STEMCorp

Brazil
Brazil
SEARCH FILTERS
Time filter
Source Type

Hurlburt G.,STEMCorp
Computer | Year: 2016

Given that no system is completely immune from attack, cybersecurity advances, while important, should take a backseat to improving human awareness of security risks. An objective, consensus-based rating system is one means to achieve this end. © 1970-2012 IEEE.


Hurlburt G.F.,STEMCorp | Bojanova I.,University of Maryland University College
IT Professional | Year: 2014

The new world of mobile devices offers reasonable likelihood that virtual currency will prevail on a global scale. Currently, the bitcoin crypto-currency model appears to be a forerunner. Bitcoin, a highly disruptive technology, has both supporters and detractors. Nonetheless, in concert with other trends, some form of virtual currency, even if a successor to bitcoin, appears to have a path forward. Virtual currencies will likely gain in stature as other novel, unspecified, and disruptive innovations take hold in a world of increasingly autonomous systems. This department is part of a special issue on mobile commerce. © 1999-2012 IEEE.


Bojanova I.,University of Maryland University College | Hurlburt G.,STEMCorp | Voas J.,IEEE - Institute of Electrical and Electronics Engineers
Computer | Year: 2014

Today, the Internet of Things. Tomorrow, the Internet of Everything. Beyond that, perhaps, the Internet of Anything-a radically super-connected ecosystem where questions about security, trust, and control assume entirely new dimensions. © 2014 IEEE.


Hurlburt G.,STEMCorp | Bojanova I.,University of Maryland University College | Sobel A.,University of Miami | Crosby K.,Tri Guard Risk Solutions Ltd.
Computer | Year: 2014

How secure is "secure enough," and how private is "private enough"? At age 25, the Internet offers unprecedented potential for both liberty and protection, but can easily breed lawlessness and oppression - blurring the line between safety and simple prying. © 2014 IEEE.


Hurlburt G.,STEMCorp | Bojanova I.,University of Maryland University College | Berezdivin R.,Catapult
IT Professional | Year: 2014

The adoption of various converging trends in IT, such as cloud computing, the Internet of Things (IoT), crypto-currency, autonomous systems, and big data, challenge traditional notions of program management and highlight the importance of computational networks. © 1999-2012 IEEE.


Hurlburt G.,STEMCorp
IT Professional | Year: 2015

Graph databases are a relatively new database technology gaining popularity. This article explores the value of graph databases and probes some of their security and privacy implications. © 1999-2012 IEEE.


Hurlburt G.,STEMCorp
Computer | Year: 2015

The ways in which we use and develop tools shape human destiny. This is especially true when such tools are used in harmful ways - as with the recent rash of cyberattacks. © 1970-2012 IEEE.


Hurlburt G.F.,STEMCorp
Computer | Year: 2014

Big data analytics poses significant challenges for privacy protection. Meeting these challenges requires thinking hard about the increasingly critical role autonomous embedded networks play in all aspects of life. © 1970-2012 IEEE.


Bojanova I.,University of Maryland University College | Voas J.,IEEE - Institute of Electrical and Electronics Engineers | Hurlburt G.,STEMCorp
IT Professional | Year: 2015

The Internet of Anything and sustainability are coevolving concepts Their convergence is occurring in a world that can no longer be viewed in terms of often mechanistic and static precision characteristics, as was the thinking of our recently industrialized era. This special issue examines and reinforces this vital union and explores its potential. © 1999-2012 IEEE.

Loading STEMCorp collaborators
Loading STEMCorp collaborators