Trends
In-depth analysis of the latest tech trends, with highlights of the top research from the world's standard-bearer for computing professionals.

Recent Articles

Loading Tech News Entries
For the past 4 years, the Trump Administration has been committed to strengthening American leadership in artificial intelligence (AI). After recognizing the strategic importance of AI to the Nation’s future economy and security, the Trump Administration issued the first ever national AI strategy, committed to doubling AI research investment, established…
By Larry Alton
Moving into 2021, you can’t be too careful with cybersecurity. Each time you or an employee download an app, sign up for an account, or use public Wi-Fi, you’re at risk.
By Gaurav Belani
The cyberattack surface in modern enterprise environments is massive, and it’s continuing to grow rapidly. This means that analyzing and improving an organization’s cybersecurity posture needs more than mere human intervention.
By Gilad Maayan
Enterprise Kubernetes is a foundation for digital transformation at many organizations. In the age before container technology, different departments and technical teams were using different tools, applications, and hardware, with no standardized platform for developing and deploying software.
By Gilad Maayan
ECM provides a centralized platform for maintaining and distributing content, in a manner that meets compliance requirements and risk management guidelines. ECM achieves compliance by eliminating ad hoc processes that could expose companies to the risk of data exposure or loss.
By Gaurav Belani
VPNs are becoming more and more commonplace today and you likely have some friends or colleagues who use a VPN while browsing the internet. If you’re unfamiliar with what it is, how it works, and why an increasing number of people are using it, then this post is for you.
By Gilad Maayan
Insider threats are individuals who are or were employed or contracted by the organization, and carry out activities that harm the organization. These individuals often have access to corporate networks and assets like applications and databases storing sensitive information and trade secrets.
By Charles Macfarlane
Without open standards, OEMs will not be able to transition through the SAE levels of autonomy. OEMs will stay in Level 2, or an extended version of Level 2 (often referred to as Level 2+) but will not evolve to Level 3 in a credible timeframe. Nor will they achieve UN’s WP29 requirement to maintain and update the car’s software for the lifetime of the vehicle.
By Charles Macfarlane
Just like the PC, gaming and smartphone industry, the business models and relationships in automotive will evolve in almost every part of the supply chain and vehicle usage. Shared ownership and “robotaxis” are being extensively projected as the norm within the future’s smart cities bringing a host of benefits.
By Charles Macfarlane
Developing software for Advanced Driver Assistance System (ADAS) has always been a challenge, but the demand to achieve ambitious feature targets in cars while maintaining functional safety is tough. The charge through the next generation ADAS and leading to the Autonomous Drive (AD) vehicle feels like an impossible task today.
By Gilad Maayan
High performance computing (HPC) technologies can quickly perform parallel processing tasks. In the past, HPC resources were expensive to set up and maintain. However, once HPC moved to the cloud, it became more accessible and affordable. In this article, you will learn about three successful cloud HPC implementations.
By Gilad Maayan
Today, data is generated and distributed across highly complex ecosystems, such as multicloud, hybrid cloud, edge and Internet of Things (IoT), to name a few, making backup and recovery more difficult to achieve, and requiring innovative automated solutions. This article covers important trends driving the backup and recovery ecosystem.
By Larry Alton
Computer technology has a special way of transforming nearly every industry on the face of the planet. It should be no surprise that technology is transforming firearms in a new way.
By Schrödinger
Get the computing resources you need, when you need them, with the auto-scaling Virtual Clusters of Schrödinger in the Cloud.
By Steven Bay
Internal vulnerabilities cannot be ignored. Employees have access, inside knowledge, and from time to time, if disgruntled, may be motivated to do significant damage to the organizations they support. As a trusted and cleared contractor at NSA, Snowden extracted millions of top secret documents and released them to the world.
By Matt Shealy
Much of the software code that serves as the base for blockchain and cryptocurrency has been developed using open source software. Developers from all over the world have contributed to create, manage and expand on the software. It’s this open source approach that has created opportunities for business and consumers to use the blockchain in new ways across society.
By Devin Partida
If a person uses pirated software innocently — most sites offering cracked software don't warn people they're breaking the law by using it — their actions could cause consequences for their companies, jobs and livelihoods. For example, allegations of using pirated software could cause authorities at a university to decide that the visiting professor who did it broke the terms of the agreement allowing them to come to the institution. 
By Andrej Kovačević
In a world where internet connectivity’s coming to countless new devices daily, security concerns are mounting. Here’s how to keep your digital home secure. In the modern home, connected devices are multiplying. It started with computers, smartphones, and tablets. Then came the rise of smart TVs and connected media players.…
By Larry Alton
It’s likely that millions of people have missed out on job opportunities or lost their current jobs due to something they said or did on social media.
By Gaurav Belani
Every startup owner today is aware that having an active business blog is crucial to building online thought leadership and visibility. Producing useful blog posts and articles on a consistent basis is an integral part of any holistic marketing strategy, in order to garner more traffic and rank higher on search engines.
There are no results for this search.