019t have to spend so much time slogging through emails, filling out forms, or wracking your brain for a password.","dateTimeMS":1445462460000,"title":"8 Tasks You Should Automate At Work","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=8-tasks-you-should-automate-at-work","target":"_blank","peerReviewed":false,"subType":"","id":54360166,"orderField":0},{"dateTime":"Thursday, Oct 22, 2015","urlTitle":"analyst-comment-17","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending October 16, 2015.","dateTimeMS":1445534520000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-comment-17","target":"_blank","peerReviewed":false,"subType":"","id":54364467,"orderField":0},{"dateTime":"Friday, Oct 23, 2015","urlTitle":"do-you-need-to-be-smarter-than-me-to-use-tableau-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"Tableau is typically known as a provider of interactive data visualization software with a loyal, bordering on cult-like, customer base. So this naturally got me thinking \u2013 who are these \u201cpeople\u201d and do I have the intellectual horsepower to be one of them? Do you need to be smarter than me to use Tableau?","dateTimeMS":1445629980000,"title":"Do You Need to Be Smarter than Me to Use Tableau?","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=do-you-need-to-be-smarter-than-me-to-use-tableau-","target":"_blank","peerReviewed":false,"subType":"","id":54364494,"orderField":0},{"dateTime":"Monday, Oct 26, 2015","urlTitle":"analyst-comment-18","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending October 23, 2015.","dateTimeMS":1445900340000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-comment-18","target":"_blank","peerReviewed":false,"subType":"","id":54366032,"orderField":0},{"dateTime":"Wednesday, Oct 28, 2015","urlTitle":"the-amazing-and-emerging-world-of-electronics-and-vanishing-electrics","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/harrop.jpg","groupId":54174376,"channel":"","description":"Consider the most glamorous things that recently burst upon the scene, such as the MIT robot dog that jumps over obstacles, the Dyson robot vacuum cleaner that is as effective as a traditional model or the latest smart watch with its myriad features. Behind the dazzling exterior, they are made by 100-year-old design rules: buy components, connect them together and drop them in a box.","dateTimeMS":1446056280000,"title":"The Amazing \u2015 and Emerging \u2015 World of Electronics and Vanishing Electrics","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=the-amazing-and-emerging-world-of-electronics-and-vanishing-electrics","target":"_blank","peerReviewed":false,"subType":"","id":54367497,"orderField":0},{"dateTime":"Wednesday, Oct 28, 2015","urlTitle":"use-private-cloud-to-make-customers-an-offer-they-can-t-refuse","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"using private cloud technology to help organizations gain the benefits of business-critical enterprise applications can be a vital component of building and offering services that no smart business can refuse. - See more at: http://www.techproessentials.com/use-private-cloud-to-make-customers-an-offer-they-cant-refuse/#sthash.0UV9v5uY.dpuf","dateTimeMS":1446051000000,"title":"Use Private Cloud to Make Customers an Offer They Can\u2019t Refuse","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=use-private-cloud-to-make-customers-an-offer-they-can-t-refuse","target":"_blank","peerReviewed":false,"subType":"","id":54367429,"orderField":0},{"dateTime":"Friday, Oct 30, 2015","urlTitle":"keep-on-truckin-mobile-apps-moving-on-down-the-road","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/truck_th.jpg","groupId":7989281,"channel":"","description":"Over the past couple of years, according to Fleet Owner, truckers have tapped in to an array of mobile business applications that are helping to strengthen a fleet\u2019s competitive advantage and assist with regulatory compliance.","dateTimeMS":1446223800000,"title":"Keep on Truckin\u2019 \u2013 Mobile Apps Moving on Down the Road","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=keep-on-truckin-mobile-apps-moving-on-down-the-road","target":"_blank","peerReviewed":false,"subType":"","id":54374614,"orderField":0},{"dateTime":"Monday, Nov 2, 2015","urlTitle":"the-resurgence-of-3d-printing-using-binders","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/gordon.png","groupId":54174376,"channel":"","description":"Although, the binder-on-plastic technology has fallen out of fashion, binder-on-sand and binder-on-metal are both seeing rapid growth and increased awareness.","dateTimeMS":1446480600000,"title":"The Resurgence of 3D Printing Using Binders","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=the-resurgence-of-3d-printing-using-binders","target":"_blank","peerReviewed":false,"subType":"","id":54377757,"orderField":0},{"dateTime":"Tuesday, Nov 3, 2015","urlTitle":"analyst-comment-19","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending October 30, 2015.","dateTimeMS":1446569820000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-comment-19","target":"_blank","peerReviewed":false,"subType":"","id":54379737,"orderField":0},{"dateTime":"Wednesday, Nov 4, 2015","urlTitle":"collect-but-protect-five-focus-areas-for-greater-user-privacy","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"Data stolen from many recent breaches can be aggregated to create a full portrait of your personal information, a portrait that can be used for nefarious purposes.\n\nPrivacy is dead. At least that\u2019s what it feels like.","dateTimeMS":1446673560000,"title":"Collect, But Protect! Five Focus Areas for Greater User Privacy","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=collect-but-protect-five-focus-areas-for-greater-user-privacy","target":"_blank","peerReviewed":false,"subType":"","id":54388106,"orderField":0},{"dateTime":"Thursday, Nov 5, 2015","urlTitle":"use-private-cloud-to-get-the-enterprise-applications-that-you-want","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"What do companies want today? Well, many want to be able to power their business with the most advanced technologies and innovative enterprise applications and platforms.","dateTimeMS":1446762720000,"title":"Use Private Cloud to Get the Enterprise Applications That You Want","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=use-private-cloud-to-get-the-enterprise-applications-that-you-want","target":"_blank","peerReviewed":false,"subType":"","id":54388127,"orderField":0},{"dateTime":"Friday, Nov 6, 2015","urlTitle":"when-a-data-breach-occurs-focus-on-the-how-not-the-who","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"There are certainly more important questions than \u201cwhodunit\u201d for IT executives when it comes to network breaches and data theft.","dateTimeMS":1446855240000,"title":"When a Data Breach Occurs, Focus on the How, Not the Who","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=when-a-data-breach-occurs-focus-on-the-how-not-the-who","target":"_blank","peerReviewed":false,"subType":"","id":54388154,"orderField":0},{"dateTime":"Monday, Nov 9, 2015","urlTitle":"analyst-comment-20","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending November 06, 2015.","dateTimeMS":1447098480000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-comment-20","target":"_blank","peerReviewed":false,"subType":"","id":54390499,"orderField":0},{"dateTime":"Thursday, Nov 12, 2015","urlTitle":"kinaxis-digital-transformation-and-the-supply-chain-laughing-all-the-way-to-market-success","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"You\u2019ve got to love a company that brags at its user conference that its motto is Learn, Laugh, Share, Connect. Don\u2019t hear that too often. What you also don\u2019t see very often is the other characteristic that makes the company in question, Kinaxis, unique: it\u2019s a highly profitable, cloud-only company. And when I say profitable, I mean profitable, as in a net profit margin of 16% of its $23.8 million in revenue last quarter.","dateTimeMS":1447355520000,"title":"Kinaxis, Digital Transformation, and the Supply Chain: Laughing all the Way to Market Success","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=kinaxis-digital-transformation-and-the-supply-chain-laughing-all-the-way-to-market-success","target":"_blank","peerReviewed":false,"subType":"","id":54394483,"orderField":0},{"dateTime":"Tuesday, Nov 10, 2015","urlTitle":"the-value-of-real-user-measurements-in-the-cloud-with-examples-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"So goes the old joke: \u2018The great thing about standards is everybody\u2019s got one.\u201d There is some truth to the fact that one man\u2019s best practices are another man\u2019s legacy architecture that needs to be deprecated.","dateTimeMS":1447172760000,"title":"The Value of Real User Measurements in the Cloud (With Examples!)","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=the-value-of-real-user-measurements-in-the-cloud-with-examples-","target":"_blank","peerReviewed":false,"subType":"","id":54394428,"orderField":0},{"dateTime":"Wednesday, Nov 11, 2015","urlTitle":"answering-the-hyperconverged-infrastructure-skeptics","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"There\u2019s no denying that hyperconverged infrastructure is a hard-to-ignore trend right now, promising to dramatically shift the way data center infrastructure is procured, deployed, and managed.","dateTimeMS":1447283820000,"title":"Answering the Hyperconverged Infrastructure Skeptics","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=answering-the-hyperconverged-infrastructure-skeptics","target":"_blank","peerReviewed":false,"subType":"","id":54394455,"orderField":0},{"dateTime":"Monday, Nov 16, 2015","urlTitle":"how-is-mobile-technology-impacting-the-food-and-beverage-supply-chain-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/keith-sm.jpg","groupId":54174062,"channel":"","description":"With mobile supply chain applications, business owners in the food and beverage industry have greater insight into their everyday workflow \u2013 accessing data on the fly, enabling them to make better decisions faster. Let\u2019s take a look at just how mobile technology is giving the food and beverage industry a leg up.","dateTimeMS":1447701060000,"title":"How is Mobile Technology Impacting the Food and Beverage Supply Chain?","type":"article","subCategories":"","url":"/web/all-things-supply-chain-analytics/content?g=54174062&type=article&urlTitle=how-is-mobile-technology-impacting-the-food-and-beverage-supply-chain-","target":"_blank","peerReviewed":false,"subType":"","id":54398158,"orderField":0},{"dateTime":"Tuesday, Nov 17, 2015","urlTitle":"practical-strategies-for-enhancing-your-company-s-cyber-security","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/cyber-attack.jpg","groupId":53319,"channel":"SECURITY","description":"Cyber attacks are proliferating at an incredible rate and now is the time for business owners and IT professionals to protect their organizations if they want to avoid catastrophes.","dateTimeMS":1447784820000,"title":"Practical Strategies for Enhancing Your Company\u2019s Cyber Security","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=practical-strategies-for-enhancing-your-company-s-cyber-security","target":"_blank","peerReviewed":false,"subType":"","id":54399227,"orderField":0},{"dateTime":"Thursday, Nov 19, 2015","urlTitle":"computer-graphics-is-where-all-the-elements-of-computer-meet-the-user","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/jpr.jpg","groupId":54397843,"channel":"","description":"This is the inaugural post of what I hope will be an interesting series on things that make good use of pixels. Things like game consoles, workstations, smartphones, PCs, supercomputers, tablets, arcades, CAVEs, VR headsets, smart glasses, and maybe even watches, as wells as the glue that makes them works such as APIs, libraries, and interfaces like DisplayPort and HDMI.","dateTimeMS":1447957920000,"title":"Computer graphics is where all the elements of computer meet the user","type":"article","subCategories":"","url":"/web/chasing-pixels-finding-gems/content?g=54397843&type=article&urlTitle=computer-graphics-is-where-all-the-elements-of-computer-meet-the-user","target":"_blank","peerReviewed":false,"subType":"","id":54405627,"orderField":0},{"dateTime":"Wednesday, Nov 18, 2015","urlTitle":"10-simple-css-design-tricks","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/css.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Everyone loves shortcuts. Whether you\u2019re a new CSS developer or a seasoned pro, it never hurts to learn some new, easier ways to do things. It\u2019s the trademark of our times: we want the best result possible in the least amount of time.","dateTimeMS":1447884480000,"title":"10 Simple CSS Design Tricks","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=10-simple-css-design-tricks","target":"_blank","peerReviewed":false,"subType":"","id":54403626,"orderField":0},{"dateTime":"Friday, Nov 20, 2015","urlTitle":"analyst-comment-21","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending November 13, 2015.","dateTimeMS":1448051040000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-comment-21","target":"_blank","peerReviewed":false,"subType":"","id":54410431,"orderField":0},{"dateTime":"Tuesday, Nov 24, 2015","urlTitle":"analyst-comment-22","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"CLOUD","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending November 20, 2015.`","dateTimeMS":1448386320000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=analyst-comment-22","target":"_blank","peerReviewed":false,"subType":"","id":54418225,"orderField":0},{"dateTime":"Wednesday, Nov 25, 2015","urlTitle":"cyber-security-engineering","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ebert-thumb.jpg","groupId":5954967,"channel":"","description":"Cyber security matters. Products are hacked, in order to misuse, abuse and confuse. Unlike other technologies which are mastered by specific teams and functions, security is a base technology which belongs to the body of knowledge of each single software developer.","dateTimeMS":1448479200000,"title":"Cyber Security Engineering","type":"article","subCategories":"","url":"/web/software-technologies/content?g=5954967&type=article&urlTitle=cyber-security-engineering","target":"_blank","peerReviewed":false,"subType":"","id":54428414,"orderField":0},{"dateTime":"Monday, Nov 30, 2015","urlTitle":"will-robo-advisors-invade-the-financial-world-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/advisor2.jpg","groupId":7989281,"channel":"","description":"While it\u2019s not likely that R2-D2 is going to sit down with you at home and help construct your portfolio, reinvest your dividends and even harvest your tax losses, the use of robo-advisers is nonetheless growing in popularity.","dateTimeMS":1448920080000,"title":"Will Robo-Advisors Invade the Financial World?","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=will-robo-advisors-invade-the-financial-world-","target":"_blank","peerReviewed":false,"subType":"","id":54480460,"orderField":0},{"dateTime":"Wednesday, Dec 2, 2015","urlTitle":"analyst-comment-23","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"BIG DATA","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending November 27, 2015.","dateTimeMS":1449076080000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=analyst-comment-23","target":"_blank","peerReviewed":false,"subType":"","id":54493422,"orderField":0},{"dateTime":"Thursday, Dec 3, 2015","urlTitle":"why-unused-software-is-costing-your-business","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"On average, companies are wasting 37% of their software spend \u2014 a proportion that would be deemed unacceptable in any other part of the business. In the U.S. alone, this amounts to $30 billion in wasted IT dollars. - See more at: http://techproessentials.com/why-unused-software-is-costing-your-business/#sthash.L4VG5QAQ.dpuf","dateTimeMS":1449164700000,"title":"Why Unused Software is Costing Your Business","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=why-unused-software-is-costing-your-business","target":"_blank","peerReviewed":false,"subType":"","id":54505191,"orderField":0},{"dateTime":"Thursday, Dec 3, 2015","urlTitle":"iot-frameworks-products-and-solutions","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ib2.png","groupId":53926943,"channel":"","description":"Let\u2019s look now at some of the available and emerging IoT frameworks, products and solutions.","dateTimeMS":1449184620000,"title":"IoT Frameworks, Products, and Solutions","type":"article","subCategories":"","url":"/web/sensing-iot/content?g=53926943&type=article&urlTitle=iot-frameworks-products-and-solutions","target":"_blank","peerReviewed":false,"subType":"","id":54518733,"orderField":0},{"dateTime":"Friday, Dec 4, 2015","urlTitle":"try-getting-your-work-done-when-tier-2-applications-go-down","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"Have you ever used a \u2018loaner\u2019 laptop while your work machine was getting fixed or after you had forgotten it at home?","dateTimeMS":1449273240000,"title":"Try Getting Your Work Done When \u2018Tier 2\u2032 Applications Go Down","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=try-getting-your-work-done-when-tier-2-applications-go-down","target":"_blank","peerReviewed":false,"subType":"","id":54541528,"orderField":0},{"dateTime":"Monday, Dec 7, 2015","urlTitle":"the-journey-to-data-driven-finance","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"As organizations adjust strategic investments with an eye toward capturing revenue growth, today\u2019s CFOs need every advantage to help their businesses make profitable decisions. In an environment of flat or decreasing budgets, the challenge is to move beyond typical finance functions to deliver insights and leadership to the business.","dateTimeMS":1449512400000,"title":"The Journey to Data-Driven Finance","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=the-journey-to-data-driven-finance","target":"_blank","peerReviewed":false,"subType":"","id":54553916,"orderField":0},{"dateTime":"Tuesday, Dec 8, 2015","urlTitle":"analyst-comment-24","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"BIG DATA","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending December 04, 2015.","dateTimeMS":1449596400000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=analyst-comment-24","target":"_blank","peerReviewed":false,"subType":"","id":54553991,"orderField":0},{"dateTime":"Wednesday, Dec 9, 2015","urlTitle":"what-does-amazon-have-in-store-for-2016-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/onlineret.jpg","groupId":53319,"channel":"INSIGHTS","description":"Amazon remains at the top of its game as we close out the 2015 holiday shopping season. But things in the tech world rarely remain the same for long, and if you want to survive, you have to constantly push for more. So what is Amazon doing to take its company into 2016 and beyond, and what does it mean for the world of online retail?","dateTimeMS":1449682440000,"title":"What Does Amazon Have In Store for 2016?","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=what-does-amazon-have-in-store-for-2016-","target":"_blank","peerReviewed":false,"subType":"","id":54564955,"orderField":0},{"dateTime":"Thursday, Dec 10, 2015","urlTitle":"mass-production","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/agile-thumb.jpg","groupId":8504655,"channel":"","description":"Mass production is scaling\u2019s handmaiden. Solving bigger or harder problems in software isn\u2019t a matter of working harder or of adding more people, but of working smarter. Adding more people rarely increases quality but instead just creates a glut of output.","dateTimeMS":1449767400000,"title":"Mass Production","type":"article","subCategories":"","url":"/web/agile-careers/content?g=8504655&type=article&urlTitle=mass-production","target":"_blank","peerReviewed":false,"subType":"","id":54577974,"orderField":0},{"dateTime":"Friday, Dec 11, 2015","urlTitle":"an-iot-device-to-protect-your-iot-devices","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"The Internet of Things (IoT) is still such a burgeoning term in and of itself \u2013 nevermind the technology \u2013 that it may seem cumbersome, worrisome, or disingenuous to have a newfangled, connected device layered on top of other newfangled, connected devices.","dateTimeMS":1449869640000,"title":"An IoT Device\u2026To Protect Your IoT Devices","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=an-iot-device-to-protect-your-iot-devices","target":"_blank","peerReviewed":false,"subType":"","id":54612044,"orderField":0},{"dateTime":"Monday, Dec 14, 2015","urlTitle":"big-data-success-doesn-t-come-from-big-teams","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"The idea that organizations will tolerate the productivity hits and maintenance nightmares of hand-coded scripts is preposterous. Organizations that lead the pack in delivering repeatable and sustainable success recognize that automation and intelligence are critical to delivering well-managed and trustworthy analytics using Hadoop.","dateTimeMS":1450136220000,"title":"Big Data Success Doesn\u2019t Come From Big Teams","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=big-data-success-doesn-t-come-from-big-teams","target":"_blank","peerReviewed":false,"subType":"","id":54612065,"orderField":0},{"dateTime":"Tuesday, Dec 15, 2015","urlTitle":"analyst-comment-25","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"MOBILE","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending December 11, 2015.","dateTimeMS":1450201380000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analyst-comment-25","target":"_blank","peerReviewed":false,"subType":"","id":54621489,"orderField":0},{"dateTime":"Wednesday, Dec 16, 2015","urlTitle":"the-long-slow-ineffective-arm-of-protecting-consumers-against-data-breaches","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"On December 9, 2015, it was announced that Wyndham Hotels and Resorts reached an agreement with the Federal Trade Commission (FTC), because \u201cthe company\u2019s security practices unfairly exposed the payment card information of hundreds of thousands of consumers to hackers in three separate data breaches.\u201d","dateTimeMS":1450309140000,"title":"The Long (Slow, Ineffective) Arm of Protecting Consumers Against Data Breaches","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=the-long-slow-ineffective-arm-of-protecting-consumers-against-data-breaches","target":"_blank","peerReviewed":false,"subType":"","id":54678819,"orderField":0},{"dateTime":"Thursday, Dec 17, 2015","urlTitle":"cloud-based-uc-the-choice-of-the-new-generation-of-business","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"There\u2019s a simple test that one can do to find out if a technology has made it \u2014 if it is now fully mature and ready for primetime. Just ask, \u201cIf you were starting a brand-new business, would you implement this technology?\u201d","dateTimeMS":1450389540000,"title":"Cloud-based UC: The Choice of the New Generation of Business","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=cloud-based-uc-the-choice-of-the-new-generation-of-business","target":"_blank","peerReviewed":false,"subType":"","id":54679014,"orderField":0},{"dateTime":"Friday, Dec 18, 2015","urlTitle":"the-it-year-in-review-2015-takin-care-of-business","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"Business\u201d was a word that came up quite a bit in the 2015 IT world. There was plenty of unassuming business being taken care of on the Information Technology side, business (sadly) not being taken care of on the IT security side, and a major, earth-shattering business deal primed to shake up the world of IT as we know it.","dateTimeMS":1450461240000,"title":"The IT Year in Review 2015: Takin\u2019 Care of Business","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=the-it-year-in-review-2015-takin-care-of-business","target":"_blank","peerReviewed":false,"subType":"","id":54679041,"orderField":0},{"dateTime":"Monday, Dec 21, 2015","urlTitle":"why-microsoft-s-focus-on-cloud-is-good-news-for-customers","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"The last few months have been a turning point for Microsoft, as Office 365 raced past Google Apps to become the top productivity suite in the enterprise market.","dateTimeMS":1450728060000,"title":"Why Microsoft\u2019s Focus on Cloud is Good News for Customers","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=why-microsoft-s-focus-on-cloud-is-good-news-for-customers","target":"_blank","peerReviewed":false,"subType":"","id":54679070,"orderField":0},{"dateTime":"Tuesday, Dec 22, 2015","urlTitle":"2016-new-frontiers-in-innovation","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/carint.JPG","groupId":53319,"channel":"INSIGHTS","description":"We live in what will perhaps be considered by historians as the golden age of technology. Innovations are happening at breakneck speed, and so are its mass adoptions. As we wrap up 2015 and look at what lies ahead, it is clear that our voracious appetite for content and the need for constant connectivity are only going to escalate. So in 2016 we will see a continued drumbeat for technologies that enhance the broader adoption of IoT, over-the-top (OTT) content, connected homes, smart cars and solutions that deliver rich content.","dateTimeMS":1450822500000,"title":"2016: New Frontiers in Innovation","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=2016-new-frontiers-in-innovation","target":"_blank","peerReviewed":false,"subType":"","id":54679445,"orderField":0},{"dateTime":"Thursday, Dec 24, 2015","urlTitle":"advances-in-affective-computing-expected-to-be-game-changers-in-many-verticals","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/epu.png","groupId":7989281,"channel":"","description":"Affective computing is nothing new \u2013 it has been around for awhile \u2013 over a decade, in fact. As defined by MIT\u2019s Media Lab, affective computing is computing \u201cthat relates to, arises from, or deliberately influences emotion or other affective phenomena.\u201d","dateTimeMS":1450983900000,"title":"Advances in Affective Computing Expected to be Game Changers in Many Verticals","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=advances-in-affective-computing-expected-to-be-game-changers-in-many-verticals","target":"_blank","peerReviewed":false,"subType":"","id":54690709,"orderField":0},{"dateTime":"Wednesday, Dec 23, 2015","urlTitle":"where-does-sharepoint-end-and-enterprise-content-management-begin-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"If you\u2019re like most organizations, you\u2019re probably using Microsoft SharePoint. This isn\u2019t all that surprising, given that SharePoint is integrated with the productivity tools that many organizations use to create content (Microsoft Office and Office 365), and that it provides some very convenient capabilities for storing, syncing, and sharing those files. As a first step, SharePoint is an easy choice.","dateTimeMS":1450905000000,"title":"Where Does SharePoint End, and Enterprise Content Management Begin?","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=where-does-sharepoint-end-and-enterprise-content-management-begin-","target":"_blank","peerReviewed":false,"subType":"","id":54799954,"orderField":0},{"dateTime":"Monday, Dec 28, 2015","urlTitle":"what-sd-wan-means-for-network-management","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"Just a few years ago, enterprise network management was much simpler. Configuration changes were rare \u2014 most equipment was configured and left as-is. If any change was needed, long and strict change management procedures were required. Then, changes were executed in manual or semi-automated network configuration updates, sufficient to maintain reliability and consistent service levels across the organization.","dateTimeMS":1451343780000,"title":"What SD-WAN Means for Network Management","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=what-sd-wan-means-for-network-management","target":"_blank","peerReviewed":false,"subType":"","id":54709878,"orderField":0},{"dateTime":"Wednesday, Dec 30, 2015","urlTitle":"are-your-analytics-tight-fit-or-loose-hanging-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"Amid growth in the analytics space these days, it\u2019s easy to get caught up in the allure of next-generation technology and what it can do for organizations. However, companies that stay focused on the analytical needs of their users and align the tools accordingly are dividends from those efforts.","dateTimeMS":1451499600000,"title":"Are Your Analytics Tight Fit or Loose Hanging?","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=are-your-analytics-tight-fit-or-loose-hanging-","target":"_blank","peerReviewed":false,"subType":"","id":54726848,"orderField":0},{"dateTime":"Tuesday, Dec 29, 2015","urlTitle":"fighting-data-urgency-analytics-in-the-palm-of-your-hand","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"Today\u2019s decisions are all too often a fight against time. But the most powerful weapon at our disposal may just fit in the palm of our hands. Mobile capabilities for the consumption (or creation) of business insight have taken center stage for companies looking to arm a diverse workforce with timely information.","dateTimeMS":1451407620000,"title":"Fighting Data Urgency: Analytics in the Palm of Your Hand","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=fighting-data-urgency-analytics-in-the-palm-of-your-hand","target":"_blank","peerReviewed":false,"subType":"","id":54726876,"orderField":0},{"dateTime":"Monday, Jan 4, 2016","urlTitle":"a-great-change-in-mindset-needed-for-a-more-secure-iot-environment","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"With the prevalent awareness of security flaws in IoT devices, manufacturers need to rethink their strategies for marketing their products, and have an entirely new perception on the issue of security.","dateTimeMS":1451949480000,"title":"A Great Change in Mindset Needed for a More Secure IoT Environment","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=a-great-change-in-mindset-needed-for-a-more-secure-iot-environment","target":"_blank","peerReviewed":false,"subType":"","id":54747179,"orderField":0},{"dateTime":"Tuesday, Jan 5, 2016","urlTitle":"enabling-mobile-first-unified-communications-through-the-cloud","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"For years now, one of the most complex and time-consuming tasks any IT department could take on was the on-premise implementation of a Unified Communications (UC) platform.","dateTimeMS":1452035580000,"title":"Enabling Mobile-First Unified Communications Through the Cloud","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=enabling-mobile-first-unified-communications-through-the-cloud","target":"_blank","peerReviewed":false,"subType":"","id":54757155,"orderField":0},{"dateTime":"Wednesday, Jan 6, 2016","urlTitle":"analyst-comment-26","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"NETWORKING","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending December 25, 2015 - January 01, 2016.","dateTimeMS":1452105240000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=analyst-comment-26","target":"_blank","peerReviewed":false,"subType":"","id":54773740,"orderField":0},{"dateTime":"Thursday, Jan 7, 2016","urlTitle":"ford-s-new-plan-for-the-internet-of-things","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/fordtech.jpg","groupId":53319,"channel":"INSIGHTS","description":"When you think about the forerunners of advancement in the Internet of Things (IoT), a digitally connected network of different devices and everyday objects, you might think of technological geniuses like the folks at Apple or Google, who have consistently pushed the boundaries of technological sophistication in the past. You might not think of Ford, an auto manufacturer, as being a mover in the industry, but the company recently announced plans to advance IoT networks with car-home communication.","dateTimeMS":1452193440000,"title":"Ford\u2019s New Plan for the Internet of Things","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=ford-s-new-plan-for-the-internet-of-things","target":"_blank","peerReviewed":false,"subType":"","id":54774316,"orderField":0},{"dateTime":"Friday, Jan 8, 2016","urlTitle":"say-halow-to-the-future-of-wifi-at-ces-2016","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"The Consumer Electronics Show (CES) is one of the most anticipated events of the year for true gadget nerds. Outside of company-specific events such as Apple\u2019s WWDC or Google I/O, CES is where we see the future of the technology that we will all use in the near future.","dateTimeMS":1452276960000,"title":"Say HaLow to the Future of WiFi at CES 2016","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=say-halow-to-the-future-of-wifi-at-ces-2016","target":"_blank","peerReviewed":false,"subType":"","id":54795014,"orderField":0},{"dateTime":"Monday, Jan 11, 2016","urlTitle":"iam-investing-for-success-are-you-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"In its research report, IAM Beyond Control, Compliance, and Cost: The Rise of the User, Aberdeen Group described how the strategic focus for enterprise identity and access management (IAM) systems has changed.","dateTimeMS":1452552900000,"title":"IAM Investing for Success \u2014 Are You?","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=iam-investing-for-success-are-you-","target":"_blank","peerReviewed":false,"subType":"","id":54797015,"orderField":0},{"dateTime":"Tuesday, Jan 12, 2016","urlTitle":"fighting-data-urgency-analytics-in-the-palm-of-your-ha-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"Today\u2019s decisions are all too often a fight against time. But the most powerful weapon at our disposal may just fit in the palm of our hands. Mobile capabilities for the consumption (or creation) of business insight have taken center stage for companies looking to arm a diverse workforce with timely information.","dateTimeMS":1452640500000,"title":"Fighting Data Urgency: Analytics in the Palm of Your Hand","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=fighting-data-urgency-analytics-in-the-palm-of-your-ha-1","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":54804371,"orderField":0},{"dateTime":"Wednesday, Jan 13, 2016","urlTitle":"back-to-school-week-with-salesforce-com","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"Salesforce.com kicked off the analyst season with the first analyst summit of the year, and aside from inciting back-to-school analogies from an overly-relaxed group of analysts, some clear wins and opportunities, and a few issues, emerged that will both set the bar for the competition and keep Salesforce execs from entertaining any notions of complacency.","dateTimeMS":1452719580000,"title":"Back to School Week with Salesforce.com","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=back-to-school-week-with-salesforce-com","target":"_blank","peerReviewed":false,"subType":"","id":54825875,"orderField":0},{"dateTime":"Thursday, Jan 14, 2016","urlTitle":"10-best-time-tracking-tools-to-manage-freelancers","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/freelancer.jpg","groupId":53319,"channel":"CAREERS","description":"Everyone who has ever worked a job knows that time is money. Employees log hours for a paycheck, and businesses track hours to ensure that work is getting done at a steady pace. It\u2019s in the interest of both parties to track time accurately and ensure that each gets the benefits of completed work hours.","dateTimeMS":1452789300000,"title":"10 Best Time Tracking Tools to Manage Freelancers","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=10-best-time-tracking-tools-to-manage-freelancers","target":"_blank","peerReviewed":false,"subType":"","id":54803590,"orderField":0},{"dateTime":"Friday, Jan 15, 2016","urlTitle":"why-an-enterprise-search-platform-should-be-your-company-s-next-investment","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/search.png","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"No matter what industry you\u2019re in, you have one thing in common with almost every other business on this planet: you\u2019ve been creating copious amounts of data at an exponential rate for the last 10 years, if not longer.","dateTimeMS":1452882840000,"title":"Why an Enterprise Search Platform Should Be Your Company\u2019s Next Investment","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=why-an-enterprise-search-platform-should-be-your-company-s-next-investment","target":"_blank","peerReviewed":false,"subType":"","id":54805084,"orderField":0},{"dateTime":"Monday, Jan 18, 2016","urlTitle":"what-is-blockchain-and-is-it-the-key-to-bitcoin-s-future-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"I\u2019ll admit that I\u2019m a bit of a blockhead when it comes to the term blockchain (I\u2019m also a blockhead for a host of other reasons, but I\u2019ll leave that for another day), a technology being brandied about quite a bit as a savior of industries including financial services. I decided to look into the technology behind the polarizing digital currency Bitcoin.","dateTimeMS":1453157940000,"title":"What is Blockchain, and is it the Key to Bitcoin\u2019s Future?","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=what-is-blockchain-and-is-it-the-key-to-bitcoin-s-future-","target":"_blank","peerReviewed":false,"subType":"","id":54810034,"orderField":0},{"dateTime":"Thursday, Jan 21, 2016","urlTitle":"designing-a-software-engineer-interviewing-strategy","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/softwhire.jpg","groupId":53319,"channel":"CAREERS","description":"Hiring software engineers is hard. A poor hire can easily drag down an entire team. But an excellent hire can be an order of magnitude more effective than everyone else--a \u201c10xer.\u201d How do you know if a given candidate is a 10xer or a total dud?","dateTimeMS":1453408560000,"title":"Designing a Software Engineer Interviewing Strategy","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=designing-a-software-engineer-interviewing-strategy","target":"_blank","peerReviewed":false,"subType":"","id":54817367,"orderField":0},{"dateTime":"Wednesday, Jan 20, 2016","urlTitle":"iam-focused-on-users-and-getting-results","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"In the blog IAM Investing for Success \u2014 Are You?, Aberdeen Group described insights from its Q4 2015 study on Identity and Access Management (IAM), which examined the use, experiences, and intentions of nearly 250 organizations from a diverse set of industries with respect to this important topic.","dateTimeMS":1453333920000,"title":"IAM Focused On Users, and Getting Results","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=iam-focused-on-users-and-getting-results","target":"_blank","peerReviewed":false,"subType":"","id":54817388,"orderField":0},{"dateTime":"Tuesday, Jan 19, 2016","urlTitle":"analyst-comment-27","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"STARTUPS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending January 15, 2016.","dateTimeMS":1453223400000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=analyst-comment-27","target":"_blank","peerReviewed":false,"subType":"","id":54818909,"orderField":0},{"dateTime":"Friday, Jan 22, 2016","urlTitle":"devops","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ebert-thumb.jpg","groupId":5954967,"channel":"","description":"This integrative approach helps teams deliver value in a faster and continuous way, reducing problems generated by miscommunication between team members and enhancing a faster resolution of problems.","dateTimeMS":1453483020000,"title":"DevOps","type":"article","subCategories":"","url":"/web/software-technologies/content?g=5954967&type=article&urlTitle=devops","target":"_blank","peerReviewed":false,"subType":"","id":54825657,"orderField":0},{"dateTime":"Monday, Jan 25, 2016","urlTitle":"lack-of-employee-education-means-insider-threats-won-t-stop-in-2016","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"As we move towards Data Protection Day this week and continue to navigate the constantly evolving security landscape where new malicious hacks are made each day, we often overlook the ones closest to home: insider threats.","dateTimeMS":1453742400000,"title":"Lack of Employee Education Means Insider Threats Won\u2019t Stop in 2016","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=lack-of-employee-education-means-insider-threats-won-t-stop-in-2016","target":"_blank","peerReviewed":false,"subType":"","id":54825698,"orderField":0},{"dateTime":"Tuesday, Jan 26, 2016","urlTitle":"analyst-comment-28","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"CLOUD","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending January 22, 2016.","dateTimeMS":1453825500000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=analyst-comment-28","target":"_blank","peerReviewed":false,"subType":"","id":54825825,"orderField":0},{"dateTime":"Wednesday, Jan 27, 2016","urlTitle":"is-computer-withdrawal-a-real-phenomenon-5-possible-signs","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/addiction.jpg","groupId":53319,"channel":"MOBILE","description":"Recent research suggests that computer and technology-based addiction and withdrawal may be real, physical phenomena.","dateTimeMS":1453916100000,"title":"Is Computer Withdrawal a Real Phenomenon? 5 Possible Signs","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=is-computer-withdrawal-a-real-phenomenon-5-possible-signs","target":"_blank","peerReviewed":false,"subType":"","id":54838418,"orderField":0},{"dateTime":"Thursday, Jan 28, 2016","urlTitle":"breaking-down-the-risk-of-industrial-control-systems-security","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"SECURITY","description":"RSA President Amit Yoran\u2019s has released predictions for 2016, which include the following thoughts about the increasing risk in our collective industrial control systems (ICS) security:","dateTimeMS":1454010420000,"title":"Breaking Down the Risk of Industrial Control Systems Security","type":"article","subCategories":"","url":"/web/aberdeen-group/security/content?g=6012563&type=article&urlTitle=breaking-down-the-risk-of-industrial-control-systems-security","target":"_blank","peerReviewed":false,"subType":"","id":54838447,"orderField":0},{"dateTime":"Tuesday, Feb 2, 2016","urlTitle":"play-serious-games-in-your-browser","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/jpr.jpg","groupId":54397843,"channel":"","description":"Three developments have taken place recently that makes it possible to play serious 3D games in a browser: on your PC, smartphone, or tablet, and one day your TV as well.","dateTimeMS":1454436660000,"title":"Play serious games in your browser","type":"article","subCategories":"","url":"/web/chasing-pixels-finding-gems/content?g=54397843&type=article&urlTitle=play-serious-games-in-your-browser","target":"_blank","peerReviewed":false,"subType":"","id":54843515,"orderField":0},{"dateTime":"Tuesday, Feb 2, 2016","urlTitle":"telematics-on-cusp-of-widespread-adoption","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"https://web.archive.org/web/20170606103214/https://www.computer.org/cms/Computer.org/ComputingNow/marketing/car22-th.jpg","groupId":7989281,"channel":"","description":"Telematics is nothing new \u2013 the technology\u2019s been around for decades \u2013 but the ubiquitous smartphone is now expected to drive telematics penetration in private hire vehicles and taxis to 21% globally by 2019","dateTimeMS":1454437020000,"title":"Telematics On Cusp of Widespread Adoption","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=telematics-on-cusp-of-widespread-adoption","target":"_blank","peerReviewed":false,"subType":"","id":54844822,"orderField":0},{"dateTime":"Wednesday, Feb 3, 2016","urlTitle":"analyst-comment-29","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"BIG DATA","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending January 29, 2016.","dateTimeMS":1454541000000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=analyst-comment-29","target":"_blank","peerReviewed":false,"subType":"","id":54849807,"orderField":0},{"dateTime":"Thursday, Feb 4, 2016","urlTitle":"on-premise-to-the-cloud-keeping-up-with-the-analytical-evolution","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"Given the natural progression of reporting and analysis to the interactivity and visual appeal of today\u2019s business intelligence (BI) tools, it\u2019s no surprise that the backdrop has been forced to evolve and expand as well.","dateTimeMS":1454632560000,"title":"On-Premise to the Cloud: Keeping up with the Analytical Evolution","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=on-premise-to-the-cloud-keeping-up-with-the-analytical-evolution","target":"_blank","peerReviewed":false,"subType":"","id":54853621,"orderField":0},{"dateTime":"Friday, Feb 5, 2016","urlTitle":"why-we-need-to-improve-ehr-software-systems","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/handgraphic.png","groupId":8206605,"channel":"","description":"Some of the patient care technology advances have not accomplished the promised end results and are in desperate need of improvement. Topping the list of needed replacements is today\u2019s electronic health records (EHRs) software systems.","dateTimeMS":1454710320000,"title":"Why We Need to Improve EHR Software Systems","type":"article","subCategories":"","url":"/web/the-doctor-is-in/content?g=8206605&type=article&urlTitle=why-we-need-to-improve-ehr-software-systems","target":"_blank","peerReviewed":false,"subType":"","id":54855892,"orderField":0},{"dateTime":"Monday, Feb 8, 2016","urlTitle":"microdisplay-technologies-for-smartglasses-poised-for-explosive-growth","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/zervos.png","groupId":54174376,"channel":"","description":"The market for smart glasses and functional contact lenses will be worth over $260 billion by 2026. And it will be diverse \u2013 encompassing augmented and virtual reality headsets to remarkable embedded functionalities in lenses.","dateTimeMS":1454950080000,"title":"Microdisplay Technologies for Smartglasses Poised for Explosive Growth","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=microdisplay-technologies-for-smartglasses-poised-for-explosive-growth","target":"_blank","peerReviewed":false,"subType":"","id":54858208,"orderField":0},{"dateTime":"Monday, Nov 23, 2015","urlTitle":"informatica-tackles-the-data-side-of-innovation-digital-transformation-big-data-and-whatever-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"There\u2019s much talk about embracing new technologies, and less, unfortunately, about the human capital and buyer behavior changes that must accompany any significant transformation.","dateTimeMS":1448301780000,"title":"Informatica Tackles the Data Side of Innovation, Digital Transformation, Big Data, and Whatever\u2026","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=informatica-tackles-the-data-side-of-innovation-digital-transformation-big-data-and-whatever-","target":"_blank","peerReviewed":false,"subType":"","id":54857759,"orderField":0},{"dateTime":"Tuesday, Feb 9, 2016","urlTitle":"analyst-comment-30","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"NETWORKING","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending February 05, 2016.","dateTimeMS":1455041040000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=analyst-comment-30","target":"_blank","peerReviewed":false,"subType":"","id":54858285,"orderField":0},{"dateTime":"Wednesday, Feb 10, 2016","urlTitle":"seven-keys-to-scaling-your-supplier-scorecarding-program","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/keith-sm.jpg","groupId":54174062,"channel":"","description":"A solid supplier scorecarding program can drive big cost savings in the supply chain.","dateTimeMS":1455141240000,"title":"Seven Keys to Scaling Your Supplier Scorecarding Program","type":"article","subCategories":"","url":"/web/all-things-supply-chain-analytics/content?g=54174062&type=article&urlTitle=seven-keys-to-scaling-your-supplier-scorecarding-program","target":"_blank","peerReviewed":false,"subType":"","id":54864656,"orderField":0},{"dateTime":"Thursday, Feb 11, 2016","urlTitle":"why-inadequate-iot-security-is-setting-regulators-on-collision-course-with-consumers-and-the-entire-open-source-moveme","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/swift-thumb.jpg","groupId":8459902,"channel":"","description":"It remains that rules set by regulators and lawmakers have consistently failed to keep up with the pace of technological change \u2013 and there\u2019s a real danger they could now threaten the development of the Internet of Things (IoT) and embedded computing.","dateTimeMS":1455211500000,"title":"Why Inadequate IoT Security Is Setting Regulators on Collision Course with Consumers and the Entire Open Source Movement","type":"article","subCategories":"","url":"/web/prpl-matters/content?g=8459902&type=article&urlTitle=why-inadequate-iot-security-is-setting-regulators-on-collision-course-with-consumers-and-the-entire-open-source-moveme","target":"_blank","peerReviewed":false,"subType":"","id":54865826,"orderField":0},{"dateTime":"Friday, Feb 12, 2016","urlTitle":"hacking-iot","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ib2.png","groupId":53926943,"channel":"","description":"Would the IoT introduce all the vulnerabilities of the digital world into our real world? Do we even know the scale? Each person/object may have multiple devices/sensors, each with a different aspect of exposure.","dateTimeMS":1455297420000,"title":"Hacking IoT","type":"article","subCategories":"","url":"/web/sensing-iot/content?g=53926943&type=article&urlTitle=hacking-iot","target":"_blank","peerReviewed":false,"subType":"","id":54957986,"orderField":0},{"dateTime":"Tuesday, Feb 16, 2016","urlTitle":"30-websites-your-startup-needs-in-2016","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/startup.jpg","groupId":53319,"channel":"STARTUPS","description":"All entrepreneurs dream of owning and operating their own startup and with the following list of different tools and services it can be more of a reality and take some of the burden off of becoming a new business owner.","dateTimeMS":1455642000000,"title":"30 Websites Your Startup Needs in 2016","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=30-websites-your-startup-needs-in-2016","target":"_blank","peerReviewed":false,"subType":"","id":54876602,"orderField":0},{"dateTime":"Wednesday, Feb 17, 2016","urlTitle":"re-platforming-business-transformation-people-and-partners-get-it-right-or-get-out-of-the-way","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"Every vendor, whether old guard freshening up for the cloud, or new guard playing defense against the dark arts, has a cloud platform strategy with two purported goals: offer value to customers and confer an easy way for partners to make up for the lost revenue implicit in the cloud\u2019s ability to sop up a lot of low-hanging fruit previously left for partners to pick.","dateTimeMS":1455731100000,"title":"Re-platforming, Business Transformation, People, and Partners: Get it Right or Get Out of the Way","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=re-platforming-business-transformation-people-and-partners-get-it-right-or-get-out-of-the-way","target":"_blank","peerReviewed":false,"subType":"","id":54884670,"orderField":0},{"dateTime":"Wednesday, Feb 17, 2016","urlTitle":"preview-of-encyclopedia-of-cloud-computing-part-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5970564.png","groupId":5970564,"channel":"","description":"The book covers broad range of topics aimed at helping you gain an informed and comprehensive understanding of the promises and the potential of cloud computing.","dateTimeMS":1455731400000,"title":"Preview of Encyclopedia of Cloud Computing \u2013 Part 1","type":"article","subCategories":"","url":"/web/irena-bojanova/content?g=5970564&type=article&urlTitle=preview-of-encyclopedia-of-cloud-computing-part-1","target":"_blank","peerReviewed":false,"subType":"","id":54884690,"orderField":0},{"dateTime":"Thursday, Feb 18, 2016","urlTitle":"4-ways-big-businesses-copy-startup-culture","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/foos.png","groupId":53319,"channel":"STARTUPS","description":"Across the country, big corporations are adjusting the way they interact with customers, come up with ideas, and motivate their employees. Instead of operating the way they always have, these businesses are taking a cue from startups and rethinking their workplace culture.","dateTimeMS":1455819960000,"title":"4 Ways Big Businesses Copy Startup Culture","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=4-ways-big-businesses-copy-startup-culture","target":"_blank","peerReviewed":false,"subType":"","id":54885184,"orderField":0},{"dateTime":"Friday, Feb 19, 2016","urlTitle":"analyst-comment-31","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"CAREERS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending February 12, 2016.","dateTimeMS":1455920220000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=analyst-comment-31","target":"_blank","peerReviewed":false,"subType":"","id":54889555,"orderField":0},{"dateTime":"Monday, Feb 22, 2016","urlTitle":"analyst-comment-32","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"SECURITY","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending February 19, 2016.","dateTimeMS":1456165380000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=analyst-comment-32","target":"_blank","peerReviewed":false,"subType":"","id":54900120,"orderField":0},{"dateTime":"Tuesday, Feb 23, 2016","urlTitle":"data-spinning-straw-into-gold-with-analytics","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"Who among us hasn\u2019t seen a drastic influx in the amount of business data related to our little corner of the world? At most mid-size and enterprise-level companies, there are obligations \u2014 if not requirements \u2014 to store that information. Are we also taking strides to make that data more searchable and discoverable?","dateTimeMS":1456264620000,"title":"Data = $$$: Spinning Straw into Gold with Analytics","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=data-spinning-straw-into-gold-with-analytics","target":"_blank","peerReviewed":false,"subType":"","id":54900147,"orderField":0},{"dateTime":"Wednesday, Feb 24, 2016","urlTitle":"5-ways-facebook-can-make-or-break-your-website","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/webdesign.jpg","groupId":53319,"channel":"STARTUPS","description":"You\u2019ve put hard work into building your website, but can people find it? Even with top search engine placement, if customers aren\u2019t searching for your business\u2019s product or service, they may not be able to find you. For today\u2019s businesses, the best way to get the word out is to find those potential customers online, where they spend the most time.","dateTimeMS":1456337100000,"title":"5 Ways Facebook Can Make or Break Your Website","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=5-ways-facebook-can-make-or-break-your-website","target":"_blank","peerReviewed":false,"subType":"","id":54900174,"orderField":0},{"dateTime":"Wednesday, Feb 24, 2016","urlTitle":"mettle-fatigue-vw-s-single-point-of-failure-ethics","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/mfthumb.png","groupId":53319,"channel":"INSIGHTS","description":"After a year of denials, Volkswagen admitted in September 2015 that multiple makes and models of its diesel vehicles contained defeat device software. The decisions leading to \u201cDieselgate\u201d involved a corruption of engineering ethics that the profession ought to address.","dateTimeMS":1456357680000,"title":"Mettle Fatigue: VW\u2019s Single-Point-of-Failure Ethics","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=mettle-fatigue-vw-s-single-point-of-failure-ethics","target":"_blank","peerReviewed":false,"subType":"","id":54902001,"orderField":0},{"dateTime":"Thursday, Feb 25, 2016","urlTitle":"how-open-hardware-based-iot-security-can-be-a-win-win-for-innovation-and-regulation","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/swift-thumb.jpg","groupId":8459902,"channel":"","description":"The Internet of Things is rapidly turning a new generation of products \u201csmart\u201d by adding computing power, network connectivity and sophisticated software. From cars to routers and drug infusion pumps to drones, they now offer a wealth of possibilities for tech savvy owners keen to push their device capabilities to the limits. But at the same time there are logical reasons why lawmakers and regulators need to lock down certain functionality \u2013 for the safety and well-being of their citizens.","dateTimeMS":1456434480000,"title":"How Open, Hardware-Based IoT Security Can Be a Win-Win for Innovation and Regulation","type":"article","subCategories":"","url":"/web/prpl-matters/content?g=8459902&type=article&urlTitle=how-open-hardware-based-iot-security-can-be-a-win-win-for-innovation-and-regulation","target":"_blank","peerReviewed":false,"subType":"","id":54902944,"orderField":0},{"dateTime":"Friday, Feb 26, 2016","urlTitle":"have-you-taken-your-itsm-to-the-next-level-and-what-the-heck-does-that-look-like-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"Leading \u2014 or Best-in-Class \u2014 organizations are taking their ITSM \u201cto the next level\u201d by working hard and striving to improve it at every stage of the game, leveraging the communication channels and technologies that their users rely on to make everyone much more productive.","dateTimeMS":1456526940000,"title":"Have You Taken Your ITSM to the \u2018Next Level\u2019 (And What the Heck Does That Look Like)?","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=have-you-taken-your-itsm-to-the-next-level-and-what-the-heck-does-that-look-like-","target":"_blank","peerReviewed":false,"subType":"","id":54908151,"orderField":0},{"dateTime":"Monday, Feb 29, 2016","urlTitle":"analyst-comment-33","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending February 26, 2016.","dateTimeMS":1456770480000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-comment-33","target":"_blank","peerReviewed":false,"subType":"","id":54915958,"orderField":0},{"dateTime":"Tuesday, Mar 1, 2016","urlTitle":"new-ways-to-avoid-annoying-ad-retargeting","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/target.jpg","groupId":53319,"channel":"CAREERS","description":"Advertisement retargeting has become so prevalent, consumers are beginning to feel as though their every move is being watched. In many ways, they\u2019re right. Businesses are gathering data on every customer interaction with their products and services, from the products they research online to the items they buy in their stores.","dateTimeMS":1456872420000,"title":"New Ways to Avoid Annoying Ad Retargeting","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=new-ways-to-avoid-annoying-ad-retargeting","target":"_blank","peerReviewed":false,"subType":"","id":54916424,"orderField":0},{"dateTime":"Wednesday, Mar 2, 2016","urlTitle":"asteroids-and-earthquakes-belong-in-the-movies-not-in-your-it-ops","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"While disaster for me in film is a guilty (embarrassing?) pleasure, I can\u2019t think of too many folks that enjoy disaster in real life. And nowhere is that more apparent than in an organization\u2019s IT operations.","dateTimeMS":1456944240000,"title":"Asteroids and Earthquakes Belong in the Movies, Not in Your IT Ops","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=asteroids-and-earthquakes-belong-in-the-movies-not-in-your-it-ops","target":"_blank","peerReviewed":false,"subType":"","id":54922439,"orderField":0},{"dateTime":"Thursday, Mar 3, 2016","urlTitle":"microsoft-tests-underwater-data-center-for-more-efficient-cooling","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/gordon.png","groupId":54174376,"channel":"","description":"Microsoft has tested a prototype of a self-contained data center that can operate below the surface of the ocean to reduce the need for expensive air-conditioning.","dateTimeMS":1457030880000,"title":"Microsoft Tests Underwater Data Center for More Efficient Cooling","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=microsoft-tests-underwater-data-center-for-more-efficient-cooling","target":"_blank","peerReviewed":false,"subType":"","id":54922459,"orderField":0},{"dateTime":"Friday, Mar 4, 2016","urlTitle":"facing-the-challenges-of-modernizing-mainframe-data","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"","description":"Over the last 25 years, mainframes have been a solid investment in term of reliability, performance, and security. It\u2019s estimated that within the insurance industry, half of all core applications are still on a mainframe. But for insurers and other data-intensive industries that rely on mainframe applications and data, those days are coming to an end.","dateTimeMS":1457135460000,"title":"Facing the Challenges of Modernizing Mainframe Data","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=facing-the-challenges-of-modernizing-mainframe-data","target":"_blank","peerReviewed":false,"subType":"","id":54926362,"orderField":0},{"dateTime":"Monday, Mar 7, 2016","urlTitle":"analyst-comment-34","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"MOBILE","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending March 04, 2016.","dateTimeMS":1457376300000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analyst-comment-34","target":"_blank","peerReviewed":false,"subType":"","id":54930775,"orderField":0},{"dateTime":"Tuesday, Mar 8, 2016","urlTitle":"it-support-staff-doesn-t-and-shouldn-t-care-about-your-privacy","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":53319,"channel":"SECURITY","description":"There\u2019s one area where most people don\u2019t think about privacy too much, and that\u2019s at work. And that\u2019s because this issue has been settled for a while. When using the web, email, or other services at work, there really isn\u2019t much privacy, especially from the IT workers tasked to support and protect these business systems.","dateTimeMS":1457463000000,"title":"IT Support Staff Doesn\u2019t (and Shouldn\u2019t) Care About Your Privacy","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=it-support-staff-doesn-t-and-shouldn-t-care-about-your-privacy","target":"_blank","peerReviewed":false,"subType":"","id":54932544,"orderField":0},{"dateTime":"Wednesday, Mar 9, 2016","urlTitle":"if-google-has-solved-go-then-what-s-next-for-artificial-intelligence-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/go.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Google, one of the leading authorities in the modern world of artificial intelligence development, has created an algorithm capable of defeating a human expert in the game of Go. If you\u2019re not familiar with Go, or the logistical hurdles of overcoming a human player with a machine, this may not seem very impressive to you. Suffice it to say, this is a massive breakthrough, and it\u2019s opening up new doors for the development of artificial intelligence.","dateTimeMS":1457549040000,"title":"If Google Has \"Solved\" Go, Then What's Next for Artificial Intelligence?","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=if-google-has-solved-go-then-what-s-next-for-artificial-intelligence-","target":"_blank","peerReviewed":false,"subType":"","id":54933339,"orderField":0},{"dateTime":"Wednesday, Mar 9, 2016","urlTitle":"hsa-foundation-unlocking-the-performance-and-power-efficiency-of-parallel-computing-engines","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/glossner.jpg","groupId":54930593,"channel":"","description":"Welcome to HSA Connections! On behalf of the Heterogeneous System Architecture (HSA) Foundation, I first want to thank IEEE for the opportunity to launch this blog. We appreciate being able to share HSA achievements with both the developer community and IEEE\u2019s diverse and prestigious global audience.","dateTimeMS":1457558640000,"title":"HSA Foundation: Unlocking the Performance and Power Efficiency of Parallel Computing Engines","type":"article","subCategories":"","url":"/web/hsa-connections/content?g=54930593&type=article&urlTitle=hsa-foundation-unlocking-the-performance-and-power-efficiency-of-parallel-computing-engines","target":"_blank","peerReviewed":false,"subType":"","id":54933682,"orderField":0},{"dateTime":"Thursday, Mar 10, 2016","urlTitle":"5-ways-to-make-your-customer-service-reps-sound-more-informed","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/cservice.jpg","groupId":53319,"channel":"STARTUPS","description":"In an era where customers can research anything online, the customer service experience has evolved. Instead of merely directing customers to products in stores and asking general questions, employees now serve as subject matter experts.","dateTimeMS":1457630580000,"title":"5 Ways to Make Your Customer Service Reps Sound More Informed","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=5-ways-to-make-your-customer-service-reps-sound-more-informed","target":"_blank","peerReviewed":false,"subType":"","id":54934787,"orderField":0},{"dateTime":"Friday, Mar 11, 2016","urlTitle":"productivity-enterprise-software-and-the-economics-of-digital-disruption","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"The New York Times ran an article recently that made the shocking claim that \u201cSilicon Valley hasn\u2019t saved us from a productivity slowdown.\u201d","dateTimeMS":1457739840000,"title":"Productivity, Enterprise Software, and The Economics of Digital Disruption","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=productivity-enterprise-software-and-the-economics-of-digital-disruption","target":"_blank","peerReviewed":false,"subType":"","id":54940791,"orderField":0},{"dateTime":"Monday, Mar 14, 2016","urlTitle":"five-steps-to-launch-a-supplier-scorecard","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/keith-sm.jpg","groupId":54174062,"channel":"","description":"Supplier scorecards are near universally accepted as a key tool for managing a more profitable supply chain.","dateTimeMS":1457973000000,"title":"Five steps to launch a supplier scorecard","type":"article","subCategories":"","url":"/web/all-things-supply-chain-analytics/content?g=54174062&type=article&urlTitle=five-steps-to-launch-a-supplier-scorecard","target":"_blank","peerReviewed":false,"subType":"","id":54944257,"orderField":0},{"dateTime":"Tuesday, Mar 15, 2016","urlTitle":"analyst-comment-35","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"BIG DATA","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending March 11,2016.","dateTimeMS":1458060600000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=analyst-comment-35","target":"_blank","peerReviewed":false,"subType":"","id":54947090,"orderField":0},{"dateTime":"Thursday, Mar 17, 2016","urlTitle":"augmented-reality-is-not-just-wearing-glasses","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/jpr.jpg","groupId":54397843,"channel":"","description":"In the very near future we will all be wearing AR glasses, just as we wear corrective and sun glasses today.","dateTimeMS":1458233700000,"title":"Augmented Reality Is Not Just Wearing Glasses","type":"article","subCategories":"","url":"/web/chasing-pixels-finding-gems/content?g=54397843&type=article&urlTitle=augmented-reality-is-not-just-wearing-glasses","target":"_blank","peerReviewed":false,"subType":"","id":54947818,"orderField":0},{"dateTime":"Wednesday, Mar 16, 2016","urlTitle":"primitives-and-elements-of-iot-trustworthiness","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ib2.png","groupId":53926943,"channel":"","description":"The National Institute of Standards and Technology (NIST) recently released a DRAFT Interagency Report 8063, \u201cPrimitives and Elements of Internet of Things (IoT) Trustworthiness\u201d. This report for first time offers a scientific foundation as to what the Internet of Things is.","dateTimeMS":1458146400000,"title":"Primitives and Elements of IoT Trustworthiness","type":"article","subCategories":"","url":"/web/sensing-iot/content?g=53926943&type=article&urlTitle=primitives-and-elements-of-iot-trustworthiness","target":"_blank","peerReviewed":false,"subType":"","id":54947548,"orderField":0},{"dateTime":"Friday, Mar 18, 2016","urlTitle":"a-warning-for-wearables-think-before-you-emote","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"https://web.archive.org/web/20170606103214/http://img.deusm.com/darkreading/john-havens.png","groupId":53319,"channel":"BIG DATA","description":"An examination of how wearable devices could become the modern equivalent of blogs broadcasting proprietary workplace information directly to the Internet of Things -- and beyond.","dateTimeMS":1458338400000,"title":"A Warning for Wearables: Think Before You Emote","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=a-warning-for-wearables-think-before-you-emote","target":"_blank","peerReviewed":false,"subType":"","id":54951134,"orderField":0},{"dateTime":"Monday, Mar 21, 2016","urlTitle":"analyst-comment-36","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"NETWORKING","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending March 18, 2016.","dateTimeMS":1458594720000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=analyst-comment-36","target":"_blank","peerReviewed":false,"subType":"","id":54953873,"orderField":0},{"dateTime":"Wednesday, Mar 23, 2016","urlTitle":"cloud-enabled-the-shift-in-connectivity","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":53319,"channel":"CLOUD","description":"BUSINESS SOLUTIONS The last decade has seen a surge in new technologies and new uses for those technologies, so much so that we\u2019re already feeling the shift in our society.","dateTimeMS":1458752700000,"title":"Cloud Enabled: The Shift in Connectivity","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=cloud-enabled-the-shift-in-connectivity","target":"_blank","peerReviewed":false,"subType":"","id":54959419,"orderField":0},{"dateTime":"Thursday, Mar 24, 2016","urlTitle":"breaking-down-the-risk-of-industrial-control-systems-securi-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"RSA President Amit Yoran\u2019s predictions for 2016 includes the following thoughts about the increasing risk in our collective industrial control systems (ICS) security.","dateTimeMS":1458852180000,"title":"Breaking Down the Risk of Industrial Control Systems Security","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=breaking-down-the-risk-of-industrial-control-systems-securi-1","target":"_blank","peerReviewed":false,"subType":"","id":54961090,"orderField":0},{"dateTime":"Friday, Mar 25, 2016","urlTitle":"the-rise-of-emerging-haptics","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/hayward.png","groupId":54174376,"channel":"","description":"Emerging haptics has been a major research priority in the automotive sector (for car interiors), in VR, AR and robotics (for adding touch, force and acceleration to the sensation), as well as in other consumer sectors (for making user interfaces more intelligent).","dateTimeMS":1458942360000,"title":"The Rise of Emerging Haptics","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=the-rise-of-emerging-haptics","target":"_blank","peerReviewed":false,"subType":"","id":54961519,"orderField":0},{"dateTime":"Monday, Mar 28, 2016","urlTitle":"solar-roads-to-power-lights-cars-and-houses","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"https://web.archive.org/web/20170606103214/https://www.computer.org/cms/Computer.org/ComputingNow/marketing/harrop.jpg","groupId":54174376,"channel":"","description":"Installing photovoltaics in roads? This seems a strange idea at first. It sounds expensive and unlikely to work unless the surface is cleaned, free of snow and ice and in direct sunlight \u2013 all too infrequent in most places. Indeed, roads are constantly dug up by utilities, repairmen and others.","dateTimeMS":1459197300000,"title":"Solar Roads to Power Lights, Cars and Houses","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=solar-roads-to-power-lights-cars-and-houses","target":"_blank","peerReviewed":false,"subType":"","id":54963615,"orderField":0},{"dateTime":"Tuesday, Mar 29, 2016","urlTitle":"computer-ed-is-key-to-tech-s-future","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":53319,"channel":"INSIGHTS","description":"Technologists should back expanded support for computer education in the latest budget request from the White House, says the president of the IEEE Computer Society.","dateTimeMS":1459276080000,"title":"Computer Ed is Key to Tech\u2019s Future","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=computer-ed-is-key-to-tech-s-future","target":"_blank","peerReviewed":false,"subType":"","id":54965105,"orderField":0},{"dateTime":"Tuesday, Mar 29, 2016","urlTitle":"e-textiles-on-the-cusp-of-rapid-growth-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/hayward.png","groupId":54174376,"channel":"","description":"While the majority of wearable technology products sold today still fit with the components-in-a-box design, 2015 was a record year for investment in smart clothing and e-textile products. To reach the masses, wearable technology must be useful, practical and fashionable, and seamless integration within textiles and clothing is seen as a key part of this.","dateTimeMS":1459276560000,"title":"E-Textiles on the Cusp of Rapid Growth?","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=e-textiles-on-the-cusp-of-rapid-growth-","target":"_blank","peerReviewed":false,"subType":"","id":54967807,"orderField":0},{"dateTime":"Wednesday, Mar 30, 2016","urlTitle":"biometrics-making-inroads-with-financial-institutions","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/biobanking_th.jpg","groupId":7989281,"channel":"","description":"While numerous financial institutions worldwide have embraced biometric technology, widespread acceptance and adoption by customers is still in its early stages.","dateTimeMS":1459377240000,"title":"Biometrics Making Inroads with Financial Institutions","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=biometrics-making-inroads-with-financial-institutions","target":"_blank","peerReviewed":false,"subType":"","id":54969716,"orderField":0},{"dateTime":"Wednesday, Mar 30, 2016","urlTitle":"robotics-industry-poised-for-rapid-growth","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/harrop.png","groupId":54174376,"channel":"","description":"Global Market Expected to Top $120 Billion by 2026.","dateTimeMS":1459377900000,"title":"Robotics Industry Poised for Rapid Growth","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=robotics-industry-poised-for-rapid-growth","target":"_blank","peerReviewed":false,"subType":"","id":54972731,"orderField":0},{"dateTime":"Thursday, Mar 31, 2016","urlTitle":"energy-independent-vehicles-creating-new-technology-and-a-substantial-global-business","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/harrop.jpg","groupId":54174376,"channel":"","description":"Formula One is significant in two ways. It is a major business in its own right -- approaching $14 billion -- and it pioneers vital new technologies in a car or bus near you from the disk brake to the flywheel kinetic energy recovery system and the supercapacitor hybrid powertrain.","dateTimeMS":1459466760000,"title":"Energy Independent Vehicles \u2013 Creating New Technology and a Substantial Global Business","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=energy-independent-vehicles-creating-new-technology-and-a-substantial-global-business","target":"_blank","peerReviewed":false,"subType":"","id":54972116,"orderField":0},{"dateTime":"Friday, Apr 1, 2016","urlTitle":"printed-and-flexible-electronics-in-vehicles-a-5-5bn-market-by-2026","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/zervos.png","groupId":54174376,"channel":"","description":"Printed and flexible electronics are beginning to proliferate, with a variety of components and devices coming to market. Several end-user verticals are expected to benefit from the host of advantages these technologies offer and the automotive sector is no exception.","dateTimeMS":1459548600000,"title":"Printed and Flexible Electronics in Vehicles \u2013 a $5.5bn Market by 2026","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=printed-and-flexible-electronics-in-vehicles-a-5-5bn-market-by-2026","target":"_blank","peerReviewed":false,"subType":"","id":54972790,"orderField":0},{"dateTime":"Monday, Apr 4, 2016","urlTitle":"ariba-infor-and-the-business-network-challenge-quantum-physics-big-transformations-and-big-barriers","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"As the enterprise software market embraces the concept of digital transformation with typical reckless, feckless abandon, it\u2019s interesting to see how one of the most transformative concepts \u2013 business networks \u2013 is evolving. What\u2019s clear from a look at two of the most well thought-out strategies, those of Infor (via its GT Nexus acquisition) and SAP (via its Ariba acquisition), is that there\u2019s no shortage of merit to what these two companies are doing and planning.","dateTimeMS":1459802820000,"title":"Ariba, Infor, and the Business Network Challenge: Quantum Physics, Big Transformations and Big Barriers","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=ariba-infor-and-the-business-network-challenge-quantum-physics-big-transformations-and-big-barriers","target":"_blank","peerReviewed":false,"subType":"","id":54977741,"orderField":0},{"dateTime":"Monday, Apr 4, 2016","urlTitle":"in-demand-cloud-computing-professionals-are-being-paid-top-dollar","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":53319,"channel":"CAREERS","description":"Cloud-computing services have become popular and affordable ways for companies to maintain their data, apps, and websites on off-site servers. There are shortages of cloud-computing experts around the world, particularly in China, India, South Africa, and the United States. Companies on the prowl for cloud-computing professionals include Amazon, Facebook, Google, Microsoft, and Oracle.","dateTimeMS":1459809480000,"title":"In-demand Cloud Computing Professionals Are Being Paid Top Dollar","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=in-demand-cloud-computing-professionals-are-being-paid-top-dollar","target":"_blank","peerReviewed":false,"subType":"","id":54977770,"orderField":0},{"dateTime":"Monday, Apr 4, 2016","urlTitle":"traction-motors-yes-gaining-traction","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/gonzalez.png","groupId":54174376,"channel":"","description":"There are about 200 companies making traction motors for electric vehicles. Concurrently, there are also about 200 companies that make the lithium-ion batteries that increasingly power them. However, whereas three types of lithium-ion battery chemistry and construction are taking almost all of the business, with traction motors the situation is more complex because the diversity of needs calls for many very different types of motor - from brushless outrunner motors for quadcopters to claw pole torque assist reversing alternators (TARA) for the new 48V mild hybrids that will be in volume production from 2017.","dateTimeMS":1459810920000,"title":"Traction Motors \u2013 Yes \u2013 Gaining Traction","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=traction-motors-yes-gaining-traction","target":"_blank","peerReviewed":false,"subType":"","id":54978545,"orderField":0},{"dateTime":"Wednesday, Apr 6, 2016","urlTitle":"energy-harvesting-steady-growth-and-sensible-increase-in-opportunities-forecasted","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/zervos.png","groupId":54174376,"channel":"","description":"Developments of energy harvesting technologies in 2015 were pretty uneven, with some showcasing growth in interest as well as applications and others failing to meet expectations but despite limited growth expected in 2016 , by 2025 the market for transducers and power conditioning is expected to reach over $12 billion.","dateTimeMS":1459958160000,"title":"Energy Harvesting, Steady Growth and Sensible Increase in Opportunities Forecasted","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=energy-harvesting-steady-growth-and-sensible-increase-in-opportunities-forecasted","target":"_blank","peerReviewed":false,"subType":"","id":54984757,"orderField":0},{"dateTime":"Thursday, Apr 7, 2016","urlTitle":"analyst-comment-37","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending April 01, 2016.","dateTimeMS":1460068980000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=analyst-comment-37","target":"_blank","peerReviewed":false,"subType":"","id":54998668,"orderField":0},{"dateTime":"Friday, Apr 8, 2016","urlTitle":"conductive-inks-and-paste-everything-is-changing","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/khasha.png","groupId":54174376,"channel":"","description":"Everything, literally everything, is changing in the conductive inks business. The traditional markets are experiencing upheaval in terms of requirements and product leadership, while various emerging markets are opening up new frontiers.","dateTimeMS":1460133300000,"title":"Conductive Inks and Paste: Everything is Changing","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=conductive-inks-and-paste-everything-is-changing","target":"_blank","peerReviewed":false,"subType":"","id":55000350,"orderField":0},{"dateTime":"Sunday, Feb 28, 2016","urlTitle":"high-tech-careers-finding-the-job-you-want","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/htech.jpg","groupId":54960830,"channel":"","description":"As an Intel enterprise architect and technology strategist, Enrique G. Castro-Leon knows a thing or two about computer technology careers. With research interests that include cloud computing and IT-enabled enterprise service innovation, he recently co-authored a guest editor introduction for the November\u2013December 2015 IT Professional special issue on smart systems.","dateTimeMS":1456685700000,"title":"High-Tech Careers: Finding the Job You Want","type":"article","subCategories":"","url":"/web/computing-careers/content?g=54960830&type=article&urlTitle=high-tech-careers-finding-the-job-you-want","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55162041,"orderField":0},{"dateTime":"Monday, Apr 11, 2016","urlTitle":"the-hidden-costs-of-full-time-software-developers","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/outsource.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Software development is one of the hottest areas for outsourcing, with businesses realizing that they can easily assign projects to workers in remote areas and save money.","dateTimeMS":1460411640000,"title":"The Hidden Costs of Full-Time Software Developers","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=the-hidden-costs-of-full-time-software-developers","target":"_blank","peerReviewed":false,"subType":"","id":55005206,"orderField":0},{"dateTime":"Monday, Apr 11, 2016","urlTitle":"electrically-conductive-adhesives-enabling-low-temperature-electronics","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/gordon.png","groupId":54174376,"channel":"","description":"$1.2 billion of Electrically Conductive Adhesives (ECAs) are already selling each year, and they are becoming increasingly common to replace solders in a variety of functions, applications and industries.","dateTimeMS":1460412540000,"title":"Electrically Conductive Adhesives Enabling Low Temperature Electronics","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=electrically-conductive-adhesives-enabling-low-temperature-electronics","target":"_blank","peerReviewed":false,"subType":"","id":55005261,"orderField":0},{"dateTime":"Tuesday, Apr 12, 2016","urlTitle":"analyst-comment-38","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"MOBILE","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending April 08, 2016.","dateTimeMS":1460495280000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analyst-comment-38","target":"_blank","peerReviewed":false,"subType":"","id":55015866,"orderField":0},{"dateTime":"Wednesday, Apr 13, 2016","urlTitle":"are-europeans-more-data-driven-than-the-rest-of-u-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"Like any other technology implementation, nothing threatens effective business analytics more than the looming specter of \u201cshelfware.\u201d In the fight against underutilized technology, companies in Europe are leaning on their users and an increased propensity for data-driven decisions.","dateTimeMS":1460585340000,"title":"Are Europeans More Data-Driven than the Rest of Us?","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=are-europeans-more-data-driven-than-the-rest-of-u-1","target":"_blank","peerReviewed":false,"subType":"","id":55038327,"orderField":0},{"dateTime":"Monday, Apr 18, 2016","urlTitle":"analyst-comment-39","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"STARTUPS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending April 15, 2016.","dateTimeMS":1460999640000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=analyst-comment-39","target":"_blank","peerReviewed":false,"subType":"","id":55031028,"orderField":0},{"dateTime":"Thursday, Apr 14, 2016","urlTitle":"rethinking-storage-virtualization-the-flat-earth-approach","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"","description":"In 2014, virtualization surpassed 50 percent of all server workloads, according to Gartner, which believes it will reach 86 percent in 2016. That\u2019s phenomenal for a relatively young technology. But due to other shifts in technology and the demands they produce, it\u2019s a framework whose time has come.","dateTimeMS":1460656740000,"title":"Rethinking Storage Virtualization: The \u2018Flat Earth\u2019 Approach","type":"article","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=article&urlTitle=rethinking-storage-virtualization-the-flat-earth-approach","target":"_blank","peerReviewed":false,"subType":"","id":55031055,"orderField":0},{"dateTime":"Thursday, Mar 31, 2016","urlTitle":"finding-the-cybersecurity-job-you-want","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/cybersecurity.jpg","groupId":54960830,"channel":"","description":"Rakesh Verma is a professor of computer science at the University of Houston and director of its ReDAS (Reasoning and Data Analytics for Security) Laboratory. His research interests are formal methods and data analytics applied to natural-language understanding and cybersecurity. Thus, he is very knowledgeable about security-related careers. We asked Verma several questions about career opportunities in this increasingly important field.","dateTimeMS":1459448820000,"title":"Finding the Cybersecurity Job You Want","type":"article","subCategories":"","url":"/web/computing-careers/content?g=54960830&type=article&urlTitle=finding-the-cybersecurity-job-you-want","target":"_blank","peerReviewed":false,"subType":"","id":55162061,"orderField":0},{"dateTime":"Wednesday, Apr 20, 2016","urlTitle":"5-ways-to-convert-your-visitors","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/arrowbutton.jpg","groupId":53319,"channel":"STARTUPS","description":"Conversion is the name of the game for any website or business that is getting off the ground, and even for those that are well established. After all, it doesn\u2019t matter how much traffic you can drive to your site if you can\u2019t convert those visitors into customers or users.","dateTimeMS":1461174120000,"title":"5 Ways to Convert Your Visitors","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=5-ways-to-convert-your-visitors","target":"_blank","peerReviewed":false,"subType":"","id":55031982,"orderField":0},{"dateTime":"Monday, Apr 25, 2016","urlTitle":"technology-s-making-smart-clothing-even-smarter","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/fabricm.jpg","groupId":7989281,"channel":"","description":"A generation from now (or probably much less), your blue jeans might tell you that they really need to be washed. Or your blue blazer might complain that that hideous Christmas gift tie you got from Aunt Mabel just doesn\u2019t cut it with your dress shirt and slacks.","dateTimeMS":1461614340000,"title":"Technology\u2019s Making Smart Clothing Even Smarter","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=technology-s-making-smart-clothing-even-smarter","target":"_blank","peerReviewed":false,"subType":"","id":55038116,"orderField":0},{"dateTime":"Saturday, Apr 30, 2016","urlTitle":"finding-the-internet-of-things-related-job-you-want","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/iotc.jpg","groupId":54960830,"channel":"","description":"For this ComputingEdge issue, we asked Jaroslaw Domaszewicz, an assistant professor in Warsaw University of Technology\u2019s (WUT\u2019s) Faculty of Electronics and Information Technology and its Institute of Telecommunications, about career opportunities related to the Internet of Things (IoT). Domaszewicz\u2019s research interests include the IoT, pervasive computing, middleware, and the interaction between people and smart objects, and he has led WUT\u2019s team in a number of European Union projects in these areas.","dateTimeMS":1462046640000,"title":"Finding the Internet of Things\u2013Related Job You Want","type":"article","subCategories":"","url":"/web/computing-careers/content?g=54960830&type=article&urlTitle=finding-the-internet-of-things-related-job-you-want","target":"_blank","peerReviewed":false,"subType":"","id":55162081,"orderField":0},{"dateTime":"Thursday, Apr 21, 2016","urlTitle":"securing-enterprise-networks-in-the-age-of-byod-and-the-iot","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"As if managing the BYOD phenomenon wasn\u2019t hard enough, Microsoft made it harder with its free Windows 10 upgrade. That wasn\u2019t Microsoft\u2019s intention, of course, and the company can\u2019t be blamed for the increasing challenge of managing employee devices with disparate software versions. After all, it\u2019s pretty great to get a new operating system for free.","dateTimeMS":1461270300000,"title":"Securing Enterprise Networks in the Age of BYOD and the IoT","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=securing-enterprise-networks-in-the-age-of-byod-and-the-iot","target":"_blank","peerReviewed":false,"subType":"","id":55038303,"orderField":0},{"dateTime":"Tuesday, Apr 26, 2016","urlTitle":"analyst-comment-40","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"BIG DATA","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending April 22, 2016.","dateTimeMS":1461688920000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=analyst-comment-40","target":"_blank","peerReviewed":false,"subType":"","id":55038962,"orderField":0},{"dateTime":"Wednesday, Apr 27, 2016","urlTitle":"ibm-s-grady-booch-receives-the-2016-ieee-cs-computer-pioneer-award","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"https://web.archive.org/web/20170606103214/https://s3-us-west-2.amazonaws.com/ieeecs.cdn.rockstars/images/headshots/booch.png","groupId":53319,"channel":"INSIGHTS","description":"Grady Booch, Chief Scientist for Software Engineering and Watson/M at IBM Research, has been selected to receive the IEEE Computer Society\u2019s 2016 Computer Pioneer Award.","dateTimeMS":1461780120000,"title":"IBM\u2019s Grady Booch Receives the 2016 IEEE-CS Computer Pioneer Award","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=ibm-s-grady-booch-receives-the-2016-ieee-cs-computer-pioneer-award","target":"_blank","peerReviewed":false,"subType":"","id":55043868,"orderField":0},{"dateTime":"Thursday, Apr 28, 2016","urlTitle":"exploring-how-cache-coherency-accelerates-heterogeneous-compute","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/parris2.jpg","groupId":54930593,"channel":"","description":"This blog focuses on some of the hardware innovations and changes that are relevant to shared virtual memory and cache coherency, which are components of the HSA hardware specification.","dateTimeMS":1461886020000,"title":"Exploring how Cache Coherency Accelerates Heterogeneous Compute","type":"article","subCategories":"","url":"/web/hsa-connections/content?g=54930593&type=article&urlTitle=exploring-how-cache-coherency-accelerates-heterogeneous-compute","target":"_blank","peerReviewed":false,"subType":"","id":55056393,"orderField":0},{"dateTime":"Friday, Apr 29, 2016","urlTitle":"9-tools-your-company-needs-in-2016","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/businesstools.png","groupId":53319,"channel":"STARTUPS","description":"If you\u2019re planning to improve operations using technology, here are a few tools you should have on your devices in 2016. These products will help you be more productive and informed as you run your company.","dateTimeMS":1461963120000,"title":"9 Tools Your Company Needs in 2016","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=9-tools-your-company-needs-in-2016","target":"_blank","peerReviewed":false,"subType":"","id":55045235,"orderField":0},{"dateTime":"Monday, May 2, 2016","urlTitle":"analyst-comment-41","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"SECURITY","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending April 29, 2016.","dateTimeMS":1462213080000,"title":"Analyst Commentary","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=analyst-comment-41","target":"_blank","peerReviewed":false,"subType":"","id":55051435,"orderField":0},{"dateTime":"Wednesday, May 4, 2016","urlTitle":"how-to-prevent-tech-from-destroying-your-work-life-balance","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/wlb.jpg","groupId":53319,"channel":"CAREERS","description":"New tech emerges all the time, purportedly to make our lives easier and keep us in closer connection with each other. Traditional mediums, like email and phone calls, are still around, but a bevy of new communication mediums have arisen to streamline conversations and break down the barriers that previous communication channels erected.\nThe trouble is, some of these barriers were a good thing. Are we losing them?","dateTimeMS":1462379160000,"title":"How to Prevent Tech From Destroying Your Work-Life Balance","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=how-to-prevent-tech-from-destroying-your-work-life-balance","target":"_blank","peerReviewed":false,"subType":"","id":55056023,"orderField":0},{"dateTime":"Friday, May 13, 2016","urlTitle":"prpl-security-group-and-imperas-address-iot-security-challenges-via-multi-domain-virtualization","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/simon.jpg","groupId":8459902,"channel":"","description":"Recent news shows that security is a key challenge to the wide scope and deployment of IoT, with varied consequences across many IoT markets. Imagine automotive hijacking. Power grid failure. Financial security breaches. Health care hacking. Consequences are severe: successful security measures in the IoT ecosystem will accelerate the explosion of its many markets while poorly implemented security will be a significant impediment to growth of IoT usage.","dateTimeMS":1463172540000,"title":"prpl Security Group and Imperas Address IoT Security Challenges via Multi-Domain Virtualization","type":"article","subCategories":"","url":"/web/prpl-matters/content?g=8459902&type=article&urlTitle=prpl-security-group-and-imperas-address-iot-security-challenges-via-multi-domain-virtualization","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55110880,"orderField":0},{"dateTime":"Tuesday, May 17, 2016","urlTitle":"analystperspectives-weekly-s-36","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"cms/computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending May13, 2016.","dateTimeMS":1463527860000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-36","target":"_blank","peerReviewed":false,"subType":"","id":55072258,"orderField":0},{"dateTime":"Wednesday, Jun 1, 2016","urlTitle":"got-game-analytics-may-help-those-weekend-duffers","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/game1.png","groupId":7989281,"channel":"","description":"If you constantly shank your drives into the rough, have a propensity for landing your ball in every other sand trap and have a knack for choking on those three-foot putts, well, golf analytics may offer some incremental improvements to your game, but playing on the PGA Tour will still be a bedtime fantasy.\n\nThe skinny, however, is that the analytics gleaned via wearable technology and cloud computing are bringing about a sea change in golf.","dateTimeMS":1464801060000,"title":"Got Game? Analytics May Help Those Weekend Duffers","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=got-game-analytics-may-help-those-weekend-duffers","target":"_blank","peerReviewed":false,"subType":"","id":55122106,"orderField":0},{"dateTime":"Wednesday, Jun 1, 2016","urlTitle":"5-tips-to-processing-payments-remotely","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/secure.jpg","groupId":53319,"channel":"SECURITY","description":"Today\u2019s busy professionals rarely sit at a desk for eight hours. Work is conducted in cafes, while waiting at the airport, or before leaving the house for the day. Mobile devices have freed business leaders to travel across the country and even to the other side of the globe. However, for entrepreneurs who don\u2019t have a bookkeeping team back home, processing incoming and outgoing invoices in a timely manner can be challenging.","dateTimeMS":1464800400000,"title":"5 Tips to Processing Payments Remotely","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=5-tips-to-processing-payments-remotely","target":"_blank","peerReviewed":false,"subType":"","id":55105140,"orderField":0},{"dateTime":"Thursday, Jun 2, 2016","urlTitle":"analystperspectiv-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"AnalystPerspectives Weekly Scan covers analyst commentary","dateTimeMS":1464854640000,"title":"AnalystPerspectives","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analystperspectiv-1","target":"_blank","peerReviewed":false,"subType":"","id":55106195,"orderField":0},{"dateTime":"Friday, Jun 3, 2016","urlTitle":"the-last-real-user-group-standing-why-asug-matters-to-sap-and-its-customers","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2.png","groupId":6416743,"channel":"","description":"The first time I ever attended a user group meeting was way back at the dawn of my career, when I was managing a pioneering print-on-demand/desktop publishing system for a specialty publisher. I went to the meeting to find out if the vendor was ever going to fix the latest version of its software, which was basically dead-on-arrival. To my surprise, the CEO took to the stage, apologized profusely, begged forgiveness, promised to fix the problem or else, and otherwise completely humbled himself in front of his irate customers.","dateTimeMS":1464941940000,"title":"The Last Real User Group Standing: Why ASUG Matters to SAP and Its Customers","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=the-last-real-user-group-standing-why-asug-matters-to-sap-and-its-customers","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55108292,"orderField":0},{"dateTime":"Friday, Jun 3, 2016","urlTitle":"what-s-new-is-old","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/jpr.jpg","groupId":54397843,"channel":"","description":"Augmented reality (AR) systems come in a various models or designs, glasses, headsets, and helmets to name the most popular. AR helmets are used for industrial applications such as maintenance and repair, first responders such as firemen, rescue workers, and they are used by military pilots. AR helmets are also being introduced for motorcyclists and provide a head\u2019s up display (HUD) of road conditions and nearby attractions. BMW has demonstrated such a helmet, and Skully has sold a few. Inside the DOT/ECE certified helmet, the user has intelligent audio, helmet-to-helmet communication, hands-free calling, music streaming, and GPS navigation via Bluetooth to a cell phone,","dateTimeMS":1464980760000,"title":"What\u2019s New Is Old","type":"article","subCategories":"","url":"/web/chasing-pixels-finding-gems/content?g=54397843&type=article&urlTitle=what-s-new-is-old","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55110900,"orderField":0},{"dateTime":"Thursday, Jun 16, 2016","urlTitle":"cognitive-computing-set-to-make-significant-inroads-in-healthcare-indust-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/vrbicky.png","groupId":8206605,"channel":"","description":"The global healthcare cognitive computing market is poised for explosive growth.\n\nMarket research firm Grand View Research predicts it will top more than $5 billion by 2022. Grand Review Research also says significant factors driving the market are rapid growth in the scientific database, demand for personalized healthcare, and the need to reduce healthcare expenditure levels.","dateTimeMS":1466101740000,"title":"Cognitive Computing Set to Make Significant Inroads in Healthcare Industry","type":"article","subCategories":"","url":"/web/the-doctor-is-in/content?g=8206605&type=article&urlTitle=cognitive-computing-set-to-make-significant-inroads-in-healthcare-indust-1","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55126681,"orderField":0},{"dateTime":"Sunday, Jun 5, 2016","urlTitle":"sap-s-ginormous-sapphire-user-conference-sales-event","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/Josh greenbaum.JPG","groupId":6416743,"channel":"","description":"In case you don\u2019t know the drill, SAP\u2019s biggest challenge of all is to funnel everything that\u2019s good and true and important to the company into CEO Bill McDermott\u2019s keynote. The process is simple \u2013 start with a blank sheet, put some ideas on paper, and then watch as the jostling, politicking, and pitching begins to fill out Bill\u2019s time on stage.","dateTimeMS":1465116960000,"title":"SAP\u2019s ginormous SAPPHIRE user conference/sales event","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=sap-s-ginormous-sapphire-user-conference-sales-event","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55109582,"orderField":0},{"dateTime":"Monday, Jun 6, 2016","urlTitle":"rocm-do-you-speak-my-language-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ben1.jpg","groupId":54930593,"channel":"","description":"The open-source ROCm stack offers several programming-language choices designed to give you a range of developer tools.","dateTimeMS":1465197240000,"title":"ROCm: Do You Speak My Language?","type":"article","subCategories":"","url":"/web/hsa-connections/content?g=54930593&type=article&urlTitle=rocm-do-you-speak-my-language-","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55125278,"orderField":0},{"dateTime":"Sunday, Jun 5, 2016","urlTitle":"invest-in-the-right-battery-markets-new-opportunities","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/he.png","groupId":54174376,"channel":"","description":"There are significant investment opportunities now in various battery markets. According to an IDTechEx Research report, Flexible, Printed and Thin Film Batteries 2016-2026: Technologies, Markets, Players , the total market for thin, flexible and printed batteries will reach $471 million by 2026.","dateTimeMS":1465114860000,"title":"Invest in the right battery markets: New opportunities","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=invest-in-the-right-battery-markets-new-opportunities","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55109503,"orderField":0},{"dateTime":"Wednesday, Jun 8, 2016","urlTitle":"informatica-s-dilemma-how-to-sell-the-un-platform-in-the-midst-of-today-s-platform-wars","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/Josh greenbaum.JPG","groupId":6416743,"channel":"","description":"It\u2019s now standard operating procedure at virtually every conference I attend: the execs on stage are talking about a disrupted digital future and how they can enable it to an audience that\u2019s pretty much focused on how their vendor can help them do a better job today: The future can wait.","dateTimeMS":1465375320000,"title":"Informatica\u2019s Dilemma: How To Sell the Un-Platform in the Midst of Today\u2019s Platform Wars","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=informatica-s-dilemma-how-to-sell-the-un-platform-in-the-midst-of-today-s-platform-wars","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55113521,"orderField":0},{"dateTime":"Tuesday, Jun 7, 2016","urlTitle":"analystperspectives-weekly-scan-covers-analyst-commentary-from-the-week-ending-may-27-2016-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"HP and CSC make plans to merge in the enterprise services sector. Read these analyst discussions and more.","dateTimeMS":1465285620000,"title":"AnalystPerspectives Weekly Scan covers analyst commentary from the week ending May 27, 2016.","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analystperspectives-weekly-scan-covers-analyst-commentary-from-the-week-ending-may-27-2016-","target":"_blank","peerReviewed":false,"subType":"","id":55111170,"orderField":0},{"dateTime":"Wednesday, Jun 15, 2016","urlTitle":"happy-trails-to-you-salesforce-com-gets-in-front-of-the-platform-ecosystem-challenge-if-someone-were-to-write-the-the-tech-event-manager-s-guide-to-en","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/greenbaum1.jpg","groupId":6416743,"channel":"","description":"If someone were to write the \u201cThe Tech Event Manager\u2019s Guide to Engaging a Millennial Audience\u201d, a look at Salesforce.com\u2019s recent TrailheaDX conference would be a great place to start. Similarly, if someone wanted to write the \u201cPlatform Vendors\u2019 Guide to Building an Engaged Developer Audience\u201d, that same TrailheaDX conference would also serve as an excellent model.","dateTimeMS":1465983600000,"title":"Happy Trails to You: Salesforce.com","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=happy-trails-to-you-salesforce-com-gets-in-front-of-the-platform-ecosystem-challenge-if-someone-were-to-write-the-the-tech-event-manager-s-guide-to-en","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55121010,"orderField":0},{"dateTime":"Wednesday, Jun 15, 2016","urlTitle":"very-large-lithium-ion-batteries-becoming-widespread","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/circle1.png","groupId":54174376,"channel":"","description":"Very large lithium-ion (Li-ion) battery banks were largely unknown 10 years ago. Now, it is tough to keep up with the variety of uses for them. On ships, where there were no such batteries, we are starting to see 1-5 MWh banks. Autonomous underwater vehicles, mining trucks and buses can sport ones of up to 350 kWh but it is in stationary applications that really big facilities have arrived. Here there is a multiplier effect with Li-ion gaining market share in growth markets.","dateTimeMS":1465977660000,"title":"Very Large Lithium-Ion Batteries Becoming Widespread","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=very-large-lithium-ion-batteries-becoming-widespread","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55119056,"orderField":0},{"dateTime":"Thursday, Jun 16, 2016","urlTitle":"analystperspectives-weekly-s-37","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"As the amount of data continues to grow, the analyst discussions also continue. Here are some of the headlines you will find in the Data, Big Data & Digital Assets discussions.","dateTimeMS":1466068080000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-37","target":"_blank","peerReviewed":false,"subType":"","id":55121441,"orderField":0},{"dateTime":"Friday, Jun 17, 2016","urlTitle":"holoportation","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/holo.jpg","groupId":53319,"channel":"BIG DATA","description":"holoportation is a new type of 3D capture technology that allows high-quality 3D models of people to be reconstructed, compressed and transmitted anywhere in the world in real time. When combined with mixed reality displays such as HoloLens, this technology allows users to see, hear, and interact with remote participants in 3D as if they are actually present in the same physical space. Communicating and interacting with remote users becomes as natural as face-to-face communication.","dateTimeMS":1466157480000,"title":"holoportation","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=holoportation","target":"_blank","peerReviewed":false,"subType":"","id":55122879,"orderField":0},{"dateTime":"Monday, Jun 20, 2016","urlTitle":"creating-a-new-generation-of-computing-device","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/head.PNG","groupId":53319,"channel":"BIG DATA","description":"Quantum computing is a field of research that applies the principles of quantum physics and new directions in materials science to building a new type of computers that use quantum effects in computation. Beyond creating quantum computers, the field also includes studies of algorithms that such computers can execute.","dateTimeMS":1466458920000,"title":"Creating a new generation of computing device","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=creating-a-new-generation-of-computing-device","target":"_blank","peerReviewed":false,"subType":"","id":55125665,"orderField":0},{"dateTime":"Tuesday, Jun 21, 2016","urlTitle":"analyst-perspectiv-7","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"The big news this week is Microsoft\u2019s acquisition of LinkedIn. Here are analyst conversations regarding this development.","dateTimeMS":1466528940000,"title":"Analyst Perspectives","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-perspectiv-7","target":"_blank","peerReviewed":false,"subType":"","id":55126434,"orderField":0},{"dateTime":"Wednesday, Jun 22, 2016","urlTitle":"le-blueprint-c-est-moi-the-counter-customization-revolution-comes-to-sap","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/greenbaum1.jpg","groupId":6416743,"channel":"","description":"Sometimes revolutions start with a shot heard round the world, and sometimes they start with a quiet nudge in a new direction. The latter form of revolution was nudged into being for SAP\u2019s HR customers last April in the form of eight words uttered by Mike Ettling, the president of SAP SuccessFactors, during an analyst summit in San Francisco. Ettling\u2019s eight words have been said before, but the fact that they come from a man who is re-writing what it means to be a cloud company, and thereby what it means for customers to consume cloud services, adds enormous gravitas to the moment.","dateTimeMS":1466589180000,"title":"Le Blueprint, C\u2019est Moi: the Counter-Customization Revolution comes to SAP","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=le-blueprint-c-est-moi-the-counter-customization-revolution-comes-to-sap","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55134264,"orderField":0},{"dateTime":"Tuesday, May 31, 2016","urlTitle":"finding-the-big-data-job-you-want","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/bigdata_sm.jpg","groupId":54960830,"channel":"","description":"For this ComputingEdge issue, we asked Martin Petitclerc, senior software architect for Watson Analytics at IBM Canada, about career opportunities in the expanding field of big data. Petitclerc is an expert in areas such as matrix, relational, and hybrid online analytical processing (OLAP); the OLAP calculation engine; and advanced analysis using data mining.","dateTimeMS":1464726780000,"title":"Finding the Big Data Job You Want","type":"article","subCategories":"","url":"/web/computing-careers/content?g=54960830&type=article&urlTitle=finding-the-big-data-job-you-want","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55162301,"orderField":0},{"dateTime":"Thursday, Jun 23, 2016","urlTitle":"ito-alternatives-light-at-the-end-of-the-tunnel","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/mkt1.jpg","groupId":54174376,"channel":"","description":"The Transparent Conductive Industry (TCF) industry has recently experienced sluggish growth. The industry has transitioned from being supply-limited to being commoditized and demand-limited with supply currently outstripping demand. This is a commonplace characteristic of supply industry into consumer electronic devices: there is often a scramble for supplies as demand rapidly takes off but the industry soon over-invests, the capacity overshoots demand, and competition renders the component a commodity.","dateTimeMS":1466711580000,"title":"ITO ALTERNATIVES: LIGHT AT THE END OF THE TUNNEL","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=ito-alternatives-light-at-the-end-of-the-tunnel","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55138401,"orderField":0},{"dateTime":"Friday, Jun 24, 2016","urlTitle":"hsa-1-1-specification-bringing-heterogeneous-computing-to-wide-array-of-platforms","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/hsa.jpg","groupId":54930593,"channel":"","description":"Today's systems-on-chips (SoCs) are complicated amalgamations of multiple components such as CPUs, GPUs, DSPs, FPGAs, fabrics and fixed-function accelerators. Within each SoC, various open and proprietary IP blocks are integrated into one singular environment. Tying these unique components together into one streamlined SoC requires multiple (and distinct) toolchains, profiling methods and debug tools.","dateTimeMS":1466759880000,"title":"HSA 1.1 Specification Bringing Heterogeneous Computing to Wide Array of Platforms","type":"article","subCategories":"","url":"/web/hsa-connections/content?g=54930593&type=article&urlTitle=hsa-1-1-specification-bringing-heterogeneous-computing-to-wide-array-of-platforms","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55134284,"orderField":0},{"dateTime":"Monday, Jun 27, 2016","urlTitle":"devops-practice","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ebert-thumb.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"DevOps is an organizational shift where instead of distributed silo-like functions cross-functional teams work on continuous operational feature deliveries. Teams thus deliver value in a faster and continuous way, reducing problems generated by miscommunication between team members and enhancing a faster resolution of problems. It obviously means a culture shift towards collaboration between development, quality assurance and operations. At Vector we have supported a number of companies on improving efficiency with DevOps and continuous delivery. Here a brief case study from a domain with high safety and security requirements.","dateTimeMS":1467052500000,"title":"DevOps Practice","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=devops-practice","target":"_blank","peerReviewed":false,"subType":"","id":55139342,"orderField":0},{"dateTime":"Tuesday, Jun 28, 2016","urlTitle":"the-internet-of-things-iot-and-the-enterprise-the-future-today","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/greenbaum1.jpg","groupId":6416743,"channel":"","description":"The opportunities for IoT innovation abound. The ability, for example, to optimize the angle of the blades of a wind turbine in real time, or identify and track the contents of a pallet of parts as it moves through the supply chain, will change the underlying operations of every industry and every individual in ways that are only now beginning to be understood.","dateTimeMS":1467107580000,"title":"The Internet of Things (IoT) and the Enterprise: The Future Today","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=the-internet-of-things-iot-and-the-enterprise-the-future-today","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55139182,"orderField":0},{"dateTime":"Monday, Jul 4, 2016","urlTitle":"hp-launches-jet-fusion-3d-printing-solutions","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/hp5.JPG","groupId":54174376,"channel":"","description":"HP first launched their Multijet Fusion concept in October 2014 and have been teasing us with snippets of additional information ever since. HP recently started taking orders for products, the first of which will be shipped by the end of 2016. The first target is model shops and service bureaus, and the co-developers included Materialise, Shapeways and Protolabs.\n\nMultijet Fusion is being positioned as a truly industrial technology, and is poised to take a share of the $12 trillion global manufacturing market.","dateTimeMS":1467621900000,"title":"HP Launches Jet Fusion 3D Printing Solutions","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=hp-launches-jet-fusion-3d-printing-solutions","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55144347,"orderField":0},{"dateTime":"Wednesday, Jun 29, 2016","urlTitle":"analystperspectives-weekly-s-38","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analyst7.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending June 24, 2016. \nWith Brexit events, analysts discuss possible effects.","dateTimeMS":1467192780000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-38","target":"_blank","peerReviewed":false,"subType":"","id":55140137,"orderField":0},{"dateTime":"Thursday, Jun 30, 2016","urlTitle":"driverless-cars-are-coming-a-paradigm-shift","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/neal.jpg","groupId":7989281,"channel":"","description":"An MIT study predicted last year that shared, self-driving cars may take so many vehicles off the road \u2013 perhaps 80% of them \u2013 that a new class of \u2018exurbs\u2019 in the U.S. may spring up within a decade.\n\n\u201cWith fewer cars, much of this space could be freed for other uses. Such reduction in car numbers would also dramatically lower the cost (and related energy consumption) of building and maintaining roads,\u201d said MIT\u2019s Matthew Claudel and Carlo Ratti. One engineering study, they noted, found that automation could quadruple capacity on any given highway \u2013 and fewer cars translate to less noise and a small environmental impact.\n\nThese self-driving vehicles will eventually blur the lines between public/private transportation modes.","dateTimeMS":1467279780000,"title":"Driverless Cars Are Coming \u2013 a Paradigm Shift","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=driverless-cars-are-coming-a-paradigm-shift","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55140791,"orderField":0},{"dateTime":"Thursday, Jul 7, 2016","urlTitle":"analystperspectives-weekly-scan-covers-analyst-commentary-from-the-week-ending-july-01-2016-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"You will find a variety of discussions in the Mobile & Broadband section this week. Here is a sampling:\n- New Apple Patent Could Make iPhone an Enterprise Must \n- IDC Spending Guide Finds Western European Organizations Accelerating Their Investment in the Internet of Things as Meaningful Use Cases Find Their Way to Fruition\n- Mobile Payment Users in Canada Get More Enthusiastic.","dateTimeMS":1467912600000,"title":"AnalystPerspectives Weekly Scan covers analyst commentary from the week ending July 01, 2016.","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analystperspectives-weekly-scan-covers-analyst-commentary-from-the-week-ending-july-01-2016-","target":"_blank","peerReviewed":false,"subType":"","id":55151206,"orderField":0},{"dateTime":"Friday, Jul 8, 2016","urlTitle":"sid-dispatch","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/Blogs/seogkim.png","groupId":55151125,"channel":"","description":"Welcome to the first post of SID Dispatch from the Society for Information Display (SID)","dateTimeMS":1468016640000,"title":"Society for Information Display (SID) Dispatch Debuts","type":"article","subCategories":"","url":"/web/sid-dispatch/content?g=55151125&type=article&urlTitle=sid-dispatch","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55157569,"orderField":0},{"dateTime":"Monday, Jul 11, 2016","urlTitle":"cybersecurity-threats-driving-businesses-to-the-cloud","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/greenbaum.jpg","groupId":6416743,"channel":"","description":"\u201cCybersecurity is a cat and mouse game where the mouse gets bigger and more ferocious by the minute,\u201d stated Joshua Greenbaum, analyst, Enterprise Applications Consulting, in his discussion of the topics to be addressed at the upcoming Rock Stars of Cybersecurity Threats and Countermeasures, September 13, 2016, in Seattle. \u201cSecurity threats can\u2019t be minimized. That\u2019s why companies of all sizes are running to the cloud.\u201d","dateTimeMS":1468277280000,"title":"Cybersecurity Threats Driving Businesses to the Cloud","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=cybersecurity-threats-driving-businesses-to-the-cloud","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55154496,"orderField":0},{"dateTime":"Tuesday, Jul 12, 2016","urlTitle":"encyclopedia-of-cloud-computing","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/book1.jpg","groupId":53319,"channel":"CLOUD","description":"Cloud computing is changing the way people and enterprises use computers and their work practices, as well as how companies and governments deploy their computer applications. It will drastically improve access to information for all as well as cut IT costs. It redefines not only the information and communication technology (ICT) industry but also enterprise IT in all industry and business sectors. It is also driving innovations by small enterprises and facilitating deployment of new applications that would otherwise be infeasible.\nThis is an edited excerpt from Encyclopedia of Cloud Computing, ©Wiley 2016.","dateTimeMS":1468341480000,"title":"Encyclopedia of Cloud Computing","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=encyclopedia-of-cloud-computing","target":"_blank","peerReviewed":false,"subType":"","id":55155779,"orderField":0},{"dateTime":"Thursday, Jul 14, 2016","urlTitle":"analystperspectiv-2","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analyst7.jpg","groupId":53319,"channel":"MOBILE","description":"This issue of covers analyst commentary from the week ending July 08, 2016.\n\nMobile security is just one of the subjects covered in this week\u2019s newsletter. \n Here is a sample of the articles you will find in the Mobile & Broadband section:\n\nRural Communities Need Investments in Small Cell Backhaul to Narrow the Digital \n\nDivide as World Ramps Up to 5G | ABI Research - Wed, 06 Jul 2016 \n\nBlackBerry Misinformation and the Smartphone Security Crisis | Enderle Group - Fri, 08 Jul 2016 |Rob Enderle\n\nSecuring Trust in Digital Business | Gartner - Tue, 05 Jul 2016 \n\nPasswords Suck \u2013 Bring on Biometrics! | Celent - Wed, 06 Jul 2016 |Bob Meara","dateTimeMS":1468536180000,"title":"AnalystPerspectives","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=analystperspectiv-2","target":"_blank","peerReviewed":false,"subType":"","id":55158580,"orderField":0},{"dateTime":"Monday, Jul 18, 2016","urlTitle":"ieee-computer-society-70th-anniversary","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/old.jpg","groupId":53319,"channel":"INSIGHTS","description":"The IEEE Computer Society is dedicated to improve technical skills by providing access to the latest trends through conferences, publication and training with world renown researches and industry leaders.","dateTimeMS":1468879380000,"title":"IEEE Computer Society 70th Anniversary","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=ieee-computer-society-70th-anniversary","target":"_blank","peerReviewed":false,"subType":"","id":55161168,"orderField":0},{"dateTime":"Tuesday, Jul 19, 2016","urlTitle":"analystperspectives-weekly-s-39","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"Cloud Computing is a topic of interest for analysts this week. Here is one of the discussions:\n\nEnterprise Adoption Driving Strong Growth of Public Cloud Infrastructure as a Service, According to IDC | IDC - Thu, 14 Jul 2016","dateTimeMS":1468946940000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-39","target":"_blank","peerReviewed":false,"subType":"","id":55161574,"orderField":0},{"dateTime":"Wednesday, Jul 20, 2016","urlTitle":"finding-the-cloud-computing-job-you-want","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/cloud.jpg","groupId":54960830,"channel":"","description":"The proliferation of cloud-computing networks in recent years has created a need for more security and privacy personnel in the field. For thisComputingEdge issue, we asked Christian Esposito, associate researcher at the University of Naples Federico II about cloud-computing career opportunities. Esposito\u2019s research interests include cloud computing, distributed systems, middleware, dependability, ubiquitous computing, and artificial intelligence.","dateTimeMS":1469051700000,"title":"Finding the Cloud-Computing Job You Want","type":"article","subCategories":"","url":"/web/computing-careers/content?g=54960830&type=article&urlTitle=finding-the-cloud-computing-job-you-want","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55385586,"orderField":0},{"dateTime":"Monday, Jul 25, 2016","urlTitle":"3-ways-to-outsource-software-development-and-actually-get-things-done","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/drew.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Developing digital assets is rapidly becoming one of the most expensive undertakings for businesses in 2016. Skilled developers command high salaries, which can add up to millions of dollars over the life of your startup. After all, it often takes a team of project managers and developers to create and maintain unique, high quality software.","dateTimeMS":1469487960000,"title":"3 Ways to Outsource Software Development and Actually Get Things Done","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=3-ways-to-outsource-software-development-and-actually-get-things-done","target":"_blank","peerReviewed":false,"subType":"","id":55178895,"orderField":0},{"dateTime":"Tuesday, Jul 26, 2016","urlTitle":"analystperspectives-weekly-scan-covers-analyst-commentary","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analyst7.jpg","groupId":53319,"channel":"CLOUD","description":"Here are a few Cloud conversations from this week, covering Amazon Web Services and IBM:\n\nAWS Dominance Gives Rise to Differentiation in Public Cloud Provider Strategies | Saugatuck Technology - Wed, 20 Jul 2016 |Bruce Guptill","dateTimeMS":1469564820000,"title":"AnalystPerspectives Weekly Scan covers analyst commentary","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=analystperspectives-weekly-scan-covers-analyst-commentary","target":"_blank","peerReviewed":false,"subType":"","id":55180415,"orderField":0},{"dateTime":"Friday, Jul 29, 2016","urlTitle":"smart-appliances-are-on-the-rise","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/neal.jpg","groupId":7989281,"channel":"","description":"Washers of the world, unite! While that\u2019s taking a bit of poetic license from the famous rallying cry in the 1848 Communist Manifesto by Karl Marx and Friedrich Engels, advances in smart appliances may someday have washers from Halifax to Harare talking to each other.","dateTimeMS":1469827620000,"title":"Smart Appliances Are on the Rise","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=smart-appliances-are-on-the-rise","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55187929,"orderField":0},{"dateTime":"Monday, Aug 1, 2016","urlTitle":"diversify-to-survive-apple-on-the-defensive","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/apple.png","groupId":54174376,"channel":"","description":"While Apple\u2019s profits have hit record levels recently, the writing has been on the wall as the competition from Asia in particular begins to produce much improved products at lower prices. With Apple\u2019s quarterly profits and revenues down, the change in strategy at their primary market matures is becoming less subtle. They need to find the next iPhone, meaning the next big thing. They won\u2019t mind whether it\u2019s a car, a medical device, a wearable, a service, or one of those Jobsian products that we don\u2019t know that we want yet. They will get there, but expect a bumpy ride along the way.","dateTimeMS":1470094440000,"title":"Diversify to Survive: Apple on the Defensive","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=diversify-to-survive-apple-on-the-defensive","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55217886,"orderField":0},{"dateTime":"Thursday, Aug 4, 2016","urlTitle":"analystperspectives-weekly-s-40","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analyst7.jpg","groupId":53319,"channel":"INSIGHTS","description":"The big news this week is Oracle\u2019s acquisition of NetSuite. The idea of ERP in the Cloud calls for a lot of analyst conversations:\n\nOracle is shifting its Cloud ERP strategy with Netsuite bid | Pierre Audoin Consultants (PAC) - Fri, 29 Jul 2016 |Frank Niemann, Ronny Hirono","dateTimeMS":1470348420000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-40","target":"_blank","peerReviewed":false,"subType":"","id":55195414,"orderField":0},{"dateTime":"Friday, Aug 5, 2016","urlTitle":"better-faster-systems-with-heterogeneous-design","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/hsa.jpg","groupId":54930593,"channel":"","description":"Heterogeneous systems typically consist of a CPU, GPU and other accelerator devices, all of which are integrated in a single platform with a shared high-bandwidth memory system. The special accelerators are used to obtain both power and performance benefits. While the shared memory system eliminates data copies between the CPU and accelerator-owned memory, the different memory access models for most of the accelerators (e.g. for cache coherency) may still result in \u201cexpensive\u201d software synchronization overhead when passing data between the different system components.","dateTimeMS":1470428280000,"title":"Better, Faster Systems with Heterogeneous Design","type":"article","subCategories":"","url":"/web/hsa-connections/content?g=54930593&type=article&urlTitle=better-faster-systems-with-heterogeneous-design","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55534414,"orderField":0},{"dateTime":"Monday, Aug 8, 2016","urlTitle":"how-can-virtualization-prevent-life-threatening-iot-attacks-open-source-hypervisor-for-iot-security-stops-lateral-movement","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/swift-thumb.jpg","groupId":8459902,"channel":"","description":"Compared to the coverage data breaches receive, reporting on IoT flaws has been relatively sparse, despite some major research appearing of late which exposes the potentially life-threatening nature of security problems in embedded computing systems.\n\nThese flaws haven\u2019t been exploited on a large scale yet because they require a great deal of time and effort to exploit, but there are already signs this is changing. Governments in particular have both the time and resources. A power outage attack on the Ukrainian grid just before Christmas involved hackers overwriting firmware at multiple substations, rendering them unable to receive commands. It has been widely blamed on Russian state actors, although definitive attribution remains difficult.","dateTimeMS":1470698760000,"title":"How Can Virtualization Prevent Life-Threatening IoT Attacks? Open Source Hypervisor for IoT Security Stops Lateral Movement","type":"article","subCategories":"","url":"/web/prpl-matters/content?g=8459902&type=article&urlTitle=how-can-virtualization-prevent-life-threatening-iot-attacks-open-source-hypervisor-for-iot-security-stops-lateral-movement","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55215470,"orderField":0},{"dateTime":"Tuesday, Aug 9, 2016","urlTitle":"key-benefits-of-cloud-based-paperless-technology","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/cloudhosting-thumb.jpg","groupId":53319,"channel":"CLOUD","description":"While a completely paperless approach might not be possible yet, the paperless technologies are already having significant impacts on the traditional businesses. A paperless environment is beneficial for both the company and the environment. Here are the most prominent ways about how cloud-based paperless technology is changing traditional businesses.","dateTimeMS":1470784920000,"title":"Key Benefits of Cloud-based, Paperless Technology","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=key-benefits-of-cloud-based-paperless-technology","target":"_blank","peerReviewed":false,"subType":"","id":55199949,"orderField":0},{"dateTime":"Monday, Aug 15, 2016","urlTitle":"graphene-to-drive-innovation-in-next-gen-displays-possibilities-range-from-display-backplanes-to-touch-layers","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/roni1.jpg","groupId":55151125,"channel":"","description":"Graphene is an emerging material with the potential to revolutionize whole industries. It could someday change the way electronic components are made, create batteries that charge in minutes and last longer, improve computing speed and performance, bring about advances in solar cells and much more. Researchers and companies alike are working tirelessly to harness graphene\u2019s incredible attributes to make real-world applications, and the race seems hotter than ever.","dateTimeMS":1471296360000,"title":"Graphene to Drive Innovation in Next-Gen Displays - Possibilities range from display backplanes to touch layers","type":"article","subCategories":"","url":"/web/sid-dispatch/content?g=55151125&type=article&urlTitle=graphene-to-drive-innovation-in-next-gen-displays-possibilities-range-from-display-backplanes-to-touch-layers","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55206574,"orderField":0},{"dateTime":"Friday, Aug 19, 2016","urlTitle":"wearables-what-s-really","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/body.jpg","groupId":55151125,"channel":"","description":"Are consumers becoming jaded by all the wearables products out in the marketplace now? Has all the hype and fancy buzzwords met expectations? The jury\u2019s still out but the wearables market, nonetheless, continues to grow.","dateTimeMS":1471629180000,"title":"Wearables: What\u2019s Really Catching on with Consumers?","type":"article","subCategories":"","url":"/web/sid-dispatch/content?g=55151125&type=article&urlTitle=wearables-what-s-really","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55225047,"orderField":0},{"dateTime":"Friday, Aug 19, 2016","urlTitle":"6-ways-to-effectively-manage-your-remote-workers","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/remote.jpg","groupId":53319,"channel":"CAREERS","description":"emote work becomes more popular with each passing year, with 37 percent of workers now saying they telecommute. Businesses now realize they can use a combination of salaried and contract workers to save money and access a wider talent pool. Even companies that rely solely on salaried workers can save money by allowing employees to work from home.","dateTimeMS":1471646160000,"title":"6 Ways to Effectively Manage Your Remote Workers","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=6-ways-to-effectively-manage-your-remote-workers","target":"_blank","peerReviewed":false,"subType":"","id":55215337,"orderField":0},{"dateTime":"Friday, Aug 19, 2016","urlTitle":"analystperspectives-weekly-s-41","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"Security of information is a popular topic this week. Find these headlines and more in the Data, Big Data & Digital Assets section:\n\nData encryption must be a priority for the digital business | Ovum - Wed, 10 Aug 2016 |Richard Edwards","dateTimeMS":1471646760000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-41","target":"_blank","peerReviewed":false,"subType":"","id":55215450,"orderField":0},{"dateTime":"Tuesday, Oct 4, 2016","urlTitle":"mixed-up-about-reality-you-should-be","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/head3.jpg","groupId":54397843,"channel":"","description":"We\u2019ve had VR, we\u2019ve had AR, then came MR and it\u2019s getting pretty hard to keep all these various realities sorted out. It\u2019s the prefix that has so many people confused, smart people, technical people, and naturally marketing people who are confused most of the time while proclaiming just the opposite. Reality has never been easy, right?","dateTimeMS":1475613000000,"title":"Mixed up about reality\u2014you should be","type":"article","subCategories":"","url":"/web/chasing-pixels-finding-gems/content?g=54397843&type=article&urlTitle=mixed-up-about-reality-you-should-be","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55465211,"orderField":0},{"dateTime":"Wednesday, Aug 24, 2016","urlTitle":"the-rise-of-social-electronic-cash","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/cash.JPG","groupId":53319,"channel":"INSIGHTS","description":"The way you can pay for goods and services continues to evolve, including new types of currency and a variety of different platforms not to mention new contactless technology, mobile payments, and digital wallets. These new payment options have helped provide new opportunities for many people and businesses to conduct transactions online that may not want to use, or can\u2019t access, some other traditional payment forms like debit and credit cards.","dateTimeMS":1472076180000,"title":"The Rise of Social Electronic Cash","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=the-rise-of-social-electronic-cash","target":"_blank","peerReviewed":false,"subType":"","id":55226985,"orderField":0},{"dateTime":"Wednesday, Aug 24, 2016","urlTitle":"tomorrow-s-vehicles-will-feature-an-array-of-displays","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/display.JPG","groupId":55151125,"channel":"","description":"Automotive displays can allow us to drive better, smarter and more carefully, working in tandem with the many sensors and cameras being designed into new vehicles as part of advanced driver assistance system (ADAS) technology.\n\nSo what kind of display(s) will see you over the next few years?","dateTimeMS":1472077380000,"title":"Tomorrow\u2019s Vehicles Will Feature an Array of Displays","type":"article","subCategories":"","url":"/web/sid-dispatch/content?g=55151125&type=article&urlTitle=tomorrow-s-vehicles-will-feature-an-array-of-displays","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55226965,"orderField":0},{"dateTime":"Thursday, Aug 25, 2016","urlTitle":"analyst-perspectiv-8","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analyst7.jpg","groupId":53319,"channel":"INSIGHTS","description":"Intel held its Developer Forum, and here are some analyst thoughts on the event, from the Enterprise Applications section:\n\nIntel Developer Forum 2016: Are You Ready for a Revolution? | Enderle Group - Tue, 16 Aug 2016 |Rob Enderle","dateTimeMS":1472155740000,"title":"Analyst Perspectives","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-perspectiv-8","target":"_blank","peerReviewed":false,"subType":"","id":55227045,"orderField":0},{"dateTime":"Thursday, Aug 25, 2016","urlTitle":"digital-trading-cards-growing-in-popularity-bubble-gum-not-included","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/card.JPG","groupId":7989281,"channel":"","description":"I never threw out my extensive baseball card collection. \n\nWhile I don\u2019t have a T206 Honus Wagner American Tobacco Company card (sold for $2.8 million in August 2007) or a Topps 1952 Mickey Mantle rookie year card (sold by Dallas-based Heritage Auctions in December 2015 to an anonymous collector for $525,800), the collection has increased in value over the years as it sits in multiple shoe boxes silently stuffed away in a corner of a closet.\n\nNot surprisingly, in today\u2019s digital age, sports card collecting has also gone digital over the past few years and those of us that still have paper card collections are becoming an endangered species. You no longer get a stick of Bazooka bubble gum to chew for hours on end, but the flip side is that a memorable sports moment can immediately be available online and downloaded.","dateTimeMS":1472156040000,"title":"Digital Trading Cards Growing in Popularity \u2013 Bubble Gum Not Included","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=digital-trading-cards-growing-in-popularity-bubble-gum-not-included","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55246002,"orderField":0},{"dateTime":"Tuesday, Aug 30, 2016","urlTitle":"cyclomatic-complexity-40-years-later","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ebert1.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"The criticality and risk of software is defined by its complexity. Forty years ago, McCabe introduced his famous cyclomatic complexity (CC) metric. Today, it is still one of the most popular and meaningful measurements for analyzing code. Read this blog about the measurement and its value for improving code quality and maintainability...","dateTimeMS":1472590140000,"title":"Cyclomatic Complexity \u2013 40 Years Later","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=cyclomatic-complexity-40-years-later","target":"_blank","peerReviewed":false,"subType":"","id":55252908,"orderField":0},{"dateTime":"Wednesday, Aug 31, 2016","urlTitle":"global-quantum-dots-market-poised-for-rapid-growth-array-of-applications-range-from-signage-to-monitors-to-tv","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/glow2.jpg","groupId":55151125,"channel":"","description":"Liquid Crystal Display (LCD) is currently the dominant technology used in television displays, and represents more than 90 percent of the market. LCDs enabled flat-panel televisions that were slimmer and lighter than cathode ray tubes (CRT) and resulted in the eventual phasing-out of CRTs. Although LCDs steadily gained popularity and market share since its introduction in the 1998 and eventually surpassed CRT sales in 2007, other competing technologies such as Organic LED (OLED) have emerged in the last decade that have capitalized on the limitations of LCDs. Quantum Dots have enabled LCD to defend its dominant market position by improving one of the key weaknesses of LCD \u2013 its poorer color gamut.","dateTimeMS":1472675100000,"title":"Global Quantum Dots Market Poised for Rapid Growth Array of Applications Range from Signage to Monitors to TV","type":"article","subCategories":"","url":"/web/sid-dispatch/content?g=55151125&type=article&urlTitle=global-quantum-dots-market-poised-for-rapid-growth-array-of-applications-range-from-signage-to-monitors-to-tv","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55437921,"orderField":0},{"dateTime":"Sunday, Aug 28, 2016","urlTitle":"devops-practi-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ebert1.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"DevOps breaks organizational silos and thus accelerates delivery. DevOps principles apply not only for cloud and IT services but for most industries, including critical systems. Read the blog and learn from a recent case study of using DevOps methodologies in critical domains...","dateTimeMS":1472420940000,"title":"DevOps Practice","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=devops-practi-1","target":"_blank","peerReviewed":false,"subType":"","id":55252788,"orderField":0},{"dateTime":"Tuesday, Sep 6, 2016","urlTitle":"display-solutions-for-the-mid-volume-oem-your-way-customization-options-for-fitting-your-production-needs","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/PD8.jpg","groupId":53319,"channel":"BIG DATA","description":"One of the most common misconceptions about display customization among engineers and procurement team members is custom displays cost more. But the opposite is most often true.","dateTimeMS":1473201840000,"title":"Display Solutions for the Mid-Volume OEM...Your Way - Customization Options for Fitting Your Production Needs","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=display-solutions-for-the-mid-volume-oem-your-way-customization-options-for-fitting-your-production-needs","target":"_blank","peerReviewed":false,"subType":"","id":55251136,"orderField":0},{"dateTime":"Wednesday, Sep 7, 2016","urlTitle":"analyst-perspectiv-9","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending September 02, 2016\nVMWorld took place this week, and here are some of the analyst insights you can find in the Enterprise Applications section:\n\nAutomating the Integration at VMWorld 2016 | Aberdeen Group - Wed, 31 Aug 2016 |Jim Rapoza","dateTimeMS":1473275100000,"title":"Analyst Perspectives","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-perspectiv-9","target":"_blank","peerReviewed":false,"subType":"","id":55251110,"orderField":0},{"dateTime":"Wednesday, Sep 7, 2016","urlTitle":"electricity-from-smart-elastic","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/pharrop.jpg","groupId":54174376,"channel":"","description":"The commercial success of energy harvesting has been almost entirely based on variants of the electric motor and the silicon solar cell. That spans from the bicycle dynamo and wind turbine to the solar roof and solar wristwatch. Nonetheless, off-grid creation of electricity where it is needed and with no emissions should be a market of more than a few billions of dollars \u2013 it could be one hundred times that.","dateTimeMS":1473281100000,"title":"Electricity from Smart Elastic","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=electricity-from-smart-elastic","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55251163,"orderField":0},{"dateTime":"Thursday, Sep 1, 2016","urlTitle":"devops-practice","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ebert-thumb.jpg","groupId":5954967,"channel":"","description":"DevOps breaks organizational silos and thus accelerates delivery. DevOps principles apply not only for cloud and IT services but for most industries, including critical systems. Read the blog and learn from a recent case study of using DevOps methodologies in critical domains...","dateTimeMS":1472762280000,"title":"DevOps Practice","type":"article","subCategories":"","url":"/web/software-technologies/content?g=5954967&type=article&urlTitle=devops-practice","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55253024,"orderField":0},{"dateTime":"Wednesday, Sep 7, 2016","urlTitle":"cyclomatic-complexity-40-years-later","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ebert-thumb.jpg","groupId":5954967,"channel":"","description":"The criticality and risk of software is defined by its complexity. Forty years ago, McCabe introduced his famous cyclomatic complexity (CC) metric. Today, it is still one of the most popular and meaningful measurements for analyzing code. Read this blog about the measurement and its value for improving code quality and maintainability...","dateTimeMS":1473306120000,"title":"Cyclomatic Complexity \u2013 40 Years Later","type":"article","subCategories":"","url":"/web/software-technologies/content?g=5954967&type=article&urlTitle=cyclomatic-complexity-40-years-later","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55256809,"orderField":0},{"dateTime":"Saturday, Sep 10, 2016","urlTitle":"ewriting-technology-indispensable-and-sustainable-for-21st-century-businesses-schools-consumers-and-communities","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/sid1.jpg","groupId":55151125,"channel":"","description":"In your next meeting, notice how many people use pen and paper to take notes \u2013 despite access to smartphones, laptops and other communication technology. You are witnessing the power and durability of handwriting. Now technology experts in academia and industry are developing tools to integrate handwriting into digital communications, and have spawned revolutionary solutions in the new category of \u201ceWriting.\u201d","dateTimeMS":1473528720000,"title":"eWriting Technology: Indispensable and Sustainable for 21st Century Businesses, Schools, Consumers and Communities","type":"article","subCategories":"","url":"/web/sid-dispatch/content?g=55151125&type=article&urlTitle=ewriting-technology-indispensable-and-sustainable-for-21st-century-businesses-schools-consumers-and-communities","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55254858,"orderField":0},{"dateTime":"Tuesday, Sep 13, 2016","urlTitle":"analystperspectives-weekly-s-42","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"The Internet of Things and Intelligent Assistance are just two of the topics you will find being discussed in the Mobile & Broadband section:\n\nAnd nearby somebody finally gets it \u2013 new interaction programming models | RedMonk - Fri, 09 Sep 2016 |James Governor","dateTimeMS":1473795420000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-42","target":"_blank","peerReviewed":false,"subType":"","id":55257682,"orderField":0},{"dateTime":"Thursday, Sep 15, 2016","urlTitle":"5-trends-shaping-the-trajectory-of-ecommerce","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/larryalton.jpg","groupId":53319,"channel":"MOBILE","description":"As ecommerce continues to become an even larger part of the global marketplace, we\u2019re beginning to see some new developments take shape. These trends are making ecommerce more cost-effective, efficient, and profitable for both businesses and their consumers.","dateTimeMS":1473982800000,"title":"5 Trends Shaping the Trajectory of Ecommerce","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=5-trends-shaping-the-trajectory-of-ecommerce","target":"_blank","peerReviewed":false,"subType":"","id":55259835,"orderField":0},{"dateTime":"Sunday, Sep 18, 2016","urlTitle":"speaker-steven-bay-presents-edward-snowden-and-defending-against-the-insider-threat-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/snowden.jpg","groupId":53319,"channel":"SECURITY","description":"IEEE Computer Society Rockstars of Cybersecurity: Threats and Counter Measures Symposium\nSeptember 13, 2016, Seattle,Washington\n\nSpeaker Steven Bay Presents \"Edward Snowden and Defending Against the Insider Threat\"\n\nSteven Bay was Edward Snowden's boss. This is his personal account of how Edward Snowden was hired, behaved, how he got access to files and suggestion on how you can protect your company or organization.","dateTimeMS":1474235820000,"title":"Speaker Steven Bay Presents \"Edward Snowden and Defending Against the Insider Threat\"","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=speaker-steven-bay-presents-edward-snowden-and-defending-against-the-insider-threat-","target":"_blank","peerReviewed":false,"subType":"","id":55261958,"orderField":0},{"dateTime":"Thursday, Sep 29, 2016","urlTitle":"energy-storage-innovations-may-finally-bring-about-the-holy-grail-of-batteries","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/energy1.jpg","groupId":54174376,"channel":"","description":"The future of the energy, mobility, electronics, and communications industry will be strongly shaped by the development of one key enabling technology, that is, energy storage. At the historical tipping point of structural change in these sectors there has never been a better time for a dedicated forum on energy storage as key enabling technology.","dateTimeMS":1475178780000,"title":"Energy Storage Innovations May Finally Bring About the \u2018Holy Grail\u2019 of Batteries","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=energy-storage-innovations-may-finally-bring-about-the-holy-grail-of-batteries","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55279693,"orderField":0},{"dateTime":"Tuesday, Sep 20, 2016","urlTitle":"how-google-fiber-inspired-the-creation-of-one-of-the-world-s-top-tech-conferences-kansas-city-home-to-jazz-the-royals-2015-world-series-champions-and-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/drew.jpg","groupId":53319,"channel":"MOBILE","description":"Kansas City: home to Jazz, the Royals (2015 World Series Champions) and BBQ.\n\nFor the past few years, it's also been the envy of the tech world with first access to Google Fiber..... eliminating all perception as just \"flyover country\".\n\nHaving initial dibs on this gigabit speed internet not only helped elevate KC as a top tech hub, it brought jobs, startups and created a buzz that can't be quantified.\n\nThis journey all started with a challenge from Google: \"What would you do with internet 100x faster?\"","dateTimeMS":1474402560000,"title":"How Google Fiber Inspired The Creation Of One Of The World\u2019s Top Tech Conferences","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=how-google-fiber-inspired-the-creation-of-one-of-the-world-s-top-tech-conferences-kansas-city-home-to-jazz-the-royals-2015-world-series-champions-and-","target":"_blank","peerReviewed":false,"subType":"","id":55264142,"orderField":0},{"dateTime":"Tuesday, Sep 20, 2016","urlTitle":"7-startups-changing-their-field-for-the-better","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/drew.jpg","groupId":53319,"channel":"STARTUPS","description":"Until the past decade or so, large corporations dominated most industries. Change was gradual and consumer opinions were rarely considered. However, the internet has completely upended traditional ways of doing business. Instead of one company\u2019s CEO and board of directors deciding what direction an industry will go next, now a group of startups in each industry are making bold, innovative improvements that push corporations to make their own changes to remain competitive.","dateTimeMS":1474403280000,"title":"7 Startups Changing Their Field for the Better","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=7-startups-changing-their-field-for-the-better","target":"_blank","peerReviewed":false,"subType":"","id":55264116,"orderField":0},{"dateTime":"Wednesday, Sep 21, 2016","urlTitle":"analystperspectives-weekly-s-43","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analyst7.jpg","groupId":53319,"channel":"INSIGHTS","description":"Discussions about Cloud Computing are taking a variety of shapes this week. Here are just a few for you to check out:\n\nManaging your Cloud\u2019s Lifecycle | Storage Switzerland, LLC - Thu, 15 Sep 2016 |Joseph Ortiz","dateTimeMS":1474492200000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-43","target":"_blank","peerReviewed":false,"subType":"","id":55265525,"orderField":0},{"dateTime":"Thursday, Sep 22, 2016","urlTitle":"apple-s-missing-headphone-jack-and-why-innovation-requires-discomfort","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/Alton.jpg","groupId":53319,"channel":"MOBILE","description":"Apple has unveiled its latest model of iPhone, the iPhone 7, and it carries with it a host of nifty new features you\u2019d come to expect from the tech giant\u2019s landmark product. However, one new feature seems to stand out more than the others when it comes to public attention and scrutiny; the traditional 3.5 mm headphone jack, long a staple for phones and similar audio devices, has been removed.","dateTimeMS":1474575060000,"title":"Apple's Missing Headphone Jack and Why Innovation Requires Discomfort","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=apple-s-missing-headphone-jack-and-why-innovation-requires-discomfort","target":"_blank","peerReviewed":false,"subType":"","id":55266649,"orderField":0},{"dateTime":"Thursday, Sep 29, 2016","urlTitle":"warehouse-robots-boosting-productivity-and-they-don-t-call-in-sick","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/neal.jpg","groupId":7989281,"channel":"","description":"hey never take a vacation day. In fact, they work 24/7 in the warehouse with nary a complaint. They don\u2019t kvetch about the rising cost of healthcare insurance. And other than initially programming them, they don\u2019t need any extensive training.\n\nWarehouse robots are growing in popularity and are already causing an upheaval in the industry. Steve Vairma, who heads up the International Brotherhood of Teamsters, which represents 122,000 grocery-warehouse workers, said \u201cemployers are looking to move more and more into automation and we\u2019re going to be faced with those challenges in contract negotiations in coming years.\u201d","dateTimeMS":1475186760000,"title":"Warehouse Robots Boosting Productivity \u2013 and They Don\u2019t Call in Sick","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=warehouse-robots-boosting-productivity-and-they-don-t-call-in-sick","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55288836,"orderField":0},{"dateTime":"Monday, Oct 3, 2016","urlTitle":"millennials-discovering-buying-new-works-of-art-online","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/neal.jpg","groupId":7989281,"channel":"","description":"It should come as no surprise - Millennials grab most of their info online \u2013 and via smartphones. And that extends to how they discover works of art. To further corroborate this, Invaluable, an online marketplace for fine art, antiques and collectibles, conducted a survey earlier this year entitled \u2018American Attitudes Toward Art.\u2019\n\nSome interesting survey findings:","dateTimeMS":1475537100000,"title":"Millennials Discovering, Buying New Works of Art Online","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=millennials-discovering-buying-new-works-of-art-online","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55286611,"orderField":0},{"dateTime":"Monday, Oct 3, 2016","urlTitle":"the-tech-industry-has-seen-a-huge-rise-of-remote-work-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ellie.jpg","groupId":53319,"channel":"CAREERS","description":"It\u2019s no exaggeration to say that the tech industry is booming these days. Statistics show that between 2004 and 2014, jobs in the tech industry grew 31% faster than jobs in other high-growth sectors like business services. And given the increasing rate at which technology continues to permeate such huge industries as finance and healthcare, you can bet that this enormous growth rate isn\u2019t showing any signs of slowing down.","dateTimeMS":1475537700000,"title":"Huge Rise in Remote Work in the Tech Industry","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=the-tech-industry-has-seen-a-huge-rise-of-remote-work-","target":"_blank","peerReviewed":false,"subType":"","id":55286687,"orderField":0},{"dateTime":"Tuesday, Oct 4, 2016","urlTitle":"an-open-approach-to-autonomous-vehicl-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/10/T_An-Open-Approach-100x100.jpg","groupId":53319,"channel":"","description":"An open platform of algorithms, software libraries, and datasets allows autonomous vehicle researchers and developers to test performance using a common interface.","dateTimeMS":1475608680000,"title":"An Open Approach to Autonomous Vehicles","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=an-open-approach-to-autonomous-vehicl-1","target":"_blank","peerReviewed":false,"subType":"","id":55288029,"orderField":0},{"dateTime":"Tuesday, Oct 4, 2016","urlTitle":"a-heterogeneous-fleet-of-vehicles-for-automated-humanitarian-missions","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/10/T_A-Heterogeneous-100x100.jpg","groupId":53319,"channel":"","description":"This article presents an automated emergency- response system consisting of a high-level mission optimization and a fleet of heterogeneous autonomous vehicles.","dateTimeMS":1475608740000,"title":"A Heterogeneous Fleet of Vehicles for Automated Humanitarian Missions","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=a-heterogeneous-fleet-of-vehicles-for-automated-humanitarian-missions","target":"_blank","peerReviewed":false,"subType":"","id":55288056,"orderField":0},{"dateTime":"Tuesday, Oct 4, 2016","urlTitle":"design-and-evaluation-of-a-touch-centered-calming-interaction-with-a-social-robot","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/10/T_Design-and-Evaluation-100x100.jpg","groupId":53319,"channel":"","description":"With an approach grounded in social cognitive theories for human-animal relations, researchers developed a social pet robot aimed at helping people manage anxiety.","dateTimeMS":1475608800000,"title":"Design and Evaluation of a Touch-Centered Calming Interaction with a Social Robot","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=design-and-evaluation-of-a-touch-centered-calming-interaction-with-a-social-robot","target":"_blank","peerReviewed":false,"subType":"","id":55288163,"orderField":0},{"dateTime":"Tuesday, Oct 4, 2016","urlTitle":"impact-of-using-an-educational-robot-based-learning-system-on-students-motivation-in-elementary-education","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/10/T_Impact-of-Using-100x100.jpg","groupId":53319,"channel":"","description":"Researchers developed an educational robot-based learning system and found that it improved overall student learning interest and motivation in the classroom.","dateTimeMS":1475608860000,"title":"Impact of Using an Educational Robot-Based Learning System on Students\u2019 Motivation in Elementary Education","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=impact-of-using-an-educational-robot-based-learning-system-on-students-motivation-in-elementary-education","target":"_blank","peerReviewed":false,"subType":"","id":55288110,"orderField":0},{"dateTime":"Tuesday, Oct 4, 2016","urlTitle":"graphical-instruction-for-home-robots","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/10/T_Graphical-Instruction-100x100.jpg","groupId":53319,"channel":"","description":"Three research projects demonstrate proof-of-concept prototypes and showcase the future of home robots and their interaction design.","dateTimeMS":1475608920000,"title":"Graphical Instruction for Home Robots","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=graphical-instruction-for-home-robots","target":"_blank","peerReviewed":false,"subType":"","id":55288137,"orderField":0},{"dateTime":"Tuesday, Oct 4, 2016","urlTitle":"a-new-design-of-in-memory-file-system-based-on-file-virtual-address-framework","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/10/W_A-New-Design-100x100.jpg","groupId":53319,"channel":"","description":"This paper presents a framework based on a new concept, \u201cFile Virtual Address Space\u201d. A file system, Sustainable In-Memory File System (SIMFS), is designed and implemented, which fully utilizes the memory mapping hardware at the file access path. First, SIMFS embeds the address space of an open file into the process\u2019 address space. Then, file accesses are handled by the memory mapping hardware. Several optimization approaches are also presented for the proposed SIMFS. Extensive experiments are conducted. The experimental results show that the throughput of SIMFS achieves significant performance improvement over the state-of-the-art in-memory file systems.","dateTimeMS":1475627580000,"title":"A New Design of In-Memory File System Based on File Virtual Address Framework","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=a-new-design-of-in-memory-file-system-based-on-file-virtual-address-framework","target":"_blank","peerReviewed":false,"subType":"","id":55289030,"orderField":0},{"dateTime":"Wednesday, Oct 5, 2016","urlTitle":"robotic-agriculture-the-battle-between-the-big-and-the-small-part-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/tractor.jpg","groupId":54174376,"channel":"","description":"Agricultural robotics can upend several commonly-held notions. Amongst them is the idea that big is better. In practice this has translated into ever larger and more powerful agricultural machinery. This makes sense because a big machine amplifies the capabilities of the skilled driver, dramatically boosting its productivity. This notion may however be about to experience a fundamental change. The reason is that the driver can now finally be taken totally out of the equation.","dateTimeMS":1475701320000,"title":"Robotic Agriculture: The Battle Between the Big and the Small/Part 1","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=robotic-agriculture-the-battle-between-the-big-and-the-small-part-1","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55291417,"orderField":0},{"dateTime":"Wednesday, Oct 5, 2016","urlTitle":"finding-the-social-networking-job-you-want","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/social.jpg","groupId":54960830,"channel":"","description":"Michael Tsikerdekis is an assistant professor in information and communications technology at the University of Kentucky, Lexington. His research interests lie in social engineering, data mining, collaboration technologies, and social media design and development. He co-authored the article \u201cDetecting and Preventing Online Identity Deception in Social Networking Services\u201d in the May\u2014June 2015 issue of IEEE Internet Computing. For this issue of ComputingEdge, we asked Tsikerdekis about career opportunities in the field of social networking.","dateTimeMS":1475707260000,"title":"Finding the Social Networking Job You Want","type":"article","subCategories":"","url":"/web/computing-careers/content?g=54960830&type=article&urlTitle=finding-the-social-networking-job-you-want","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55385566,"orderField":0},{"dateTime":"Thursday, Oct 6, 2016","urlTitle":"robotic-agriculture-part-2-data-and-mobility-will-be-critical-factors-for-industry-success","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/tractor.jpg","groupId":54174376,"channel":"","description":"Agrochemicals and old-school machines currently comprise nearly the entire market value in global crop production. A mega shift, however, is underway that will see data acquisition and analytics grab a larger share. Agricultural robots will accelerate this enormous global value chain reconfiguration, bringing the endgame of ultra-precision automated farming ever closer.","dateTimeMS":1475777760000,"title":"Robotic Agriculture/Part 2: Data and Mobility Will Be Critical Factors for Industry Success","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=robotic-agriculture-part-2-data-and-mobility-will-be-critical-factors-for-industry-success","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55381975,"orderField":0},{"dateTime":"Wednesday, Oct 12, 2016","urlTitle":"art-of-hacking","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/art.jpg","groupId":53319,"channel":"SECURITY","description":"Protect your organization from hackers by learning to think like them. Now, for the first time, NotSoSecure has joined forces with IEEE Computer Society to create the first e-learning courses with The Art of Hacking certification course. You and your staff can take these courses where you are and at your own pace, getting hands-on, real-world training that you can put to work immediately.","dateTimeMS":1476302340000,"title":"Art of Hacking","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=art-of-hacking","target":"_blank","peerReviewed":false,"subType":"","id":55313040,"orderField":0},{"dateTime":"Wednesday, Oct 12, 2016","urlTitle":"website-costs-you-can-do-without","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/designer.jpg","groupId":53319,"channel":"CLOUD","description":"It\u2019s no secret that the price for design and development of websites are through the roof. If you fire a contractor or employee with a marketing or other related degree, you\u2019re also paying a premium (albeit likely a worthwhile one if you must hire!). Website costs can range from putting a minor ding in the budget to becoming your CPA\u2019s biggest nightmare. Did you know that there are many little details that not only can you do without, but your customers probably won\u2019t even notice? A lot of businesses are paying for services that are completely unnecessary.","dateTimeMS":1476302700000,"title":"Website Costs You Can Do Without","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=website-costs-you-can-do-without","target":"_blank","peerReviewed":false,"subType":"","id":55310564,"orderField":0},{"dateTime":"Wednesday, Oct 12, 2016","urlTitle":"news-of-the-week-in-review","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"Blackberry\u2019s announcement tops our News of the Week in Review along with other Mobile & Broadband news:\n\nBlackBerry exits hardware as smartphone business turns sour | Ovum - Fri, 30 Sep 2016 |Daniel Gleeson","dateTimeMS":1476303180000,"title":"News of the Week in Review","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=news-of-the-week-in-review","target":"_blank","peerReviewed":false,"subType":"","id":55310591,"orderField":0},{"dateTime":"Wednesday, Oct 12, 2016","urlTitle":"finding-the-emerging-technology-job-you-want","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/emerging.jpg","groupId":54960830,"channel":"","description":"ComputingEdge: What careers in the newest emerging technologies will see the most growth in the next several years?\n\nWilliams: In information technology, I see neuromorphic computing as offering the biggest opportunity for growth the next decade or two. Adapting concepts from the brain for computation will be the key enabler for robotics, the Internet of Things, autonomous vehicles, search, and learning.","dateTimeMS":1476303420000,"title":"Finding the Emerging Technology Job You Want","type":"article","subCategories":"","url":"/web/computing-careers/content?g=54960830&type=article&urlTitle=finding-the-emerging-technology-job-you-want","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55385546,"orderField":0},{"dateTime":"Wednesday, Oct 12, 2016","urlTitle":"finding-the-wearable-technology-job-you-want","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/wear1.jpg","groupId":54960830,"channel":"","description":"ComputingEdge: What careers in wearable technology will see the most growth in the next several years?\n\nSuder: The careers that will see the most growth include those involving cutting-edge wearable development and device management as a service. I think security will also be huge. People worry that their wearable devices will be hacked, which is a significant risk.","dateTimeMS":1476303660000,"title":"Finding the Wearable Technology Job You Want","type":"article","subCategories":"","url":"/web/computing-careers/content?g=54960830&type=article&urlTitle=finding-the-wearable-technology-job-you-want","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55405675,"orderField":0},{"dateTime":"Wednesday, Oct 12, 2016","urlTitle":"analyst-perspecti-10","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analyst7.jpg","groupId":53319,"channel":"INSIGHTS","description":"Data Management and Analytics top the News of the Week in Review along with other Data, Big Data & Digital Assets news:\n\nData Management as a Strategy \u2013 Commvault Go 2016 | Storage Switzerland, LLC Wed, 05 Oct 2016 |George Crump","dateTimeMS":1476307620000,"title":"Analyst Perspectives","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-perspecti-10","target":"_blank","peerReviewed":false,"subType":"","id":55313065,"orderField":0},{"dateTime":"Tuesday, Oct 18, 2016","urlTitle":"security-is-a-people-problem-bringing-the-chro-to-the-table-in-the-cybersecurity-wars","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/greenbaum1.jpg","groupId":6416743,"channel":"","description":"All the attention on whether Russia or some other nation-state entity is trying to hack the election in November or how organized gangs are flooding PCs with ransomware has obscured that truth about where the real threat to our collective cybersecurity comes from: our employees.","dateTimeMS":1476779580000,"title":"Security is a People Problem: Bringing the CHRO to the Table in the Cybersecurity Wars","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=security-is-a-people-problem-bringing-the-chro-to-the-table-in-the-cybersecurity-wars","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55325632,"orderField":0},{"dateTime":"Sunday, Oct 30, 2016","urlTitle":"hsa-helping-to-deliver-more-immersive-and-better-use-cases","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/hsa.jpg","groupId":54930593,"channel":"","description":"At ARM, when we design products, we consider real world use cases first and foremost. If we can do everything possible to ensure our latest CPUs, G","dateTimeMS":1477867380000,"title":"HSA Helping to Deliver More Immersive and Better Use Cases","type":"article","subCategories":"","url":"/web/hsa-connections/content?g=54930593&type=article&urlTitle=hsa-helping-to-deliver-more-immersive-and-better-use-cases","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55534394,"orderField":0},{"dateTime":"Sunday, Oct 30, 2016","urlTitle":"more-than-remote-computer-use-concerns-while-traveling","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/Alton.jpg","groupId":53319,"channel":"CAREERS","description":"The digital revolution has made it easier than ever to work from home or from other remote locations, but professionals who hit the road with their computers in tow also face certain health and security risks that might be avoided if they were based in an office.","dateTimeMS":1477878120000,"title":"More Than Remote: Computer Use Concerns While Traveling","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=more-than-remote-computer-use-concerns-while-traveling","target":"_blank","peerReviewed":false,"subType":"","id":55357108,"orderField":0},{"dateTime":"Monday, Oct 31, 2016","urlTitle":"manipulating-ultra-high-definition-video-traffic","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/11/T_Manipulating-Ultra-100x100.jpg","groupId":53319,"channel":"","description":"The proposed solution uses the scalable extensions of HEVC (SHVC) to efficiently compress, store, and deliver ultra-high definition (UHD) video in a large-scale streaming system.","dateTimeMS":1477946520000,"title":"Manipulating Ultra-High Definition Video Traffic","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=manipulating-ultra-high-definition-video-traffic","target":"_blank","peerReviewed":false,"subType":"","id":55358723,"orderField":0},{"dateTime":"Monday, Oct 31, 2016","urlTitle":"kaas-a-standard-framework-proposal-on-video-skimming","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/11/KaaS-100x100.jpg","groupId":53319,"channel":"","description":"This article argues that video summarization should be a standard service in the face of explosive growth of video content.","dateTimeMS":1477946580000,"title":"KaaS: A Standard Framework Proposal on Video Skimming","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=kaas-a-standard-framework-proposal-on-video-skimming","target":"_blank","peerReviewed":false,"subType":"","id":55358750,"orderField":0},{"dateTime":"Monday, Oct 31, 2016","urlTitle":"service-provisioning-in-content-centric-networking-challenges-opportunities-and-promising-directions","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/11/T_Service-Provisioning-in-Content-100x100.jpg","groupId":53319,"channel":"","description":"Content-centric networking (CCN) can accommodate current network usage patterns better than existing IP networks. CCN features in- network caching, name-based routing, friendly mobility, and built-in security.","dateTimeMS":1477946700000,"title":"Service Provisioning in Content-Centric Networking: Challenges, Opportunities, and Promising Directions","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=service-provisioning-in-content-centric-networking-challenges-opportunities-and-promising-directions","target":"_blank","peerReviewed":false,"subType":"","id":55358884,"orderField":0},{"dateTime":"Monday, Oct 31, 2016","urlTitle":"a-survey-of-pervasive-displays-for-information-presentation","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/11/T_A-Survey-of-Pervasive-100x100.jpg","groupId":53319,"channel":"","description":"Current pervasive display technologies exhibit five emerging trends: situatedness, nonexpert users, accessible interaction, new applications of data, and balancing \"calm\" computing against data presentation.","dateTimeMS":1477946700000,"title":"A Survey of Pervasive Displays for Information Presentation","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=a-survey-of-pervasive-displays-for-information-presentation","target":"_blank","peerReviewed":false,"subType":"","id":55358804,"orderField":0},{"dateTime":"Monday, Oct 31, 2016","urlTitle":"optimizing-the-perceptual-quality-of-real-time-multimedia-applications","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/11/T_Optimizing-the-Perceptual--100x100.jpg","groupId":53319,"channel":"","description":"This article presents a systematic method for finding operating points that achieve good perceptual quality in a real-time multimedia system.","dateTimeMS":1477946760000,"title":"Optimizing the Perceptual Quality of Real-Time Multimedia Applications","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=optimizing-the-perceptual-quality-of-real-time-multimedia-applications","target":"_blank","peerReviewed":false,"subType":"","id":55358904,"orderField":0},{"dateTime":"Monday, Oct 31, 2016","urlTitle":"hbbtv-security-and-privacy-issues-and-challenges","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/11/T_HbbTV-Security-100x100.jpg","groupId":53319,"channel":"","description":"Unlike PCs and mobile devices, smart TVs don't allow consumers to configure privacy and security options. This article considers the implications of this limitation.","dateTimeMS":1477946760000,"title":"HbbTV Security and Privacy: Issues and Challenges","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=hbbtv-security-and-privacy-issues-and-challenges","target":"_blank","peerReviewed":false,"subType":"","id":55358858,"orderField":0},{"dateTime":"Tuesday, Nov 1, 2016","urlTitle":"virtual-cards-today-and-virtual-card-payments-in-the-near-future","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/pay.JPG","groupId":53319,"channel":"SECURITY","description":"Today\u2019s virtual (credit) cards are optimizing safety, allowing for easier employee travel reimbursement, and helping everyone avoid credit card fraud. You can set a limit, an expiration date, and trust that the virtual credit card number is unique from any physical credit cards. Yes, you can only use them for online purchases, but swiping cards is usually reserved for smaller purchases anyway. Virtual cards are rapidly changing how we think of payment processing, but many experts agree virtual cards are really a gateway and transition into virtual card payments of the future.","dateTimeMS":1478028480000,"title":"Virtual Cards Today and Virtual Card Payments in the Near Future","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=virtual-cards-today-and-virtual-card-payments-in-the-near-future","target":"_blank","peerReviewed":false,"subType":"","id":55359925,"orderField":0},{"dateTime":"Friday, Nov 4, 2016","urlTitle":"benchmarking-clarifies-the-future-of-internet-of-things","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/harrop1.jpg","groupId":54174376,"channel":"","description":"IDTechEx has a newly researched report, \"Internet of Things 2017-2027\". Benchmarking what went before, it finds that the most prolific electronic device is the anti-theft tag known as Electronic Article Surveillance (EAS). This is because it is disposable and big retailers and libraries in some countries feel that it deters thieves. Over 10 billion are produced yearly, mostly sold at around one cent apiece. There are three standards impeding sales because tags have to be replaced; and produce, for instance, is often defaced in that process when goods are rerouted to a different retailer.","dateTimeMS":1478297460000,"title":"Benchmarking Clarifies the Future of Internet of Things","type":"article","subCategories":"","url":"/web/idtechex-emerging-technologies/content?g=54174376&type=article&urlTitle=benchmarking-clarifies-the-future-of-internet-of-things","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55365863,"orderField":0},{"dateTime":"Friday, Nov 4, 2016","urlTitle":"analyst-perspecti-11","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"Samsung remains in the news this week following the Note 7 recall. Also, Verizon and Nokia seem to be preparing for 5G. Google and Apple are also making headlines.","dateTimeMS":1478299200000,"title":"Analyst Perspectives","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-perspecti-11","target":"_blank","peerReviewed":false,"subType":"","id":55365890,"orderField":0},{"dateTime":"Monday, Nov 7, 2016","urlTitle":"when-surveillance-is-the-way-in-new-devices-create-security-gaps","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/home1.jpg","groupId":53319,"channel":"SECURITY","description":"Today, smart homes are considered to be the pinnacle of security, but are these new devices causing more harm than good? Though we may think we\u2019re protecting our homes, many people are inadvertently creating new avenues for cyber criminals to enter. These new systems are full of gaps, but unlike with traditional fences and locks, we often can\u2019t see the spaces where criminals are getting through, making them that much harder to thwart.","dateTimeMS":1478552580000,"title":"When Surveillance Is The Way In: New Devices Create Security Gaps","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=when-surveillance-is-the-way-in-new-devices-create-security-gaps","target":"_blank","peerReviewed":false,"subType":"","id":55368632,"orderField":0},{"dateTime":"Thursday, Nov 10, 2016","urlTitle":"6-steps-you-need-to-take-before-hiring-contract-workers","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/drew.jpg","groupId":53319,"channel":"CAREERS","description":"Businesses are increasingly turning to contractors to help them accomplish various tasks. They save money on salaries and benefits and workers enjoy a flexibility they can\u2019t achieve when they\u2019re on the payroll. But finding top contract workers for each position can be complicated, especially for businesses that are new to the process.","dateTimeMS":1478811360000,"title":"6 Steps You Need to Take Before Hiring Contract Workers","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=6-steps-you-need-to-take-before-hiring-contract-workers","target":"_blank","peerReviewed":false,"subType":"","id":55374679,"orderField":0},{"dateTime":"Thursday, Nov 10, 2016","urlTitle":"analystperspectives-weekly-s-44","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analyst7.jpg","groupId":53319,"channel":"CLOUD","description":"Analysts have been busy discussing what the IT future holds in the upcoming year. Read the headlines in the Forecasts & Predictions 2017 section:\n\nForrester Predictions: Ten Key Developments In Cloud Computing Shape The Industry In 2017 |Forrester - Thu, 03 Nov 2016 |Charlie Dai","dateTimeMS":1478811600000,"title":"AnalystPerspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=analystperspectives-weekly-s-44","target":"_blank","peerReviewed":false,"subType":"","id":55374706,"orderField":0},{"dateTime":"Tuesday, Nov 15, 2016","urlTitle":"designing-displays-to-take-the-drop","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/cube1.jpg","groupId":53319,"channel":"MOBILE","description":"Any portable or hand-held device will be dropped. Humans do that. Because LCD displays are made of thin glass and glass can break, we face some design challenges. While making your display unbreakable isn't possible, optimizing drop-test performance with a system level approach will help products pass drop-testing and make your end product far more durable.","dateTimeMS":1479234720000,"title":"Designing Displays to Take the Drop","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=designing-displays-to-take-the-drop","target":"_blank","peerReviewed":false,"subType":"","id":55412623,"orderField":0},{"dateTime":"Tuesday, Nov 15, 2016","urlTitle":"scalable-power-management-for-on-chip","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/11/W_ttc2016113398-100x100.jpg","groupId":53319,"channel":"","description":"We present a scalable Dynamic Power Management (DPM) scheme where malleable applications may change their degree of parallelism at run time depending upon the workload and performance constraints. We employ a per-application predictive\npower manager that autonomously controls the power states of the cores with the goal of energy efficiency.","dateTimeMS":1479240180000,"title":"Scalable Power Management for On-Chip","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=scalable-power-management-for-on-chip","target":"_blank","peerReviewed":false,"subType":"","id":55382372,"orderField":0},{"dateTime":"Wednesday, Nov 16, 2016","urlTitle":"analyst-perspectives-weekly-sc-2","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"SECURITY","description":"ast week\u2019s U.S. Presidential election certainly had the eyes of the world looking on. Analysts had plenty to say about the election, but the discussion was geared mostly toward cybersecurity and data.","dateTimeMS":1479333000000,"title":"Analyst Perspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=analyst-perspectives-weekly-sc-2","target":"_blank","peerReviewed":false,"subType":"","id":55385520,"orderField":0},{"dateTime":"Wednesday, Nov 16, 2016","urlTitle":"finding-the-cybersecurity-job-you-wa-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/cyber1.jpg","groupId":54960830,"channel":"","description":"The rapidly increasing popularity of cloud computing, smartphone technology, big data, and the Internet of Things has made cybersecurity more important than ever. There are thus many opportunities for finding jobs in the field. That is the focus of this month\u2019s article, which features an interview with Hewlett Packard Enterprise research engineer Massimo Felici, who co-authored the article \u201cWhat's New in the Economics of Cybersecurity\u201d in IEEE Security & Privacy\u2019s May/June 2016 issue.","dateTimeMS":1479338460000,"title":"Finding the Cybersecurity Job You Want","type":"article","subCategories":"","url":"/web/computing-careers/content?g=54960830&type=article&urlTitle=finding-the-cybersecurity-job-you-wa-1","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55385707,"orderField":0},{"dateTime":"Friday, Nov 18, 2016","urlTitle":"4-ways-startups-are-helping-their-teams-bonds","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/Alton.jpg","groupId":53319,"channel":"STARTUPS","description":"Startup success is tied to a number of different factors, but it\u2019s hard to deny the importance of a unified team that works together for the common good of the business. That\u2019s why you need to do everything you possibly can to help your team bond from day one.","dateTimeMS":1479515220000,"title":"4 Ways Startups Are Helping Their Teams Bonds","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=4-ways-startups-are-helping-their-teams-bonds","target":"_blank","peerReviewed":false,"subType":"","id":55389331,"orderField":0},{"dateTime":"Monday, Nov 28, 2016","urlTitle":"the-ecosystem-platform-war-how-do-microsoft-salesforce-com-and-sap-stack-up-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/greenbaum2.jpg","groupId":6416743,"channel":"","description":"As the enterprise software market slowly morphs into the enterprise software and platform market, it\u2019s become necessary to carefully define what it means to be a successful platform vendor. Importantly, that definition has nothing to do with technology \u2013 okay, maybe a little \u2013 but it does have a whole lot to do with people and perceptions.","dateTimeMS":1480374180000,"title":"The Ecosystem/Platform War: How do Microsoft, Salesforce.com, and SAP Stack Up?","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=the-ecosystem-platform-war-how-do-microsoft-salesforce-com-and-sap-stack-up-","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55399857,"orderField":0},{"dateTime":"Thursday, Dec 1, 2016","urlTitle":"a-look-at-the-5-biggest-challenges-facing-the-web-development-industry","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/Alton.jpg","groupId":53319,"channel":"CLOUD","description":"When you look at the country\u2019s fastest growing industries, web development is always ranked near the top. But just because it\u2019s a fast-growing industry with lots of demand doesn\u2019t mean there aren\u2019t issues facing developers on a daily basis.\n\nHere are Five Challenges Developers are Working Through","dateTimeMS":1480615860000,"title":"A Look at the 5 Biggest Challenges Facing the Web Development Industry","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=a-look-at-the-5-biggest-challenges-facing-the-web-development-industry","target":"_blank","peerReviewed":false,"subType":"","id":55405641,"orderField":0},{"dateTime":"Thursday, Dec 1, 2016","urlTitle":"analyst-perspectives-weekly-sc-3","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"CLOUD","description":"The holiday shopping season remains a hot topic amongst analysts. Black Friday began on Thanksgiving and there were many deals to be had. Here are a few highlights from our Retail section:\n\nBlack Thursday Turns Black Friday Grey |The NPD Group - Fri, 25 Nov 2016 |Marshal Cohen","dateTimeMS":1480626660000,"title":"Analyst Perspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=analyst-perspectives-weekly-sc-3","target":"_blank","peerReviewed":false,"subType":"","id":55406004,"orderField":0},{"dateTime":"Monday, Dec 5, 2016","urlTitle":"a-mobile-multi-technology-gateway-to-enable-iot-interoperability","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/12/T_A-Mobile-Multi-100x100.jpg","groupId":53319,"channel":"","description":"This paper proposes a unified, extendable smartphone software architecture for \"thing\" discovery and management, as well as for data collection, processing, and forwarding.","dateTimeMS":1480981320000,"title":"A Mobile Multi-Technology Gateway to Enable IoT Interoperability","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=a-mobile-multi-technology-gateway-to-enable-iot-interoperability","target":"_blank","peerReviewed":false,"subType":"","id":55411879,"orderField":0},{"dateTime":"Monday, Dec 5, 2016","urlTitle":"automation-4-productivity-tips-for-remote-workers","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/elle.jpg","groupId":53319,"channel":"INSIGHTS","description":"In the past year, I\u2019ve lived and worked in 18 different cities around the world. At first, I was wary of remote working. Would I remain productive? Can I actually collaborate with my coworkers halfway around the world? The answer to all of those questions is assuredly yes, and now I consider myself lucky to be a part of the remote workforce.","dateTimeMS":1480967280000,"title":"Automation: 4 Productivity Tips for Remote Workers","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=automation-4-productivity-tips-for-remote-workers","target":"_blank","peerReviewed":false,"subType":"","id":55411960,"orderField":0},{"dateTime":"Monday, Dec 5, 2016","urlTitle":"impact-of-sdn-on-mobility-management","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/12/T_Impact-of-SDN-100x100.jpg","groupId":53319,"channel":"","description":"This paper shows that a Software Defined Network (SDN) mobility service can be implemented without an IP mobility protocol and provide some performance gain.","dateTimeMS":1480981380000,"title":"Impact of SDN on Mobility Management","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=impact-of-sdn-on-mobility-management","target":"_blank","peerReviewed":false,"subType":"","id":55412706,"orderField":0},{"dateTime":"Monday, Dec 5, 2016","urlTitle":"mosden-an-internet-of-things-middleware-for-resource-constrained-mobile-devices","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/12/T_MOSDEN-100x100.jpg","groupId":53319,"channel":"","description":"A new plug-in-based IoT middleware for mobile devices allows for collecting and processing sensor data without programming efforts.","dateTimeMS":1480981440000,"title":"MOSDEN: An Internet of Things Middleware for Resource Constrained Mobile Devices","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=mosden-an-internet-of-things-middleware-for-resource-constrained-mobile-devices","target":"_blank","peerReviewed":false,"subType":"","id":55412733,"orderField":0},{"dateTime":"Monday, Dec 5, 2016","urlTitle":"event-driven-soa-for-iot-services","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/12/T_Event-Driven-100x100.jpg","groupId":53319,"channel":"","description":"In a new event-driven service-oriented architecture (EDSOA) for IoT services, distributed events act as a mechanism for coordinating independent services.","dateTimeMS":1480981440000,"title":"Event-Driven SOA for IoT Services","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=event-driven-soa-for-iot-services","target":"_blank","peerReviewed":false,"subType":"","id":55412760,"orderField":0},{"dateTime":"Monday, Dec 5, 2016","urlTitle":"connected-smart-cities-interoperability-with-seg-3-0-for-the-internet-of-things","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/12/T_Connected-Smart-Cities-100x100.jpg","groupId":53319,"channel":"","description":"A new methodology federates, unifies, and provides semantic interoperability among IoT devices. This paper presents use cases for smart cities as proof of concept.","dateTimeMS":1480981500000,"title":"Connected Smart Cities: Interoperability with SEG 3.0 for the Internet of Things","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=connected-smart-cities-interoperability-with-seg-3-0-for-the-internet-of-things","target":"_blank","peerReviewed":false,"subType":"","id":55412787,"orderField":0},{"dateTime":"Monday, Dec 5, 2016","urlTitle":"trust-management-framework-for-internet-of-things","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/12/T_Trust-Management-100x100.jpg","groupId":53319,"channel":"","description":"Agents in IoT systems must collaborate based on predefined protocols, and a trust management framework can help them evaluate trustworthiness and reduce analysis errors.","dateTimeMS":1480981560000,"title":"Trust Management Framework for Internet of Things","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=trust-management-framework-for-internet-of-things","target":"_blank","peerReviewed":false,"subType":"","id":55412814,"orderField":0},{"dateTime":"Monday, Dec 5, 2016","urlTitle":"analytical-processor-performance-and-power-modeling-using-micro-architecture-independent-characteristics","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2016/12/W_Analytical-Processor-Performance-100x100.jpg","groupId":53319,"channel":"","description":"Optimizing processors for (a) specific application(s) can substantially improve energy-efficiency. With the end of Dennard scaling, and the corresponding reduction in energy-efficiency gains from technology scaling, such approaches may become increasingly important. However, designing application-specific processors requires fast design space exploration tools to optimize for the targeted application(s). Analytical models can be a good fit for such design space exploration as they provide fast performance and power estimates and insight into the interaction between an application\u2019s characteristics and the micro- architecture of a processor.","dateTimeMS":1480981560000,"title":"Analytical Processor Performance and Power Modeling Using Micro-Architecture Independent Characteristics","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=analytical-processor-performance-and-power-modeling-using-micro-architecture-independent-characteristics","target":"_blank","peerReviewed":false,"subType":"","id":55412841,"orderField":0},{"dateTime":"Wednesday, Dec 7, 2016","urlTitle":"7-startups-in-healthcare-improving-the-system","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/drew.jpg","groupId":53319,"channel":"STARTUPS","description":"ccording to TIME Magazine, the American healthcare system is the worst amongst the 11 wealthiest nations, and that\u2019s even after relative improvements following the Affordable Care Act. However, there\u2019s a silver lining amidst the surge of startups and small businesses, a sector which enjoyed a healthy boom following the 2009 Great Recession. Startups in healthcare have the ability to improve the system, and they\u2019ve been doing so at an impressive clip.","dateTimeMS":1481150520000,"title":"7 Startups In Healthcare Improving The System","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=7-startups-in-healthcare-improving-the-system","target":"_blank","peerReviewed":false,"subType":"","id":55416306,"orderField":0},{"dateTime":"Wednesday, Dec 7, 2016","urlTitle":"analyst-perspectives-weekly-sc-4","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analyst7.jpg","groupId":53319,"channel":"SECURITY","description":"The 2016 U.S. presidential election and President-elect Trump continue to make headlines this week, particularly when it comes to security. You can read about them, along with other news in the Security & Privacy section:\n\nCybersecurity in President Trump\u2019s America: The first 100 days | Cloud Security Allicance - Mon, 28 Nov 2016 |Katie Lewin","dateTimeMS":1481150640000,"title":"Analyst Perspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=analyst-perspectives-weekly-sc-4","target":"_blank","peerReviewed":false,"subType":"","id":55416333,"orderField":0},{"dateTime":"Friday, Dec 9, 2016","urlTitle":"how-to-protect-your-website-from-hackers","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/elle1.jpg","groupId":53319,"channel":"MOBILE","description":"Hackers are rampant on the internet and it's not unusual for people to get have their websites destroyed because of an attack. While these cyber attacks are actually quite common, there are many ways to be able to protect oneself from hackers that roam around the internet. In order to protect your information from these hackers, you can make use of these tips to beef up your security of your website or your personal accounts.","dateTimeMS":1481322480000,"title":"How to Protect Your Website from Hackers","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=how-to-protect-your-website-from-hackers","target":"_blank","peerReviewed":false,"subType":"","id":55419361,"orderField":0},{"dateTime":"Friday, Dec 9, 2016","urlTitle":"finding-the-healthcare-technology-job-you-want","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/healthcare2.jpg","groupId":54960830,"channel":"","description":"For this issue of ComputingEdge, we asked Phillip A. Laplante\u2014professor of software engineering and co-director of the Software Engineering Group at Pennsylvania State University\u2014about career opportunities in healthcare technology. Laplante\u2019s research interests include real-time and embedded systems, image processing, and artificial intelligence.","dateTimeMS":1481323440000,"title":"Finding the Healthcare Technology Job You Want","type":"article","subCategories":"","url":"/web/computing-careers/content?g=54960830&type=article&urlTitle=finding-the-healthcare-technology-job-you-want","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55419311,"orderField":0},{"dateTime":"Monday, Dec 12, 2016","urlTitle":"looking-for-mr-cloud-the-benioff-scale-and-sap-s-cloud-leadership-conundrum","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/greenbaum2.jpg","groupId":6416743,"channel":"","description":"Cloud computing, the artist formerly known as SaaS, has always been a proving ground for dynamic leadership. The standard \u2013 brash, outspoken, ubiquitous, successful \u2013 was set once upon a time by Marc Benioff, and ever since it\u2019s been easy to measure cloud leadership by what I call the Benioff Scale. On a Benioff Scale of 1-10, where 1 is Ginni (Ginni who?) Rometty of IBM, and 10 is Marc himself, measuring cloud leadership by how many Benioffs a particular leader generates is as good a method as any.","dateTimeMS":1481577480000,"title":"Looking for Mr. Cloud: The Benioff Scale and SAP\u2019s Cloud Leadership Conundrum","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=looking-for-mr-cloud-the-benioff-scale-and-sap-s-cloud-leadership-conundrum","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55421797,"orderField":0},{"dateTime":"Monday, Dec 12, 2016","urlTitle":"20-content-marketing-tools-to-improve-your-blogging-efforts","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/drew.jpg","groupId":53319,"channel":"STARTUPS","description":"2017 will be a big year for content marketing, with brands focusing on better ways to reach a wide audience. Marketers have spent enough time honing their content marketing strategies over the past few years and they now look for more sophisticated ways to drive traffic. As brands prepare to step up their marketing games in 2017, it\u2019s more important than ever that they have the right tools for the job. Here are 20 tools that will help you take your business blog to the next level in 2017.","dateTimeMS":1481577660000,"title":"20 Content Marketing Tools to Improve Your Blogging Efforts","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=20-content-marketing-tools-to-improve-your-blogging-efforts","target":"_blank","peerReviewed":false,"subType":"","id":55421750,"orderField":0},{"dateTime":"Wednesday, Dec 14, 2016","urlTitle":"ieee-computer-society-predicts-the-future-of-tech-for-2017-and-next-five-years-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/2017.jpg","groupId":53319,"channel":"INSIGHTS","description":"After grading itself on its 2016 vison, IEEE Computer Society has plunged into technology predictions for 2017 and for the next five years by 2022.\n\nTechnology trends that will reach adoption in 2017:","dateTimeMS":1481737620000,"title":"IEEE Computer Society Predicts the Future of Tech for 2017 and Next Five Years!","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=ieee-computer-society-predicts-the-future-of-tech-for-2017-and-next-five-years-","target":"_blank","peerReviewed":false,"subType":"","id":55424847,"orderField":0},{"dateTime":"Tuesday, Dec 20, 2016","urlTitle":"analyst-perspectives-weekly-sc-5","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analyst7.jpg","groupId":53319,"channel":"CLOUD","description":"Many analysts continue to discuss the busy holiday shopping season. Here are a few of those highlights found in the Retail section:\n\nConsumers are Paying the Price for Toys this Holiday | The NPD Group - Thu, 08 Dec 2016 |Juli Lennett","dateTimeMS":1482279600000,"title":"Analyst Perspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=analyst-perspectives-weekly-sc-5","target":"_blank","peerReviewed":false,"subType":"","id":55436309,"orderField":0},{"dateTime":"Tuesday, Dec 20, 2016","urlTitle":"how-technology-is-improving-campus-security","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/Alton.jpg","groupId":53319,"channel":"SECURITY","description":"College campuses aren\u2019t inherently more dangerous than other areas of the country, but with so many young people packed in one place, security is a natural concern. Campus shootings and attacks, rape culture, and other high-profile incidents are putting a spotlight on the importance of campus security, and colleges across the country are looking to new forms of technology to help address student and parent worries.","dateTimeMS":1482279900000,"title":"How Technology Is Improving Campus Security","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=how-technology-is-improving-campus-security","target":"_blank","peerReviewed":false,"subType":"","id":55436336,"orderField":0},{"dateTime":"Wednesday, Dec 21, 2016","urlTitle":"new-hsa-academic-centers-of-excellence-undertake-research-and-development-of-hsa-compliant-technologies","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/glossner3.jpg","groupId":54930593,"channel":"","description":"The Heterogeneous System Architecture (HSA) Foundation recently added two new HSA Academic Centers of Excellence - Technische Universitaet (TU) Darmstadt, and Friedrich-Alexander-University Erlangen-Nurnberg (FAU), both in Germany.\n\nAs mentioned in previous HSA Connections posts, HSA is a standardized platform design that unlocks the performance and power efficiency of the parallel computing engines found in most modern electronic devices. It allows developers to easily and efficiently apply the hardware resources\u2014including CPUs, GPUs, DSPs, FPGAs, fabrics and fixed function accelerators\u2014in today\u2019s complex systems-on-chip (SoCs).","dateTimeMS":1482354180000,"title":"New HSA Academic Centers of Excellence Undertake Research and Development of HSA-Compliant Technologies","type":"article","subCategories":"","url":"/web/hsa-connections/content?g=54930593&type=article&urlTitle=new-hsa-academic-centers-of-excellence-undertake-research-and-development-of-hsa-compliant-technologies","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55437260,"orderField":0},{"dateTime":"Wednesday, Dec 21, 2016","urlTitle":"ieee-computer-society-celebrates-70th-anniversary-while-president-roger-fujii-shares-how-tech-research-and-standards-shape-innovation","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/cslogo.jpg","groupId":53319,"channel":"CAREERS","description":"With standards governing everything from nuclear weapons software to wifi networks, the Institute of Electrical and Electronics Engineers (IEEE) and the IEEE Computer Society (IEEE CS) bring a unique blend of computing and engineering expertise to developing the standards governing the advancement of technology. The society boasts roughly 60,000 members and encompasses all aspects of theory, design, practice, and applications of computer science, technology, and information processing. IEEE Computer Society President Roger Fujii shared his IEEE membership experiences and how the networking and educational opportunities provide an invaluable resource to both established professionals and budding tech enthusiasts.","dateTimeMS":1482361920000,"title":"IEEE Computer Society Celebrates 70th Anniversary While President Roger Fujii Shares How Tech Research and Standards Shape Innovation","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=ieee-computer-society-celebrates-70th-anniversary-while-president-roger-fujii-shares-how-tech-research-and-standards-shape-innovation","target":"_blank","peerReviewed":false,"subType":"","id":55437720,"orderField":0},{"dateTime":"Wednesday, Dec 21, 2016","urlTitle":"all-email-should-be-encrypted","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/drew.jpg","groupId":53319,"channel":"SECURITY","description":"Dark Web, Deep Web, Deepnet, Invisible Web, Hidden Web, Dark Internet. What\u2019s the average computer user to know? You can start by understanding there are dark places and dark minds out there, criminals who would hack into your internet devices and steal or corrupt your information. It\u2019s why all email should be encrypted.","dateTimeMS":1482362160000,"title":"All email should be encrypted","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=all-email-should-be-encrypted","target":"_blank","peerReviewed":false,"subType":"","id":55437747,"orderField":0},{"dateTime":"Wednesday, Dec 28, 2016","urlTitle":"thermal-safe-power-tsp-efficient-power-budgeting-for-heterogeneous-manycore-systems-in-dark-silicon","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2017/01/W_Thermal-Safe-Power-100x100.jpg","groupId":53319,"channel":"","description":"Chip manufacturers provide the Thermal Design Power (TDP) for a specific chip. The cooling solution is designed to dissipate this power level. But because TDP is not necessarily the maximum power that can be applied, chips are operated with Dynamic Thermal Management (DTM) techniques. To avoid excessive triggers of DTM, usually, system designers also use TDP as power constraint. However, using a single and constant value as power constraint, e.g., TDP, can result in significant performance losses in homogeneous and heterogeneous manycore systems.","dateTimeMS":1482961500000,"title":"Thermal Safe Power (TSP): Efficient Power Budgeting for Heterogeneous Manycore Systems in Dark Silicon","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=thermal-safe-power-tsp-efficient-power-budgeting-for-heterogeneous-manycore-systems-in-dark-silicon","target":"_blank","peerReviewed":false,"subType":"","id":55444678,"orderField":0},{"dateTime":"Wednesday, Dec 28, 2016","urlTitle":"faults-affecting-the-control-blocks-of-pv-arrays-and-techniques-for-their-concurrent-detection","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2017/01/T_Faults-affecting-100x100.jpg","groupId":53319,"channel":"","description":"Two novel approaches detect the faults most likely to affect the control circuitry of PV arrays and allow the activation of proper reconfiguration schemes.","dateTimeMS":1482961560000,"title":"Faults affecting the control blocks of PV arrays and techniques for their concurrent detection","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=faults-affecting-the-control-blocks-of-pv-arrays-and-techniques-for-their-concurrent-detection","target":"_blank","peerReviewed":false,"subType":"","id":55444705,"orderField":0},{"dateTime":"Wednesday, Dec 28, 2016","urlTitle":"designing-fault-tolerant-photovoltaic-systems","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2017/01/T_Designing-Fault-Tolerant-100x100.jpg","groupId":53319,"channel":"","description":"Fault-tolerant PV systems can detect and bypass PV cell faults\u2014which lower output power and shorten system lifespan\u2014in situ without any manual interventions.","dateTimeMS":1482961620000,"title":"Designing Fault-Tolerant Photovoltaic Systems","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=designing-fault-tolerant-photovoltaic-systems","target":"_blank","peerReviewed":false,"subType":"","id":55444839,"orderField":0},{"dateTime":"Wednesday, Dec 28, 2016","urlTitle":"automatic-detection-and-analysis-of-photovoltaic-modules-in-aerial-infrared-imagery","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2017/01/T_Automatic-detection-and-analysis-100x100.jpg","groupId":53319,"channel":"","description":"Aerial thermography is a convenient tool for locating defective modules and cells in large photovoltaic-power plants. A new automatic detection approach can identify temperature abnormalities.","dateTimeMS":1482961620000,"title":"Automatic detection and analysis of photovoltaic modules in aerial infrared imagery","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=automatic-detection-and-analysis-of-photovoltaic-modules-in-aerial-infrared-imagery","target":"_blank","peerReviewed":false,"subType":"","id":55444759,"orderField":0},{"dateTime":"Wednesday, Dec 28, 2016","urlTitle":"reconfiguration-of-photovoltaic-arrays-based-on-a-gpu-accelerated-exhaustive-search-algorithm","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2017/01/T_Reconfiguration-of-Photovoltaic-100x100.jpg","groupId":53319,"channel":"","description":"A search algorithm finds the best electrical configuration of PV arrays, which can mitigate power losses caused by partial shading and other mismatching conditions.","dateTimeMS":1482961680000,"title":"Reconfiguration of Photovoltaic Arrays Based on a GPU-Accelerated Exhaustive Search Algorithm","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=reconfiguration-of-photovoltaic-arrays-based-on-a-gpu-accelerated-exhaustive-search-algorithm","target":"_blank","peerReviewed":false,"subType":"","id":55444786,"orderField":0},{"dateTime":"Wednesday, Dec 28, 2016","urlTitle":"let-the-sun-shine","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2017/01/T_Let-the-Sun-Shine-100x100.jpg","groupId":53319,"channel":"","description":"An inexpensive infrastructure collects real-time, localized solar irradiation data, which consumers and utilities can use to predict the availability of solar energy.","dateTimeMS":1482961680000,"title":"Let the Sun Shine","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=let-the-sun-shine","target":"_blank","peerReviewed":false,"subType":"","id":55444813,"orderField":0},{"dateTime":"Wednesday, Jan 11, 2017","urlTitle":"5-ways-tech-hr-will-change-in-2017-and-beyond","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/larryalton.jpg","groupId":53319,"channel":"CAREERS","description":"Technology is a complex tool for businesses to manage, and it\u2019s only going to grow in complexity as new gadgets and programs enter the market. You\u2019ll need a crack team of IT workers, including programmers, project managers, and everything in between if you want to be successful.","dateTimeMS":1484174820000,"title":"5 Ways Tech HR Will Change in 2017 and Beyond","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=5-ways-tech-hr-will-change-in-2017-and-beyond","target":"_blank","peerReviewed":false,"subType":"","id":55459552,"orderField":0},{"dateTime":"Wednesday, Jan 11, 2017","urlTitle":"pixel-perfect-is-critical-in-augmented-reality","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/peddie.jpg","groupId":54397843,"channel":"","description":"By now anyone who hasn\u2019t heard of augmented reality (AR) and/or virtual reality (VR), have either been living without Wi-Fi, or on a deep space mission. Most people have probably also heard of mixed reality (MR). However, hearing about it, and possibly even trying it, does not equate to understanding it. Most of us drive a car, but how many understand how it works? And because all three technologies involve a headset, it is too often assumed they are somehow related, similar, or a subset of one another\u2014they are not. \nI want to be augmented, not virtual.","dateTimeMS":1484175240000,"title":"Pixel Perfect Is Critical in Augmented Reality","type":"article","subCategories":"","url":"/web/chasing-pixels-finding-gems/content?g=54397843&type=article&urlTitle=pixel-perfect-is-critical-in-augmented-reality","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55558368,"orderField":0},{"dateTime":"Wednesday, Jan 11, 2017","urlTitle":"how-to-conquer-online-marketing-in-2017","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/drew.jpg","groupId":53319,"channel":"CAREERS","description":"The internet is eating the world, one industry at a time. Now that even the venerated fields of law and medicine can be done through your browser, it can safely be said that if your brand isn\u2019t online, then you\u2019re not interested in success. If you do have a website, but you\u2019re not promoting it through online marketing means, then you\u2019re letting customers and sales slip by you. Want to change your ways?\n\nHere are the best ways to conquer online marketing in 2017, no matter how much - or how little - you did in 2016:","dateTimeMS":1484177460000,"title":"How To Conquer Online Marketing in 2017","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=how-to-conquer-online-marketing-in-2017","target":"_blank","peerReviewed":false,"subType":"","id":55459593,"orderField":0},{"dateTime":"Wednesday, Jan 11, 2017","urlTitle":"analyst-perspectives-weekly-sc-6","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/analysts.jpg","groupId":53319,"channel":"INSIGHTS","description":"As we all submerge ourselves into the hustle and bustle of the holiday season, we find little time for much else \u2013 and analysts are no exception! Due to the limited number of headlines in December, we bring you this multiple week Weekly Scan.\n\nNow that the holiday dust has settled, the analysts are back in full swing and there are many predictions for 2017 covering various categories and industries. Read some of the headlines here and in the Forecasts & Predictions 2017 section:","dateTimeMS":1484178120000,"title":"Analyst Perspectives Weekly Scan","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=analyst-perspectives-weekly-sc-6","target":"_blank","peerReviewed":false,"subType":"","id":55459740,"orderField":0},{"dateTime":"Monday, Jan 16, 2017","urlTitle":"useful-gadgets-wacky-gizmos-par-for-ces","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/neal.jpg","groupId":7989281,"channel":"","description":"This year at CES marked a personal milestone \u2013 the good folks at CES affixed a \u201810+ Years\u2019 ribbon to the bottom of my badge (it\u2019s actually 12 but who\u2019s counting). To paraphrase from those ubiquitous Allstate commercials, after a dozen consecutive Las Vegas sojourns, \u201cI know a thing or two because I\u2019ve seen a thing or two.\u201d\n\nAnd there was a lot to see. The buzzwords this year were augmented reality, virtual reality, artificial intelligence, and robotics. Wearables and phones? There, but somewhat passé. On to the next trend(s), product(s).","dateTimeMS":1484600820000,"title":"Useful Gadgets, Wacky Gizmos; Par for CES","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=useful-gadgets-wacky-gizmos-par-for-ces","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55465231,"orderField":0},{"dateTime":"Monday, Jan 16, 2017","urlTitle":"oled-technology-marking-major-milestone-becoming-ubiquitious-in-devices","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/takatoshi.JPG","groupId":55151125,"channel":"","description":"2017 is a significant milestone for OLED (organic light-emitting diode) technology \u2013 it will be 30 years since its introduction via a paper published by Ching Tang and Steven Van Slyke.\n\nIn brief, OLED utilizes an emmisive layer comprised of carbon-based thin-film that\u2019s held between two charged electrodes. There\u2019s no backlighting which necessitates an extremely high contrast ratio. OLED technology is now frequently being used in mobile phones, digital cameras, PDAs, mp3 players, and more.","dateTimeMS":1484601600000,"title":"OLED Technology Marking Major Milestone, Becoming Ubiquitous in Devices","type":"article","subCategories":"","url":"/web/sid-dispatch/content?g=55151125&type=article&urlTitle=oled-technology-marking-major-milestone-becoming-ubiquitious-in-devices","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55467631,"orderField":0},{"dateTime":"Monday, Jan 16, 2017","urlTitle":"elearning-is-growing-here-s-what-businesses-need-to-know","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/Alton.jpg","groupId":53319,"channel":"CAREERS","description":"Fifteen years ago, eLearning was a very rudimentary practice that yielded minimal benefits for businesses. However, even in the early days, large organizations realized that the potential for success existed. Now, as we prepare to enter 2017, it appears the eLearning is ready to explode onto the scene.","dateTimeMS":1484604540000,"title":"eLearning is Growing: Here\u2019s What Businesses Need to Know","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=elearning-is-growing-here-s-what-businesses-need-to-know","target":"_blank","peerReviewed":false,"subType":"","id":55465144,"orderField":0},{"dateTime":"Tuesday, Jan 17, 2017","urlTitle":"sap-s-s-4-hana-looking-good-trying-to-look-better","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/joshg2th.png","groupId":6416743,"channel":"","description":"SAP\u2019s S/4 HANA has been called many things, but to characterize it as the future of SAP is far from hyperbole. SAP has minced no words in affirming that the path from R/2 to R/3 to ECC eventually leads to S/4 HANA. The question is not an \u201cif\u201d, but a \u201cwhen.\u201d\n\nWhen, however, has been the tricky question \u2013 when will the customers sign on in droves, when will SAP put in the critical mass of the functionality customers need in S/4 in order for the transition to make sense, and when will S/4 become a significant revenue-maker for SAP?","dateTimeMS":1484676540000,"title":"SAP\u2019s S/4 HANA: Looking Good, Trying to Look Better","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=sap-s-s-4-hana-looking-good-trying-to-look-better","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55468187,"orderField":0},{"dateTime":"Monday, Jan 23, 2017","urlTitle":"an-analysis-of-machine-and-human-analytics-in-classification","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2017/02/T_An-Analysis-of-Machine-100x100.jpg","groupId":53319,"channel":"","description":"This study traces the technical and cognitive processes in two visual analytics applications to a common theoretic model that could help construct a decision-tree model.","dateTimeMS":1485211800000,"title":"An Analysis of Machine- and Human-Analytics in Classification","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=an-analysis-of-machine-and-human-analytics-in-classification","target":"_blank","peerReviewed":false,"subType":"","id":55481197,"orderField":0},{"dateTime":"Monday, Jan 23, 2017","urlTitle":"jacobi-fiber-surfaces-for-bivariate-reeb-space-computation","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2017/02/T_Jacobi-Fiber-Surfaces-100x100.jpg","groupId":53319,"channel":"","description":"An efficient, output-sensitive algorithm computes the Reeb space of an input bivariate piecewise linear scalar function defined on a tetrahedral mesh.","dateTimeMS":1485211860000,"title":"Jacobi Fiber Surfaces for Bivariate Reeb Space Computation","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=jacobi-fiber-surfaces-for-bivariate-reeb-space-computation","target":"_blank","peerReviewed":false,"subType":"","id":55481924,"orderField":0},{"dateTime":"Monday, Jan 23, 2017","urlTitle":"vega-lite-a-grammar-of-interactive-graphics","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2017/02/T_Vega-Lite-100x100.jpg","groupId":53319,"channel":"","description":"Vega-Lite is a grammar that enables rapid specification of interactive data visualizations, providing visual encoding rules and a composition algebra for layered and multi-view displays.","dateTimeMS":1485211860000,"title":"Vega-Lite: A Grammar of Interactive Graphics","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=vega-lite-a-grammar-of-interactive-graphics","target":"_blank","peerReviewed":false,"subType":"","id":55481951,"orderField":0},{"dateTime":"Monday, Jan 23, 2017","urlTitle":"vtk-m-accelerating-the-visualization-toolkit-for-massively-threaded-architectures","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2017/02/T_VTK-m-100x100.jpg","groupId":53319,"channel":"","description":"The VTK-m framework serves as a container for algorithms, provides flexible data representation, and simplifies visualization algorithm design on new and future computer architecture.","dateTimeMS":1485211920000,"title":"VTK-m: Accelerating the Visualization Toolkit for Massively Threaded Architectures","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=vtk-m-accelerating-the-visualization-toolkit-for-massively-threaded-architectures","target":"_blank","peerReviewed":false,"subType":"","id":55481978,"orderField":0},{"dateTime":"Monday, Jan 23, 2017","urlTitle":"a-decision-support-system-for-sustainable-water-distribution-system-planning","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2017/02/T_A-Decision-Support-100x100.jpg","groupId":53319,"channel":"","description":"An interactive decision-support system uses visualization techniques like circle views, grid layout, small multiple maps, and node simplification to assist water resource management planners.","dateTimeMS":1485211980000,"title":"A Decision-Support System for Sustainable Water Distribution System Planning","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=a-decision-support-system-for-sustainable-water-distribution-system-planning","target":"_blank","peerReviewed":false,"subType":"","id":55482005,"orderField":0},{"dateTime":"Friday, Jan 27, 2017","urlTitle":"the-sound-of-new-medical-treatments","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/vrbicky.png","groupId":8206605,"channel":"","description":"A few years ago, while visiting the University of Virginia, my friend Dr. Alan Matsumoto introduced me to some new medical technology being investigated to treat uterine fibroids (benign tumors of the uterus) with focused ultrasound therapy and thus avoid the need for hysterectomy and preservation of the patient\u2019s fertility.","dateTimeMS":1485544680000,"title":"The \u201cSound\u201d of New Medical Treatments","type":"article","subCategories":"","url":"/web/the-doctor-is-in/content?g=8206605&type=article&urlTitle=the-sound-of-new-medical-treatments","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55491868,"orderField":0},{"dateTime":"Friday, Jan 27, 2017","urlTitle":"careers-in-emerging-technology-databases-and-data-science","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/database1.jpg","groupId":54960830,"channel":"","description":"For this issue of ComputingEdge, we asked Andy Pavlo\u2014assistant professor of databaseology in Carnegie Mellon University\u2019s Computer Science Department\u2014about career opportunities in emerging technology fields involving databases and data science. Pavlo\u2019s research interests are database management systems\u2014specifically main memory, nonrelational, and transaction-processing systems\u2014and large-scale data analytics.","dateTimeMS":1485546120000,"title":"Careers in Emerging Technology: Databases and Data Science","type":"article","subCategories":"","url":"/web/computing-careers/content?g=54960830&type=article&urlTitle=careers-in-emerging-technology-databases-and-data-science","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55491889,"orderField":0},{"dateTime":"Friday, Jan 27, 2017","urlTitle":"careers-in-cybersecurity-technology","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/Cyber3.jpg","groupId":54960830,"channel":"","description":"For this ComputingEdge issue, we asked Dan Haagman\u2014cybersecurity entrepreneur and cofounder of NotSoSecure Global Services, a leading UK penetration-testing and hacking-training firm\u2014about cybersecurity-related career opportunities. In early 2016, the IEEE Computer Society partnered with NotSoSecure to develop cybersecurity eLearning courses for its members (www.computer.org/artofhacking.)","dateTimeMS":1485546840000,"title":"Careers in Cybersecurity Technology","type":"article","subCategories":"","url":"/web/computing-careers/content?g=54960830&type=article&urlTitle=careers-in-cybersecurity-technology","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55492216,"orderField":0},{"dateTime":"Friday, Jan 27, 2017","urlTitle":"how-to-create-a-successful-ecommerce-strategy-for-2017","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ellie1.jpg","groupId":53319,"channel":"INSIGHTS","description":"Like many of you, I like to set out a list of goals, targets and ambitions for the coming year. And 2017 is no different! Getting a clear strategy down in advance is the best way to kickstart the year.\n\nMore than ever, people are looking to start their own ecommerce empire. Whether it\u2019s a side-hustle or full-time dream, building an online store is a fantastic way to start a business online.","dateTimeMS":1485547440000,"title":"How To Create a Successful Ecommerce Strategy For 2017","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=how-to-create-a-successful-ecommerce-strategy-for-2017","target":"_blank","peerReviewed":false,"subType":"","id":55492271,"orderField":0},{"dateTime":"Friday, Feb 3, 2017","urlTitle":"surprising-marketing-lessons-from-the-pet-industry","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/neal.jpg","groupId":7989281,"channel":"","description":"Marketers can learn a thing or two from our furry (and scaly for those who may own reptiles, snakes, other creepy-crawlers) friends. \n\nWhile the fast-growing $61 billion a year pet product industry is wooing new consumers with disruptive marketing campaigns, e-Commerce and digital marketing to pet owners is still the new frontier. According to Annalect, a New York City-based data analytics company, only 8.2 percent of the entire market regularly shops for pet products online.","dateTimeMS":1486154220000,"title":"Surprising Marketing Lessons from the Pet Industry","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=surprising-marketing-lessons-from-the-pet-industry","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55503913,"orderField":0},{"dateTime":"Friday, Feb 3, 2017","urlTitle":"is-technology-ready-to-support-xl-touchscreens-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/zag.jpg","groupId":55151125,"channel":"","description":"Diverse touch sensor technologies and their challenges\n\nIt is remarkable that after all these years of touchscreen evolution there are still so many different technologies behind touch sensors, all developed in parallel to one another. The huge diversity of technologies is driven by the different applications and specialized requested features of them. The touch panel of a museum info kiosk, for example, is based on surface acoustic wave (SAW) technology offering high durability while on the other hand, gaming tables such as casino machines, rely on projected-capacitive touch sensors with increased sensitivity and multi-touch capabilities.","dateTimeMS":1486155660000,"title":"Is Technology Ready to Support XL Touchscreens?","type":"article","subCategories":"","url":"/web/sid-dispatch/content?g=55151125&type=article&urlTitle=is-technology-ready-to-support-xl-touchscreens-","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55535223,"orderField":0},{"dateTime":"Tuesday, Feb 7, 2017","urlTitle":"5-reasons-why-wordpress-is-the-superior-cms-platform","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/Alton.jpg","groupId":53319,"channel":"CAREERS","description":"Your website plays an extremely vital role in your business\u2019 brand image. It\u2019s the virtual portal to your company and should be held in high regard. It makes sense, then, that you would want to power your website with the best possible content management system (CMS) on the market.","dateTimeMS":1486522500000,"title":"5 Reasons Why WordPress is the Superior CMS Platform","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=5-reasons-why-wordpress-is-the-superior-cms-platform","target":"_blank","peerReviewed":false,"subType":"","id":55509327,"orderField":0},{"dateTime":"Tuesday, Feb 7, 2017","urlTitle":"a-license-to-build-software-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/grier.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"Author David Alan Grier reads his new Global Code column, in which he discusses how professional competencies and ethics can be ensured locally while remaining on par with global standards.","dateTimeMS":1486522860000,"title":"A License to Build (Software)","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=a-license-to-build-software-","target":"_blank","peerReviewed":false,"subType":"","id":55509354,"orderField":0},{"dateTime":"Tuesday, Feb 7, 2017","urlTitle":"bioacoustics-based-human-body-mediated-communication","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/bone.jpg","groupId":53319,"channel":"INSIGHTS","description":"This video illustrates concepts discussed in Computer's February 2017 feature article \"Bioacoustics-Based Human-Body-Mediated Communication,\" by Cheng Zhang and his Georgia Tech colleagues.","dateTimeMS":1486523400000,"title":"Bioacoustics-Based Human-Body-Mediated Communication","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=bioacoustics-based-human-body-mediated-communication","target":"_blank","peerReviewed":false,"subType":"","id":55509381,"orderField":0},{"dateTime":"Thursday, Feb 16, 2017","urlTitle":"fine-grained-task-migration-for-graph-algorithms-using-processing-in-memory","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2017/03/T_Fine-Grained-Task-100x100.jpg","groupId":53319,"channel":"","description":"This paper examines the feasibility and potential of fine-grained work migration to reduce remote data accesses in systems with multiple processing-in-memory devices.","dateTimeMS":1487280180000,"title":"Fine-Grained Task Migration for Graph Algorithms using Processing in Memory","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=fine-grained-task-migration-for-graph-algorithms-using-processing-in-memory","target":"_blank","peerReviewed":false,"subType":"","id":55530031,"orderField":0},{"dateTime":"Thursday, Feb 16, 2017","urlTitle":"practical-near-data-processing-for-in-memory-analytics-frameworks","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2017/03/T_Practical-Near-Data-100x100.jpg","groupId":53319,"channel":"","description":"This paper develops the hardware and software of a near-data-processing architecture for in-memory analytics frameworks, including MapReduce, graph processing, and deep neural networks.","dateTimeMS":1487280360000,"title":"Practical Near-Data Processing for In-Memory Analytics Frameworks","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=practical-near-data-processing-for-in-memory-analytics-frameworks","target":"_blank","peerReviewed":false,"subType":"","id":55529911,"orderField":0},{"dateTime":"Thursday, Feb 16, 2017","urlTitle":"near-dram-acceleration-with-single-isa-heterogeneous-processing-in-standard-memory-modules","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2017/03/T_Near-DRAM-Acceleration-100x100.jpg","groupId":53319,"channel":"","description":"A near-DRAM acceleration architecture features lightweight processors that are 3D-stacked atop commodity DRAM devices in a standard memory module to efficiently process data.","dateTimeMS":1487280420000,"title":"Near-DRAM Acceleration with Single-ISA Heterogeneous Processing in Standard Memory Modules","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=near-dram-acceleration-with-single-isa-heterogeneous-processing-in-standard-memory-modules","target":"_blank","peerReviewed":false,"subType":"","id":55529931,"orderField":0},{"dateTime":"Thursday, Feb 16, 2017","urlTitle":"prime-a-novel-processing-in-memory-architecture-for-neural-network","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2017/03/T_PRIME-100x100.jpg","groupId":53319,"channel":"","description":"A novel processing-in-memory architecture, called PRIME, accelerates neural network applications in resistive random access memory-based main memory, resulting in significant performance improvement and energy savings.","dateTimeMS":1487280420000,"title":"PRIME: A Novel Processing-in-Memory Architecture for Neural Network","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=prime-a-novel-processing-in-memory-architecture-for-neural-network","target":"_blank","peerReviewed":false,"subType":"","id":55529951,"orderField":0},{"dateTime":"Thursday, Feb 16, 2017","urlTitle":"hamlet-architecture-for-parallel-data-reorganization-in-memory","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2017/03/T_HAMLeT-100x100.jpg","groupId":53319,"channel":"","description":"This article details data reorganization performed in parallel with host memory accesses, providing mechanisms to address host/near-data-processing interference, flexible bandwidth allocation, and in-memory coherence.","dateTimeMS":1487280480000,"title":"HAMLeT Architecture for Parallel Data Reorganization in Memory","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=hamlet-architecture-for-parallel-data-reorganization-in-memory","target":"_blank","peerReviewed":false,"subType":"","id":55529971,"orderField":0},{"dateTime":"Thursday, Feb 16, 2017","urlTitle":"transparent-offloading-and-mapping-tom-enabling-programmer-transparent-near-data-processing-in-gpu-systems","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2017/03/T_Transparent-Offloading-and-Mapping-100x100.jpg","groupId":53319,"channel":"","description":"By enabling computation offloading and data mapping to multiple 3D-stacked memories, TOM significantly improves performance compared to a baseline GPU system.","dateTimeMS":1487280480000,"title":"Transparent Offloading and Mapping (TOM): Enabling Programmer-Transparent Near-Data Processing in GPU Systems","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=transparent-offloading-and-mapping-tom-enabling-programmer-transparent-near-data-processing-in-gpu-systems","target":"_blank","peerReviewed":false,"subType":"","id":55529991,"orderField":0},{"dateTime":"Thursday, Feb 16, 2017","urlTitle":"hrl-efficient-and-flexible-reconfigurable-logic-for-near-data-processing","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2017/03/T_Practical-Near-Data-100x100.jpg","groupId":53319,"channel":"","description":"This paper presents Heterogeneous Reconfigurable Logic (HRL), a reconfigurable array for near-data-processing systems that improves on both fine-grained and coarse-grained reconfigurable logic arrays.","dateTimeMS":1487280480000,"title":"HRL: Efficient and flexible reconfigurable logic for near-data processing","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=hrl-efficient-and-flexible-reconfigurable-logic-for-near-data-processing","target":"_blank","peerReviewed":false,"subType":"","id":55530011,"orderField":0},{"dateTime":"Tuesday, Feb 21, 2017","urlTitle":"icdm-the-standards-body-of-sid","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/arrows.jpg","groupId":55151125,"channel":"","description":"Did you know that SID has a standards organization that develops display metrology and related standards? It is called ICDM (International Committee for Display Metrology)..","dateTimeMS":1487728380000,"title":"ICDM - the Standards Body of SID","type":"article","subCategories":"","url":"/web/sid-dispatch/content?g=55151125&type=article&urlTitle=icdm-the-standards-body-of-sid","target":"_blank","peerReviewed":false,"subType":"","id":55763622,"orderField":0},{"dateTime":"Tuesday, Feb 21, 2017","urlTitle":"4-technologies-that-could-pave-the-future-of-cybersecurity","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/Alton.jpg","groupId":53319,"channel":"SECURITY","description":"Cybersecurity has come a long way over the decades, but hackers and cybersecurity experts are constantly trying to one-up each other in terms of technological sophistication and preparedness. Every time we take a major step forward in terms of reliable security, cybercriminals are there to match us.","dateTimeMS":1487729160000,"title":"4 Technologies That Could Pave the Future of Cybersecurity","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=4-technologies-that-could-pave-the-future-of-cybersecurity","target":"_blank","peerReviewed":false,"subType":"","id":55536659,"orderField":0},{"dateTime":"Tuesday, Feb 21, 2017","urlTitle":"coping-with-the-internet-of-unnecessary-things","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/quantum.jpg","groupId":8459902,"channel":"","description":"It\u2019s taken a while, but the Internet of Things (IoT) is finally mainstream. From smart homes with heating, entertainment and security systems to connected street lights and smart cities, the infrastructure has now been put in place to support a connected world. As such, we will see more and more applications spiral off of it.","dateTimeMS":1487729940000,"title":"Coping with the Internet of Unnecessary Things","type":"article","subCategories":"","url":"/web/prpl-matters/content?g=8459902&type=article&urlTitle=coping-with-the-internet-of-unnecessary-things","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55548455,"orderField":0},{"dateTime":"Tuesday, Feb 21, 2017","urlTitle":"deadlock-verification-of-cache-coherence-protocols-and-communication-fabrics","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2017/02/W_TC.2016.2584060-100x100.jpg","groupId":53319,"channel":"","description":"Cache coherence plays a major role in manycore systems. The verification of deadlocks is a challenge in particular, because deadlock freedom is an emerging property. Formal methods often decouple verification of the protocol from verification of the communication interconnect. Modern communication fabrics, however, become more advanced and include a network topology, routing, arbitration, synchronization, and more. In this paper, an integrated approach is proposed that allows cross-layer verification of both the cache coherence protocol and the communication fabric all at once.","dateTimeMS":1487725680000,"title":"Deadlock Verification of Cache Coherence Protocols and Communication Fabrics","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=deadlock-verification-of-cache-coherence-protocols-and-communication-fabrics","target":"_blank","peerReviewed":false,"subType":"","id":55537006,"orderField":0},{"dateTime":"Friday, Mar 3, 2017","urlTitle":"trends-in-multi-modal-interfaces-and-automotive-displays","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/dash1.jpg","groupId":55151125,"channel":"","description":"As advanced driver assist systems (ADAS), connected-car technology, and varying levels of vehicle autonomy proliferate, the display suite must work together with other input/output technologies such as touch, audio, gesture control, and haptics to create a reliable and effortless human-machine interface (HMI).","dateTimeMS":1488579840000,"title":"Trends in Multi-Modal Interfaces and Automotive Displays","type":"article","subCategories":"","url":"/web/sid-dispatch/content?g=55151125&type=article&urlTitle=trends-in-multi-modal-interfaces-and-automotive-displays","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55552138,"orderField":0},{"dateTime":"Monday, Mar 6, 2017","urlTitle":"how-much-an-android-developer-costs-these-days-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/ellie1.jpg","groupId":53319,"channel":"MOBILE","description":"Over $69 billion was generated in global mobile app revenue in the year 2015 alone. Some estimates purport that by the year 2020 that number will nearly triple. It would be an understatement to suggest that the (already massive) mobile app market is growing exponentially. Advancements in both hardware and software have greatly decreased the cost of powerful smartphones, which has, in turn, caused them to proliferate rather rapidly. As more people use smartphones on an everyday basis, the demand for apps rises.","dateTimeMS":1488839340000,"title":"How Much an Android Developer Costs These Days?","type":"article","subCategories":"","url":"/web/computingnow/mobile/content?g=53319&type=article&urlTitle=how-much-an-android-developer-costs-these-days-","target":"_blank","peerReviewed":false,"subType":"","id":55554922,"orderField":0},{"dateTime":"Monday, Mar 6, 2017","urlTitle":"a-look-at-how-new-tech-is-giving-patients-more-control-over-their-health","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/Alton.jpg","groupId":53319,"channel":"CLOUD","description":"Technological innovation and the healthcare industry are forever intertwined. There\u2019s always some new procedure, device, or software program coming down the line that\u2019s supposed to change or improve a certain area of the industry. And while each technology has its own specific influence, the vast majority are working together to provide patients with more control over their experiences.","dateTimeMS":1488839700000,"title":"A Look at How New Tech is Giving Patients More Control Over Their Health","type":"article","subCategories":"","url":"/web/computingnow/cloud/content?g=53319&type=article&urlTitle=a-look-at-how-new-tech-is-giving-patients-more-control-over-their-health","target":"_blank","peerReviewed":false,"subType":"","id":55554949,"orderField":0},{"dateTime":"Monday, Mar 6, 2017","urlTitle":"which-product-configurator-software-is-ruling-2017-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/drew.jpg","groupId":53319,"channel":"INSIGHTS","description":"From CPQ to Q2C, contractor management software to web based product configurator software, already 2017 is offering a smorgasbord of product configurator software options. Which one is right for your business? There\u2019s no one size fits all answer. It depends on your business, your goals, numerous economic factors, where you\u2019re located and scores of additional conditions. What\u2019s important is identifying the best software for your goals that fits into your company and your budget.","dateTimeMS":1488840360000,"title":"Which Product Configurator Software is Ruling 2017?","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=which-product-configurator-software-is-ruling-2017-","target":"_blank","peerReviewed":false,"subType":"","id":55554976,"orderField":0},{"dateTime":"Tuesday, Mar 7, 2017","urlTitle":"8-common-phishing-attacks-and-how-to-protect-against-them","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/drew.jpg","groupId":53319,"channel":"SECURITY","description":"What Phishers Do\n\nYou need to accept that these scammers might just be smarter than you, at least with respect to the ability to conspire and corrupt.","dateTimeMS":1488925500000,"title":"8 Common Phishing Attacks And How To Protect Against Them","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=8-common-phishing-attacks-and-how-to-protect-against-them","target":"_blank","peerReviewed":false,"subType":"","id":55558307,"orderField":0},{"dateTime":"Tuesday, Mar 14, 2017","urlTitle":"mixed-reality-computer-vision-killer-app-will-change-how-we-communicate-collaborate","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/holo.jpg","groupId":54930593,"channel":"","description":"At this year\u2019s Consumer Electronics Show, I walked many miles and saw countless demos. Several of these demos were memorable, but one in particular really got my mental gears turning: Microsoft\u2019s HoloLens.\n\nHoloLens will spur many \u201caha\u201d moments, leading to accelerated innovation in wearable computer vision devices, low-power 3D computer vision, and mixed reality.","dateTimeMS":1489530960000,"title":"Mixed Reality: Computer Vision Killer App Will Change How We Communicate, Collaborate","type":"article","subCategories":"","url":"/web/hsa-connections/content?g=54930593&type=article&urlTitle=mixed-reality-computer-vision-killer-app-will-change-how-we-communicate-collaborate","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55596368,"orderField":0},{"dateTime":"Wednesday, Mar 15, 2017","urlTitle":"i-just-had-an-amazing-experience-i-think-i-ll-throw-up-the-hope-of-consumer-vr","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/Analysts.JPG/robo.jpg","groupId":54397843,"channel":"","description":"Consumers are an unforgiving lot. They expect things they bought to work, and they don\u2019t expect to be hurt by them. So far, for many purchasers of VR devices, they\u2019ve been disappointed - too much hype, not enough reality.","dateTimeMS":1489619700000,"title":"I Just Had an Amazing Experience \u2013 I Think I\u2019ll Throw Up. The hope of consumer VR","type":"article","subCategories":"","url":"/web/chasing-pixels-finding-gems/content?g=54397843&type=article&urlTitle=i-just-had-an-amazing-experience-i-think-i-ll-throw-up-the-hope-of-consumer-vr","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55700329,"orderField":0},{"dateTime":"Friday, Mar 17, 2017","urlTitle":"linear-branch-entropy-characterizing-and-optimizing-branch-behavior-in-a-micro-architecture-independent-way","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2017/03/Linear-Branch-Entropy-100x100.jpg","groupId":53319,"channel":"","description":"In this paper, we propose linear branch entropy, a new metric for characterizing branch behavior. Linear branch entropy is independent of the configuration of a specific branch predictor, but is highly correlated with the branch misprediction rate of any predictor.","dateTimeMS":1489789080000,"title":"Linear Branch Entropy: Characterizing and Optimizing Branch Behavior in a Micro-Architecture Independent Way","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=linear-branch-entropy-characterizing-and-optimizing-branch-behavior-in-a-micro-architecture-independent-way","target":"_blank","peerReviewed":false,"subType":"","id":55582355,"orderField":0},{"dateTime":"Monday, Mar 27, 2017","urlTitle":"program-actions-as-actual-causes-a-building-block-for-accountability","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2017/04/T_Program-Actions-100x100.jpg","groupId":53319,"channel":"","description":"This violation cause analysis of a security protocol is designed to address weaknesses in the current public key certification infrastructure.","dateTimeMS":1490626800000,"title":"Program Actions as Actual Causes: A Building Block for Accountability","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=program-actions-as-actual-causes-a-building-block-for-accountability","target":"_blank","peerReviewed":false,"subType":"","id":55649881,"orderField":0},{"dateTime":"Monday, Mar 27, 2017","urlTitle":"rahasnym-pseudonymous-identity-management-system-for-protecting-against-linkability","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2017/04/T_RahasNym-100x100.jpg","groupId":53319,"channel":"","description":"This paper presents a pseudonymous identity management system in which users carry out unlinkable online transactions without disclosing their actual identity information in plain text.","dateTimeMS":1490626860000,"title":"RahasNym: Pseudonymous Identity Management System for Protecting against Linkability","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=rahasnym-pseudonymous-identity-management-system-for-protecting-against-linkability","target":"_blank","peerReviewed":false,"subType":"","id":55650201,"orderField":0},{"dateTime":"Monday, Mar 27, 2017","urlTitle":"nane-identifying-misuse-cases-using-temporal-norm-enactments","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2017/04/T_Nane-100x100.jpg","groupId":53319,"channel":"","description":"Data breaches often originate from legitimate users, not only from technical vulnerabilities. A new formal framework identifies misuse cases in a healthcare scenario.","dateTimeMS":1490627400000,"title":"Nane: Identifying Misuse Cases Using Temporal Norm Enactments","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=nane-identifying-misuse-cases-using-temporal-norm-enactments","target":"_blank","peerReviewed":false,"subType":"","id":55650221,"orderField":0},{"dateTime":"Monday, Mar 27, 2017","urlTitle":"accountablemr-toward-accountable-mapreduce-systems","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2017/04/T_AccountableMR-100x100.jpg","groupId":53319,"channel":"","description":"This paper proposes an accountable MapReduce architecture in which specific data usage is allowed after fine- grained transparent authorizations and effective accountability assessments.","dateTimeMS":1490627760000,"title":"AccountableMR: Toward accountable MapReduce systems","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=accountablemr-toward-accountable-mapreduce-systems","target":"_blank","peerReviewed":false,"subType":"","id":55650241,"orderField":0},{"dateTime":"Monday, Mar 27, 2017","urlTitle":"priguard-a-semantic-approach-to-detect-privacy-violations-in-online-social-networks","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2017/04/T_PriGuard-100x100.jpg","groupId":53319,"channel":"","description":"We implement the proposed model on real-life online social networks to detect privacy violations that are unrelated to system malfunctioning.","dateTimeMS":1490628300000,"title":"PriGuard: A Semantic Approach to Detect Privacy Violations in Online Social Networks","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=priguard-a-semantic-approach-to-detect-privacy-violations-in-online-social-networks","target":"_blank","peerReviewed":false,"subType":"","id":55650261,"orderField":0},{"dateTime":"Monday, Mar 27, 2017","urlTitle":"a-guide-to-end-to-end-privacy-accountability","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/documents/16228/4e75d1a3-0a5e-4911-8107-d68b0ca232c6","groupId":53319,"channel":"","description":"This article, which results from a multidisciplinary project involving lawyers, industry players, and computer scientists, presents guidelines for implementing consistent accountability measures in organizations.","dateTimeMS":1490628900000,"title":"A Guide to End-to-End Privacy Accountability","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=a-guide-to-end-to-end-privacy-accountability","target":"_blank","peerReviewed":false,"subType":"","id":55650301,"orderField":0},{"dateTime":"Friday, Mar 24, 2017","urlTitle":"4-useful-technologies-made-possible-by-computers","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/Alton.jpg","groupId":53319,"channel":"INSIGHTS","description":"People love to joke about disk drives that were once the size of washing machines. Except it\u2019s not really a joke\u2014it\u2019s true. With a fresh coat of white paint, the RP04 disk drive could easily infiltrate any laundry room and blend right in. With a 92MB capacity, you could almost store the photos of your dinner you posted to Instagram last night.","dateTimeMS":1490379000000,"title":"4 Useful Technologies Made Possible by Computers","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=4-useful-technologies-made-possible-by-computers","target":"_blank","peerReviewed":false,"subType":"","id":55596085,"orderField":0},{"dateTime":"Friday, Mar 24, 2017","urlTitle":"4-things-every-tech-startup-needs-to-know-about-the-coaching-industry","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/coach.jpg","groupId":53319,"channel":"CAREERS","description":"Knowledge on any subject is widely available to those who wish to learn. However, just gathering knowledge from other people doesn\u2019t guarantee results in business. Results come from applying what you know in specific ways. And, if you\u2019re a tech startup with dreams of being acquired by a top tech company, you need to get results.","dateTimeMS":1490379900000,"title":"4 Things Every Tech Startup Needs to Know About The Coaching Industry","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=4-things-every-tech-startup-needs-to-know-about-the-coaching-industry","target":"_blank","peerReviewed":false,"subType":"","id":55596342,"orderField":0},{"dateTime":"Monday, Apr 3, 2017","urlTitle":"here-s-why-every-millennial-needs-a-mentor-in-the-tech-industry","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/startup1.jpg","groupId":53319,"channel":"STARTUPS","description":"Millennials are often unfairly given a bad rap for doing things that other generations also do on a regular basis. They\u2019re easy targets and older professionals like to give them a hard time. So, this article isn\u2019t meant to be a hit piece on millennials. Rather, it\u2019s meant to expose something that\u2019s true: Every millennial who has aspirations of being successful in the tech space needs an older mentor.","dateTimeMS":1491255780000,"title":"Here\u2019s Why Every Millennial Needs a Mentor in the Tech Industry","type":"article","subCategories":"","url":"/web/computingnow/startups/content?g=53319&type=article&urlTitle=here-s-why-every-millennial-needs-a-mentor-in-the-tech-industry","target":"_blank","peerReviewed":false,"subType":"","id":55620018,"orderField":0},{"dateTime":"Monday, Apr 3, 2017","urlTitle":"a-look-at-the-state-of-connected-devices-in-2017","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/Alton.jpg","groupId":53319,"channel":"BIG DATA","description":"The connected devices trend is one that seems to be growing at a faster rate each year. This calendar year will be no different, as more and more companies continue to get involved. But where exactly do things stand and what can be expected in 2017 and beyond?","dateTimeMS":1491256620000,"title":"A Look at the State of Connected Devices in 2017","type":"article","subCategories":"","url":"/web/computingnow/big data/content?g=53319&type=article&urlTitle=a-look-at-the-state-of-connected-devices-in-2017","target":"_blank","peerReviewed":false,"subType":"","id":55620045,"orderField":0},{"dateTime":"Tuesday, Apr 11, 2017","urlTitle":"space-semi-partitioned-cache-for-energy-efficient-hard-real-time-systems","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2017/04/W_SPACE-100x100.jpg","groupId":53319,"channel":"","description":"Multi-core processors are increasingly popular because they yield higher performance, but they also present new challenges for hard real-time systems in that they make it much more difficult to estimate a task\u2019s worst-case execution time (WCET).","dateTimeMS":1491936240000,"title":"SPACE: Semi-Partitioned CachE for Energy Efficient, Hard Real-Time Systems","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=space-semi-partitioned-cache-for-energy-efficient-hard-real-time-systems","target":"_blank","peerReviewed":false,"subType":"","id":55649520,"orderField":0},{"dateTime":"Tuesday, Apr 11, 2017","urlTitle":"4-useful-technologies-made-possible-by-compute-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/Alton.jpg","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"People love to joke about disk drives that were once the size of washing machines. Except it\u2019s not really a joke\u2014it\u2019s true. With a fresh coat of white paint, the RP04 disk drive could easily infiltrate any laundry room and blend right in. With a 92MB capacity, you could almost store the photos of your dinner you posted to Instagram last night.\n\nToday, this technology once considered cutting-edge has become obsolete. Large, clunky, slow machines have been replaced with lightning fast, smart technology that does more than just sit in a corner and collect dust.\n\nHere are four computer-based, cutting edge technologies you can\u2019t live without:","dateTimeMS":1491949140000,"title":"4 Useful Technologies Made Possible by Computers","type":"article","subCategories":"","url":"/web/computingnow/software engineering/content?g=53319&type=article&urlTitle=4-useful-technologies-made-possible-by-compute-1","target":"_blank","peerReviewed":false,"subType":"","id":55650430,"orderField":0},{"dateTime":"Tuesday, Apr 11, 2017","urlTitle":"heterogeneous-the-benefits-to-performance-and-power-consumption","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/hsa3.jpg","groupId":54930593,"channel":"","description":"High-performance processors typically employ techniques such as deep, multi-issue pipelines, branch prediction and out-of-order processing to maximize performance, but these do come at a cost; specifically, they impact power efficiency.","dateTimeMS":1491952860000,"title":"Heterogeneous \u2013 the Benefits to Performance and Power Consumption","type":"article","subCategories":"","url":"/web/hsa-connections/content?g=54930593&type=article&urlTitle=heterogeneous-the-benefits-to-performance-and-power-consumption","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55667612,"orderField":0},{"dateTime":"Wednesday, Apr 12, 2017","urlTitle":"4-productivity-tips-for-first-time-remote-workers","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/Alton.jpg","groupId":53319,"channel":"CAREERS","description":"Working remotely can seem like a dream setup, particularly if you fall on the introverted side of the personality spectrum. But the biggest challenge that comes with remote working is distractions. If you don\u2019t have a plan for combatting distractions, your productivity will quickly wane.","dateTimeMS":1492027800000,"title":"4 Productivity Tips for First-Time Remote Workers","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=4-productivity-tips-for-first-time-remote-workers","target":"_blank","peerReviewed":false,"subType":"","id":55661695,"orderField":0},{"dateTime":"Thursday, Apr 20, 2017","urlTitle":"digital-services-in-the-automotive-industry","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2017/05/T_Digital-Services-100x100.jpg","groupId":53319,"channel":"","description":"Original equipment manufacturers in the automotive industry are shifting focus toward software and service platforms to compete with companies like Apple and Google.","dateTimeMS":1492733520000,"title":"Digital Services in the Automotive Industry","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=digital-services-in-the-automotive-industry","target":"_blank","peerReviewed":false,"subType":"","id":55693282,"orderField":0},{"dateTime":"Thursday, Apr 20, 2017","urlTitle":"implementing-functional-safety","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2017/05/T_Implementing-Functional-100x100.jpg","groupId":53319,"channel":"","description":"This article uses an automotive industry example to discuss best practices for efficiently and effectively implementing functional safety in software systems.","dateTimeMS":1492733640000,"title":"Implementing Functional Safety","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=implementing-functional-safety","target":"_blank","peerReviewed":false,"subType":"","id":55693302,"orderField":0},{"dateTime":"Thursday, Apr 20, 2017","urlTitle":"computer-drive-my-car-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/issues/2017/05/T_Computer-Drive-My-Car-100x100.jpg","groupId":53319,"channel":"","description":"Thanks to autonomous driving technologies, our future roads will be safer, our societies more efficient, and our world less polluted.","dateTimeMS":1492733700000,"title":"Computer, Drive My Car!","type":"article","subCategories":"","url":"/web/computingnow/content?g=53319&type=article&urlTitle=computer-drive-my-car-","target":"_blank","peerReviewed":false,"subType":"","id":55693322,"orderField":0},{"dateTime":"Friday, Jan 29, 2016","urlTitle":"are-europeans-more-data-driven-than-the-rest-of-us-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png ","groupId":6012563,"channel":"BIG DATA","description":"Like any other technology implementation, nothing threatens effective business analytics more than the looming specter of \u201cshelfware.\u201d In the fight against underutilized technology, companies in Europe are leaning on their users and an increased propensity for data-driven decisions.","dateTimeMS":1454090100000,"title":"Are Europeans More Data-Driven than the Rest of Us?","type":"article","subCategories":"","url":"/web/aberdeen-group/big data/content?g=6012563&type=article&urlTitle=are-europeans-more-data-driven-than-the-rest-of-us-","target":"_blank","peerReviewed":false,"subType":"","id":55698519,"orderField":0},{"dateTime":"Tuesday, Apr 25, 2017","urlTitle":"ai-helping-marketers-better-engage-customers","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/cs1.jpg","groupId":7989281,"channel":"","description":"Artificial intelligence (AI), to use a hackneyed term, is already causing a paradigm shift for marketers. AI, in brief, is helping brands to rapidly collaborate with and learn from online followers. \n\nAnd while there probably exists many a Luddite that deems AI a pervasive jobs threat, the flip side is that it may be a golden opportunity to let the machines do mundane stuff like customer support, enabling humans to become more creative.","dateTimeMS":1493154660000,"title":"AI Helping Marketers Better Engage Customers","type":"article","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=article&urlTitle=ai-helping-marketers-better-engage-customers","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55700202,"orderField":0},{"dateTime":"Tuesday, Apr 25, 2017","urlTitle":"touch-screens-that-survive-in-harsh-environments","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/pad5.jpg","groupId":55151125,"channel":"","description":"Touch screens are used everywhere today· from consumer electronics, to industrial, medical, automotive and aerospace applications. This wide range of varying environments and usage types leads to wide diversity in the required specifications.","dateTimeMS":1493155440000,"title":"Touch Screens that Survive in Harsh Environments","type":"article","subCategories":"","url":"/web/sid-dispatch/content?g=55151125&type=article&urlTitle=touch-screens-that-survive-in-harsh-environments","target":"_blank","peerReviewed":false,"subType":"","id":55763682,"orderField":0},{"dateTime":"Tuesday, Apr 25, 2017","urlTitle":"5-trends-to-watch-for-in-online-file-sharing","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/Alton.jpg","groupId":53319,"channel":"NETWORKING","description":"nline file storage and sharing are becoming more important than ever, both in personal and professional applications. We\u2019re creating more data on a daily basis\u2014according to VoucherCloud, we produce about 2.5 quintillion bytes of data every day, which would fill 10 million Blu-ray discs\u2014and we\u2019re reliant on accessing and exchanging that data for our daily lives.","dateTimeMS":1493156520000,"title":"5 Trends to Watch For in Online File Sharing","type":"article","subCategories":"","url":"/web/computingnow/networking/content?g=53319&type=article&urlTitle=5-trends-to-watch-for-in-online-file-sharing","target":"_blank","peerReviewed":false,"subType":"","id":55700256,"orderField":0},{"dateTime":"Tuesday, Apr 25, 2017","urlTitle":"holographic-optical-elements-with-led-based-optics","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/dlmig/computingnow/image/pi243y?img_id=55763582&t=1496745147044","groupId":55151125,"channel":"","description":"Advances in LED technology continue to bring new opportunities in digital displays. Existing optical technologies are also benefiting from the LED boom, specifically Holographic Optical Elements or HOEs. Holographic Optical Elements are holographic images embedded onto a thin, clear photopolymer film that can be applied to glass or plastic surfaces. When a light source, such as LED, is projected onto the surface, the invisible recorded holographic images come to life. Although the technology has existed for decades, Luminit scientists and engineers are turning once futuristic concepts into tangible opportunities for manufacturers and government agencies.","dateTimeMS":1493157480000,"title":"Holographic Optical Elements with LED-Based Optics","type":"article","subCategories":"","url":"/web/sid-dispatch/content?g=55151125&type=article&urlTitle=holographic-optical-elements-with-led-based-optics","target":"_blank","peerReviewed":false,"subType":"","id":55763581,"orderField":0},{"dateTime":"Tuesday, May 9, 2017","urlTitle":"here-s-why-every-millennial-needs-a-mentor-in-the-tech-indust-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/anna.jpg","groupId":53319,"channel":"CAREERS","description":"Millennials are often unfairly given a bad rap for doing things that other generations also do on a regular basis. They\u2019re easy targets and older professionals like to give them a hard time. So, this article isn\u2019t meant to be a hit piece on millennials. Rather, it\u2019s meant to expose something that\u2019s true: Every millennial who has aspirations of being successful in the tech space needs an older mentor.","dateTimeMS":1494356280000,"title":"Here\u2019s Why Every Millennial Needs a Mentor in the Tech Industry","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=here-s-why-every-millennial-needs-a-mentor-in-the-tech-indust-1","target":"_blank","peerReviewed":false,"subType":"","id":55727408,"orderField":0},{"dateTime":"Tuesday, May 9, 2017","urlTitle":"how-often-are-americans-really-hacked-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/Alton.jpg","groupId":53319,"channel":"SECURITY","description":"Most people in the United States rely on technology to do their work, exchange messages, and even handle their financial transactions. The fear of being hacked, or having their personal information vulnerable and/or stolen, is prominent and played up by both technology companies and the media.","dateTimeMS":1494361680000,"title":"How Often Are Americans Really Hacked?","type":"article","subCategories":"","url":"/web/computingnow/security/content?g=53319&type=article&urlTitle=how-often-are-americans-really-hacked-","target":"_blank","peerReviewed":false,"subType":"","id":55727435,"orderField":0},{"dateTime":"Tuesday, May 9, 2017","urlTitle":"techignite-2017-conference-highlights-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/woz.jpg","groupId":53319,"channel":"CAREERS","description":"Watch great minds discuss the truth behind today's most disruptive technologies at TechIgnite 2017. Brought to you by the IEEE Computer Society. \n\nSome of the topics include; Blockchain, Machine Learning, AI, VR, AR, IoT. Google, Uber, CISCO, Homeland Security, GE, Amgen and 24 other C-level execs share their secrets.\n\nHere are some highlights from this amazing conference.","dateTimeMS":1494366420000,"title":"TechIgnite 2017 Conference Highlights!","type":"article","subCategories":"","url":"/web/computingnow/careers/content?g=53319&type=article&urlTitle=techignite-2017-conference-highlights-","target":"_blank","peerReviewed":false,"subType":"","id":55727831,"orderField":0},{"dateTime":"Thursday, May 11, 2017","urlTitle":"how-technology-allows-your-business-to-outsource-without-going-overseas","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/Alton.jpg","groupId":53319,"channel":"INSIGHTS","description":"utsourcing is something formerly available only to businesses and people with large amounts of cash flow. Thanks to the internet, every business, entrepreneur, contractor, and individual now has access to outsourcing services to help relieve some of their duties. The best part is that on the internet you can outsource locally \u2013 you no longer have to outsource overseas.","dateTimeMS":1494535980000,"title":"How Technology Allows Your Business To Outsource Without Going Overseas","type":"article","subCategories":"","url":"/web/computingnow/insights/content?g=53319&type=article&urlTitle=how-technology-allows-your-business-to-outsource-without-going-overseas","target":"_blank","peerReviewed":false,"subType":"","id":55733720,"orderField":0},{"dateTime":"Thursday, May 11, 2017","urlTitle":"sap-is-kicking-off-sapphire-part-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/greenbaum.jpg","groupId":6416743,"channel":"","description":"Part of the fun and challenge of following SAP is that its present and future are defined by the intersection of its own peculiarities and the peculiarities of the markets it lives in. This interplay means that SAP, like many large software companies, isn\u2019t just a single company with a single overarching strategy: it\u2019s really many companies with many strategies. The trick for SAP is to make sure they overlap more than they contradict each other.","dateTimeMS":1494536400000,"title":"SAP is kicking off SAPPHIRE - Part 1","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=sap-is-kicking-off-sapphire-part-1","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55733747,"orderField":0},{"dateTime":"Friday, May 12, 2017","urlTitle":"the-challenges-sap-will-face-part-2","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/marketing/greenbaum.jpg","groupId":6416743,"channel":"","description":"We\u2019re back, discoursing on the challenges SAP will face as platform proliferation and the shifting of the edge app issue into the hands of the LOB developer influences what vendor\u2019s tools and platform will be used to power its customers\u2019 digital transformations. Where we last left off, I was about to illustrate SAP\u2019s dilemma with a true-to-life story.)","dateTimeMS":1494573180000,"title":"The challenges SAP will face - Part 2","type":"article","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=article&urlTitle=the-challenges-sap-will-face-part-2","target":"_blank","peerReviewed":false,"subType":"BLOG POST","id":55734277,"orderField":0},{"dateTime":"Friday, Aug 31, 2012","urlTitle":"global-software-engineering","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5954967.png","groupId":5954967,"channel":"","description":"Companies in IT and software business will fail if they don\u2019t master global software engineering. Prestigious journal Harvard Business Manager recently wrote that outsourcing with global IT services and software development ranks as one of the top business ideas of the past 100 years.","dateTimeMS":1346433300000,"title":"Global Software Engineering","type":"blogpost","subCategories":"","url":"/web/software-technologies/content?g=5954967&type=blogpost&urlTitle=global-software-engineering","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":5958634,"orderField":0},{"dateTime":"Sunday, Feb 24, 2013","urlTitle":"defining-cloud-computing","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5970564.png","groupId":5970564,"channel":"","description":"Cloud computing (CC) allows pay-per-use or charge-per-use access to applications, software development and deployment environments, and computing infrastructure. It provides optimized and efficient computing through enhanced collaboration, agility, scalability...","dateTimeMS":1361725200000,"title":"Defining Cloud Computing","type":"blogpost","subCategories":"","url":"/web/irena-bojanova/content?g=5970564&type=blogpost&urlTitle=defining-cloud-computing","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":5970943,"orderField":0},{"dateTime":"Friday, Oct 12, 2012","urlTitle":"better-estimation-means-better-projects","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5954967.png","groupId":5954967,"channel":"","description":"Estimating size or resources is one of the most important topics in software engineering and IT. You will not deliver according to expectations, if you don\u2019t plan. And, you cannot plan if you don\u2019t know the underlying dependencies and estimates.","dateTimeMS":1350053100000,"title":"Better Estimation Means Better Projects","type":"blogpost","subCategories":"","url":"/web/software-technologies/content?g=5954967&type=blogpost&urlTitle=better-estimation-means-better-projects","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":6159916,"orderField":0},{"dateTime":"Monday, Nov 19, 2012","urlTitle":"disaster-recovery-in-the-wake-of-hurricane-sandy:-a-personal-account","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6012563.png","groupId":6012563,"channel":"MOBILE","description":"First, let me set the record straight: I have not suffered (much) as a result of Hurricane Sandy. My story is about minor inconveniences and life disrupted in subtle ways \u2013 nothing as compared to the many folks who have truly suffered: loss of homes, health, livelihood, and even loved ones. To them all I wish a speedy return to safe shelter, dry clothes, hot food, and a warm bed.\n\nIt is a brief and inconsequential personal account and observation on a) the lack of preparedness in modern life for the breakdown of modern life as we know it, and b) the brilliant performance during the disaster and its aftermath of that little portable SoMoClo™ endpoint, the smartphone.","dateTimeMS":1353346800000,"title":"Disaster Recovery in the Wake of Hurricane Sandy: A Personal Account","type":"blogpost","subCategories":"","url":"/web/aberdeen-group/content?g=6012563&type=blogpost&urlTitle=disaster-recovery-in-the-wake-of-hurricane-sandy%3A-a-personal-account","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":6405193,"orderField":0},{"dateTime":"Friday, Nov 23, 2012","urlTitle":"when-will-you-pay-back-your-technical-debt-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5954967.png","groupId":5954967,"channel":"","description":"Debt is bad. We hear this simple rule from parents when they educate their children on the proper use of money, from politicians when they try to control economy, and of course from our managers when we try to sell a proposal which needs investment. Expenses should be done from our earned money. On the other hand, success often stems from borrowed money. Apple was started in 1976 with borrowed money from an Intel executive. Later Steve Jobs borrowed millions from Bill Gates to turn around the loss-making Apple. There seems to be good and bad debt.","dateTimeMS":1353697200000,"title":"When Will You Pay Back Your Technical Debt?","type":"blogpost","subCategories":"","url":"/web/software-technologies/content?g=5954967&type=blogpost&urlTitle=when-will-you-pay-back-your-technical-debt-","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":6725197,"orderField":0},{"dateTime":"Monday, Jan 21, 2013","urlTitle":"bridging-the-twin-peaks-winning-with-requirements-and-architecture","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5954967.png","groupId":5954967,"channel":"","description":"Requirements and architecture of any system thus are highly interdependent. Projects without early architecture evaluation will overlook critical requirements. They will fail in prioritizing requirements. They face budget overruns and rework due to inappropriate and late design changes. This blog looks how to bridge the twin peaks of requirements and architecture.","dateTimeMS":1358792220000,"title":"Bridging the Twin Peaks - Winning with Requirements and Architecture","type":"blogpost","subCategories":"","url":"/web/software-technologies/content?g=5954967&type=blogpost&urlTitle=bridging-the-twin-peaks-winning-with-requirements-and-architecture","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7122465,"orderField":0},{"dateTime":"Friday, Feb 15, 2013","urlTitle":"happy-sailing","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"Call me Ray. Some years ago - never mind how long precisely - having little or no IT knowledge, and nothing particular to interest me, I thought I would take up a programming language. It is a way I have of...","dateTimeMS":1360956420000,"title":"Happy Sailing","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=happy-sailing","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7187493,"orderField":0},{"dateTime":"Tuesday, Feb 19, 2013","urlTitle":"data-modeling","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"The importance of Data Modeling","dateTimeMS":1361283120000,"title":"Data Modeling","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=data-modeling","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7191739,"orderField":0},{"dateTime":"Monday, Feb 25, 2013","urlTitle":"business-intelligence-and-big-data-part-i","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"Business Intelligence","dateTimeMS":1361800920000,"title":"Business Intelligence and Big Data - Part I","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=business-intelligence-and-big-data-part-i","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7203618,"orderField":0},{"dateTime":"Monday, Feb 25, 2013","urlTitle":"business-intelligence-and-big-data-part-ii","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"Business Intelligence and Big Data","dateTimeMS":1361802000000,"title":"Business Intelligence and Big Data - Part II","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=business-intelligence-and-big-data-part-ii","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7203633,"orderField":0},{"dateTime":"Tuesday, Mar 5, 2013","urlTitle":"web-application-security","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"A blog entry about web application security best practices.","dateTimeMS":1362486900000,"title":"Web Application Security","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=web-application-security","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7268184,"orderField":0},{"dateTime":"Friday, Mar 8, 2013","urlTitle":"mastering-functional-safety","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5954967.png","groupId":5954967,"channel":"SOFTWARE ENGINEERING","description":"We increasingly rely on complex electronic functions to ensure functional safety. These functions are realized by systems of sensors, actuators and interconnected electronic control units. To mitigate product liability risks associated with such systems as well as to ensure the high level of quality under varying operational conditions, significant improvements to engineering processes are necessary. This blog shows how to master functional safety.","dateTimeMS":1362759660000,"title":"Mastering Functional Safety","type":"blogpost","subCategories":"","url":"/web/software-technologies/content?g=5954967&type=blogpost&urlTitle=mastering-functional-safety","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7284741,"orderField":0},{"dateTime":"Monday, Mar 11, 2013","urlTitle":"big-data-processing-pipeline-&-challenges-infographic","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"An infographic on Big Data processing stages and challenges associated with each stage.","dateTimeMS":1363004940000,"title":"Big Data Processing Pipeline & Challenges Infographic","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=big-data-processing-pipeline-%26-challenges-infographic","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7290120,"orderField":0},{"dateTime":"Monday, Mar 25, 2013","urlTitle":"internet-of-things-and-big-data","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"Challenges of technology and privacy with IoT data","dateTimeMS":1364229360000,"title":"Internet of Things and Big Data","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=internet-of-things-and-big-data","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7316404,"orderField":0},{"dateTime":"Friday, Mar 29, 2013","urlTitle":"top-3-web-applications-security-threats-infographic","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"Top 3 Web Applications security threats and some advise as how to prevent or minimize their impacts.","dateTimeMS":1364584560000,"title":"Top 3 Web Applications Security Threats Infographic","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=top-3-web-applications-security-threats-infographic","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7327817,"orderField":0},{"dateTime":"Wednesday, Apr 10, 2013","urlTitle":"evaluating-initial-cloud-risks","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5970564.png","groupId":5970564,"channel":"","description":"The stages of the Cloud follow the evolution of sharing on the Internet: networking, network sharing, information sharing, resources sharing, and services sharing.","dateTimeMS":1365595200000,"title":"Evaluating Initial Cloud Risks","type":"blogpost","subCategories":"","url":"/web/irena-bojanova/content?g=5970564&type=blogpost&urlTitle=evaluating-initial-cloud-risks","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7341010,"orderField":0},{"dateTime":"Monday, Apr 8, 2013","urlTitle":"information-security:-risk-assessment-&-management","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"Information security is a 2 step process of risk assessment and risk management.","dateTimeMS":1365427020000,"title":"Information Security: Risk Assessment & Management","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=information-security%3A-risk-assessment-%26-management","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7344424,"orderField":0},{"dateTime":"Wednesday, Apr 24, 2013","urlTitle":"understanding-multi-tenancy-i","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5970564.png","groupId":5970564,"channel":"","description":"NIST has defined five essential cloud characteristics: on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service.","dateTimeMS":1366804800000,"title":"Understanding Multi-Tenancy I","type":"blogpost","subCategories":"","url":"/web/irena-bojanova/content?g=5970564&type=blogpost&urlTitle=understanding-multi-tenancy-i","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7360737,"orderField":0},{"dateTime":"Friday, May 3, 2013","urlTitle":"understanding-multi-tenancy-ii","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5970564.png","groupId":5970564,"channel":"","description":"Continuing our discussion on multi-tenancy, note that Gartner places multi-tenancy close to the peak of expectations in the Hype Cycle for Cloud Computing, shown on Figure 1.","dateTimeMS":1367582400000,"title":"Understanding Multi-Tenancy II","type":"blogpost","subCategories":"","url":"/web/irena-bojanova/content?g=5970564&type=blogpost&urlTitle=understanding-multi-tenancy-ii","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7372830,"orderField":0},{"dateTime":"Friday, Apr 26, 2013","urlTitle":"fighting-terror-with-predictive-analytics","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"Using predictive analytics to predict and prevent terrorism","dateTimeMS":1366993380000,"title":"Fighting Terror with Predictive Analytics","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=fighting-terror-with-predictive-analytics","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7375302,"orderField":0},{"dateTime":"Wednesday, May 8, 2013","urlTitle":"bob-metcalfe:-ethernet-at-forty","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/53319.png","groupId":53319,"channel":"NETWORKING","description":"Audio Podcast - Bob Metcalfe: Ethernet at Forty Author Charles Severance provides an audio recording of his Computing Conversations column, in which he discusses his interview with Bob Metcalfe about how the Ethernet local area network was created 40 years ago at Xerox Palo Alto Research Center","dateTimeMS":1368002340000,"title":"Bob Metcalfe: Ethernet at Forty","type":"podcast","subCategories":"","url":"/web/computingnow/content?g=53319&type=podcast&urlTitle=bob-metcalfe%3A-ethernet-at-forty","target":"_self","peerReviewed":false,"subType":"PODCAST","id":7405157,"orderField":0},{"dateTime":"Friday, May 10, 2013","urlTitle":"exploring-service-model-architecture","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5970564.png","groupId":5970564,"channel":"","description":"NIST lists three cloud service models: Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS) (please see the \"As discussed in the Defining Cloud Computing\" post and Figure 1).","dateTimeMS":1368192840000,"title":"Exploring Service Model Architecture","type":"blogpost","subCategories":"","url":"/web/irena-bojanova/content?g=5970564&type=blogpost&urlTitle=exploring-service-model-architecture","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7409690,"orderField":0},{"dateTime":"Monday, May 20, 2013","urlTitle":"addressing-cloud-security","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5970564.png","groupId":5970564,"channel":"","description":"Understanding cloud security risks is related to understanding the relationships and dependencies between cloud computing models. IaaS forms the foundation of the service model architecture, PaaS builds upon IaaS, and SaaS in turn builds upon PaaS; and information security issues and risks are inherited just as capabilities are.","dateTimeMS":1369066320000,"title":"Addressing Cloud Security","type":"blogpost","subCategories":"","url":"/web/irena-bojanova/content?g=5970564&type=blogpost&urlTitle=addressing-cloud-security","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7425131,"orderField":0},{"dateTime":"Thursday, Jun 20, 2013","urlTitle":"cloud-interoperability-and-portability","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5970564.png","groupId":5970564,"channel":"","description":"Interoperability and portability are closely related to the previously discussed Cloud elasticity and multi-tenancy. Any IaaS to SaaS cloud-implemented system should have as design goals both interoperability and portability to fully gain the benefits of the Cloud elastic environment. Although interoperability and portability are not unique for cloud and the related security aspects did not emerge with cloud computing, multi-tenancy (where data and applications of different customers/companies share platforms, storage, networks) brings the need of greater precautions than those required for traditional processing models.","dateTimeMS":1371729600000,"title":"Cloud Interoperability and Portability","type":"blogpost","subCategories":"","url":"/web/irena-bojanova/content?g=5970564&type=blogpost&urlTitle=cloud-interoperability-and-portability","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7487285,"orderField":0},{"dateTime":"Monday, Jul 1, 2013","urlTitle":"measuring-productivity","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5954967.png","groupId":5954967,"channel":"SOFTWARE ENGINEERING","description":"You cannot control what you cannot measure. This holds especially for software productivity, where many companies struggle how to measure and improve it. Often we in software and IT fail to understand that productivity relates to delivering value \u2013 as opposed to collecting features and increasing complexity. This blog will provide some guidance and hints for measuring productivity. Let me know of any further question or stimulus arising from this blog.","dateTimeMS":1372685940000,"title":"Measuring Productivity","type":"blogpost","subCategories":"","url":"/web/software-technologies/content?g=5954967&type=blogpost&urlTitle=measuring-productivity","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7510165,"orderField":0},{"dateTime":"Thursday, Jul 25, 2013","urlTitle":"cloud-interoperability-and-portability-ii","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5970564.png","groupId":5970564,"channel":"","description":"Being locked-in by a cloud provider is not what customers plan to experience. So, let\u2019s explore a bit more on the cloud portability and interoperability topic. The Open Cloud Manifesto explains data and applications interoperability and portability","dateTimeMS":1374753600000,"title":"Cloud Interoperability and Portability II","type":"blogpost","subCategories":"","url":"/web/irena-bojanova/content?g=5970564&type=blogpost&urlTitle=cloud-interoperability-and-portability-ii","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7537820,"orderField":0},{"dateTime":"Friday, Jul 26, 2013","urlTitle":"working-with-hadoop-:-a-practical-guide-\u2013-part-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"Part I of a practical experience with Hadoop. First the architecture.","dateTimeMS":1374863220000,"title":"Working with Hadoop : A practical Guide \u2013 Part 1","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=working-with-hadoop-%3A-a-practical-guide-%E2%80%93-part-1","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7552930,"orderField":0},{"dateTime":"Friday, Aug 2, 2013","urlTitle":"working-with-hadoop:-a-practical-guide-\u2013-part-2","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"Part two of working with Hadoop: its 2 components, HDFS and MapReduce, my choice distribution and online resources.","dateTimeMS":1375453200000,"title":"Working with Hadoop: A practical Guide \u2013 Part 2","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=working-with-hadoop%3A-a-practical-guide-%E2%80%93-part-2","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7566367,"orderField":0},{"dateTime":"Thursday, Aug 8, 2013","urlTitle":"cloud-interoperability-and-federation","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5970564.png","groupId":5970564,"channel":"","description":"Clouds today do not interoperate, resulting in absolute limitations in geographical coverage, resource functionality, and resource scalability. A cloud provider may not have resources where a cloud consumer needs them; a cloud provider may not offer the type of resource needed; and a cloud provider's resources cannot be infinitely elastic.","dateTimeMS":1375963200000,"title":"Cloud Interoperability and Federation","type":"blogpost","subCategories":"","url":"/web/irena-bojanova/content?g=5970564&type=blogpost&urlTitle=cloud-interoperability-and-federation","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7567139,"orderField":0},{"dateTime":"Tuesday, Aug 13, 2013","urlTitle":"working-with-hadoop:-a-practical-guide-\u2013-part-3","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"Installation and configuration of Cloudera's management server and clients.","dateTimeMS":1376419200000,"title":"Working with Hadoop: A practical Guide \u2013 Part 3","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=working-with-hadoop%3A-a-practical-guide-%E2%80%93-part-3","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7598125,"orderField":0},{"dateTime":"Monday, Aug 19, 2013","urlTitle":"working-with-hadoop:-a-practical-guide-\u2013-part-4","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"Hardware recommendations for your cluster & Hadoop's physical architecture explained","dateTimeMS":1376930400000,"title":"Working with Hadoop: A Practical Guide \u2013 Part 4","type":"podcast","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=podcast&urlTitle=working-with-hadoop%3A-a-practical-guide-%E2%80%93-part-4","target":"_self","peerReviewed":false,"subType":"PODCAST","id":7607545,"orderField":0},{"dateTime":"Friday, Aug 30, 2013","urlTitle":"working-with-hadoop:-part-5","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"Hadoop important files and commands","dateTimeMS":1377888600000,"title":"Working with Hadoop: Part 5","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=working-with-hadoop%3A-part-5","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7628804,"orderField":0},{"dateTime":"Friday, Sep 6, 2013","urlTitle":"native-apps-vs-html5-responsive-design:-a-diversion-of-sorts","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"HTML vs. iOS Native Apps: What makes more sense?","dateTimeMS":1378490400000,"title":"Native Apps vs. HTML5/Responsive Design: A diversion of sorts","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=native-apps-vs-html5-responsive-design%3A-a-diversion-of-sorts","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7637865,"orderField":0},{"dateTime":"Friday, Oct 11, 2013","urlTitle":"working-with-hadoop:-a-practical-guide-\u2013-part-6","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"Configuring Hadoop for a single node experiment","dateTimeMS":1381503660000,"title":"Working with Hadoop: A practical Guide \u2013 Part 6","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=working-with-hadoop%3A-a-practical-guide-%E2%80%93-part-6","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7710072,"orderField":0},{"dateTime":"Tuesday, Oct 15, 2013","urlTitle":"advancing-with-lifecycle-management","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5954967.png","groupId":5954967,"channel":"SOFTWARE ENGINEERING","description":"Rising cost pressure is forcing manufacturers and their suppliers to jointly and consistently master product development. Product and application life-cycle management (PLM and ALM) is the primary mechanism for integrating engineering processes, tools and people across the domains of system, software, hardware and mechanical engineering. This blog will provide some guidance and hints for successfully introducing PLM and ALM. Let me know of any further question or stimulus arising from this blog.","dateTimeMS":1381825500000,"title":"Advancing with Lifecycle Management","type":"blogpost","subCategories":"","url":"/web/software-technologies/content?g=5954967&type=blogpost&urlTitle=advancing-with-lifecycle-management","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7712627,"orderField":0},{"dateTime":"Tuesday, Nov 5, 2013","urlTitle":"cloud-computing-in-research-and-education","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5970564.png","groupId":5970564,"channel":"","description":"Cloud computing has huge potential to accelerate research, enhance collaboration, and enrich education. Educators, research administrators, IT directors, and research should realize and leverage cloud\u2019s potential in research, teaching, and learning. They can complement their current in-house cyberinfrastructure by deploying public, private, or hybrid clouds. In fact, as a recent survey reveals, some are already benefiting by embracing the clouds.","dateTimeMS":1383666300000,"title":"Cloud Computing in Research and Education","type":"blogpost","subCategories":"","url":"/web/irena-bojanova/content?g=5970564&type=blogpost&urlTitle=cloud-computing-in-research-and-education","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7748747,"orderField":0},{"dateTime":"Monday, Feb 3, 2014","urlTitle":"cloud-computing-what-s-next-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5970564.png","groupId":5970564,"channel":"","description":"Cloud computing is no longer on the horizon; it\u2019s already here in a big way. Governments, business, industry, and individuals are increasingly using cloud computing for their information processing, and computational and developmental needs. They have begun to realize several benefits of cloud computing, including pay for the use, quick deployment of applications, variety of offerings from several cloud service providers, enhanced collaboration, agility, scalability, and availability.","dateTimeMS":1391409480000,"title":"Cloud Computing - What's Next?","type":"podcast","subCategories":"","url":"/web/irena-bojanova/content?g=5970564&type=podcast&urlTitle=cloud-computing-what-s-next-","target":"_self","peerReviewed":false,"subType":"PODCAST","id":7957431,"orderField":0},{"dateTime":"Monday, Feb 10, 2014","urlTitle":"satya-nadella-ceo:-good-news-for-microsoft-dynamics-bad-news-for-the-competition","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"CLOUD","description":"The ascendency of Satya Nadella to the top spot at Microsoft is welcome news to a wide range of internal and external stakeholders. He\u2019s an insider who knows not just where the skeletons are buried, but, more importantly, where the gemstones are buried too.","dateTimeMS":1392030780000,"title":"Satya Nadella, CEO: Good News for Microsoft Dynamics, Bad News for the Competition","type":"blogpost","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=blogpost&urlTitle=satya-nadella-ceo%3A-good-news-for-microsoft-dynamics-bad-news-for-the-competition","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":7965685,"orderField":0},{"dateTime":"Tuesday, Feb 18, 2014","urlTitle":"prime-time-for-wearable-devices-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7989281.png","groupId":7989281,"channel":"MOBILE","description":"Welcome to NealNotes; this is my inaugural blog post. Not exactly Proustian prose, but there you have it \u2013 short/succinct. Going forward, I\u2019ll comment on various technology trends/issues/ideas, in short, whatever techles my fancy (sorry, inveterate punster too, even when borderline like that one).\nUnless you have successfully disengaged yourself from every conceivable 21st Century communications device, you\u2019ve probably been hearing a lot about wearable devices \u2013 that they\u2019re the next big trend/revolution/most stupendous technological invention since the cotton gin, ad nauseum.\nWell, not quite, but wearable devices were yakked about incessantly at CES 2014 last month and the overall buzz is getting louder.","dateTimeMS":1392759180000,"title":"Prime Time for Wearable Devices?","type":"blogpost","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=blogpost&urlTitle=prime-time-for-wearable-devices-","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8002705,"orderField":0},{"dateTime":"Thursday, Feb 20, 2014","urlTitle":"testing-training-succeeding\u2026-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"SOFTWARE ENGINEERING","description":"There are many nerdy little corners of enterprise software that don\u2019t get the big buzz effect of overly hyped concepts like \u201csocial\u201d and \u201cmobile\u201d, but never let inattention lure you into complacency. There are many factors that lead to project success or failure, and some of the more nerdy are in fact much more relevant to overall enterprise success than giving away iPads to your salespeople or trying to foist some collaboration software on an un-collaborative workforce.","dateTimeMS":1392887400000,"title":"Testing, Training, Succeeding\u2026.","type":"blogpost","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=blogpost&urlTitle=testing-training-succeeding%E2%80%A6-","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8005546,"orderField":0},{"dateTime":"Tuesday, Mar 11, 2014","urlTitle":"the-windows-phone-dilemma:-are-crapps-all-that-matter-or-can-dynamics-help-save-microsoft\u2019s-7-billion-nokia-bet-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"MOBILE","description":"It\u2019s almost ironic that using a Windows 8 phone is actually a major geek credential \u2013 albeit geek more in the mold of driving a DeLorean than tooling around in a state of the art Tesla. But as a Windows 8 phone user for the past five months, I can say that no one notices these days when you have a new iPhone, but running around with a Windows 8 phone certainly draws comment, a good deal of it polite, if not positive. Perceptions aside, my Nokia 928 and its software are a pretty damn good tool for work, and as a business tool it\u2019s pretty much on par with my old iPhone \u2013 albeit not a perfect one. And, if you put the larger form factor of the Nokia product line into the equation, the extra real-estate makes a huge difference in my day to day work and consumer life.","dateTimeMS":1394558940000,"title":"The Windows Phone Dilemma: Are Crapps All that Matter, or Can Dynamics Help Save Microsoft\u2019s $7 billion Nokia bet?","type":"blogpost","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=blogpost&urlTitle=the-windows-phone-dilemma%3A-are-crapps-all-that-matter-or-can-dynamics-help-save-microsoft%E2%80%99s-7-billion-nokia-bet-","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8058859,"orderField":0},{"dateTime":"Tuesday, Mar 11, 2014","urlTitle":"traceability","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5954967.png","groupId":5954967,"channel":"SOFTWARE ENGINEERING","description":"Ever corrected a problem and introduced two new defects? Introduced a last-minute change and accidentally removed an important feature? Growing governance concerns demand traceability between needs and solutions to preserve work product integrity. Traceability facilitates maintainability and dramatically reduces cost of rework. However without the right methodology and technology, traceability can be highly inefficient and thus rather decrease value.","dateTimeMS":1394561640000,"title":"Traceability","type":"blogpost","subCategories":"","url":"/web/software-technologies/content?g=5954967&type=blogpost&urlTitle=traceability","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8058899,"orderField":0},{"dateTime":"Wednesday, Mar 26, 2014","urlTitle":"internet-of-things-evolving-into-a-game-changer","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7989281.png","groupId":7989281,"channel":"MOBILE","description":"Unless you\u2019re completely off the technology grid (and in which case, you wouldn\u2019t be reading this post anyhow), you\u2019ve probably been bombarded by countless stories/mentions about the Internet of Things (IoT).\nWhether you\u2019re aware of it \u2013 like it or not \u2013 the IoT is already transforming our lives. Procter & Gamble, for instance, rolled out a web-enabled toothbrush at last month\u2019s Mobile World Congress in Barcelona. It links with your smartphone, records your brushing habits and even has an app providing mouth-care tips alongside news headlines.","dateTimeMS":1395820800000,"title":"Internet of Things Evolving Into a Game Changer","type":"blogpost","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=blogpost&urlTitle=internet-of-things-evolving-into-a-game-changer","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8099775,"orderField":0},{"dateTime":"Friday, Mar 28, 2014","urlTitle":"future-of-mobility-and-its-impact-to-cloud","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5970564.png","groupId":5970564,"channel":"CLOUD","description":"This week, I had the honor of co-hosting the \u201cFuture of Mobility and its Impact to Cloud\u201d breakout session at The Intersection of Cloud and Mobility Forum, which attracted more than 50 government and business experts in the fields of cloud, mobility, and measurement. Here I share some of my presentation main points, and the brainstorming questions. >>> Wearables, Scannables, Drivables, Flyables: Did your pill just call you?\u2014Don\u2019t be surprised! It all is coming in full speed. We will be able to monitor our health through wearables, get our houses on the phone, use the human body for data transmission, and sense the environment.","dateTimeMS":1395995400000,"title":"Future of Mobility and its Impact to Cloud","type":"blogpost","subCategories":"","url":"/web/irena-bojanova/content?g=5970564&type=blogpost&urlTitle=future-of-mobility-and-its-impact-to-cloud","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8109233,"orderField":0},{"dateTime":"Wednesday, Apr 16, 2014","urlTitle":"is-your-company-ready-to-deploy-business-intelligence-intelligently-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8151874.png","groupId":8151874,"channel":"INSIGHTS","description":"Although the majority of data-driven enterprises may have or use BI software or systems, a recent survey we took of IT executives revealed that there is a vast difference between having BI and using BI to the company\u2019s full advantage. There is an even larger chasm between the cost to implement BI and the value realized from those efforts. This is not good news for anyone whose bread-and-butter comes from demonstrating measurable results and ROI. But understanding the reasons why most companies aren\u2019t realizing the full value can help plot the course for the change and make the most of the marvelous tool that is business intelligence.","dateTimeMS":1397670180000,"title":"Is Your Company Ready to Deploy Business Intelligence Intelligently?","type":"blogpost","subCategories":"","url":"/web/major-bi-all-things-business-intelligence/content?g=8151874&type=blogpost&urlTitle=is-your-company-ready-to-deploy-business-intelligence-intelligently-","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8153729,"orderField":0},{"dateTime":"Friday, Apr 18, 2014","urlTitle":"getting-help-from-the-home-country-proving-essential-for-foreign-startups-in-the-u-s-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7989281.png","groupId":7989281,"channel":"NETWORKING","description":"It\u2019s challenging enough trying to generate some noise and buzz about your product/service/app if you\u2019re a U.S.-based startup. Cracking the U.S. market can be daunting. But if you\u2019re a foreign startup, the difficulties are manifold. \nFortunately, many countries and private organizations have realized this and have rolled out extensive programs and services to bolster the success rate for these nascent companies on this side of the pond.","dateTimeMS":1397808120000,"title":"Getting Help from the Home Country Proving Essential for Foreign Startups in the U.S.","type":"blogpost","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=blogpost&urlTitle=getting-help-from-the-home-country-proving-essential-for-foreign-startups-in-the-u-s-","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8157823,"orderField":0},{"dateTime":"Wednesday, Apr 23, 2014","urlTitle":"ngn-insights","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8150864.png","groupId":8150864,"channel":"NETWORKING","description":"Over 1.4 zettabytes. That\u2019s Cisco\u2019s projection for annual global IP traffic by the end of 2017. This translates to 120.6 exabytes per month, a more than 4x increase in the past five years, and an expected 3x increase over the next five years. If you think that this doesn\u2019t impact you, you should take a closer look. You, your company, even your household are all contributors to this explosive traffic growth. \nHow, you ask? Largely through public and private sector demand for mobile and cloud networking services, two of the most significant trends impacting the communications industry today.","dateTimeMS":1398240060000,"title":"NGN Insights","type":"podcast","subCategories":"","url":"/web/ngn-insights/content?g=8150864&type=podcast&urlTitle=ngn-insights","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8162343,"orderField":0},{"dateTime":"Wednesday, May 14, 2014","urlTitle":"it\u2019s-all-about-timing:-why-network-synchronization-matters","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8150864.png","groupId":8150864,"channel":"NETWORKING","description":"Ask anyone, and you know that most people dislike when their calls drop, or when the dreaded \u2018loading\u2019 icon disrupts their live stream of the playoff game. Carriers realize this, and know that network speed and reliability are driving forces behind consumer satisfaction in today\u2019s connected world. With the exabytes of data sent across today\u2019s networks, however, speed and reliability can be difficult to maintain consistently. \n\nWhat\u2019s less commonly known is the role that network timing and synchronization play in this whole equation. 4G LTE networks, for example, rely on highly accurate timing and synchronization for smooth cell-to-cell transfers of the mass of voice, video and mobile data.","dateTimeMS":1400044740000,"title":"It\u2019s All About Timing: Why Network Synchronization Matters","type":"blogpost","subCategories":"","url":"/web/ngn-insights/content?g=8150864&type=blogpost&urlTitle=it%E2%80%99s-all-about-timing%3A-why-network-synchronization-matters","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8190723,"orderField":0},{"dateTime":"Monday, May 19, 2014","urlTitle":"bi-and-your-business:-ignorance-is-not-bliss","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8151874.png","groupId":8151874,"channel":"BIG DATA","description":"Last month we talked about determining whether your company is ready to deploy business intelligence \u2018intelligently.\u2019 I mentioned that there\u2019s a considerable gap between the cost to implement BI and the value gleaned from those efforts \u2013 which isn\u2019t great for anyone whose bread-and-butter comes from demonstrating measurable results and ROI.\n\nAnd as a quick refresh, deploying BI intelligently begins with assessing your organization\u2019s BI goals \u2013 something a lot of companies don\u2019t do well. It\u2019s critical to link BI to your company\u2019s goals/key initiatives \u2013 this helps insure the relevance of decisions made, actions taken based on your BI system.","dateTimeMS":1400476140000,"title":"BI and Your Business: Ignorance Is Not Bliss","type":"blogpost","subCategories":"","url":"/web/major-bi-all-things-business-intelligence/content?g=8151874&type=blogpost&urlTitle=bi-and-your-business%3A-ignorance-is-not-bliss","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8202505,"orderField":0},{"dateTime":"Wednesday, May 21, 2014","urlTitle":"security-privacy-big-data-and-informatica:-making-data-safe-at-the-source-of-use","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"SECURITY","description":"It\u2019s hard to find a set of topics more relevant to the interplay of technology and society than security and privacy. From Glenn Greenwald\u2019s new book on NSA leaker Edward Snowden to the recent finding of a European Union court that Google has to drastically alter the persistence of user data in its services, the societal fallout from the Internet as it enters its Big Data phase is everywhere.","dateTimeMS":1400650320000,"title":"Security, Privacy, Big Data, and Informatica: Making Data Safe at the Source of Use","type":"blogpost","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=blogpost&urlTitle=security-privacy-big-data-and-informatica%3A-making-data-safe-at-the-source-of-use","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8205903,"orderField":0},{"dateTime":"Friday, May 23, 2014","urlTitle":"interoperability-key-to-success-of-health-information-exchanges","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8206605.png","groupId":8206605,"channel":"SOFTWARE ENGINEERING","description":"So with my inaugural post, I wanted to talk about health information exchanges (HIE) \u2013 key technological advances, what\u2019s lacking, what are some of the advantages to doctors and patients, and more.","dateTimeMS":1400821560000,"title":"Interoperability Key to Success of Health Information Exchanges","type":"blogpost","subCategories":"","url":"/web/the-doctor-is-in/content?g=8206605&type=blogpost&urlTitle=interoperability-key-to-success-of-health-information-exchanges","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8209639,"orderField":0},{"dateTime":"Thursday, May 29, 2014","urlTitle":"sap-ariba-and-the-future-of-b2b-networks","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"INSIGHTS","description":"Can the Internet of Highly Insecure Things Be Trusted to Run the One True Network?\nAs the dust settles on the recent changes at SAP, and with SAPPHIRE looming large, it\u2019s worth taking a look at what I think will be one of the most interesting, ambitious, and potentially lucrative bets SAP has made in a long time. The bet is on Ariba and its vision for a global, competitor-crushing, B2B network. At stake is nothing short of a major reconfiguration of the global economy, global trade, global service delivery, and pretty everything else that falls under the rubric of B2B commerce as we know it.","dateTimeMS":1401339600000,"title":"SAP, Ariba, and the Future of B2B Networks","type":"blogpost","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=blogpost&urlTitle=sap-ariba-and-the-future-of-b2b-networks","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8219402,"orderField":0},{"dateTime":"Friday, May 30, 2014","urlTitle":"uae-making-significant-inroads-in-utilizing-advanced-medical-technologies","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8206605.png","groupId":8206605,"channel":"","description":"The United Arab Emirates, a federation of seven states (Abu Dhabi, Dubai, Ajman, Fujairah, Ras al Khaimah, Sharjah and Umm al Qaiwain) formed in 1971, has grown over the past 15 years to become one of the Middle East\u2019s most important economic centers.\n\nConcurrent with this phenomenal growth have been major advancements in the healthcare arena. In fact, according to the World Health Organization (WHO), the UAE ranked first in life expectancy in 2009 (78 years), had the lowest infant mortality rate and was ranked third in having the lowest adult mortality rate among other Gulf Cooperation Council (GCC) countries.","dateTimeMS":1401426000000,"title":"UAE Making Significant Inroads in Utilizing Advanced Medical Technologies","type":"podcast","subCategories":"","url":"/web/the-doctor-is-in/content?g=8206605&type=podcast&urlTitle=uae-making-significant-inroads-in-utilizing-advanced-medical-technologies","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8219500,"orderField":0},{"dateTime":"Friday, May 30, 2014","urlTitle":"israeli-semiconductor-industry-continues-to-thrive-but-some-clouds-may-be-on-horizon","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7989281.png","groupId":7989281,"channel":"","description":"Back in 1974, Dov Frohman, one of Intel\u2019s first employees and the inventor of EPROM, erasable programmable read only memory, decided to leave Silicon Valley and return to Israel, his adopted home since 1949. Frohman was charged with helping Intel establish a small chip design center in Haifa, which at the time, was Intel\u2019s first outside the U.S.\nThe rest, as the cliché goes, is history. In a little over a generation, the Israeli semiconductor industry has grown to now employ more than 20,000; annual revenues are about US $5 billion.","dateTimeMS":1401476280000,"title":"Israeli Semiconductor Industry Continues to Thrive, but Some Clouds May Be on Horizon","type":"blogpost","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=blogpost&urlTitle=israeli-semiconductor-industry-continues-to-thrive-but-some-clouds-may-be-on-horizon","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8222951,"orderField":0},{"dateTime":"Tuesday, Jun 3, 2014","urlTitle":"secure-ethernet-everywhere:-future-proofing-iot-networks","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8150864.png","groupId":8150864,"channel":"SECURITY","description":"$19 trillion. That\u2019s the Internet of Things (IoT) market size as recently estimated by Cisco CEO John Chambers. According to Morgan Stanley forecasts, some 75 billion devices could be connected to the IoT by 2020, or 9.4 devices for each one of the eight billion people on earth. \n\nWhile much of the hype is on the consumer side and still coming to fruition, the industrial IoT is an entirely different animal and very real today. There are multiple industrial IoT applications where the embedded machine-to-machine (M2M) networking between \u2018smart objects\u2019 already exists. This includes a range of commercial, industrial and government applications, ranging from video surveillance and security, smart energy, intelligent transportation, digital signage, manufacturing automation and even automotive connectivity, to name a few. And these applications have far more exacting requirements than consumer-based IoT, the key ones of which we\u2019ll address.","dateTimeMS":1401772980000,"title":"Secure Ethernet Everywhere: Future-Proofing IoT Networks","type":"blogpost","subCategories":"","url":"/web/ngn-insights/content?g=8150864&type=blogpost&urlTitle=secure-ethernet-everywhere%3A-future-proofing-iot-networks","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8225193,"orderField":0},{"dateTime":"Wednesday, Jun 25, 2014","urlTitle":"internet-of-things-becoming-a-healthcare-game-changer","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8206605.png","groupId":8206605,"channel":"CLOUD","description":"The IoT is already resulting in significant changes in many areas of healthcare. To explore further, I reached out to a number of globally recognized IoT experts and posed a number of questions.","dateTimeMS":1403673420000,"title":"Internet of Things Becoming a Healthcare Game Changer","type":"blogpost","subCategories":"","url":"/web/the-doctor-is-in/content?g=8206605&type=blogpost&urlTitle=internet-of-things-becoming-a-healthcare-game-changer","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8279819,"orderField":0},{"dateTime":"Wednesday, Jun 25, 2014","urlTitle":"selfies:-evolving-technology-may-be-a-boon-for-business","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7989281.png","groupId":7989281,"channel":"MOBILE","description":"The \u2018selfie\u2019 phenomenon has grown exponentially. BGR, for instance, estimates more than 250 billion selfies will be taken worldwide this year.\nPeople from all walks of life have embraced selfies. In fact, The Guardian reports that UK farmers are posting \u2018felfies\u2019 \u2013 a selfie snapped on the farm.\n\u201cBut it\u2019s not just for fun \u2013 social media is a lifeline for people in a lonely profession\u2026the \u2018felfie\u2019 is taking off, with farmers posting photos of themselves next to their favorite sheep, cow or tractor,\u201d noted The Guardian.","dateTimeMS":1403726760000,"title":"Selfies: Evolving Technology May Be a Boon for Business","type":"podcast","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=podcast&urlTitle=selfies%3A-evolving-technology-may-be-a-boon-for-business","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8283819,"orderField":0},{"dateTime":"Tuesday, Jul 1, 2014","urlTitle":"the-rise-of-the-small-cells-&-a-\u2018brand-new-network\u2019-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8150864.png","groupId":8150864,"channel":"SECURITY","description":"According to Google Developer Advocate, Don Dodge, the Internet of Things (IoT) requires a \u2018brand new network.\u2019 He made some great points at the recent MIT Technology Review Digital Summit, but the linchpin of what he\u2019s really talking about here is small cells. That is, the femto-, pico- and microcells that carriers use to fill in the coverage and capacity gaps in their networks. These are the same small cells that have become so commonplace that AT&T actually has a whole commercial campaign essentially explaining small cells and how they\u2019re using them to improve their network.","dateTimeMS":1404192600000,"title":"The Rise of the Small Cells & A \u2018Brand New Network\u2019?","type":"blogpost","subCategories":"","url":"/web/ngn-insights/content?g=8150864&type=blogpost&urlTitle=the-rise-of-the-small-cells-%26-a-%E2%80%98brand-new-network%E2%80%99-","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8290921,"orderField":0},{"dateTime":"Thursday, Jul 10, 2014","urlTitle":"the-nexus-of-forces-at-world-cup-2014","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/5970564.png","groupId":5970564,"channel":"","description":"The Nexus of Forces (defined as convergence and mutual reinforcement of social, mobile, cloud, and information) in combination with the Internet of Everything (IoE) had a game changing role at the World Cup in Brazil","dateTimeMS":1404969900000,"title":"The Nexus of Forces at World Cup 2014","type":"blogpost","subCategories":"","url":"/web/irena-bojanova/content?g=5970564&type=blogpost&urlTitle=the-nexus-of-forces-at-world-cup-2014","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8312399,"orderField":0},{"dateTime":"Tuesday, Jul 15, 2014","urlTitle":"computing-appliances-to-accelerate-deployment-of-new-hardware-and-software-technologies","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/53319.png","groupId":53319,"channel":"SOFTWARE ENGINEERING","description":"The advent of hyperscale semiconductor integration (HSI) is now driving development of a new generation of massivelyparallel processing (MPP) computer systems for enterprise computing.","dateTimeMS":1405431540000,"title":"Computing Appliances to Accelerate Deployment of New Hardware and Software Technologies","type":"blogpost","subCategories":"","url":"/web/computingnow/content?g=53319&type=blogpost&urlTitle=computing-appliances-to-accelerate-deployment-of-new-hardware-and-software-technologies","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8316062,"orderField":0},{"dateTime":"Wednesday, Jul 23, 2014","urlTitle":"organ-on-a-chip-could-aid-drug-discovery-be-the-shape-of-medicine-to-come","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7989281.png","groupId":7989281,"channel":"","description":"Culturing 3D human tissue on a microchip isn\u2019t new. Like system-on-a-chip (SoC), which shoehorns most of a digital computer into a single chip, an organ-on-a-chip is designed to replicate human organ functions (including activities and mechanics like blood and oxygen flow) on a transparent, flexible microchip. These microfluidic devices which, in effect, are 3D cell culture versions of real organs, already exist for artery, cartilage, gut, heart, kidney, and skin.","dateTimeMS":1406120400000,"title":"Organ-on-a-Chip Could Aid Drug Discovery, Be the Shape of Medicine to Come","type":"podcast","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=podcast&urlTitle=organ-on-a-chip-could-aid-drug-discovery-be-the-shape-of-medicine-to-come","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8337165,"orderField":0},{"dateTime":"Tuesday, Jul 22, 2014","urlTitle":"telemedicine-boosting-healthcare-in-rural-communities","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8206605.png","groupId":8206605,"channel":"","description":"Telemedicine has been around in some form for almost 40 years \u2013 and it\u2019s now increasingly becoming a cost-effective and indispensable tool for doctors, rural hospitals, and local and regional governmental agencies situated in rural areas.","dateTimeMS":1406034360000,"title":"Telemedicine Boosting Healthcare in Rural Communities","type":"podcast","subCategories":"","url":"/web/the-doctor-is-in/content?g=8206605&type=podcast&urlTitle=telemedicine-boosting-healthcare-in-rural-communities","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8337702,"orderField":0},{"dateTime":"Monday, Sep 1, 2014","urlTitle":"barriers-to-telehealth-adoption-slowly-coming-down","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8206605.png","groupId":8206605,"channel":"NETWORKING","description":"Telehealth. \nWe\u2019ve seen that word bandied about frequently. In brief, telehealth comprises not only physician-patient interactions but information and educational services that foster awareness of treatments, medical conditions, good health practices and diagnoses.\n\nAnd while telehealth is becoming more widespread, NTT DATA, a Tokyo-based IT services provider, indicated in its Trends in Telehealth white paper published earlier this year that \u201cthe healthcare industry is historically a late adopter of technology and this has proven to be a barrier to all new solutions that rely on technology.\u201d","dateTimeMS":1409588640000,"title":"Barriers to Telehealth Adoption Slowly Coming Down","type":"blogpost","subCategories":"","url":"/web/the-doctor-is-in/content?g=8206605&type=blogpost&urlTitle=barriers-to-telehealth-adoption-slowly-coming-down","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8401929,"orderField":0},{"dateTime":"Monday, Sep 1, 2014","urlTitle":"3d-printing-opening-the-doors-to-counterfeiters","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7989281.png","groupId":7989281,"channel":"","description":"Last year architects in Amsterdam started constructing a 3D printed home. Aircraft manufacturers are honing ways to build 3D printed planes. And 3D printing is now wending its way through the fashion industry. A 3D printed dress designed by Michael Schmidt (designed on an iPad), was printed for a private runway event \u2013 it was printed in 17 parts on an EOS P350 3D printer.\n\n\u201c3D printing presents tremendous opportunities for businesses,\u201d said Simon Jones, a partner at DLA Piper in London, a global law firm. \u201cManufacturers will no longer need to own large production facilities halfway around the world, because they can print products on demand or sell licenses to print them locally. This will have a huge impact on the supply chain; it will benefit the environment as there will be less waste, and companies will no longer need to spend a fortune gearing up to make a product and hoping its stock sells.\u201d\n\nSo the sky\u2019s the limit for 3D printing.\n\nAnd for counterfeiters too.","dateTimeMS":1409589000000,"title":"3D Printing Opening the Doors to Counterfeiters","type":"blogpost","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=blogpost&urlTitle=3d-printing-opening-the-doors-to-counterfeiters","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8401945,"orderField":0},{"dateTime":"Monday, Sep 1, 2014","urlTitle":"acumatica-living-the-channel-challenge-in-the-midmarket","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"","description":"Acumatica -- Living the Channel Challenge in the Midmarket","dateTimeMS":1409589840000,"title":"Acumatica -- Living the Channel Challenge in the Midmarket","type":"blogpost","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=blogpost&urlTitle=acumatica-living-the-channel-challenge-in-the-midmarket","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8401969,"orderField":0},{"dateTime":"Monday, Sep 15, 2014","urlTitle":"successfactor\u2019s-success-factors:-questions-in-search-of-answers","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"BIG DATA","description":"I\u2019m heading to the SuccessFactors user conference, SuccessConnect, in Las Vegas this week and, as a prelude to the conference, here\u2019s some of the questions I\u2019m looking to have answered during the course of the conference.","dateTimeMS":1410758820000,"title":"SuccessFactor\u2019s Success Factors: Questions in Search of Answers","type":"blogpost","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=blogpost&urlTitle=successfactor%E2%80%99s-success-factors%3A-questions-in-search-of-answers","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8418929,"orderField":0},{"dateTime":"Wednesday, Sep 17, 2014","urlTitle":"understanding-the-supply-chain-data-continu-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8151874.png","groupId":8151874,"channel":"BIG DATA","description":"I will be the first to admit that there are lots of different ways to categorize data. And I would like to add, that there is not necessarily one right way to do it. But at the end of the day, understanding the totality of a problem is easier if you find a way to break it down into component parts, categories, or summarize the information.","dateTimeMS":1410930840000,"title":"Understanding the Supply Chain Data Continuum","type":"blogpost","subCategories":"","url":"/web/major-bi-all-things-business-intelligence/content?g=8151874&type=blogpost&urlTitle=understanding-the-supply-chain-data-continu-1","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8427588,"orderField":0},{"dateTime":"Thursday, Sep 18, 2014","urlTitle":"successfactors-workday-and-sap-\u2013-answers-and-more","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"CLOUD","description":"SuccessFactors\u2019 user conference, SuccessConnect, has come and gone, and the four questions I posed in my previous post about the challenges facing SuccessFactors and SAP were largely answered. But, as in any good dialectic, one good answer is just the starting point for another good question\u2026.. I\u2019ll start with the Workday question/answer in this post, and continue with answers to my other three questions in a subsequent post.","dateTimeMS":1411019100000,"title":"SuccessFactors, Workday, and SAP \u2013 Answers and More","type":"podcast","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=podcast&urlTitle=successfactors-workday-and-sap-%E2%80%93-answers-and-more","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8427605,"orderField":0},{"dateTime":"Tuesday, Sep 23, 2014","urlTitle":"even-without-larry-oracle\u2019s-problems-will-continue","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"CLOUD","description":"The fundamental problems plaguing Oracle won\u2019t go away with Larry moving into an executive chairman role, this is more lipstick on a pig than a serious attempt to get the company back on course. The problem is that shuffling the deck chairs does nothing for dealing with the company\u2019s three fundamental problems. Until these are addressed, I think it\u2019s safe to assume there will be no turnaround any time soon.","dateTimeMS":1411451520000,"title":"Even without Larry, Oracle\u2019s Problems Will Continue","type":"blogpost","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=blogpost&urlTitle=even-without-larry-oracle%E2%80%99s-problems-will-continue","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8436218,"orderField":0},{"dateTime":"Friday, Oct 3, 2014","urlTitle":"smart-cities:-the-future-is-now","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7989281.png","groupId":7989281,"channel":"NETWORKING","description":"With the world\u2019s population now exceeding seven billion, many municipalities in both emerging markets and developed nations are paying closer attention on how they manage their infrastructure and resources.\n\nA number of larger cities are well on their way to becoming smart cities. Market research firm Frost & Sullivan succinctly sums up how these cities are now being defined \u2013 built on solutions and technology leading to the adoption of at least five of eight smart parameters \u2013 smart energy, smart building, smart mobility, smart healthcare, smart infrastructure, smart technology, smart governance and smart education, and smart citizen.","dateTimeMS":1412312520000,"title":"Smart Cities: The Future Is Now","type":"blogpost","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=blogpost&urlTitle=smart-cities%3A-the-future-is-now","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8453096,"orderField":0},{"dateTime":"Thursday, Oct 2, 2014","urlTitle":"bringing-telemedicine-to-the-workplace","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8206605.png","groupId":8206605,"channel":"INSIGHTS","description":"While telemedicine in the workplace to date has been used more by large businesses, this is thankfully beginning to change as technology costs decrease and support increases.\n\nBusinesses of all sizes are realizing that the benefits of telemedicine in the workplace are considerable:\n\nØ Fewer expensive visits to the emergency room;\n\nØ Better employee retention;\n\nØ Reduced employee time away from the job.\n\nAnd some companies have particularly been proactive in introducing telemedicine in the workplace. Way back in 2011, noted Modern Healthcare, Cisco expanded its use of telemedicine to reach employees at other locations and to connect San Jose, CA-based workers to specialists.","dateTimeMS":1412226180000,"title":"Bringing Telemedicine to the Workplace","type":"blogpost","subCategories":"","url":"/web/the-doctor-is-in/content?g=8206605&type=blogpost&urlTitle=bringing-telemedicine-to-the-workplace","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8454024,"orderField":0},{"dateTime":"Tuesday, Oct 7, 2014","urlTitle":"why-you-should-care-about-mobile-security","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8150864.png","groupId":8150864,"channel":"SECURITY","description":"A recent WIRED article claimed that millennials don\u2019t care about mobile security. But like it or not, the fact is that that security in mobile networks is a growing concern, and clearly an issue that\u2019s not going away anytime soon. As my colleague, Martin Nuss, pointed out in a panel discussion at CTIA Super Mobility Week last month, the explosion in 4G networks driven by small cell deployment, coupled with the tremendous growth in BYOD, has created a global IT security threat that needs urgent attention.","dateTimeMS":1412660220000,"title":"Why You Should Care About Mobile Security","type":"blogpost","subCategories":"","url":"/web/ngn-insights/content?g=8150864&type=blogpost&urlTitle=why-you-should-care-about-mobile-security","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8458272,"orderField":0},{"dateTime":"Friday, Oct 10, 2014","urlTitle":"hp\u2019s-breakup-is-oracle\u2019s-future","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"INSIGHTS","description":"The news that Meg Whitman is finally pulling the plug on the Sisyphian task of trying to resurrect HP has profound implications for the future of Oracle, and not just because the mess that Whitman was unable to unravel was an HP made functionally unmanageable by a previous HP CEO: Mark Hurd, now co-CEO of Oracle. I think Oracle has been on the leadership skids for a while, but Hurd\u2019s track record at HP, the end-game of which is now being played out in the breakup of the once-vaunted tech leader, provides a good roadmap for how Oracle ends up on the chopping block like HP.","dateTimeMS":1412973600000,"title":"HP\u2019s Breakup is Oracle\u2019s Future","type":"blogpost","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=blogpost&urlTitle=hp%E2%80%99s-breakup-is-oracle%E2%80%99s-future","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8465801,"orderField":0},{"dateTime":"Monday, Nov 17, 2014","urlTitle":"understanding-the-supply-chain-distribution-continuum","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8151874.png","groupId":8151874,"channel":"","description":"Distribution or dissemination of information is probably one of the most critical aspects of supply chain business intelligence and information management. The reason is that the cost associate with data collection, data cleansing and analytics is incurred up front in the information management process, while the benefits that are derived from the former can only be realized if the information is in the hands of the right people.","dateTimeMS":1416205440000,"title":"Understanding The Supply Chain Distribution Continuum","type":"blogpost","subCategories":"","url":"/web/major-bi-all-things-business-intelligence/content?g=8151874&type=blogpost&urlTitle=understanding-the-supply-chain-distribution-continuum","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8476975,"orderField":0},{"dateTime":"Thursday, Oct 23, 2014","urlTitle":"how-telemedicine-can-help-treat-ebola-and-other-infectious-diseases","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8206605.png","groupId":8206605,"channel":"INSIGHTS","description":"While President Obama\u2019s naming last week of a new \u2018Ebola czar\u2019 (Ron Klain, a former White House advisor) to oversee the federal government\u2019s response to the outbreak, here and abroad, is a positive step, much more is needed to help combat the contagious disease.\nThere are tools to treat Ebola and other infectious diseases remotely - in particular \u2013 telemedicine.","dateTimeMS":1414041840000,"title":"How Telemedicine Can Help Treat Ebola and Other Infectious Diseases","type":"blogpost","subCategories":"","url":"/web/the-doctor-is-in/content?g=8206605&type=blogpost&urlTitle=how-telemedicine-can-help-treat-ebola-and-other-infectious-diseases","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8483050,"orderField":0},{"dateTime":"Friday, Oct 24, 2014","urlTitle":"can-salesforce-com-deliver-the-complex-business-processes-it-aspires-to-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"CLOUD","description":"It\u2019s hard to slog through mega-conferences like Dreamforce, and not just because 135,000 people are way too much for San Francisco and its Moscone Center to handle. The sheer girth of Salesforce.com is also a factor: the company has become an immensely complicated and multifaceted company, maybe too much so for a single conference. Regardless, Dreamforce reminds me of why I don\u2019t see my favorite bands in a coliseum setting: The volume needed to fill a coliseum washes out the undertones and overtones that make music a rich and complex listening experience, instead leaving the listener to sort through a lot of random, washed out noise.","dateTimeMS":1414129020000,"title":"Can Salesforce.com Deliver the Complex Business Processes it Aspires To?","type":"blogpost","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=blogpost&urlTitle=can-salesforce-com-deliver-the-complex-business-processes-it-aspires-to-","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8483514,"orderField":0},{"dateTime":"Thursday, Oct 30, 2014","urlTitle":"microsoft-hones-its-enterprise-message","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"INSIGHTS","description":"There\u2019s always a lot to say about Microsoft, and, like any big company, it\u2019s usually a mix of good or bad. Having spent two days last week at the Microsoft Dynamics analyst event, I think that when it comes to the enterprise, most of what there is to say about Microsoft isn\u2019t just good: Microsoft\u2019s enterprise story just gets better and better, and while there are holes and issues abounding, the old maxim that Microsoft eventually gets it right was very much in evidence last week (with one notable, and important exception).","dateTimeMS":1414689060000,"title":"Microsoft Hones Its Enterprise Message","type":"blogpost","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=blogpost&urlTitle=microsoft-hones-its-enterprise-message","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8492856,"orderField":0},{"dateTime":"Thursday, Oct 30, 2014","urlTitle":"classroom-technology-changing-the-way-kids-\u2013-and-adults-learn","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7989281.png","groupId":7989281,"channel":"INSIGHTS","description":"Textbook.\n20th Century definition: A manual of instruction in any branch of study.\n21st Century definition: Ancient learning methodology, last used by aging baby boomers. Killed lots of trees. Replaced by e-Books that are usually interactive and often open or free to use and sometimes edit.","dateTimeMS":1414689540000,"title":"Classroom Technology Changing the Way Kids \u2013 And Adults Learn","type":"blogpost","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=blogpost&urlTitle=classroom-technology-changing-the-way-kids-%E2%80%93-and-adults-learn","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8492870,"orderField":0},{"dateTime":"Thursday, Nov 13, 2014","urlTitle":"understanding-the-supply-chain-collaboration-continuum","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8151874.png","groupId":8151874,"channel":"","description":"Collaboration of information and timing and are two extremely critical aspects of supply chain business intelligence and information management. Not getting data to the appropriate decision makers renders the information nominally useless. Not giving it to the right people, or right group of people, via the right mechanism also means that data loses value. \nThe truth is that moving information between humans is much more difficult to do in some cases than it is to calculate reports and analytics that need to be disseminated. This is because collaboration between humans is a behavioral issue, and no amount of technology thrown at the problem can make people silos disappear.","dateTimeMS":1415859120000,"title":"Understanding the Supply Chain Collaboration Continuum","type":"blogpost","subCategories":"","url":"/web/major-bi-all-things-business-intelligence/content?g=8151874&type=blogpost&urlTitle=understanding-the-supply-chain-collaboration-continuum","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8506101,"orderField":0},{"dateTime":"Monday, Nov 10, 2014","urlTitle":"one-minute-guide-to-understanding-the-supply-chain-analytics-continuum","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/8151874.png","groupId":8151874,"channel":"","description":"Analytics are now an integral part of any supply chain information management system. Modern computing power and advances in analytical software have made powerful analytics not only possible, but practical for most businesses sitting on top of a cornucopia of supply chain data. Analytics run the gambit from historical data dumps to models that suggest the best course of action based on a set of probable outcomes.","dateTimeMS":1415600700000,"title":"One minute Guide to Understanding the Supply Chain Analytics Continuum","type":"podcast","subCategories":"","url":"/web/major-bi-all-things-business-intelligence/content?g=8151874&type=podcast&urlTitle=one-minute-guide-to-understanding-the-supply-chain-analytics-continuum","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8506121,"orderField":0},{"dateTime":"Tuesday, Nov 18, 2014","urlTitle":"women-of-the-supply-chain:-responsibility-collaboration-and-bathroom-lines","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"","description":"Hanging out with Kinaxis, the relatively small and always interesting supply chain vendor from Ottawa, Canada, never fails to be an eye-opening experience. It\u2019s not just that I get to meet with a vendor and a loyal cadre of customers who are collectively pushing the envelope on all things supply chain, it\u2019s that sometimes they\u2019re pushing an envelope I hadn\u2019t seen before in my peregrinations in the supply chain world. \nThis year\u2019s Kinexions user conference was no different. What I heard from Kinaxis about taking Rapid Response, its in-memory supply chain planning product, further into the realm of collaboration by pushing users to self-identify their areas of responsibility represented an excellent strategic direction on the part of Kinaxis","dateTimeMS":1416290520000,"title":"Women of the Supply Chain: Responsibility, Collaboration and Bathroom Lines","type":"blogpost","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=blogpost&urlTitle=women-of-the-supply-chain%3A-responsibility-collaboration-and-bathroom-lines","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8518713,"orderField":0},{"dateTime":"Monday, Dec 1, 2014","urlTitle":"high-tech-ordering-becoming-the-norm-at-both-mainstream-and-fast-food-restaurants","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7989281.png","groupId":7989281,"channel":"MOBILE","description":"It\u2019s probably not too far fetched now to predict that in the near future \u2013 at least within the next decade or so according to some studies and experts \u2013 you might be served by R2D2, or a similar robotic food service entity.\nYes, numerous restaurants, especially those of the fast-food variety, are rapidly embracing","dateTimeMS":1417446600000,"title":"High-Tech Ordering Becoming the Norm at Both Mainstream and Fast-Food Restaurants","type":"blogpost","subCategories":"","url":"/web/nealnotes/content?g=7989281&type=blogpost&urlTitle=high-tech-ordering-becoming-the-norm-at-both-mainstream-and-fast-food-restaurants","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8535233,"orderField":0},{"dateTime":"Tuesday, Dec 2, 2014","urlTitle":"net-neutrality-\u2013-confusion-content-and-the-meaning-of-free","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"MOBILE","description":"There is perhaps no contemporary issue at the intersection of technology and public policy that is more contentious and conflicted than net neutrality. The issue itself has probably accounted for its own increase in Internet traffic over the last couple of years as opinions, jeremiads, official proclamations, and even HBO\u2019s John Oliver, have weighed in on the issue.","dateTimeMS":1417540860000,"title":"Net Neutrality \u2013 Confusion, Content, and the Meaning of Free","type":"podcast","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=podcast&urlTitle=net-neutrality-%E2%80%93-confusion-content-and-the-meaning-of-free","target":"_self","peerReviewed":false,"subType":"PODCAST","id":8535305,"orderField":0},{"dateTime":"Wednesday, Dec 10, 2014","urlTitle":"windows-phone-looks-doomed:-does-this-mean-trouble-for-windows-10-","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"MOBILE","description":"I think it\u2019s pretty fair to say that counting Microsoft out in a market it has made a commitment to is a classic rookie mistake that serves as the epitaph for too many forgotten companies. If at first you don\u2019t succeed, try try again is a time-honored mantra in Redmond. And it\u2019s pretty evident that Windows Phone is one of those areas where Microsoft has made big commitments \u2013 including but hardly limited to its $7.2 billion purchase of Nokia\u2019s phone business \u2013 and where the company is on the record as committed to try try again.","dateTimeMS":1418222040000,"title":"Windows Phone Looks Doomed: Does this Mean Trouble for Windows 10?","type":"blogpost","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=blogpost&urlTitle=windows-phone-looks-doomed%3A-does-this-mean-trouble-for-windows-10-","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":8545327,"orderField":0},{"dateTime":"Friday, Feb 13, 2015","urlTitle":"s-4-hana-it-s-not-r-3-and-it-s-not-1992-either-part-i-1","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/6416743.png","groupId":6416743,"channel":"","description":"So, smooth sailing for S/4 HANA?\u2013 Not likely, certainly nothing like the good old days when R/3 was the biggest and the baddest modern, client/server, enterprise software product on the market, marauding through the global economy like a rum-soaked buccaneer.","dateTimeMS":1423838700000,"title":"S/4 HANA: It\u2019s not R/3, and it\u2019s not 1992 either (part II)","type":"blogpost","subCategories":"","url":"/web/enterprise-thinking/content?g=6416743&type=blogpost&urlTitle=s-4-hana-it-s-not-r-3-and-it-s-not-1992-either-part-i-1","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":51934827,"orderField":0},{"dateTime":"Wednesday, Apr 22, 2015","urlTitle":"scott-galloway-on-the-four-horsemen-amazon-apple-facebook-google","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"Future of Apple, Google, Amazon and Facebook","dateTimeMS":1429711080000,"title":"Scott Galloway on The Four Horsemen: Amazon/Apple/Facebook & Google","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=scott-galloway-on-the-four-horsemen-amazon-apple-facebook-google","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":54013662,"orderField":0},{"dateTime":"Wednesday, Apr 22, 2015","urlTitle":"node-to-self-get-ready-for-asynchronous-programming-part-i","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"Node.js introduction","dateTimeMS":1429711260000,"title":"Node to Self: Get Ready for Asynchronous Programming - Part I","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=node-to-self-get-ready-for-asynchronous-programming-part-i","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":54013901,"orderField":0},{"dateTime":"Thursday, Apr 30, 2015","urlTitle":"node-to-self-get-ready-for-asynchronous-programming-part-ii","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"Installing and configuring Node.js and NPM.","dateTimeMS":1430405580000,"title":"Node to Self: Get Ready for Asynchronous Programming - Part II","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=node-to-self-get-ready-for-asynchronous-programming-part-ii","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":54026390,"orderField":0},{"dateTime":"Friday, May 8, 2015","urlTitle":"node-to-self-get-ready-for-asynchronous-programming-part-iii","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"mongoDB Installation & Configuration","dateTimeMS":1431100260000,"title":"Node to Self: Get Ready for Asynchronous Programming - Part III","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=node-to-self-get-ready-for-asynchronous-programming-part-iii","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":54042281,"orderField":0},{"dateTime":"Thursday, May 28, 2015","urlTitle":"node-to-self-get-ready-for-asynchronous-programming-part-iiii","javaClass":"org.ieee.common.bean.ContentBean","imagePath":"/cms/Computer.org/ComputingNow/homepage/blog/logos/7187424.png","groupId":7187424,"channel":"","description":"Connect node.js to mongoDB","dateTimeMS":1432835040000,"title":"Node to Self: Get Ready for Asynchronous Programming - Part IIII","type":"blogpost","subCategories":"","url":"/web/no-batteries-required/content?g=7187424&type=blogpost&urlTitle=node-to-self-get-ready-for-asynchronous-programming-part-iiii","target":"_self","peerReviewed":false,"subType":"BLOGPOST","id":54084119,"orderField":0}]}; _.each(initialContentList.list, function (listItem, itemIndex) { addToCollection(listItem); }); populateContentListContainer_13wM(contentCollection_13wM, false, 0, displayThisManyItems_13wM); } function getRemainingContent_13wM() { var url = "/web/computingnow/rest/-/api/" + "contentList"; var initialChunk = 50; var asyncChunk = 200; var totalRecords = 200; for ( var count = initialChunk; count 0 ) { scrollMovement_13wM("DOWN", scrollDuration_13wM, "SCROLLBAR"); } else { scrollMovement_13wM("UP", scrollDuration_13wM, "SCROLLBAR"); } lastPositionForDirectionalScroll = currentPosition; }); });
 
For for information please visit the PRQA site.
What Do You Think?

Computing Now Blogs
Business Intelligence
by Keith Peterson
Cloud Computing
A Cloud Blog: by Irena Bojanova
The Clear Cloud: by STC Cloud Computing
Careers
Computing Careers: by Lori Cameron
Display Technologies
Enterprise Solutions
Enterprise Thinking: by Josh Greenbaum
Healthcare Technologies
The Doctor Is In: Dr. Keith W. Vrbicky
Heterogeneous Systems
Hot Topics
NealNotes: by Neal Leavitt
Industry Trends
Internet Of Things
Sensing IoT: by Irena Bojanova