Computing Archives | Page 2 of 2 | Innovate
Innovation Spotlight
|
police data analysis
Many industries are experiencing a digital transformation through the power of data, bringing new intelligence and insights into the workplace and beyond. As part of this movement, law enforcement agencies are now looking to Intelligence-Led Policing (ILP), a model of proactive policing activity that uses data mining and analysis as...

Keep reading

|
Researchers discovered that children using VR physical therapy game trust robot therapists more than humans.

Keep reading

Recent reports[1] show hybrid cloud adoption growth tripled in the last year, and 80 percent of all IT budgets are expected to be committed to cloud solutions in the next 15 months. The message is pretty clear: cloud computing isn’t going anywhere and will only become more widespread. The same...

Keep reading

Could the Internet of Things (IoT) protect developing areas of the world from catastrophic flooding? A group of researchers in India thinks so. Each year, floods cause devastation around the globe because villages cannot afford to take preventative measures. Current flood detection systems can cost over $1 million, which is...

Keep reading

Diversification is a favorable word for anyone in finance management. And as data becomes more valuable, the same can be said for the cloud—at least according to researchers in Beijing whose new multi-cloud storage framework could improve storage reliability and reduce spending on cloud services by 20 percent. The scheme...

Keep reading

As the amount of data being generated and transmitted over to the cloud increases, so too do research proposals to combat security issues with advanced cryptography. Often these proposals involve complex policy algorithms and new infrastructures, which work in theory, but would require high overhead in reality. Dr. Mazhar Ali,...

Keep reading

University of South Florida researchers recently set out to find a way to give consumers more bandwidth. What they stumbled upon, however, may very well become a valuable hardware network security tool. An article in IEEE Journal on Emerging and Selected Topics in Circuits and Systems details how the team...

Keep reading

Millions of people share sensitive information over the digital cloud, yet with a new data-breach scandal in the media every week, few trust its security. One team of university researchers has taken the latest in encryption methodology and enhanced it – protecting users against even the server authorities. The Illinois...

Keep reading

Advanced sensors are viewed as important for improving operations in critical facilities such as power plants – but can they ultimately undermine cyber defenses? New research recently published in IEEE Transactions on Power Systems prepares for not if, but when that day will come. In the wake of large government ...

Keep reading