Trends
In-depth analysis of the latest tech trends, with highlights of the top research from the world's standard-bearer for computing professionals.

Recent Articles

Loading Tech News Entries
By Gilad Maayan
Image source: Pixabay Although Kubernetes (K8s) includes a significant number of built-in features and is designed to simplify container orchestration, it can be challenging to configure, deploy and manage. Many organizations do not have the in-house expertise needed for DIY use of K8s but don’t want to miss out on…
By Gilad Maayan
Many developers find they can do things quicker and better if they assemble applications using a variety of well built, third party components, many of them are open-source components. The rise in open source usage has led to increasing open source vulnerabilities. If you are a developer who uses open-source…
By Larry Alton
Professionals have been relying on VPNs to provide their computers with improved security when working away from their typical network connection, but until recently VPN technology was restricted to traditional computers. However, with the rise of mobile computing, a greater number of people are working remotely than ever before, and…
By Anna Johansson
Every business owner wants a well-designed website, but what does that phrase even mean? Design is partially in the eye of the beholder, but there are also some objective qualities that can make a site “better” than another. For example, if you see a site utilizing fonts and colors straight…
By Larry Alton
Most software developers love their craft, and spend hours not just writing code and solving problems, but actively engaging with the community and trying to learn new things. Software developers want to constantly get better, improving their abilities, staying up-to-date with the latest trends, and hopefully making more money. But…
By Dan Murphy
[Sponsored Content] Shakespeare. Brontë. Dickens. In literature, the classics have long been a staple of summer reading lists. Computer security has its own share of classics – reference points that serve as a foundation for understanding the field’s ever-changing chessboard of attack and defense. This list of computer security summer…
By Anna Johansson
In the past, trade show displays looked a lot like 9th grade science fair dioramas. Today, if you waltz through an exhibit hall at a major conference, you’ll find audio, visuals, impressive graphics, and interactive environments that are tailored to the wants and needs of visitors. A major shift is…
By Anthony Coggine
IoT, or the Internet of Things, is a grand ambition of the most influential kind. It is a unified goal that seeks to create an internet age of unity and equality that we may not ever see in any other industry.  In this article, we will explain why cybersecurity will…
By Gilad Maayan
https://pixabay.com/photos/startup-business-people-students-849804/ The jobs market in computer and information technology continues to flourish. According to research by the U.S. Bureau of Labor Statistics, there’ll be a 13 percent rise in employment in computer-related roles between 2016 and 2026. That figure is a considerable rise for an industry that already has high…
By Jessica Fender
In the mind’s eye, job interviews are where you walk in, smile broadly and wow the interviewer with your wit, knowledge, good looks and snappy dressings. Unfortunately, it doesn’t seem to work out like that, most of the time. Mainly that’s down to what falls outside that daydream. Thomas Edison…
By Emma Megan
Source: Pixabay   Startup business owners often don’t know where to exactly start from, when it comes to the complex and delicate chapter of data security. It is no secret that these business entities need to be a lot more aware of the fraudulent scandals that severely impacts personal and…
By Richard van Hooijdonk
Thanks to the limitless possibilities that artificial intelligence (AI) has to offer, our lives have never been easier. From smartphones and personal assistants to home automation systems, AI is everywhere. The ability of machines to mimic human intelligence may seem frightening, but the truth is that AI is already transforming…
By Gilad Maayan
Image Source: Pixabay As technologies and security tools change, cybercriminals are adapting their strategies, creating new threats and revamping known ones. Outdated systems and lack of awareness of current vulnerabilities create significant risk for companies and individuals. Staying up-to-date on current trends makes a big difference when it comes to…
By Brian Stone
Needless to say, graphics cards are the powerhouse of any gaming desktop. Not only that they’re responsible for pushing HD images when gaming but it’s also their responsibility to keep the frames high for a smooth and stellar gaming experience. But because they do most of the hard work, it’s…
By Anna Johansson
When it comes to modernization within the business world, digital transformation plays a significant role. The problem is that, in 2019, many businesses are finding digital transformation to be an insurmountable challenge that holds them back from future growth. To a large extent, the future of these companies depends on…
By Amanda Ryan
More businesses are choosing to use VoIP (Voice over Internet Protocol) as their primary communication tool, causing the industry to prosper. Research shows, by 2020, there will be approximately 204.8 billion corporate subscribers globally, and the industry will enjoy a revenue of $86.20 billion. With advancements in technology, the telecommunication…
By Michael Martinez
It wasn’t too long ago that journalists looked upon artificial intelligence and robots with disdain, warning that AI is hardly the bedrock of a free press and disparaging the story-creation technology as “robo-journalism.” But Swedish journalists have seemingly embraced the benefits of AI. The tech can be used to do…
By Larry Alton
Digital security is confusing to users. Experts don’t always agree on how to stay secure, and users don’t have time to figure it out. The security space is too complex to create an absolute standard set of rules to follow, although Google has come close. Many people believe maintaining application…
By Emma Megan
Source: Pexels Cybersecurity protects data which we save on the internet. This data could be our online banking information, medical or financial information, even our private photographs. However, cybersecurity is not always easy to implement. There are many challenges that come with access to the internet. Challenges of Cybersecurity Data…
By Donna Howard
  Web design is one of the most important things for any business to invest in and has explicit returns that can grant a business a new life in the internet age. Web design is always changing with trends and new traits that are taken from all forms of media and…
There are no results for this search.
   About the Authors
Michael Martinez, the editor of the Computer Society's Computer.Org website and its social media, has covered technology as well as global events while on the staff at CNN, Tribune Co. (based at the Los Angeles Times), and the Washington Post.
Lori Cameron is a Senior Writer for the IEEE Computer Society and currently writes regular features for Computer magazine, Computing Edge, and the Computing Now and Magazine Roundup websites. For over 20 years, she has been a professor of writing and literature at DeVry University, Long Beach, as well as a free-lance technical writer. Lori received a master of arts in English from the California State Polytechnic University in 1992, and a bachelor of arts in writing from Indiana Wesleyan University in 1988.
I am a professional blogger, writer, and researcher who contributes to a number of reputable online media outlets and news sources. A graduate of Iowa State University, I’m now a full-time freelance writer and business consultant. Currently, I write for Entrepreneur.com, HuffingtonPost.com, and Business.com, among others. In addition to journalism, technical writing and in-depth research, I’m also active in my community and spend weekends volunteering with a local non-profit literacy organization and rock climbing.