Trends
In-depth analysis of the latest tech trends, with highlights of the top research from the world's standard-bearer for computing professionals.

Recent Articles

By Stevie Carpenter
Biometric data represents an exciting opportunity in technology. It has applications across many sectors. Financial institutions, social media, education, and healthcare, to name but a few. As with any personal data, there are privacy concerns to consider. At the time of writing, there are no nationwide biometric privacy laws. However, state and f...
IEEE Computer Society SUBSCRIBER EXCLUSIVE
By Rebecca Stewart
Despite not being a brand-new concept, the idea of embracing corporate social responsibility is becoming more and more popular among today's businesses – and rightly so. Data shows, for example, that more than 60% of consumers are happy to spend more for a product sold in sustainable packaging, whereas 78% of US consumers state that they conside...
By Ross Moore
Management Takes more than just tools It's a story as old as time: students think buying the best tools will automatically make them better at their craft: pianists buy the best piano; woodworkers, the best planers and joiners; painters, the best canvas and paints; mechanics, the best impact and hydraulic equipment. Tools are a must-have; goo...
IEEE Computer Society SUBSCRIBER EXCLUSIVE
By Gilad David Maayan
What Is Configuration as Code? Configuration as Code (CaC) is a design ethos in the field of software development. It refers to the practice of managing and provisioning computing resources and applications through machine-readable definition files rather than physical hardware configuration or interactive configuration tools. The concept of ...
By Gilad David Maayan
What Are Microservices Design Patterns? Microservices design patterns are a set of reusable solutions that help resolve common problems occurring within microservices applications. Each pattern is like a blueprint that you can customize to solve a particular design problem in your code. The microservices architecture is a method of developing...
By Muadh Al Kalbani
Say It Louder: Accessibility Is Important The importance of accessibility cannot be disputed. This is underpinned by two of the key sustainable goals set out by the United Nations: "Promote peaceful and inclusive societies for sustainable development, provide access to justice for all and build effective, accountable and inclusive institutions...
By IEEE Computer Society Team
The typical answer is … maybe. But the good news is that changing that answer to a strong yes is a move that's in your own hands. The benefits of conference sponsorship are obvious, including that it can elevate your organization's profile, share knowledge about what you offer, and create networking and lead-generation opportunities. The drawb...
By IEEE Computer Society Team
At first glance, teachers and entrepreneurs play seemingly disparate roles: teachers typically gather and impart knowledge grounded in a learning tradition to a captive audience, while entrepreneurs push a rogue vision of a novel product or service to theoretical customers in an open market. An effort at Penn State, however, has been identifying an...
By Navin Kamuni
In the rapidly evolving landscape of AI, the ability to decode human emotions is akin to discovering a new language — a language that bridges the gap between human complexity and machine efficiency. This is not merely an advancement; it's a paradigm shift, redefining the interaction between humans and machines. Text Analysis: AI's Linguistic A...
By Stevie Carpenter
No matter what industry you work in, inclusivity is an essential factor. While many see inclusivity policies as paying lip service, it is something that every business should be encouraging. While great strides have been made across several sectors in moving toward equality and parity, some are lagging behind. One of those sectors is the tech secto...
By Stevie Carpenter
Have you ever had that exhilarating moment when you stumble upon a developer tool or platform that just clicks? Everything seems to groove together seamlessly, documentation is easily comprehensible, and collaborating with fellow developers feels smooth? Well, that's the magic of an exceptional developer experience (or DX for short). In this high-...
By Gaurav Belani
Software deployment involves steps and processes to make a tool available for end users while ensuring maximum security, compatibility, and optimization. It can seem overwhelming and complex, especially to computing professionals from diverse disciplines in industry, academia, and research. Fret not! This beginner's guide can help you understand ...
By Josh Breaker-Rolfe
Amidst an increasingly tumultuous cybersecurity landscape, threat intelligence vendors have become vital to protecting organizations and individuals. These vendors provide invaluable insights that empower organizations to safeguard their digital assets. However, it's essential to recognize that not all threat intelligence providers are created equa...
By Jenna Bunnell
When developers think about code reviews, they don't usually jump up and down for joy. Many might even contemplate running for the hills or the bush country. With remote teams, no running is required. They can already keep their head down and write code as they always do. Why all the anxiety surrounding code reviews? Well, having to revise work yo...
By Nicholas Woodward
The World Economic Forum has identified cyberattacks as one of the biggest risks to global economic stability. The Cybersecurity Outlook Study estimates an exponential rise in cyberattacks in the coming years, costing $11.5 trillion in damages in 2023. The eCommerce industry is one of the 8 most targeted industries for cyberattacks. The value of e...
By Ronak Pansara
In the ever-evolving landscapes of Agtech (Agricultural Technology) and Manufacturing, where data reigns supreme, a silent revolution is taking place. This revolution is fueled by the strategic implementation of Master Data Management (MDM). The concept of MDM may seem technical, but its impact is profound. It's the key to creating a single sourc...
By Sam O'brien
From saving the bees to supporting research of all kinds, technology has the potential for a massively positive impact on the world. Tech is how we, as a species, grow and get better. But not all tech is created equal, and not all tech enjoys an equally positive reception. In particular, AI-produced art has been a topic of considerable debate, bo...
By Harikrishna Kundariya
Having a great web application is like having a warm and inviting storefront in the modern digital age. It's an online venue where you may introduce yourself to potential buyers, display your wares, and build your name recognition. There is, however, one outstanding query: "How much will it cost to transform my web app idea into reality?" Don't wo...
By Grace Lau
Does your business have a Dev team? If so, then you know how complex the process can be, whatever their end goal is. When it comes to implementing a product, new software, or even a service, there can be multiple issues that may arise and keeping a close track on how they are working and problems they encounter can be crucial to success. One probl...
By David Balaban
The traditional wide area network (WAN) has a monolithic design. It means that switches and routers come as proprietary hardware with pre-installed software on board. This is a battle-tested approach, but with a nontrivial caveat. In a world of dynamic digital transformation, technological advancements, and ever-evolving cyber threats, it falls sho...
There are no results for this search.
   Analysis, Blogs, Commentary