Because the car is a nexus for continuous invention for cutting edge automotive technology, there is a need to analyze the modern automotive platform in an IT c... Read More »
Password managers (PMs) automate password generation and logins. But how secure and usable are these tools? The authors analyze four popular PMs from both secur... Read More »
The authors' unique approach to intelligent marketing in smart cities uses large-scale crowdsourcing based on mobile user behavior for market planning from a ma... Read More »
The author looks at current IT job classifications to provide context for how big data has inspired the field of data science, and define what data scientists d... Read More »
This article aims to explore the ways in which smartphones and the Internet of medical things can improve medicine, both today and in the future.
Read articl... Read More »
Although navigation devices have thus far been proprietary and closed, the Open Mobile Alliance Dynamic Navigation Enabler lets developers create novel navigati... Read More »
While researchers develop various approaches to detect Twitter spam, spammers thwart their efforts with more complex spamming strategies: coordinated posting be... Read More »