The discovery that Facebook gave unauthorized access to personally identifiable information (PII) of more than 87 million unsuspecting users to Cambridge Analyt... Read More »
Smartphones are revolutionizing the way people perceive and interact with both physical and cyber worlds. Mobile coaching (m-coaching) is expected to become a c... Read More »
The Japanese Cabinet’s “Society 5.0” initiative seeks to create a sustainable society for human security and well-being through a cyber-physical system. Keidanr... Read More »
Quantum Realism: A Realistic Future for Quantum Computing
Articles due for review: CLOSED
Publication date: June 2019
Computer plans a June 2019 special i... Read More »
Will our smart devices betray us? Can we trust our smart beds, pet feeders, and watches to maintain the level of privacy we want and expect? As the numbers of d... Read More »
No, not that kind of soda. In “Keep the Stress Away with SoDA: Stress Detection and Alleviation System" (IEEE Trans. Multi-Scale Computing Systems, vol. 3, no.... Read More »
Most security vulnerabilities result from ordinary coding errors. What does this mean for the prospects of more secure software?
Read article ... Read More »
Three programming team members from the University of Central Florida traveled across the world to compete in the ACM International Collegiate Programming Conte... Read More »
Newtonian indebtedness usually goes to Isaac. However, there’s another Newton to whom we owe a great deal: Newton Minow—a pioneer in the field of media crap det... Read More »