Trends
In-depth analysis of the latest tech trends, with highlights of the top research from the world's standard-bearer for computing professionals.

Recent Articles

By Patty Yan
In the digital world where tech-savvy consumers expect only the best, your customer service offerings need to be top tier. As the user experience across multiple devices becomes enhanced by technology, the ability to implement tech into your customer service operations is also enhanced. You might be thinking, ‘But I…
By David Gilad Maayan
What Is the Argo Project? The Cloud Native Computing Foundation (CNCF) launched the Argo project to help build and manage continuous delivery (CD) workflows on Kubernetes. It consists of four projects—Argo CD, Argo Workflows, Argo Rollouts, and Argo Events.     Want More Tech News? Subscribe to ComputingEdge Newsletter Today!…
By IEEE Computer Society Team
In 2013, Yahoo! suffered a data breach that exposed 3 billion — not million, billion — data records. At the heart of this and other costly breaches are vulnerabilities. As was the case with Yahoo!, even the biggest players can overlook crucial weak spots in their technology stack. As a…
By Grace Lau
With all aspects of business and operations becoming automated, from an automated phone system for small business owners to self-driving cars, it should come as no surprise that CI/CD pipelines are becoming automated too. In this comprehensive guide to the best CI/CD practices, we will explore what a CI/CD pipeline…
By IEEE Computer Society Team
With worldwide optimistic sentiment surrounding blockchain, many companies ponder if it is a practical, necessary competitive tool within their specific industry and business. As an immutable, transparent ledger system, blockchain sparks excitement in versatile applications outside cryptocurrency — for example, voting records, property transactions, intellectual property, luxury goods, smart contracts,…
By IEEE Computer Society Team
The global spending on enterprise software hovers around U.S. $605 billion. To ensure an efficient production process, teams incorporate several methodologies and approaches to the development lifecycle, two of which are Agile and waterfall. While Agile has been gaining momentum in recent years, waterfall still has its place. While thinking…
By Jen Smith
Over the last decade, mobile apps and mobile user experiences have evolved drastically. While we first had simple apps that did the bare minimum, recent mobile app development has led to a lot of changes. And one of the main factors that have helped in this dramatic change is the…
By Gilad David Maayan
What Are SIEM and XDR? Security information and event management (SIEM) technology aggregates security data, sends alerts on suspicious activity, and provides security insights. Extended detection and response (XDR) technology aggregates detection data, initiates automated responses, and pushes alerts as needed.     Want More Tech News? Subscribe to ComputingEdge…
By IEEE Computer Society Team
Since the Agile Manifesto was first conceived in a ski lodge at Snowbird resort in Utah, development teams have been adopting and tweaking the approach to suit their needs. They’ve also debated if it’s truly the best solution, which raises an important question: Considering the concept of software as a…
By Jamie Waltz
Remote software development is already here, opening a lot of scopes to companies for cost control and quality assurance at the same time. In addition, since the coronavirus pandemic in the last two years forced many companies to enforce work-from-home protocol, the remote workforce now constitutes a considerable portion of…
By IEEE Computer Society Team
The Institute of Electrical and Electronics Engineers (IEEE) defines software engineering as “the application of a systematic, disciplined, quantifiable approach to the development, operation, and maintenance of software; that is, the application of engineering to software.” The most common systematic approach taken is described as “layered.” What is software engineering…
By Tim Ferguson
Soon after Covid-19 struck the world, most organizations switched to digital space from offline mode, an unprecedented, vast, and swift transition. Due to this shift, one of the significant challenges for an organization today is to manage its digital assets. Digital support, in simple words, is a media collection meant…
By Saurabh Sharma
The Tech world is buzzing with a new niche term, ‘Metaverse.’ Almost everyone is talking about it. Metaverse is a concept of an online, persistent, 3D universe that associates multiple virtual spaces. You can consider it a futuristic iteration of the internet. The Metaverse will enable users to meet, work,…
By Jessica Day
Angular coding requires deep learning and regular practice. The process is not straightforward and well known for the potential litany of errors. Building and maintaining apps is an art that can be refined to enhance usability. This article will look at five practical tips for strengthening angular app structure, from…
By Jenna Bunnell
In high-quality software development, rigorous testing is critical for preparing products before release, streamlining internal use, and providing an excellent service for clients. What is test data management? This crucial step removes crippling bugs and the potential for customer dissatisfaction. To succeed, developers require a supply of test data to…
By Jenna Bunnell
Running a business can sometimes seem overwhelming. You have overall responsibility for ensuring your organization runs efficiently and that you have suitable strategies in areas such as engagement strategy. However, as well as any current processes and systems you employ, you also have to keep one eye on current and…
By IEEE Computer Society Team
In their article published on the Technical Community on Learning Technology bulletin, “The Women in Computer Science Program in New Mexico Tech,” Amy Knowles shares some stunning statistics for female students. While females make up a majority of the overall student population across American universities, only 22.5% of bachelor’s degrees…
By IEEE Computer Society Team
Listen to Episode 500 Since its founding in January 2006 by Markus Voelter, SE Radio has produced educational episodes every month — and now every week — on a variety of topics of interest to professionals in the tech world, focusing particularly on software engineers and developers. In 2012, the…
By Lucy Manole
Kubernetes has simplified managing the workload of developers, with the benefits gained by containerization coupled with the powerful orchestration functionalities of Kubernetes. However, with the ever-increasing complexity of software, there may be instances where you have to experience performance bottlenecks even with Kubernetes. In this post, we will see how…
By Jen Smith
External penetration testing is a process used to identify the vulnerabilities of a company’s computer systems and networks. An external security consultant can perform this type of testing or be conducted in-house by the company’s own IT staff. External penetration testing is a type of security testing that involves taking…
There are no results for this search.
   Analysis, Blogs, Commentary