Trends
In-depth analysis of the latest tech trends, with highlights of the top research from the world's standard-bearer for computing professionals.

Recent Articles

By Jenna Bunnell
As organizations face increasing regulation, and as more consumers prioritize brands with ethical practices, it's never been more important to prove your sustainable credentials. Tech companies are subject to extra scrutiny as they try to overcome negative public attitudes. According to a 2021 CNN poll, two-thirds of Americans trust Big Tech only ...
By Jenna Bunnell
While most people would think of congested roads or coal-fired power stations when asked about the causes of climate change, the truth is that software development has a shockingly large impact, too. In response, green coding - and more broadly, green computing - has been developed as a way to limit the environmental impacts of the field. We're g...
By Venkata Mudumbai
The rapid growth and development of artificial intelligence (AI) tools and solutions have undeniably changed the technological landscape for global industries. As business leaders and developers construct new ways to implement automated functionalities into their organization's infrastructure, enterprises are reshaping how they conduct business and...
IEEE Computer Society SUBSCRIBER EXCLUSIVE
By Kruti Chapaneri
The container orchestration landscape is vast. Managing and maintaining all the services operating in the background can be challenging while staying informed about them simultaneously. Embracing the chaos is an art, particularly within distributed, containerized platforms. It is now more important than ever to embrace open-source services to under...
By Ronak Ravjibhai Pansara
In today's fast-paced digital landscape, data reigns supreme. From customer information to product details and supplier records, organizations are inundated with vast volumes of data. Amidst this deluge of information, the need to manage and leverage data effectively has never been more critical. Enter Master Data Management (MDM), a strategic fram...
By Gilad David Maayan
What Is User Management? User management, a crucial aspect of enterprise IT, involves managing and controlling user access to a network or system. This critical process is pivotal for security, compliance, and operational efficiency in an organization. It encompasses everything from determining the levels of access a user has, authenticating t...
IEEE Computer Society SUBSCRIBER EXCLUSIVE
By Jenna Bunnell
Nowadays, many businesses are trying to be more eco-conscious. Thanks to growing public pressure and government regulations, it's in a business's best interest to become as environmentally friendly as possible. One of the ways to do this is by implementing an environmental management system. Let's look at what this system is and how it can benefit...
By Jenna Bunnell
Your company's commitment to being environmentally friendly and ethical across the board is incredibly important to your investors and stakeholders. It could be the difference between winning an investment and losing it. However, investors are increasingly looking for ESG greenwashing. Greenwashing is a trap many companies fall into, and accusatio...
By Akash Kilaru
DevOps methodology is commonly applied to software development and enables more rapid and efficient delivery of software and software updates. It is an umbrella concept that describes a specialized approach to shortening and optimizing the software development lifecycle. The primary goal of DevOps is to maximize the predictability, efficiency, secu...
By Stevie Carpenter
Transforming your business in any capacity is a major undertaking that calls for a skilled hand, not to mention a good eye for detail. Culture change management takes this a step further--we'll be discussing how and why shortly. First, we'll walk through a definition so we can clear up what culture change management actually is. After that, we'll ...
By Gilad David Maayan
What Is Social Engineering? Social engineering is a method used by cybercriminals that relies on human interaction and often involves tricking people into breaking normal security procedures. It is an art of deception, aiming to exploit the weakest link in the cyber defense system: the human element. Social engineering attempts to manipulate ...
By David Gilad Maayan
What Is EDR? Endpoint Detection and Response (EDR) is a cybersecurity technology that continuously monitors and collects data from endpoint devices to identify, investigate, and prevent potential security threats. EDR solutions are typically used to provide visibility into activities happening on endpoints, which can be any device connected to...
IEEE Computer Society SUBSCRIBER EXCLUSIVE
By Isla Sibanda
Historically a theoretical concept, quantum computing is now making significant strides toward practical applications, marking a transformative phase in computational technology. This article closely examines the latest advancements in quantum algorithms, hardware design, and error correction techniques. We'll tackle the challenges in implementing...
By Abhay Paroha
Artificial Intelligence (AI), recognized as a pivotal technology, is rapidly transforming various industries, offering substantial potential for innovation and growth. Beyond digital and tech savvy sectors, latecomers like oil and gas and oilfield service providers are increasingly relying on AI solutions. Although initial considerations for AI in ...
By Jenna Bunnell
Sustainability is a hot topic in business right now and has been for a good few years. The green tech and sustainability market is expected to grow to $83 billion by 2032 as businesses turn to smart solutions. For businesses, finding innovative solutions to sustainability challenges is a top concern. Implementing sustainable innovation is a great ...
By Gilad David Maayan
What Is Cloud Native Security? Cloud-native technologies, such as containers and serverless functions, are at the cutting edge of information technology. Cloud native applications, designed to be hosted on the cloud, offer scalability, resilience, and flexibility that traditional applications cannot match. But with new technologies come new se...
By Jenna Bunnell
The world produces so much data that it now has to be stored and processed in dedicated facilities—and that takes a lot of energy. Data centers face the twin challenges of increased demand for power and the need for sustainable IT infrastructure that doesn't harm the planet. To find this balance, data centers are becoming greener. But what role ...
By Gaurav Belani
As organizations across industries increasingly rely on digital infrastructure, the complexity of managing cybersecurity risks and regulatory requirements has escalated. A cyber GRC program integrates governance, risk management, and compliance strategies to protect against cyber threats and ensure adherence to regulatory requirements. The benefit...
IEEE Computer Society SUBSCRIBER EXCLUSIVE
By Gilad David Maayan
What Is Continuous Deployment? Continuous deployment (CD) is an indispensable aspect of a modern software development approach. It's a strategy that automates the process of deploying software changes to a production environment. With CD, every change made to the codebase is automatically tested and pushed to production if it passes all tests....
By Gilad David Maayan
What Are the Main Cost Factors of AWS Database Services? Amazon Web Services (AWS) offers a range of database services that suit different needs, such as Amazon RDS (Relational Database Service), Amazon DynamoDB (a NoSQL database service), and Amazon Redshift (a data warehousing service). These services provide resizable capacity and automate ...
There are no results for this search.
   Analysis, Blogs, Commentary