Surprise: Mobile devices don't help office ergonomics
For generations, office ergonomics involved various measures intended to keep employees productive while they remained in their chairs. New thinking and new devices are changing all that.
View ArticleHackathons for the rest of us
Forget softball games. Hackathons promote togetherness among techies while benefiting the enterprise, and no one gets pitcher's elbow.
View ArticleMalware: War without end
Ceaselessly, with no end in sight despite outlays that amount to a tax on doing business, the decades-long struggle against malware drags on.
View ArticleLocation-based services: Controversy at every level
Your smartphone can be a beacon telling the world where you are, with increasing precision. Is that good commerce or bad privacy, or maybe a bit of both?
View ArticleAI gets its groove back
Thanks to the advent of Big Data, new algorithms and massive, affordable computing power, artificial intelligence is now, finally, on a roll again.
View ArticleBoost your security training with gamification -- really!
Getting employees to take security seriously can be a game that everyone wins.
View ArticleBeyond FLOPS: The co-evolving world of computer benchmarking
It used to be simple: Multiply the microprocessor's clock rate by four, and you could measure a computer's computational power in megaFLOPS (millions of floating point operations per second) or...
View ArticleThe 8080 chip at 40: What's next for the mighty microprocessor?
It came out in 1974 and was the basis of the MITS Altair 8800, for which two guys named Bill Gates and Paul Allen wrote BASIC, and millions of people began to realize that they, too, could have their...
View ArticleIT jobs market booming in the Southwest
2015 IT Salary & Jobs Regional Report: The Southwest
View ArticleAlgorithms and experiments make strange bedfellows at SXSW
Data has to be a two-way street, these panelists agreed.
View ArticleHow it works: Iris scanning improves smartphone security
Samsung and other vendors are beginning to incorporate iris scanning into their mobile devices. We examine how this security technology works, its advantages and its drawbacks.
View Article