The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today, the widespread adoption of smartphones (inch); tablets, e-books, net books (foot); and Internet-enabled televisions and smart signs (yard) is dramatically changing the Internet landscape.
The article discusses five perspectives expressing different facets of IT value. Each perspective has merit, with both proponents and detractors. Some deal more with the actual technology, while others focus on its artifacts. The best way to consider IT is to use multiple perspectives. A single measure such as net present value doesn't adequately explain IT's impact on an organization. Taken together,...
The IEEE Computer Society Board of Governors voted at a recent meeting to amend the procedure by which proposed bylaw amendments are made available for comment by membership.
Online workflow repositories let scientists share successful experimental routines and compose new workflows from best practices and existing service components. The authors share the results of a social network analysis of the myExperiment workflow repository to assess the state of scientific workflow reuse and propose the CASE framework to facilitate such reuse.
Under the game-change metaphor, strategies developed to address hard problems will potentially lead to breakthroughs in many different interrelated cybersecurity areas. For software assurance, a game change should focus on improving resiliency and hardening new technologies that implement moving-target defenses and tailored trustworthy spaces.
Academic researchers have developed an approach that promises to make object-recognition systems efficient users of system memory and thus also of computational resources.
As software dependence reaches critical levels, threats become more pervasive, and losses become more costly, higher education must place more value on the tenets of software assurance. Courses must focus not only on security but on providing justified confidence in the software or system throughout its life cycle.
The Department of Homeland Security National Cyber Security Division's Software Assurance Program promotes the collaborative development of reliable measurement instruments and standards, opportunities for the exchange and dissemination of knowledge, a skilled workforce, and a secure software supply chain.
Although vendors developed network-access-control technology to cope with the threats organizations face from within their networks, NAC has not been as widely adopted as experts predicted.
Experiments that do not account for all relevant variables can produce misleading results. The authors identify two variables that compiler optimization evaluations often omit, resulting in significant omittedvariable bias, and discuss how to identify new OVB sources and incorporate them in an experimental design.
Media streams can be annotated with platform-independent scenario information to reflect frame-level decode complexity. This enables energy-efficient decoding, resource prediction, and quality-of-service management on single-core as well as multicore processors.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.