Trends
In-depth analysis of the latest tech trends, with highlights of the top research from the world's standard-bearer for computing professionals.

Recent Articles

By IEEE Computer Society Team
Watch 2022 Tech Predictions Sneak Peek The impact of the COVID-19 has left its imprint on human lives, supply chains, workforce, and education. In 2022, we will continue to see rapid technological advancement to meet the needs of our global society as it transforms beyond the limitations of the past…
By Gaurav Belani
When starting a new application development project, security must be top of mind, especially with the growing number of security threats, such as cyberattacks, data breaches, and more. This post will walk you through what application security means, why it matters, and the different strategies to ensure secure application development…
By Alyse Falk
Nowadays, many businesses are going through hard times with constant pandemic breakouts imposing economic, logistical, and technological challenges globally, making companies want to adapt rapidly. With face-to-face meetings being changed to video conferences to stay in touch, different cutting-edge technologies like artificial intelligence (AI) and machine learning (ML) are taking…
By Ronan Mahony
Multifactor authentication (MFA) requires users to provide two or more different types of evidence to verify who they are when logging into a service or engaging in a particular transaction. As a security mechanism, MFA is incredibly effective in helping you to stay safe online. Here’s an overview of MFA…
By Larry Alton
If you study the most productive and efficient organizations in your industry, you’ll find that they’re automating like crazy. In particular, they’re digitizing all of the manual processes that once held them back – and it’s time for you to do the same.     Want More Tech News? Subscribe…
By Maureen Stone
Tableau was founded to help people see and understand data. Tableau revolutionized business intelligence by letting a domain expert explore their own data without involving specialists in databases, analytics, and graphics. And it set an intellectual standard for an analytics tool that was both easy to use and allowed deep…
By Stella Evans
Security breaches that occur within a workplace are more common than you may think, and that goes for cyber as well as physical security. The risk of theft of computers, identity, and sensitive data leads experts to recommend that commercial operations strengthen their cyber security practices by improving their physical…
By Lois Ingram
Inclusivity is an often-overlooked factor in the tech and virtual world. However, it’s an incredibly important topic and one that computing professionals should consider in every aspect of their work. Thankfully, the versatility of modern technology is allowing aids for the visually impaired to integrate into almost every facet of…
By Shigraf Aijaz
The rising threat landscape demands a more proactive approach to cybersecurity. Organizations are scrambling to protect their data and endpoints with robust security measures as cybercriminals can now bypass the traditional security measures. Protecting endpoints is now ever more crucial to prevent cybercriminals from exploiting them as entry points within…
By Megha Gupta
Bill Gates once said, “The first rule of any technology used in a business is that automation applied to an efficient operation will magnify the efficiency…” The trend toward touchless or automated processes in business seems to surround us. Automation has largely replaced bank tellers, store cashiers, toll road clerks,…
By Jamie Waltz
Experienced mobile UI/UX designers can sense the constituents that build a great mobile user experience (UX) design. This is largely an experience and instinct-driven approach that paved the way for mobile app developers and designers’ successful and unsuccessful design attempts over the years. The approach is far from full-proof as…
By Akshay Bhimani
The retail era is evolving, and the speed of the enterprise manner agencies want to conform with it. The Cloud era has made a number of approaches simpler, permitting agencies to streamline their price processing, stock management, and different functions. Before the cloud furnished a brand new international of possibilities,…
By Raghu Krishnegowda
The gestation period for tech startups and other businesses is an exciting time for innovators who are developing “the next great product.” At the same time, it can be a period fraught with peril due to uncertainties that include the lack of clarity about how the product will evolve and…
By Gilad David Maayan
Serverless computing is being rapidly adopted by organizations, as a way to rapidly deploy software without managing the underlying infrastructure. While serverless has compelling benefits in terms of ease of maintenance and lower cost, it also raises new complexities. One of the issues developers need to address is how to…
By Ronan Mahony
In cybersecurity, it’s critical to restrict who has access to particular IT assets, such as sensitive data, servers, or applications. The implementation of policies and methods to regulate the ability to view or use resources in your environment is known as access control. This article takes a look at access…
By Iam Waqas
As the security landscape continues to grow increasingly complex, harboring an arsenal of threats and vulnerabilities, it is high time for organizations to formulate a robust cybersecurity strategy. One needs to consider that enterprises experience a loss of $3.92 on average due to data breaches. One reason for increasing data…
By Gourav Sharma
Artificial intelligence is the biggest buzzword these days and it is affecting every industry in the world. AI could be considered as a process of collecting knowledge, acting as a Human being, and using that learning to adapt to new environments and scenarios. Artificial Intelligence could adapt to all walks…
By Shigraf Aijaz
One of the most common misconceptions regarding cybersecurity is that it mostly has to do with computers and technology. This widely accepted misconception plays a significant role in the rising number of data breaches and cyber attacks that are on the rise today. In 2020 alone, 43% of C-Suite business…
By Rohan Tiwari
Predicting how computer software will perform prior to it hitting the market is a crucial element of development that saves money, time, and aggravation for users. Simulation testing may be a complex process, but it’s well worth the effort to enhance the bottom line. Today’s popular consumer apps are supported…
By Larry Alton
It’s common knowledge that most data breaches are caused by user error. For example, lax security measures and bad habits create the perfect opportunity for hackers to swoop in and steal or encrypt data in a ransomware attack. Although poor security is the leading cause of data breaches, there’s another…
There are no results for this search.
   Analysis, Blogs, Commentary