IEEE Computer Magazine

Subscribe to IEEE Computer Magazine feed IEEE Computer Magazine
Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. The aim is to provide more technical substance than trade magazines and more practical ideas than research journals. Computer seeks to deliver useful information for all computing professionals and students, including computer scientists, engineers, and practitioners of all levels.
Updated: 7 min 24 sec ago

Error-Resilient Server Ecosystems for Edge and Cloud Datacenters

Mon, 12/18/2017 - 15:01
The explosive growth of Internet-connected devices that form the Internet of Things and the flood of data they yield require new energy-efficient and error-resilient hardware and software server stacks for next-generation cloud and edge datacenters.

A 21st Century Cyber-Physical Systems Education

Mon, 12/18/2017 - 15:01
The rapid rate of change in the computing and engineering domains has our educational institutions on high alert. The authors explore how best to prepare graduates for a world in which cyber-physical systems are increasingly ubiquitous.

Plotting a Socially Responsible Course for Computers Using Cybersecurity as an Example

Mon, 12/18/2017 - 15:01
Moore’s law drove an information revolution that changed the world. But computers will need more than raw performance in the future. Because computers now act as agents for humans, new issues arise that can only be addressed if engineers coordinate with lawyers and businesspeople.

Hacking Power Grids: A Current Problem

Mon, 12/18/2017 - 15:01
Cyberattacks against power grids and other critical infrastructures are increasing in frequency and severity. Government and industry stakeholders must take more active steps to address the problem before a major catastrophe occurs.

How Do You Command an Army of Intelligent Things?

Mon, 12/18/2017 - 15:01
The future workforce will be made up of both humans and intelligent things. We’ll need to understand and leverage the strengths and weaknesses of human cognition and machine intelligence to command and control this new organizational form.

The Rise of Intelligent Cyber-Physical Systems

Mon, 12/18/2017 - 12:58
It’s expected that the cyber-physical systems revolution will be more transformative than the IT revolution of the past four decades.

50 & 25 Years Ago

Mon, 12/18/2017 - 12:58
A summary of articles published in Computer 50 and 25 years ago.

Equifax and the Latest Round of Identity Theft Roulette

Mon, 12/18/2017 - 12:58
The Equifax data breach has exposed nearly half of the US adult population to identity theft, but that’s not the real story.

The Subway to China

Mon, 12/18/2017 - 12:58
You can’t argue with a five-year plan. The web extra at https://youtu.be/5amJUyrSgBw is an audio recording of author David Alan Grier reading his Global Code column.

Embracing Changes

Mon, 12/18/2017 - 12:57
IEEE Computer Society members have many new offerings to choose from, and even more ways to get involved and make a difference.

Reduced Instruction Set Computers Then and Now

Mon, 12/18/2017 - 12:57
A widely cited Computer article published in 1982 described the reduced instruction set computer (RISC) as an alternative to the general trend at the time toward increasingly complex instruction sets. A RISC executes most instructions in a single short cycle.

Self-Driving Cars

Mon, 12/18/2017 - 12:57
Many recent technological advances have helped to pave the way forward for fully autonomous vehicles. This special issue explores three aspects of the self-driving car revolution: a historical perspective with a focus on perception for autonomous vehicles, how government policy will impact self-driving cars technically and commercially, and how cloud-based infrastructure plays a role in the future.

The Future of Intelligent Assistants

Mon, 12/18/2017 - 12:57
Today’s leading technology companies are weaving their ecosystems into our homes and our lives, placing their young AIs at the center of it all.

The Evolution of Bitcoin Hardware

Wed, 12/13/2017 - 13:53
Since its deployment in 2009, Bitcoin has achieved remarkable success and spawned hundreds of other cryptocurrencies. The author traces the evolution of the hardware underlying the system, from early GPU-based homebrew machines to today’s datacenters powered by application-specific integrated circuits. These ASIC clouds provide a glimpse into planet-scale computing’s future.

Real-Time Video Analytics: The Killer App for Edge Computing

Tue, 11/21/2017 - 12:12
Video analytics will drive a wide range of applications with great potential to impact society. A geographically distributed architecture of public clouds and edges that extend down to the cameras is the only feasible approach to meeting the strict real-time requirements of large-scale live video analytics.

IEEE Computer Society

Fri, 11/10/2017 - 15:04
Provides a listing of current staff, committee members and society officers.

The Therac-25: 30 Years Later

Thu, 11/09/2017 - 15:36
A widely cited 1993 Computer article described failures in a software-controlled radiation machine that massively overdosed six people in the late 1980s, resulting in serious injury and fatalities. How far have safety-critical systems come since then?

meSchup: A Platform for Programming Interconnected Smart Things

Thu, 11/09/2017 - 15:36
In a future where hundreds of smart networked devices will be embedded in our everyday environments, the question of how to program the world around us arises. An abstraction layer and web-based integrated development environment can interweave available smart things’ capabilities into a collective orchestration of smart behavior.

The New Science Wars

Thu, 11/09/2017 - 15:36
Science and scholarship are under attack from all sides. To a large degree the lack of appreciation is due to a fundamental misunderstanding about the nature of scientific inquiry.

On Ransomware and Envisioning the Enemy of Tomorrow

Thu, 11/09/2017 - 15:36
We warned the public more than 20 years ago that cryptoviral extortion would pose a major threat to users, a threat that has been realized with the advent of Bitcoin but largely neglected until recently. We believe that a reactive mindset along with group conformity are partly to blame for this oversight and, moreover, are negatively impacting secure systems research. This presents a recipe for disaster, for while cryptoviral extortion is wreaking havoc on the surface, covert cryptovirology attacks are likely gathering strength within the shadows.

Pages