Discover The CTU Experience

CTU Blog

Archives

Content Type

Content Category

 

Latest Posts

How Close is Molecular Computing?

While it may seem like science fiction, modern advances in semiconductor manufacturing meant to support denser integrated circuits, or chips, will soon have us trying to imprint transistors and interconnect of a size less than ten nanometers. According to the International Technology Roadmap for Semiconductors, known throughout the world as the ITRS, this scale will be near the size of individual molecules. This progress raises the question: could molecules be made to serve as transistors and interconnect?

Social Networking as a Therapeutic Device

After years of teaching online with my focus on psychology and sociology, it’s interesting to observe how the way we communicate has changed with the growth of the Internet.

Rethinking the Cybersecurity Equation

We need to take a hard look at our cybersecurity policy and ensure those that that frame it are the best minds private and public sectors can bring to the table.

How to Sound Computer-Savvy Using These Ten Terms

If you want to speak like a computer expert, it helps to do your research on computers, Internet trends, and the latest technological advances. To start learning the technical jargon, here’s a list of ten terms that you should know.

What You Need When You Fix Your Computer

Attempting to fix your computer is stressful enough, so scrambling around to find backup discs and paperwork only makes it worse. You can improve the situation, however, by assembling the right tools and materials before you start the repairs.

The Roots of Cloud Computing

What is all this hype over cloud computing? Is it really something new under the sun? As one who has witnessed the last forty years of computing technology, I say yes and no.

Flame and the (Fairly) New World of Cyber Warfare

The recent press coverage of the “Flame” computer virus, which computer security experts have purportedly been aware of since 2010, underscores changes that have been occurring in intelligence-gathering and warfare.