Latest Posts
RESET
Computing Conversations: Pooja Sankar on the Piazza Collaboration System

NETWORKING - Computing Conversations: Pooja Sankar on the Piazza Collaboration System

Friday, Apr 5, 2013

VIDEO: Computer magazine's multimedia editor Charles Severance interviews Pooja Sankar about the Piazza online collaboration system that was developed to help students, particularly women, studying science and engineering subjects feel less isolated.
Video: SandDance

HIGH PERFORMANCE - Video: SandDance

Thursday, Apr 4, 2013

ARTICLE: SandDance is a web-based visualization system that uses 3D hardware acceleration to explore the relationships between hundreds of thousands of items. Arbitrary data tables can be loaded, and results can be filtered using facets and displayed using a variety of layouts.
Video: Bill Buxton at TechFest 2013: Designing for Ubiquitous Computing

SOFTWARE ENGINEERING - Video: Bill Buxton at TechFest 2013: Designing for Ubiquitous Computing

Wednesday, Apr 3, 2013

ARTICLE: Bill Buxton, Principal Researcher at Microsoft Research, shares his perspectives on the premise that in this emerging world of ubiquitous computing, it is vital that devices, applications, and services are designed, from the start, by taking the other members of the ecosystem into account. Individually, they must offer great value, experience, and satisfaction, and combined, great design must derive value from all the other devices, applications, and services in the ecosystem, while continually reducing overall complexity.
We're Not in Post-PC Times, But It Is a Nouveau Mobile World

NETWORKING - We're Not in Post-PC Times, But It Is a Nouveau Mobile World

Tuesday, Apr 2, 2013

BLOGPOST: With the rising importance and ubiquity of devices such as tablets and smartphones, it's becoming trendy for technology pundits to say that we are moving to post PC times, that not only will the importance of the PC dwindle, but that we will soon cease to use them completely.
Restricting Signed Java Applets

SECURITY - Restricting Signed Java Applets

Monday, Apr 1, 2013

ARTICLE: I was recently on a project where I was looking at Java applets. While looking at them, I found that the moment you sign an applet, you give it carte-blanche. It downloads to your hard drive and if it is malicious, for whatever reason, it could do a lot of bad things like deleting files from your disk or connecting to sites you didn't even know existed.
Top 3 Web Applications Security Threats Infographic

Top 3 Web Applications Security Threats Infographic

Friday, Mar 29, 2013

BLOGPOST: Top 3 Web Applications security threats and some advise as how to prevent or minimize their impacts.
A Smarter Smart Home: Case Studies of Ambient Intelligence

A Smarter Smart Home: Case Studies of Ambient Intelligence

Friday, Mar 29, 2013

ARTICLE: Technological support for sustainable home use lies in more subtle and contextually appropriate interventions that integrate informative models of occupant behavior, provide hybrid levels of automated control, and use ambient sensing for localized decisions.
The SCDOR Hack: Great Security Theater in Five Stages

The SCDOR Hack: Great Security Theater in Five Stages

Friday, Mar 29, 2013

ARTICLE: The South Carolina governor's response to the SCDOR hack represents a textbook application of Elisabeth Kübler-Ross's "five stages of grief" to cybersecurity.
Sustainable IT: Challenges, Postures, and Outcomes

Sustainable IT: Challenges, Postures, and Outcomes

Friday, Mar 29, 2013

ARTICLE: Sustainable IT capabilities benefit not only the environment but also business value.
Using Datacenter Simulation to Evaluate Green Energy Integration

Using Datacenter Simulation to Evaluate Green Energy Integration

Friday, Mar 29, 2013

ARTICLE: Many simulators are available to evaluate performance and power tradeoffs in datacenters. The authors use one such simulator to demonstrate that by accurately provisioning green energy availability for longer time intervals, green energy prediction can improve overall energy efficiency.
Creating Green Awareness Using IT: The Case of Hong Kong

Creating Green Awareness Using IT: The Case of Hong Kong

Friday, Mar 29, 2013

ARTICLE: Creating green awareness through educational programs is crucial to the success of sustainable development. Several initiatives in Hong Kong use cloud technologies, online interactive games, competitions, and physical equipment to raise green awareness among high school students.
Holistic Datacenter Design in the Open Compute Project

Holistic Datacenter Design in the Open Compute Project

Friday, Mar 29, 2013

ARTICLE: Facebook's Open Compute Project lets the community benefit from and contribute to improvements in power and water usage effectiveness, cost, and operation.
Automating a Building's Carbon Management

Automating a Building's Carbon Management

Friday, Mar 29, 2013

ARTICLE: Buildings are the largest contributor to the world's carbon footprint, yet many building managers use only periodic audits to adjust resource consumption and carbon emission levels. The ECView framework leverages existing workflow systems to continually assess a building's carbon emissions in relation to daily weather, commuting and travel patterns, and changing government regulations.
Enabling Green IT through Energy-Aware Software

Enabling Green IT through Energy-Aware Software

Friday, Mar 29, 2013

ARTICLE: Software behavior can significantly affect computer energy efficiency in everything from small devices up to servers in data centers. However, there are multiple techniques that software developers can use to reduce the energy consumption of drivers and applications.
VSPN: VANET-based Secure and Privacy-preserving Navigation

VSPN: VANET-based Secure and Privacy-preserving Navigation

Friday, Mar 29, 2013

ARTICLE: In this paper, we propose a navigation scheme that utilizes the online road information collected by a vehicular ad hoc network (VANET) to guide the drivers to desired destinations in a real-time and distributed manner. The proposed scheme has the advantage of using real-time road conditions to compute a better route and at the same time, the information source can be properly authenticated. To protect the privacy of the drivers, the query (destination) and the driver who issues the query are guaranteed to be unlinkable to any party including the trusted authority. We make use of the idea of anonymous credential to achieve this goal. In addition to authentication and privacy-preserving, our scheme fulfills all other necessary security requirements. Using the real maps of New York and California, we conducted a simulation study on our scheme showing that it is effective in terms of processing delay and providing routes of much shorter travelling time.
Solution Centers
Computing Now Blogs
Big Data Trends: by David Feinleib
Enterprise Thinking: by Josh Greenbaum
A Cloud Blog: by Irena Bojanova
Mind the Cloud: by Thoran Rodrigues
No Batteries Required: by Ray Kahn
Out of Print: by Evan Butterfield
Software Technologies: by Christof Ebert
 
please follow me on twiter : sijan tamang
and also on like page on facebook : sijan tamang
and also you can send me request on my profile :Sijan waiba