October 2, 2017
Key Signing Areas: Computer Vision, Medical imaging, Computer Engineering, and Communications eEngineering. ... Read more
Introduction
Computing functionality is ubiquitous. Today this logic is built into almost any machine you can think of, from home electronics and appliances to motor vehicles, and it governs the infrastructures we depend on daily — telecommunication, public utilities, transportation. Maintaining it all and driving it forward are professionals and researchers in computer science, across disciplines including:
October 10, 2017
Study shows how the biggest challenge facing robots in the home is humans Imagine sitting on your sofa... Read more
October 3, 2017
Chiminey: A user-friendly platform that helps scientists process vast quantities of data As information technology advances at pace,... Read more
October 2, 2017
Key Signing Areas: Computer Vision, Medical imaging, Computer Engineering, and Communications eEngineering. ... Read more
Computer Science; Computer Security
Choose Better Passwords with the Help of ScienceSeptember 25, 2017
For years, computer users have been told they should have complicated passwords, including numbers, punctuation marks and other... Read more
Computer Science; Computer Security
Artificial Intelligence Cyber Attacks Are Coming – But What Does That Mean?September 19, 2017
The next major cyberattack could involve artificial intelligence systems. It could even happen soon: At a recent cybersecurity... Read more
September 19, 2017
Somebody asked me: “What is the plural of Linux?” Maybe it is Linuxes. That sounds a bit messy,... Read more
Popular on SciTechConnect
September 13, 2017
In early July, Google announced that it will expand its commercially available cloud computing services to include quantum computing.... Read more
Computer Science; Computer Security
MalwareTech’s Arrest Sheds Light on the Complex Culture of the Hacking WorldAugust 24, 2017
The arrest of a British cybersecurity researcher on charges of disseminating malware and conspiring to commit computer fraud and abuse... Read more