3D chips: The next electronics revolution
To accomplish anything in the suburbs, you need to get in your car and drive to another address. Downtown, in a skyscraper, you just use an elevator.To read this article in full or to leave a comment,...
View ArticleToday, the Internet -- tomorrow, the Internet of Things?
Embedded in the heel of his shoe was an early example of the Internet of Things -- but Andrew Duncan didn't know it at the time."My girlfriend was able to watch me on the computer screen as I did a...
View ArticlePrinter ink: How to spend less
Human blood costs about $17.27 an ounce, silver about $34 an ounce. But both are bargains compared to the ink sold to the owners of inkjet printers, which can exceed $80 an ounce. Meanwhile, the ink...
View ArticleToday, printers. Tomorrow, 'integrated peripherals'?
Out went 42 aging black and white copiers with interface boxes that let them serve as printers. In went 42 new networked multi-function printers (MFPs) that could do color printing and copying and scan...
View ArticleIncubator grows firms via geek service swaps
Drawn with colored markers, the large sales chart is handsomely done. But it's drawn on the window. Carlos Maestas, occupant of one of the three desks in the office, has no idea what it represents. He...
View ArticleEmergency! EN systems alert employees when disaster strikes
Having evacuated to a hotel in Pennsylvania in the face of Superstorm Sandy, Scott Thompson's problems had only begun.To read this article in full or to leave a comment, please click here(Insider Story)
View ArticleHackathons for the rest of us
When Moshe Tamssot walked out of a Chicago hackathon in August 2010, he had a new business and a new business partner.Most hackathon attendees go just to have fun, of course, and that's been enough to...
View ArticleMalware: War without end
Ceaselessly, with no end in sight despite outlays that amount to a tax on doing business, the decades-long struggle against malware drags on.Today, around 5 percent of the average IT budget is devoted...
View ArticleBoost your security training with gamification -- really!
Getting employees to take security seriously when security is not their job is an old challenge that now has a new answer: Gamification.That's right; game-like elements can be used to enhance security...
View ArticleMobile security: A mother lode of new tools
Long, complex passwords that must be input on tiny screens, often while on the move: Such hassles make password-based security unworkable in a mobile world. But change is coming, thanks to an...
View ArticleThe 8080 chip at 40: What's next for the mighty microprocessor?
It came out in 1974 and was the basis of the MITS Altair 8800, for which two guys named Bill Gates and Paul Allen wrote BASIC, and millions of people began to realize that they, too, could have their...
View ArticleIT jobs market booming in the Southwest
2015 IT Salary & Jobs Regional Report: The Southwest The coasts might have the high-profile IT employers-- big banks and insurance companies, Google, Apple and Microsoft. But the Southwest is the...
View ArticleEmerging enterprise techs to watch
New technologies affecting enterprise IT continue to be invented, commercialized and adopted. The latest batch of techs looming on the horizon, examined in greater detail below, include quantum...
View ArticleReal-time computing: Gateway to the Internet of things?
Real-time computing means much more than getting a seemingly immediate response after hitting Enter. In fact, its real meaning involves interfacing to real machines doing real things in, well, their...
View ArticleMobile apps get the crowdsourcing treatment
When developing mobile enterprise applications, there are two basic options: Plan the process in advance in exquisite detail or listen to user feedback and iterate as you go. The latter approach, by...
View ArticleMulti-factor authentication goes mainstream
Fingerprints, rather than passwords, are what more than a million financial services customers at USAA use to get online. Part of a trend toward multi-factor authentication (MFA), there is no stored...
View ArticlePrinter security: Is your company's data really safe?
On March 24 of this year, 59 printers at Northeastern University in Boston suddenly output white supremacist hate literature, part of a wave of spammed printer incidents reported at Northeastern and on...
View ArticleSide-channel power, the new security front
Side channels used to be avenues for cyber attacks. Today, one side channel has been elevated to a new front line for cyber defense, and it may go on to be a bulwark for the internet of things...
View ArticleThe march toward exascale computers
It's good to be near the top of the list.As for the embargo's likely effectiveness, #1 on the Top500 list happens to be China's Sunway TaihuLight at the National Supercomputing Center in Wuxi. It...
View ArticleSmartphone CPUs put desktops to shame
Fighting severe size and power constraints, the makers of smartphones have achieved levels of ingenuity not seen on the desktop. This results in mobile devices that not only have multiple cores, but...
View Article