Internet-connected toys provide an often-overlooked avenue for breaching personal data, especially of those most vulnerable. Government and private measures can... Read More »
Partisan consultancies like Cambridge Analytica that use data analytics to sway the electorate rely on social network users’ participation in their own psycholo... Read More »
More disgruntled customers are filing lawsuits against vendors when their IT projects go bad, typically alleging the vendors didn’t live up to their promises. C... Read More »
Mobile and embedded devices increasingly rely on deep neural networks to understand the world—a feat that would have overwhelmed their system resources only a f... Read More »
In this first installment of Computer’s new column, the author gives an overview of the net neutrality policy and the FCC’s recent rulings that threaten it.
... Read More »
This installment of Computer’s series highlighting the work published in IEEE Computer Society journals comes from IEEE Transactions on Computers.
Read artic... Read More »
Instead of liberating us from the biases of the educated among us, the Internet has saddled us with the biases of the unreasoned among us.
Read article... Read More »
The IEEE Computer Society provides core standards for the benefit of industry including for networking, integrated circuit design and test, cloud computing and ... Read More »
Once the domain of national agencies empowered to protect civil society and support intelligence missions, cybersecurity is now the pervasive technical, social,... Read More »
Staying motivated can be a pain for people struggling to lose weight. Wouldn’t it be great to be able to determine the nutritional value of your food at a glanc... Read More »