Uncategorized

New Products in Computer Science (1)

Especially if those things are supposed to be protecting your business data. Businesses in the healthcare field have to be cautious about data protection because of HIPAA laws and other privacy regulations that govern health information. If you thought tech incubators were a thing of the past, think again. In multiple cities around the world, new incubators are cropping up while longstanding ones are churning away and even expanding.

And some focus on specific criteria, such as startups run by college students or select areas of technology, while others have broader interests. But no matter what differentiates them from each other, these incubators have one common goal: See what the analysts are saying about IoT trends for The relationship between the cloud and data is getting some serious attention. Read what the analysts are saying. Miller about an ambitious initiative by the University of North Carolina Wilmington that demonstrates how public non-research universities can help close the US innovation deficit by encouraging local entrepreneurship and regional economic development.

Like any other web hosting service, dedicated hosting solutions have some benefits and some downsides. Nevertheless, in some particular cases, some of the pros can also prove to be cons in the end. He redefined the IT user experience, creating products and services loved by millions around the world.

He reshaped not only the IT industry but others as well—the music industry with the iPod; the cell phone industry with the iPhone; the movie industry with his Pixar Animation Studios films; and the computing industry with the original Mac, the Mac OS X, and the iPad. Back in the early stages of the SaaS market, so many months ago, it seemed obvious that the SaaS market would one day undergo a major transformation as the easy wins based on taking on-premise capabilities and flipping them to the cloud — pretty much the business model of Salesforce.

Charles Leiserson talks about the need to get rid of bloat and inefficiency, build scalable systems, and work on making our computer systems better behaved as he accepts the ACM and IEEE Computer Society Ken Kennedy Award for his influence on parallel computing systems and their adoption into mainstream use through scholarly research and development. Mobile payment is a popular topic among analysts this week. Here are some of the articles you will find in the Financial Services section.

The Next Mobile Payment Device? InterConnect is a new customer event that integrates and replaces three smaller and product-focused IBM customer events: Pulse mobile development , Innovate software development and Impact cloud computing. The three-day analyst track portion of the conference, titled A New Way, had three core stories: Here are some discussions from the cloud marketplace, with more to be found in the Cloud Computing section. The Internet of Things is a reality now. Much is here and more is coming in full speed. We are already able to monitor our health through wearables, get our houses and cars on the phone, use our human bodies for data transmission, and sense the environment.

By , it is expected that the IoT will comprise 50 billion devices, as shown in Figure 3. The IoT also includes virtual objects, such as electronic tickets, agendas, books, and wallets. Is it really that hard? And with others, you still scratch your head as well and think — what a clever idea! SXSWedu will screen "Big Dream," an inspiring film that tells the intimate stories of seven young women who are breaking barriers as they follow their passion in science, technology, engineering, and math—the acronymically named STEM fields.

The Apple watch was a popular topic among analysts last week. Here are some conversations that about the company's new wearable. He was for over 15 years the representative of the OMG in Europe. In truth, the Internet of Things might be better called the Internet of Everything. Many computing professionals, at some point in their careers, consider establishing a consulting business. Consulting offers an opportunity to leave the traditional workplace, work independently, and become your own boss. Healthcare, one of the largest and most vital sectors of the US economy, dragged its feet when other industries embraced information technologies and still creates many of its records by hand.

But that may be finally changing. Kristin Lauter is solving a problem you may not even know you have: She's working to keep your most personal data private and secure. Confidentiality and security are always top concerns when an organization considers leveraging the cloud to store their information, and certainly legitimate ones. In this wek's Analyst Perspectives, analysts talk about managing risks and other issues related to cloud computing. Pervasive computing thrives at the intersection of many areas of computer science, including distributed systems, human-computer interaction, and artifical intelligence, says Maria R.

Ebling, a research staff member at the IBM T. Startups are newly created companies with little or no history of facing high volatility in technologies and markets. In the US alone, , new businesses are established each month, accounting for nearly 20 percent of job creation. As such, startups are an important factor in the economy. Nine technical leaders of the IEEE Computer Society joined forces to write a technical report, entitled IEEE CS , symbolically surveying 23 potential technologies that could change the landscape of computer science and industry by the year In "Accidents Will Happen," Grier discusses self-driving cars, automotive information systems, and their tremendous security risks--illustrating how we tend to think about functionality first and consider security problems only as an afterthought.

DevOps--a merging of "development" and "operations"--is rapidly changing how software is produced and released. By as early as next year, market-research firm Gartner expects DevOps to move from a niche strategy to the mainstream, embraced by fully a quarter of Global companies. And the global market and impact is enormous. Cybersecurity is essential for business owners in There have been numerous security breaches of major companies just in the last few months, including Anthem Insurance Agency, Sony, and Target.

Demand for new electronic applications is driving opportunities for transparent conductors—and the need for a cost-effective material that conforms to bends and curves, is flexible, and foldable. Author Jane Cleland-Huang provides an audio recording of the Requirements column, in which she discusses how basic data-mining skills can be useful for processing domain documents early during requirements engineering. Author Grady Booch provides an audio recording of his On Computing column, in which he discusses how computing amplifies the actions of governments, but can also temper its behavior by enabling mechanisms for private communication as well as for open and transparent communication by the people of a nation.

Analysts are covering the latest news from SAP. Here are just some of the articles you will find in the Enterprise Applications section. Wearable technology has attracted a ton of buzz in the past few years, with special attention over the past few months as Apple readies the official release of the Apple Watch. Consumers, digital marketers, and businesses have all been resetting their expectations and looking to wearable devices as the future of technology, but in reality, these types of devices may only be a short-term fad.

This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending April 24, Putting off chores is one thing; putting off decisions is another. In today's digital personal communications age, the average person goes through 35GB of data each day, from storing music, photos and movies to uploading sales presentations.

As products like Apple's iPhone and Google's Android have caused mass mobile appeal, there will be a big need for new technologies that not only allow these personal "pocket" computers to help us effectively manage our daily lives, but provide ample security and storage. And contrary to what legions of cloud providers state, the cloud is not the universal solution for digital communications storage. This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending May 08, Launched a year ago, Code Hunt is a coding game that challenges players first to deduce a hidden problem from clues presented as unit tests and then to write a program to solve it.

The game has been enormously successful, attracting more than , players from around the world and achieving amazing stickiness—99 percent of players return to the game within a week. This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending May 15, This week there are acquisitions, partnerships and more.

What is going to happen in the cloud computing industry within the following few years? According to QuoteColo, cloud spending will continue to increase around the globe, and cloud based technologies will continue to play an important part in the creation and management of the future IT markets and products. Good parents complain endlessly. Every now and then I must remove scale from my teapot. It accumulates with use and slows the heating of the water over time.

Business that scale their organisations are a lot like that. Google has been on the forefront of new technology for decades. Most of the attention the company has generated has come as the result of the products it has developed—Google Search revolutionized the accessibility of the web, Google Maps brought us easier directions and mapping, Google Chrome greatly improved on its contemporaries, and the Android operating system is making waves in basic computing. But Google is enabling the development of technology in many other ways.

It allows its workers to dedicate a portion of their time to personal pet projects, enabling some of the most creative tech geniuses in the world to come up with new ideas. It funds and purchases young tech startups, giving new resources and more stability to promising new ideas.

It even partners and integrates with other tech firms, marrying its technology with those of others in an effort to enable the greatest possible user experience. Now, the search engine giant is looking to launch a new patent-related program that could work wonders in enabling the development of new technologies at a faster and more efficient rate.

This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending June 05, Waterfall seemed like it was well-attuned to developing simple or perhaps complicated systems. Such systems can be master-planned from the outset, with work done by specialized teams. There is feedback but success does not depend on efficient feedback, because it is so rarely needed. And because each stage analysis, design, implementation, test was held to be largely independent and simple, the work was partitionable. You could scale each part independently to achieve the maximum throughput.

The tragic Charleston shooting last week has again brought the national conversation about gun control front and center. Concurrent with that has been a lot of Internet chatter about smart gun technology. Beginning this summer, Google is going to roll out its self-driving car prototypes onto real American roads.

In this test, a handful of prototypes will travel throughout Mountain View, California, each with a human safety driver aboard, to rigorously test their feasibility as real-world vehicles. This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending June 19, While wearable health tech is still in its early days, its popularity is growing and the general public is beginning to understand the benefits. And this bodes well for the continued growth of telemedicine. Each day more devices are added to the repertoire of smart technology, continuing to expand the Internet of Everything IoE , creating a demand for a broad ecosystem in which technology leaders may collaborate.

This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending June 26, Hiring a new programmer for your team is a big commitment, and you want to be as sure as possible that whomever you hire will work. Know what you are looking for, and do not rush into anything unless it feels right on both sides. The GR-NI issue is time-consuming to manage but not exactly mission critical to finding new business. Because of that it often gets demoted to the lowest of priorities. Not dealing with GR-NI, however, creates financial liabilities and can introduce significant risk to your business operations.

This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending July 03, In , there were about as many devices hooked up to the Internet as there were people living in San Jose.

Latest Articles on Computer Technology | IEEE Computer Society - IEEECS

Today, there are three times more connected devices than there are human beings on the planet. It began with a simple problem: I should take a step back, actually, because it began even before that with the grand challenge of trying to crawl and index an exponentially growing number of websites in the early 21st Century. But that challenge was unique to Google and a few other players, while analyzing web site access was more ubiquitous among the burgeoning social media sites that were coming of age around the same time.

While there seems to be a constant stream of technical breakthroughs in computing systems, particularly in processors, memory and faster interfaces, revolutionary changes are also occurring in display and touch technology. This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending July 10, According to IDC, the 1. While the storage of massive amounts of data on big computers is not a new idea, what has changed is the need and expectation of mining that data for decision support.

Analytics and security must keep pace. What research underpins the latest big data-enabled advances? If your organization is relatively new to BI but has successfully built some new reports with one of the great visualization tools on the market, you will soon find yourselves in need of a better data organization environment. The rumors keep coming, fueled by highly speculative analysis like this latest stab in the dark from Fortune, that Salesforce. This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending July 17, Printing in plastics has its place in prototyping and education, but metal printing has allowed the technology to be adopted for part production in the aerospace, orthopedic, dental and jewelry industries and is now being developed for the oil and gas, printed electronics, and general engineering industries.

His website sounds like a forum for salsa recipes. The URL for his personal Facebook page reads more like a fan site for green pepper enthusiasts than the profile of an ace computer programmer. Conventional vehicles with an internal combustion engine as the sole traction power have become more electric over the years — as customers demand more and more electrical and electronic devices. Companies realize that data warehouses are not going to be replaced by Hadoop or in-memory solutions.

As such, DWA is getting a fresh look as a better way to build and manage a data warehouse. Matthew Williams solved the crackthecode challenge which was based on the 72nd anniversary of the game-changing Sigsaly encryption system launched in WWII. Where is software heading as a business? I have spoken with many software business leaders around the world. They pointed to five success factors that will advance software business. They left unaddressed whether we evolve to humanity 2. The driving factor has been the adaption of technology that has been widely used in other consumer electronics areas into a form factor that can be worn on the body.

He debunked four prominent and popular myths about Big Data: Rudin spoke about the great challenge of hiring the right people to create a successful analytical culture. Finding individuals who are academically talented and business-savvy is no easy task. Books, magazines, and newspapers were all printed on paper. Most people had external hard drives for backup and transferring files. We owned our media and entertainment and had full control over our real and digital lives.

Does anyone remember holding up a map while driving, looking up a number in a phonebook, or using an encyclopedia? It feels awfully far away and almost unimaginable. Faster time to market. Still, even with everyone pushing for DevOps, Agile and Continuous Integration, there is one key component that consistently gets lost in the shuffle — software testing. The games market has exploded in the past seven years, expanding across an array of platforms that includes PCs, consoles, and mobiles devices.

In , mobile gaming barely made a dent in this market, but today it is one of the fastest growing segments. Advances in graphics quality and player engagement have fueled this growth. What started as an Internet-controlled toaster at the Interop Conference has now blossomed into a multi-billion-dollar world of possibility.

Thin, flexible batteries have been available for more than 15 years, but have only had limited commercial success. This is not surprising, since they have been more expensive, offer lower capacity and have a shorter shelf life than regular button cell or larger batteries. Your startup is all about disruptive, game-changing ideas. However, to make that idea into a business you not only need your strategy, but you also need many tools to build your business out. Think about adding these 50 tools.

Advertisers have been salivating for years at the promise of mobile advertising. Display formats making up most of that chunk, but video driven by tablets and growth in tablet ownership will show the highest growth. The development of RFID Radio Frequency Identification in China has long been heavily supported by the Chinese government and can be readily seen in large projects, such as national identification cards, passports and subway ticket applications.

His scoffing reply was right on the money. This is specifically related to flexible OLED displays, and other devices using organic materials such as OPV , where the organic materials deteriorate very quickly with exposure to oxygen and water. While developing products and solutions, the Internet of Stuff firms are racing over the creation of tech standards. Will the standards-based bodies and the industry leaders compete or collaborate? A number of employees are starting to use the ability to work from home as an opportunity to curate their ideal working environment, no matter where in the world that is.

Disasters can come in many shapes and sizes. At your local movie theater, big budget disaster flicks can include earthquakes, tsunamis, and even aliens and rampaging dinosaurs. But in the world of business technology, while disaster may seem more mundane and not come with expensive special effects, the costs of technology-related disasters can be very big budget as well.

Remember the good old days? But I typed in the credentials right. For example, few people in could have successfully predicted many of the trends and realities of today, whether in the everyday world or in the realm of technology. Targeted attacks, persistent threats and the like usually end up with the hackers capturing sensitive IP, customer information or trade secrets. Economic damage, board level sackings and a heap of bad publicity for the breached organization. Tractor cabs that look like airplane cockpits.

Cow heat detection devices. Sensors that continuously measure everything from nitrogen content to livestock biometrics. The FCC in fact says their proposal has no effect on open source operating systems or open source in general. The FCC is undoubtedly wrong. This growth is due to both improvements in existing printing technologies and the development of completely new technologies.

The Internet of Things IoT has the power to transform our lives, making us more productive at work, and happier and safer at home. Equipment makers are turning to Asia. There is an impending transition from equipment for development and prototyping purposes to buying equipment for higher volume manufacture. Here, the equipment focus is different: It is not about making state- of-the-art transistors using printing, but doing simpler things, reliably, that can be used in commercial products today.

The Internet of Things is already permeating every part of our lives — from healthcare to aviation, automobiles to telecoms. But its security is fundamentally broken. Analytics — Everyone wants it, a lot of people use it, few people use it well. Despite the appeal and seeming ubiquity of business analytics today, the experience of the typical business user leaves a lot to be desired. Because your website and the supporting systems, applications, and so on are exposed to the outside world, they are ripe targets for sophisticated attacks designed either to exploit uncorrected flaws or to change the way these systems work.

As application development continues to move to the cloud, such attacks will continue to be difficult to defend against. When we last left our tragic hero, Windows Phone, there was no carrier support for the new Lumias that just hit the market, which means….

Why work harder when you can work smarter instead? Think of all the time you spend completing tedious tasks at work. Do you need to be smarter than me to use Tableau? Consider the most glamorous things that recently burst upon the scene, such as the MIT robot dog that jumps over obstacles, the Dyson robot vacuum cleaner that is as effective as a traditional model or the latest smart watch with its myriad features. Behind the dazzling exterior, they are made by year-old design rules: Although, the binder-on-plastic technology has fallen out of fashion, binder-on-sand and binder-on-metal are both seeing rapid growth and increased awareness.

Data stolen from many recent breaches can be aggregated to create a full portrait of your personal information, a portrait that can be used for nefarious purposes. What do companies want today? Well, many want to be able to power their business with the most advanced technologies and innovative enterprise applications and platforms. So goes the old joke: With mobile supply chain applications, business owners in the food and beverage industry have greater insight into their everyday workflow — accessing data on the fly, enabling them to make better decisions faster. Cyber attacks are proliferating at an incredible rate and now is the time for business owners and IT professionals to protect their organizations if they want to avoid catastrophes.

This is the inaugural post of what I hope will be an interesting series on things that make good use of pixels. This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending November 20, Products are hacked, in order to misuse, abuse and confuse. Unlike other technologies which are mastered by specific teams and functions, security is a base technology which belongs to the body of knowledge of each single software developer. This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending November 27, In an environment of flat or decreasing budgets, the challenge is to move beyond typical finance functions to deliver insights and leadership to the business.

This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending December 04, Adding more people rarely increases quality but instead just creates a glut of output. The Internet of Things IoT is still such a burgeoning term in and of itself — nevermind the technology — that it may seem cumbersome, worrisome, or disingenuous to have a newfangled, connected device layered on top of other newfangled, connected devices.

The idea that organizations will tolerate the productivity hits and maintenance nightmares of hand-coded scripts is preposterous. Organizations that lead the pack in delivering repeatable and sustainable success recognize that automation and intelligence are critical to delivering well-managed and trustworthy analytics using Hadoop.

This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending December 11, There was plenty of unassuming business being taken care of on the Information Technology side, business sadly not being taken care of on the IT security side, and a major, earth-shattering business deal primed to shake up the world of IT as we know it. The last few months have been a turning point for Microsoft, as Office raced past Google Apps to become the top productivity suite in the enterprise market.

Affective computing is nothing new — it has been around for awhile — over a decade, in fact. As a first step, SharePoint is an easy choice. Just a few years ago, enterprise network management was much simpler. Configuration changes were rare — most equipment was configured and left as-is. If any change was needed, long and strict change management procedures were required. Then, changes were executed in manual or semi-automated network configuration updates, sufficient to maintain reliability and consistent service levels across the organization.

However, companies that stay focused on the analytical needs of their users and align the tools accordingly are dividends from those efforts. But the most powerful weapon at our disposal may just fit in the palm of our hands.

There are no entries that match your criteria.

Mobile capabilities for the consumption or creation of business insight have taken center stage for companies looking to arm a diverse workforce with timely information. With the prevalent awareness of security flaws in IoT devices, manufacturers need to rethink their strategies for marketing their products, and have an entirely new perception on the issue of security. For years now, one of the most complex and time-consuming tasks any IT department could take on was the on-premise implementation of a Unified Communications UC platform.

This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending December 25, - January 01, The Rise of the User, Aberdeen Group described how the strategic focus for enterprise identity and access management IAM systems has changed. Everyone who has ever worked a job knows that time is money.

Employees log hours for a paycheck, and businesses track hours to ensure that work is getting done at a steady pace. I decided to look into the technology behind the polarizing digital currency Bitcoin. Hiring software engineers is hard. A poor hire can easily drag down an entire team. This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending January 15, This integrative approach helps teams deliver value in a faster and continuous way, reducing problems generated by miscommunication between team members and enhancing a faster resolution of problems.

As we move towards Data Protection Day this week and continue to navigate the constantly evolving security landscape where new malicious hacks are made each day, we often overlook the ones closest to home: This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending January 22, Recent research suggests that computer and technology-based addiction and withdrawal may be real, physical phenomena. Three developments have taken place recently that makes it possible to play serious 3D games in a browser: This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending January 29, Some of the patient care technology advances have not accomplished the promised end results and are in desperate need of improvement.

And it will be diverse — encompassing augmented and virtual reality headsets to remarkable embedded functionalities in lenses. This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending February 05, A solid supplier scorecarding program can drive big cost savings in the supply chain. Would the IoT introduce all the vulnerabilities of the digital world into our real world? Do we even know the scale? All entrepreneurs dream of owning and operating their own startup and with the following list of different tools and services it can be more of a reality and take some of the burden off of becoming a new business owner.

Every vendor, whether old guard freshening up for the cloud, or new guard playing defense against the dark arts, has a cloud platform strategy with two purported goals: The book covers broad range of topics aimed at helping you gain an informed and comprehensive understanding of the promises and the potential of cloud computing. Across the country, big corporations are adjusting the way they interact with customers, come up with ideas, and motivate their employees.

Instead of operating the way they always have, these businesses are taking a cue from startups and rethinking their workplace culture. This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending February 12, This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending February 19, At most mid-size and enterprise-level companies, there are obligations — if not requirements — to store that information. Are we also taking strides to make that data more searchable and discoverable? From cars to routers and drug infusion pumps to drones, they now offer a wealth of possibilities for tech savvy owners keen to push their device capabilities to the limits.

But at the same time there are logical reasons why lawmakers and regulators need to lock down certain functionality — for the safety and well-being of their citizens. Advertisement retargeting has become so prevalent, consumers are beginning to feel as though their every move is being watched. Businesses are gathering data on every customer interaction with their products and services, from the products they research online to the items they buy in their stores.

While disaster for me in film is a guilty embarrassing? Microsoft has tested a prototype of a self-contained data center that can operate below the surface of the ocean to reduce the need for expensive air-conditioning. Over the last 25 years, mainframes have been a solid investment in term of reliability, performance, and security.

But for insurers and other data-intensive industries that rely on mainframe applications and data, those days are coming to an end. This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending March 04, Google, one of the leading authorities in the modern world of artificial intelligence development, has created an algorithm capable of defeating a human expert in the game of Go.

Welcome to HSA Connections! In an era where customers can research anything online, the customer service experience has evolved. Instead of merely directing customers to products in stores and asking general questions, employees now serve as subject matter experts. Supplier scorecards are near universally accepted as a key tool for managing a more profitable supply chain.

This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending March 11, In the very near future we will all be wearing AR glasses, just as we wear corrective and sun glasses today. This report for first time offers a scientific foundation as to what the Internet of Things is.

An examination of how wearable devices could become the modern equivalent of blogs broadcasting proprietary workplace information directly to the Internet of Things -- and beyond. This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending March 18, Emerging haptics has been a major research priority in the automotive sector for car interiors , in VR, AR and robotics for adding touch, force and acceleration to the sensation , as well as in other consumer sectors for making user interfaces more intelligent.

Installing photovoltaics in roads? This seems a strange idea at first. It sounds expensive and unlikely to work unless the surface is cleaned, free of snow and ice and in direct sunlight — all too infrequent in most places. Indeed, roads are constantly dug up by utilities, repairmen and others. While the majority of wearable technology products sold today still fit with the components-in-a-box design, was a record year for investment in smart clothing and e-textile products. To reach the masses, wearable technology must be useful, practical and fashionable, and seamless integration within textiles and clothing is seen as a key part of this.

While numerous financial institutions worldwide have embraced biometric technology, widespread acceptance and adoption by customers is still in its early stages. Formula One is significant in two ways. Printed and flexible electronics are beginning to proliferate, with a variety of components and devices coming to market. Several end-user verticals are expected to benefit from the host of advantages these technologies offer and the automotive sector is no exception. Cloud-computing services have become popular and affordable ways for companies to maintain their data, apps, and websites on off-site servers.

There are shortages of cloud-computing experts around the world, particularly in China, India, South Africa, and the United States. Companies on the prowl for cloud-computing professionals include Amazon, Facebook, Google, Microsoft, and Oracle. There are about companies making traction motors for electric vehicles. Concurrently, there are also about companies that make the lithium-ion batteries that increasingly power them.

However, whereas three types of lithium-ion battery chemistry and construction are taking almost all of the business, with traction motors the situation is more complex because the diversity of needs calls for many very different types of motor - from brushless outrunner motors for quadcopters to claw pole torque assist reversing alternators TARA for the new 48V mild hybrids that will be in volume production from This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending April 01, Everything, literally everything, is changing in the conductive inks business.

The traditional markets are experiencing upheaval in terms of requirements and product leadership, while various emerging markets are opening up new frontiers. As an Intel enterprise architect and technology strategist, Enrique G. Castro-Leon knows a thing or two about computer technology careers. With research interests that include cloud computing and IT-enabled enterprise service innovation, he recently co-authored a guest editor introduction for the November—December IT Professional special issue on smart systems.

Software development is one of the hottest areas for outsourcing, with businesses realizing that they can easily assign projects to workers in remote areas and save money. This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending April 08, This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending April 15, In , virtualization surpassed 50 percent of all server workloads, according to Gartner, which believes it will reach 86 percent in His research interests are formal methods and data analytics applied to natural-language understanding and cybersecurity.

Thus, he is very knowledgeable about security-related careers. We asked Verma several questions about career opportunities in this increasingly important field. Conversion is the name of the game for any website or business that is getting off the ground, and even for those that are well established.

A generation from now or probably much less , your blue jeans might tell you that they really need to be washed. This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending April 22, This blog focuses on some of the hardware innovations and changes that are relevant to shared virtual memory and cache coherency, which are components of the HSA hardware specification.

These products will help you be more productive and informed as you run your company. This issue of AnalystPerspectives Weekly Scan covers analyst commentary from the week ending April 29, New tech emerges all the time, purportedly to make our lives easier and keep us in closer connection with each other. Traditional mediums, like email and phone calls, are still around, but a bevy of new communication mediums have arisen to streamline conversations and break down the barriers that previous communication channels erected. The trouble is, some of these barriers were a good thing.

Course description

Are we losing them? Recent news shows that security is a key challenge to the wide scope and deployment of IoT, with varied consequences across many IoT markets. If you constantly shank your drives into the rough, have a propensity for landing your ball in every other sand trap and have a knack for choking on those three-foot putts, well, golf analytics may offer some incremental improvements to your game, but playing on the PGA Tour will still be a bedtime fantasy.

The skinny, however, is that the analytics gleaned via wearable technology and cloud computing are bringing about a sea change in golf. Work is conducted in cafes, while waiting at the airport, or before leaving the house for the day. Mobile devices have freed business leaders to travel across the country and even to the other side of the globe. I went to the meeting to find out if the vendor was ever going to fix the latest version of its software, which was basically dead-on-arrival. To my surprise, the CEO took to the stage, apologized profusely, begged forgiveness, promised to fix the problem or else, and otherwise completely humbled himself in front of his irate customers.

Augmented reality AR systems come in a various models or designs, glasses, headsets, and helmets to name the most popular. AR helmets are used for industrial applications such as maintenance and repair, first responders such as firemen, rescue workers, and they are used by military pilots. BMW has demonstrated such a helmet, and Skully has sold a few. The global healthcare cognitive computing market is poised for explosive growth.

Grand Review Research also says significant factors driving the market are rapid growth in the scientific database, demand for personalized healthcare, and the need to reduce healthcare expenditure levels. The open-source ROCm stack offers several programming-language choices designed to give you a range of developer tools. There are significant investment opportunities now in various battery markets. The future can wait. Very large lithium-ion Li-ion battery banks were largely unknown 10 years ago. Now, it is tough to keep up with the variety of uses for them.

On ships, where there were no such batteries, we are starting to see MWh banks. Autonomous underwater vehicles, mining trucks and buses can sport ones of up to kWh but it is in stationary applications that really big facilities have arrived. Here there is a multiplier effect with Li-ion gaining market share in growth markets. When combined with mixed reality displays such as HoloLens, this technology allows users to see, hear, and interact with remote participants in 3D as if they are actually present in the same physical space.

Communicating and interacting with remote users becomes as natural as face-to-face communication. Quantum computing is a field of research that applies the principles of quantum physics and new directions in materials science to building a new type of computers that use quantum effects in computation. Beyond creating quantum computers, the field also includes studies of algorithms that such computers can execute. Sometimes revolutions start with a shot heard round the world, and sometimes they start with a quiet nudge in a new direction. Petitclerc is an expert in areas such as matrix, relational, and hybrid online analytical processing OLAP ; the OLAP calculation engine; and advanced analysis using data mining.

The industry has transitioned from being supply-limited to being commoditized and demand-limited with supply currently outstripping demand.

This is a commonplace characteristic of supply industry into consumer electronic devices: Within each SoC, various open and proprietary IP blocks are integrated into one singular environment. Tying these unique components together into one streamlined SoC requires multiple and distinct toolchains, profiling methods and debug tools.

DevOps is an organizational shift where instead of distributed silo-like functions cross-functional teams work on continuous operational feature deliveries. Teams thus deliver value in a faster and continuous way, reducing problems generated by miscommunication between team members and enhancing a faster resolution of problems. It obviously means a culture shift towards collaboration between development, quality assurance and operations.

At Vector we have supported a number of companies on improving efficiency with DevOps and continuous delivery. Here a brief case study from a domain with high safety and security requirements. The opportunities for IoT innovation abound. The ability, for example, to optimize the angle of the blades of a wind turbine in real time, or identify and track the contents of a pallet of parts as it moves through the supply chain, will change the underlying operations of every industry and every individual in ways that are only now beginning to be understood.

HP first launched their Multijet Fusion concept in October and have been teasing us with snippets of additional information ever since. HP recently started taking orders for products, the first of which will be shipped by the end of The first target is model shops and service bureaus, and the co-developers included Materialise, Shapeways and Protolabs. One engineering study, they noted, found that automation could quadruple capacity on any given highway — and fewer cars translate to less noise and a small environmental impact. Cloud computing is changing the way people and enterprises use computers and their work practices, as well as how companies and governments deploy their computer applications.

It will drastically improve access to information for all as well as cut IT costs. It redefines not only the information and communication technology ICT industry but also enterprise IT in all industry and business sectors. It is also driving innovations by small enterprises and facilitating deployment of new applications that would otherwise be infeasible. This issue of covers analyst commentary from the week ending July 08, Celent - Wed, 06 Jul Bob Meara. The proliferation of cloud-computing networks in recent years has created a need for more security and privacy personnel in the field.

Developing digital assets is rapidly becoming one of the most expensive undertakings for businesses in Skilled developers command high salaries, which can add up to millions of dollars over the life of your startup. After all, it often takes a team of project managers and developers to create and maintain unique, high quality software. Washers of the world, unite! They need to find the next iPhone, meaning the next big thing.

They will get there, but expect a bumpy ride along the way. Heterogeneous systems typically consist of a CPU, GPU and other accelerator devices, all of which are integrated in a single platform with a shared high-bandwidth memory system. While the shared memory system eliminates data copies between the CPU and accelerator-owned memory, the different memory access models for most of the accelerators e.

Compared to the coverage data breaches receive, reporting on IoT flaws has been relatively sparse, despite some major research appearing of late which exposes the potentially life-threatening nature of security problems in embedded computing systems. Governments in particular have both the time and resources. A power outage attack on the Ukrainian grid just before Christmas involved hackers overwriting firmware at multiple substations, rendering them unable to receive commands. It has been widely blamed on Russian state actors, although definitive attribution remains difficult.

While a completely paperless approach might not be possible yet, the paperless technologies are already having significant impacts on the traditional businesses. A paperless environment is beneficial for both the company and the environment. Here are the most prominent ways about how cloud-based paperless technology is changing traditional businesses.

Graphene is an emerging material with the potential to revolutionize whole industries. It could someday change the way electronic components are made, create batteries that charge in minutes and last longer, improve computing speed and performance, bring about advances in solar cells and much more.

Are consumers becoming jaded by all the wearables products out in the marketplace now? Has all the hype and fancy buzzwords met expectations? Businesses now realize they can use a combination of salaried and contract workers to save money and access a wider talent pool. Even companies that rely solely on salaried workers can save money by allowing employees to work from home. Reality has never been easy, right? Automotive displays can allow us to drive better, smarter and more carefully, working in tandem with the many sensors and cameras being designed into new vehicles as part of advanced driver assistance system ADAS technology.

So what kind of display s will see you over the next few years? I never threw out my extensive baseball card collection. You no longer get a stick of Bazooka bubble gum to chew for hours on end, but the flip side is that a memorable sports moment can immediately be available online and downloaded. The criticality and risk of software is defined by its complexity. Forty years ago, McCabe introduced his famous cyclomatic complexity CC metric. Today, it is still one of the most popular and meaningful measurements for analyzing code.

Read this blog about the measurement and its value for improving code quality and maintainability Liquid Crystal Display LCD is currently the dominant technology used in television displays, and represents more than 90 percent of the market. Quantum Dots have enabled LCD to defend its dominant market position by improving one of the key weaknesses of LCD — its poorer color gamut. DevOps breaks organizational silos and thus accelerates delivery. DevOps principles apply not only for cloud and IT services but for most industries, including critical systems.

Read the blog and learn from a recent case study of using DevOps methodologies in critical domains One of the most common misconceptions about display customization among engineers and procurement team members is custom displays cost more. But the opposite is most often true. The commercial success of energy harvesting has been almost entirely based on variants of the electric motor and the silicon solar cell. That spans from the bicycle dynamo and wind turbine to the solar roof and solar wristwatch.

Nonetheless, off-grid creation of electricity where it is needed and with no emissions should be a market of more than a few billions of dollars — it could be one hundred times that. In your next meeting, notice how many people use pen and paper to take notes — despite access to smartphones, laptops and other communication technology.

You are witnessing the power and durability of handwriting. Bishop, Computer Science and Telecommunications Board staff. Augmented reality is an alternative to virtual reality in which virtual images and data are projected onto and thereby incorporated with the physical world. For example, one can look through augmented-reality binoculars mounted in the atrium lobby of the Center for Art and Media ZKM in Karlsruhe, Germany, to see the heart of the building, overlaid with labels explaining what is done on the different floors: Technical issues in mixed reality include the maintenance of corre-spondence between real-world and virtual objects, standards for interobject communication, perception including vision processing, video tracking of objects, plan recognition, and integration of multiple forms of sensory data , spatial reasoning, and learning and adaptation.

But designing and constructing mixed-reality devices that are functional, useful, interesting, and desirable are not only technical challenges, but also artistic and practical challenges. A vision in which processors are embedded in everyday objects and networked together would integrate computation invisibly and seamlessly into daily life. Users can see the creature mature or, if insufficient attention is paid, see the creature die. Also see Anthony Dunne, , Hertzian Tales: The popular appeal and success of computer games are discussed in Chapter 2.

Computer games offer a unique playground for serious research, not only because of the underlying allure of fun and competition, but also because important new questions arise. For example, what is a body, a surface when infinitely malleable , or a space? How does one deal with a changing sense of time given that one can go back to a saved game? How then does one change the way one plays? How does one convey the essence of person despite screen form—gestures, and so on—varying? Most interestingly, designers of massively multiplayer online games are grappling, with a large degree of success, with the social, political, and aesthetic issues inherent in virtual worlds.

What is the social contract between participants, and between the participant and the designer? What are the consequences of conflicts in the virtual world, and to what degree should those consequences be determined by the online population, versus the administration? How should people deal with the distribution of authorship in an environment where narratives are participatory and emergent? How does one foster organic, self-organizing social structures in a virtual world? How does a designer make places people want not only to visit, but also to inhabit for hundreds or thousands of hours over the course of several years?

These questions raise various issues for a number of computer science fields, including information retrieval, database management, and computer graphics, to name a few—though such questions are not purely CS ones, but rather questions that are truly transdisciplinary. There is evidence that CS is beginning to address some of these questions e. In the early s, a group of graduate students at the MIT Media Lab formed a new reading group, which they called narrative intelligence NI. The group came together with an understanding of, and the desire to. One reviewer observed that the CS research agenda was being only modestly influenced as of November AI technology focused by and large on formal, logical representation and objectivity, whereas the analytical tools provided by new literary theories focused on subjectivity, multiplicity, and the limitations of formalism.

The pragmatics of negotiating the differences between these world views led to a creative foment.

Narrative intelligence as a field was born. NI research obviously incorporates influences from a variety of fields. Artificial intelligence, with tools to model human emotion, personality, and narrative abilities, provides a framework from which much of the research grows. Psychology, especially narrative psychology, generates explanations of the human ability to understand the world through narrative, creating a basis for systems that model or support this ability. Art research raises new questions about the nature of narrative representation, keeping the concept of narrative fresh.

Cultural studies analyze hidden cultural narratives, including the stories AI researchers tell through their research. Literary studies examine the nature of narrative in traditional and interactive forms. Drama provides understanding of the real-time performance of narrative. This emphasis on mixing technology development with artistic and humanistic perspectives is unusual in AI. It has supported the generation of new research fields within AI, such as lifelike interactive computer characters, as well as an increase in cross-disciplinary engagement between AI and other fields.

At the same time, narrative trends took on importance in related fields. The concept of supporting human narrative understanding through the interface of human and computer began to gain ground in the field of HCI. Work in media studies on hypertext and interactive fiction was inspiring a generation of systems that support narrative in new ways. Within AI, this interest began to spur research in AI for interactive fiction and entertainment, 36 including interactive computer.

Narrative as a topic of research is not new to AI. Programs developed by the group—which were able to generate stories and answer questions about them, albeit in limited ways and domains—illustrated theories of human understanding and the structure of knowledge in the mind. Researchers, seeking to combat the image of AI as never living up to its inflated claims, favored clearly defined problems with easily measurable outcomes—a situation that is not conducive to this kind of creative work—and, therefore, narrative fell out of favor for a decade as a research topic in AI.

The Journal of Teleoperators and Virtual Environments 1 1: The research, development, and commercialization of a new class of intelligent-agent applications that reflect a philosophy of learning through play is the focus of Extempo Systems. What makes them different from other types of intelligent agents is their ability to improvise stories. According to Hayes-Roth, this design allows the actors to achieve their goals while providing engaging conversation for many different Web site visitors. Jack accomplishes his goals by improvising appropriately in response to a situation.

For example, as a visitor enters a site, Jack says what he can do for the person. Like a human, Jack is designed to have a certain protocol involving turn taking and interruption. This allows him to have characteristics of intelligent conversation, such as making functional transformations and analogizing between topics. Many of these research areas explicitly draw on the arts and drama as a source of inspiration. With the growth of the computer game industry has come an interest in new game forms that support narrative in more complex and interesting ways than a stereotypical shoot-and-kill form.

Research in NI is flourishing, with applications in a variety of areas. Narrative interfaces explore possibilities for making interfaces more usable by incorporating elements of story, for example by embodying interaction in a storytelling character. Artificial agents can themselves be designed to use narrative, as humans do, to make sense of the world and each other see Box 4. Researchers are developing systems to support human storytelling, as in the case of plush toys that children can program to tell their stories to families and friends.

Interactive digital video allows video sequences to be generated interactively, telling. As discussed above, artists traditionally use evaluation techniques that differ radically from those of computer scientists, with little interest in formal user studies and more interest in social impact, cultural meaning, and the potential political implications of a technology. They seek to provoke as well as to understand the user. There is an opportunity to develop hybrid evaluation methodologies to combine the broader concerns of artists with the narrower and more structured methodologies of HCI.

Interestingly, they demonstrate that users are more open to and accepting of new technology that is presented as the product of a commercial venture rather than as art. Jonas Lundberg and colleagues uninten. Ethology and Interactive Creatures, Ph. Agent Design in Cultural Context , Ph. For example, because evaluators are trying to understand how people react to a system, users might not be told about the purpose or operation of a system.

At the same time, standard HCI techniques appropriately adapted to the goals of artists often far removed from issues of usefulness and efficiency that current techniques can address may help improve the sometimes opaque design of interactive artwork. To achieve these goals will likely require a fundamental rethinking of the notion of user tests, as well as other evaluations. In an early example of what such work might look like, artist-designers Anthony Dunne and Fiona Raby evaluated the Placebo project, electronically enhanced furniture that makes users aware of activity in the electromagnetic spectrum, through open-ended interviews with users combined with photographic portraits of users with their devices.

There is a need to develop a repertoire of evaluation techniques appropriate for these more open-ended questions that is as wide and deep as that already available for the relatively well defined problems of usability and efficiency. Computing is creating new challenges as it moves into everyday life. The impact of IT on everyday culture is felt particularly strongly through electronic consumer products such as handheld computers,. Designers Fiona Raby and Anthony Dunne have argued that such consumer products are currently designed much the same way as Hollywood movies: They are generally uncontroversial, focused on socially acceptable needs, and broadly marketed, and they serve an optimistically idealized lifestyle.

Experimental designers explore a range of issues and ideas that are often different from those of individuals working in specific product fields who are more constrained by the demands of the market. Their work often explores issues at the intersection of product design and social issues. There is tremendous potential for ITCP not only in reconfiguring existing consumer electronic applications, but also in imagining and building prototypes for new applications and markets. As hardware components become smaller, faster, and cheaper, IT is being embedded into more and more physical devices, linked together through often wireless networks.

Networked systems of embedded computers EmNets will be largely invisible but extremely powerful, allowing information to be collected, shared, and processed in new ways. EmNets promise significant changes in environmental and personal monitoring as well as scientific research. Thousands or millions of sensors could monitor the environment, the battlefield, the home, the office, or the factory floor; smart space containing intelligent surfaces and appliances would provide access to computational resources.

However, product development often follows the path of least resistance, resulting in products that are technically new but do not take full advantage of the broad conceptual design space that is opened up by mobile and ubiquitous technologies. For instance, it is not uncommon to simply replace discrete analog or digital electronics with an inexpensive microcontroller, or to imagine faster or smaller.

These approaches reflect an internal technical logic and a safe approach to introducing new products to consumers in a competitive marketplace. As a result, they can ignore some of the larger challenges in designing devices that could and should meaningfully support everyday quality of life. The views of social scientists, designers, and artists are needed to address the potential implications of EmNets. Imagine living in a world where it is impossible for anyone to get lost anywhere. Cars, wireless devices, laptops, TVs, and even articles of clothing will always be able to tell you and others exactly where you are.

Now, many who use e-mail and the Web enjoy relationships that involve real, but digitized, humans. Will technology make so much available without complaint that the need for interpersonal relations dissolves? Will that relationship with technology generate an illusion of satisfaction, knowledge, creativity, and life?

These are the kinds of questions that influence IT research, and they are also the kinds of questions that inspire artistic exploration via ITCP 50 —both activities where government-funded academic research or philanthropically supported arts-based activity can explore ideas not likely to flow from conventional commercial efforts. The development of smart appliances for the home provides an interesting case study.

The Domestic Environments project of the Equator research collaboration, 52 funded by the U. Engineering and Physical Sciences Research Council, is one model of how computer scientists collaborating with artist-designers and social scientists can develop appliances that are interesting both technically and socially. Although this chapter focuses on how ITCP, or the information arts, might influence the discipline of computer science, clearly ITCP can and does influence the agenda for artists and designers as well.

In this sense, IT does much more than provide tools to the arts and design disciplines. As a comparison, consider the challenge of developing new kinds of content and applications for broadband networks. As CSTB has observed previously, there is an important role for academic research. As objects are placed on the table, the window begins to drift slowly over the countryside. The focus on security resulting from the September 11, , terrorist attacks may well be a theme worthy of exploration.

As technologists push ahead an agenda for more robust computer security, the information arts would promote an agenda of how to improve security with the least harm to society or even allowing for the possibility of improved security and a net positive gain to quality of life. Two different kinds of intersection between IT and creative practices are presented in Chapters 3 and 4. On the one hand, Chapter 3 looks at the use of information technology as a medium for art and design practices, suggesting that computer science can support ITCP.

On the other, Chapter 4 looks at ways in which art practice and design and computer science can become fused, leading to new fundamental insights into the nature of computer science itself. In practice, these two kinds of intersection are not disjoint. For example, imagine the development of new word processors with input from professional writers see Box 4. In policy circles, a vigorous debate has been taking place in recent years about whether knowledge production at large is shifting from discipline-bound, strongly bounded, and relatively stable models to transdisciplinary, loosely coupled, and transient ones.

Of course, new security sensitivities could have the side effect of complicating ITCP activities that seem to take advantage of weaknesses in order to manipulate conventional IT. Paul David, Dominique Foray, and W. Trow, , The New Production of Knowledge. There is little to be gained by preferring either multidisciplinary or transdisciplinary exchanges; both are capable of generating useful and interesting results. Consider IT tools that support writing, such as the word processor.

Most word processors are based on an underlying representation of text as a long string of characters, each having some properties affecting its surface appearance. This was not a deeply thought out metaphor for the process of writing; rather it evolved through generations of automation tools—the word processor as a better typewriter, or a software tool for automating typesetting. Some word processors evolved to have a rudimentary structural representation of writing—outlines, for example—but the basic representation shines through even style sheets and wizards.

Carnegie Mellon Offers New Master's Degree in Product Management

An apparent benefit of this approach is that it supports all kinds of writing equally well: IT does not attempt to reinforce one writing style or approach to composition in favor of another ignoring, for the moment, the effects of grammar checkers and other add-ons that attempt to critique the actual writing. However, there is little doubt that the ease with which revisions can be made, ranging from typographical corrections to particular large-scale structural changes, has influenced the approach one takes to writing. This design reflects choices by software developers to structure writing as a simple string of characters, provide context-blind editing operations such as copy and paste, and let users work through the higher-level concepts and details for themselves.

As an example of a realization of a completely different set of design choices, consider Dramatica Pro— a popular tool for developing screenplays. However, it uses a domain model for screenwriting, including characters, themes, scenes, plot progression, character development, and so on. It is intended to address a much narrower set of tasks than a general-purpose word processing tool and, as such, would be of little use in writing a report such as this one.

Could a writer create a new kind of screenplay for a radically new kind of film using this tool, or would such a creation be outside its scope? Is it conceivable that a writer could push against the boundaries created by such a tool, abuse its constructs in various ways, and produce something surprising to the tools designers?

Does having these boundaries against which to push perhaps expand creative potential even more than having structures within which to work? Not enough is known about the deep impact of such design choices on users. However, it could prove very useful to explore, as an example, different kinds of word processors that could be designed, for instance, based on radically different notions of what writing is about, or on some deep criticism of the underlying assumptions embodied in typical word processors from the point of view of writers.

The result could be a meaningful intellectual shift in computer science, as well as a tool that is much more useful for writers— and possibly for the rest of us as well. This discussion is based on version 4. Dramatica is intended as a tool for developing story lines, not for producing the screenplay document. However, it does interface with a more traditionally styled word processor, tailored to the unique needs of producing screenplays.

This is another example of the kind of choices made by a designer. Further research into innovative tools for supporting creative writing might make it possible to integrate both metaphors within a single tool. But both the multidisciplinary and the transdisciplinary models make clear that there is a continuing need to maintain the integrity of the traditional disciplines, both in the arts and in the sciences. Without a disciplinary frame, the richness of disciplinary practices, methodologies, and concepts can become lost, leaving an oversimplified cross-disciplinary knowledge domain.

This danger exists when any practice is digitized in the absence of an appropriate model, as for example in arts education when young people have become wedded to the prescripted options of packaged applications and are only capable of creating PhotoShop art. Finally, it should be noted that the transient, loose coupling of transdisciplinary creativity runs an ever-present risk of premature bureaucratization. In some cases, the outcome of a rich experimental device is best evaluated and further developed in the separate but transformed disciplines that contributed to it.

In other cases, however, the committee has found persuasive evidence of the need for the sustained bridging of disciplines, involving the development of both individual practices and a community of researchers in the cross-disciplinary area with correspondingly innovative institutional structures and these are discussed in Chapter 5.

As one reviewer notes, there is much to learn from history. Edwards, , The Closed World: But much of ITCP history is undocumented or otherwise not very accessible, and therefore, it is unteachable in an organized way.