Trends
In-depth analysis of the latest tech trends, with highlights of the top research from the world's standard-bearer for computing professionals.

Recent Articles

Loading Tech News Entries
By Thomas Glare
Description: The enthusiasm of bitcoin blockchain has spawned many use cases and the right quantity of information. Now that most blockchains that run cryptos are by default free to every person, we have large sums of details getting created on various blockchains. Introduction It’s a good thing Google Bigquery eases processing of details…
The State of Software Security as Told by The Unicorn Project Date: Monday, November 25, 2019 Time: 11:00 AM Pacific Standard Time Duration: 1 hour What happens when a rag tag group of developers and business leaders band together to innovate, survive, and thrive in a time of unprecedented uncertainty…and opportunity? Gene Kim’s…
By Gaurav Belani
(Image Credit: Source) Programming languages and computer coding have made life simpler for us. Whether it’s automobiles, banks, home appliances, or hospitals, every aspect of our lives depends on codes. No wonder, coding is one of the core skills required by most well-paying jobs today. Coding skills are especially of…
By Drew Hendricks
In recent years, the ease of building websites has expanded. Thanks to content management systems (CMS), like WordPress and Joomla, business owners are now the webmasters. The responsibility for website security is now in your hands, yet, many owners do not know how to make their website safe. When customers…
By Varsha Solanki
Do you know how many mobile applications were downloaded by people worldwide last year? 194 billion, according to a report of 2018’s mobile app data. That’s right. If you also have a business or a new mobile app idea, then you must be considering mobile app development. But it is…
By Drew Hendricks
The importance of influencers to marketing is impossible to ignore. Nearly half of all consumers rely on influencers for purchasing recommendations. Using influencers to market your brand doesn’t come without risks, though. Online feuds like the one between James Charles and Tati Westbrook not only sunk Charles’s social media numbers…
By Steve Habazin
The rise of the Internet and its permeating influence on our daily lives sees no limits. From personal social media engagement to how we do business, a lot is stored and done in “the cloud.” To think there’s an entire space dedicated to our virtual activities may have been unbelievable…
By Larry Alton
Many new tech entrepreneurs want to launch an app or platform that provides some measure of cloud functionality. It’s popular, convenient, and cost-effective, allowing you to sell a monthly subscription service instead of selling one instance of a product. On top of that, it grants you the ability to scale…
By Jon Peddie
A book everyone interested in big data and visualization should read We are awash in data. We know it, but it’s like the weather, we can’t manage it. We are struggling to get a grip on it, understand it, use it and exploit it, but it is being generated faster…
By Ferrnando Valera
Industries such as automotive and medical devices are experiencing a unique transformation in adopting new technologies that are not yet clearly regulated. For example, the software in car brakes is heavily regulated, but the AI software that drives the entire car isn’t. Moreover, many IT organizations have taken advantage of…
By Lucy Manole
Tech companies, exceptionally big tech firms are compensating their employees particularly well. No wonder excellent salary package is one of the main factors why people look for tech jobs.
By David Nicol, Editor in Chief, IEEE Security and Privacy
The owner of a small firm responds to an email apparently from the company’s bank, but as a result of the interaction the company’s bank account is cleaned out, wired to an account in Eastern Europe. The purchasing manager of a large company opens a spreadsheet which proports to come…
By Bhavani Thuraisingham
The applications of Machine Learning techniques have exploded in recent years due in part to advances in data science and high-performance computing. For example, it is now possible to collect, store, manipulate, analyze and retain massive amounts of data, and therefore the Machine Learning systems are now able to learn…
By Drew Hendricks
Check Facebook right now, and you’re likely to find a dozen videos vying for your attention. Which you watch depends on an enormous number of things: your mood, which color catches your eye, the company or individual who posted it, and more. But as far as performance video is concerned,…
By Rick Kuhn
Nearly 50 years have passed since the invention of the reference monitor concept for access control.  A fundamental building block of computer security, a reference monitor was conceived as a non-bypassable component that was tamper-proof, always invoked, and small enough to allow assurance of its correctness.  Inherent in this concept…
By Jeffrey Voas, FIEEE
Cybersecurity is an overused term.  It is aged. It is worn out.  It lacks technical meaning. It became popularized during decades of continuous, successful hacking events such as ransomware attacks, data breaches, network intrusions, spyware, etc. It became a well-known word to the general public through the media that reported…
By Anna Johansson
As a business owner, you can invest in the latest and greatest technology to keep your data safe and your systems secure. You can employ VPNs, firewalls, and end-to-end encryption to keep everything on lockdown. But no matter how much time or money you invest, the security of your organization…
By Anna Johansson
In 2019, using a secure internet network is more important than ever. Cybercriminals continually find new ways to gain access to personal information they later use or sell to others. If you’re not protected, your privacy is at risk. In theory, a Virtual Private Network (VPN) is a good way…
By Larry Alton
For IT management, few issues are more challenging or relevant than cybersecurity. And when it comes to CCTV and other forms of surveillance video footage, it’s important to implement a forward-thinking security plan to prevent confidential information and data from ending up in the wrong hands. CCTV as a Business…
By Larry Alton
Recently, marketing experts have raised some serious concerns about the rise of AI-generated content and its ability to interfere with SEO rankings. The Verge, for example, reported on a website full of AI-generated content that, at least at first, all seemed plausible enough, until you realize they site people and…
There are no results for this search.
   About the Authors
Michael Martinez, the editor of the Computer Society's Computer.Org website and its social media, has covered technology as well as global events while on the staff at CNN, Tribune Co. (based at the Los Angeles Times), and the Washington Post.
Lori Cameron is a Senior Writer for the IEEE Computer Society and currently writes regular features for Computer magazine, Computing Edge, and the Computing Now and Magazine Roundup websites. For over 20 years, she has been a professor of writing and literature at DeVry University, Long Beach, as well as a free-lance technical writer. Lori received a master of arts in English from the California State Polytechnic University in 1992, and a bachelor of arts in writing from Indiana Wesleyan University in 1988.
I am a professional blogger, writer, and researcher who contributes to a number of reputable online media outlets and news sources. A graduate of Iowa State University, I’m now a full-time freelance writer and business consultant. Currently, I write for Entrepreneur.com, HuffingtonPost.com, and Business.com, among others. In addition to journalism, technical writing and in-depth research, I’m also active in my community and spend weekends volunteering with a local non-profit literacy organization and rock climbing.