Every city can be made smarter by technology. But knowing how to start on the right path to become a smart city can be hard because no two cities are alike […]
Continue Reading-
Doing the right thing: The rise of ethics in tech
Increasingly, technology companies have been focusing on their corporate social responsibility as well as their products, as customers demand both good tech and good conduct. The “State of the Connected […]
Continue Reading -
Top 10 data and analytics conferences to attend in 2020
Data and analytics are permanent business fixtures, but how they are used is subject to constant change. The options on how data is consumed and analyzed seem endless, but each […]
Continue Reading -
Hacking for a cause: Public-interest technologists needed to fight cybercrime
Do you have a cause you feel passionate about? Civil liberties, human rights, domestic abuse, conservation, animal rights? If your answer is yes, raise your hand. Technologists are desperately needed […]
Continue Reading -
An innovation war: Cybersecurity vs. cybercrime
69 percent of organizations believe they will not be able to respond to security threats without AI. Read why. Report – – 8 Pages Hackers are no slackers at innovation, […]
Continue Reading -
14 IoT conferences to attend in 2020
The Internet of Things has grown from novelty status to driving autonomous vehicles and running smart homes and factories. IoT’s phenomenal growth has created fertile ground for new disciplines to […]
Continue Reading -
How not to get ransomware
Ransomware is a particularly malicious and scary form of malware. Just about anyone can understand it well enough to be terrified of it. Without warning, you will have a choice: […]
Continue Reading -
Join us at the Mayoral Housing, Transportation & Jobs Summit
A Los Angeles summit focused on addressing the mounting affordable housing and congestion crisis and their effect on businesses and employment in the L.A. region presented by LABC.
Continue Reading -
Exascale computing by the numbers
Exascale computing by the numbers Mind-bending amounts of data, converging workloads, and the digital transformation race. These are some of the things driving the need for exascale computing. Exascale computing […]
Continue Reading -
WPA3: Your next wireless devices should support it
The “best if used by” date on the underside of your Wi-Fi router has long since passed. The WPA2 encryption standard it uses was adopted 15 years ago and suffers […]
Continue Reading -
Dodging drone traffic jams: Is integrated air traffic control finally arriving?
Fifty years ago, Mike Sanders watched with awe and anticipation as the crew of Apollo 11—Neil Armstrong, Buzz Aldrin, and Michael Collins—splashed down in the Pacific Ocean. Landing men on […]
Continue Reading -
Lightweight devices demand lightweight cryptographic capabilities
The world around us is increasingly filled with connected computing devices, even if we don’t recognize them as such. These are the computers running our automobile, lighting, and alarm systems; […]
Continue Reading -
Podcast: How AI keeps Formula E race cars running at peak efficiency
[Editor’s note: This podcast was originally published on Aug. 7, 2019.] In Formula One racing, teams work on the whole car, from design to build. Not so in Formula E, […]
Continue Reading -
Swarm learning and the artificially intelligent edge
Perhaps you’ve driven by a field and seen a flock of tens of thousands of starlings pulsing and whipping through the air, a relatively common sight, especially in Europe. Perhaps you’ve been […]
Continue Reading -
Your competition has a digital transformation plan. Do you?
The term digital transformation has caught fire among enterprises in the past several years, but many companies don’t fully comprehend its implications for them today, tomorrow, and well into the […]
Continue Reading -
Password policy recommendations: Here’s what you need to know.
Complexity, uniqueness, and periodic change have long been the top best practices for passwords, but new recommendations have led to changes around password policies.
Continue Reading
You must be logged in to post a comment.