| 2008 |
| 27 | EE | Sixto Ortiz Jr.:
Internet Researchers Look to Wipe the Slate Clean.
IEEE Computer 41(1): 12-16 (2008) |
| 26 | EE | Sixto Ortiz Jr.:
Proponents Try to Rehabilitate Peer-to-Peer Technology.
IEEE Computer 41(4): 16-19 (2008) |
| 2007 |
| 25 | EE | Sixto Ortiz Jr.:
Brain-Computer Interfaces: Where Human and Machine Meet.
IEEE Computer 40(1): 17-21 (2007) |
| 24 | EE | Sixto Ortiz Jr.:
4G Wireless Begins to Take Shape.
IEEE Computer 40(11): 18-21 (2007) |
| 23 | EE | Sixto Ortiz Jr.:
Getting on Board the Enterprise Service Bus.
IEEE Computer 40(4): 15-17 (2007) |
| 22 | EE | Sixto Ortiz Jr.:
Searching the Visual Web.
IEEE Computer 40(6): 12-14 (2007) |
| 21 | EE | Sixto Ortiz Jr.:
Protecting Networks by Controlling Access.
IEEE Computer 40(8): 16-19 (2007) |
| 2006 |
| 20 | EE | Sixto Ortiz Jr.:
Phone Companies Get into the TV Business.
IEEE Computer 39(10): 12-15 (2006) |
| 19 | EE | Sixto Ortiz Jr.:
Is Near-Field Communication Close to Success?
IEEE Computer 39(3): 18-20 (2006) |
| 18 | EE | Sixto Ortiz Jr.:
How Secure is RFID?
IEEE Computer 39(7): 17-19 (2006) |
| 2004 |
| 17 | | Sixto Ortiz Jr.:
Internet Telephony Jumps off the Wires.
IEEE Computer 37(12): 16-19 (2004) |
| 16 | EE | Sixto Ortiz Jr.:
3D Searching Starts to Take Shape.
IEEE Computer 37(8): 24-26 (2004) |
| 2003 |
| 15 | EE | Sixto Ortiz Jr.:
New Monitor Technologies Are on Display.
IEEE Computer 36(2): 13-16 (2003) |
| 14 | EE | Sixto Ortiz Jr.:
Software Radios Add Flexibility to Wireless Technology.
IEEE Computer 36(8): 23-25 (2003) |
| 2002 |
| 13 | EE | Sixto Ortiz Jr.:
Is Business Intelligence a Smart Move?
IEEE Computer 35(7): 11-14 (2002) |
| 2001 |
| 12 | EE | Sixto Ortiz Jr.:
Embedded Oss Gain the Inside Track.
IEEE Computer 34(11): 14-16 (2001) |
| 11 | EE | Sixto Ortiz Jr.:
Instant Messaging: No Longer Just Chat.
IEEE Computer 34(3): 12-15 (2001) |
| 2000 |
| 10 | EE | Sixto Ortiz Jr.:
E-mail Protection Advances with New Technologies.
IEEE Computer 33(1): 21-23 (2000) |
| 9 | EE | Sixto Ortiz Jr.:
Will PKI Become a Key to Online Security?
IEEE Computer 33(12): 13-15 (2000) |
| 8 | | Sixto Ortiz Jr.:
Embedded Databases Come out of Hiding.
IEEE Computer 33(3): 16-19 (2000) |
| 7 | EE | Sixto Ortiz Jr.:
Broadband Fixed Wireless Travels the Last Mile.
IEEE Computer 33(7): 18-21 (2000) |
| 1999 |
| 6 | | Sixto Ortiz Jr.:
New Chips Move Networking onto Silicon.
IEEE Computer 32(2): 7-9 (1999) |
| 5 | | Sixto Ortiz Jr.:
The Battle over Real-Time Java.
IEEE Computer 32(6): 13-15 (1999) |
| 4 | | Sixto Ortiz Jr.:
Appliances Challenge the Server Market.
IEEE Computer 32(9): 11-13 (1999) |
| 1998 |
| 3 | | Sixto Ortiz Jr.:
Hardware-Based Networking Widens the Pipes.
IEEE Computer 31(5): 8-9 (1998) |
| 2 | | Sixto Ortiz Jr.:
Active Networks: The Programmable Pipeline.
IEEE Computer 31(8): 19-21 (1998) |
| 1997 |
| 1 | | Sixto Ortiz Jr.:
Virtual Private Networks: Leveraging the Internet.
IEEE Computer 30(11): 18-20 (1997) |