Trends
In-depth analysis of the latest tech trends, with highlights of the top research from the world's standard-bearer for computing professionals.
Recent Articles
Loading Tech News Entries
By Drew Hendricks
Check Facebook right now, and you’re likely to find a dozen videos vying for your attention. Which you watch depends on an enormous number of things: your mood, which color catches your eye, the company or individual who posted it, and more. But as far as performance video is concerned,…
By Rick Kuhn
Nearly 50 years have passed since the invention of the reference monitor concept for access control. A fundamental building block of computer security, a reference monitor was conceived as a non-bypassable component that was tamper-proof, always invoked, and small enough to allow assurance of its correctness. Inherent in this concept…
By Jeffrey Voas, FIEEE
Cybersecurity is an overused term. It is aged. It is worn out. It lacks technical meaning. It became popularized during decades of continuous, successful hacking events such as ransomware attacks, data breaches, network intrusions, spyware, etc. It became a well-known word to the general public through the media that reported…
By Anna Johansson
As a business owner, you can invest in the latest and greatest technology to keep your data safe and your systems secure. You can employ VPNs, firewalls, and end-to-end encryption to keep everything on lockdown. But no matter how much time or money you invest, the security of your organization…
By Anna Johansson
In 2019, using a secure internet network is more important than ever. Cybercriminals continually find new ways to gain access to personal information they later use or sell to others. If you’re not protected, your privacy is at risk. In theory, a Virtual Private Network (VPN) is a good way…
By Larry Alton
For IT management, few issues are more challenging or relevant than cybersecurity. And when it comes to CCTV and other forms of surveillance video footage, it’s important to implement a forward-thinking security plan to prevent confidential information and data from ending up in the wrong hands. CCTV as a Business…
By Larry Alton
Recently, marketing experts have raised some serious concerns about the rise of AI-generated content and its ability to interfere with SEO rankings. The Verge, for example, reported on a website full of AI-generated content that, at least at first, all seemed plausible enough, until you realize they site people and…
By Anna Johansson
Most industries have undergone radical transformations in the past decade, thanks to the rapid development of new technology. But few industries have been changed as significantly as the real estate industry. Real estate agents, homebuyers, and current homeowners have all had to adapt to the new changes—and more changes are…
By Larry Alton
Technology brought us into the gig economy, which is now flourishing. In case you aren’t familiar, the “gig economy” refers to economic conditions where companies tend to hire people for “gigs,” or short-term, flexible work, and people are more interested in taking on many different contracts, clients, and opportunities, rather…
By Anna Johansson
The hardest part of being a security professional is thwarting preventable attacks caused by user error. Remote workers are especially prone to making these mistakes, and they’re driving security professionals crazy. 1. Remote workers struggle to understand their role Everyone in the tech world understands the advantage IoT systems provide…
By Gilad Maayan
Image source: Pixabay Although Kubernetes (K8s) includes a significant number of built-in features and is designed to simplify container orchestration, it can be challenging to configure, deploy and manage. Many organizations do not have the in-house expertise needed for DIY use of K8s but don’t want to miss out on…
By Gilad Maayan
Many developers find they can do things quicker and better if they assemble applications using a variety of well built, third party components, many of them are open-source components. The rise in open source usage has led to increasing open source vulnerabilities. If you are a developer who uses open-source…
By Larry Alton
Professionals have been relying on VPNs to provide their computers with improved security when working away from their typical network connection, but until recently VPN technology was restricted to traditional computers. However, with the rise of mobile computing, a greater number of people are working remotely than ever before, and…
By Anna Johansson
Every business owner wants a well-designed website, but what does that phrase even mean? Design is partially in the eye of the beholder, but there are also some objective qualities that can make a site “better” than another. For example, if you see a site utilizing fonts and colors straight…
By Larry Alton
Most software developers love their craft, and spend hours not just writing code and solving problems, but actively engaging with the community and trying to learn new things. Software developers want to constantly get better, improving their abilities, staying up-to-date with the latest trends, and hopefully making more money. But…
By Dan Murphy
[Sponsored Content] Shakespeare. Brontë. Dickens. In literature, the classics have long been a staple of summer reading lists. Computer security has its own share of classics – reference points that serve as a foundation for understanding the field’s ever-changing chessboard of attack and defense. This list of computer security summer…
By Anna Johansson
In the past, trade show displays looked a lot like 9th grade science fair dioramas. Today, if you waltz through an exhibit hall at a major conference, you’ll find audio, visuals, impressive graphics, and interactive environments that are tailored to the wants and needs of visitors. A major shift is…
By Anthony Coggine
IoT, or the Internet of Things, is a grand ambition of the most influential kind. It is a unified goal that seeks to create an internet age of unity and equality that we may not ever see in any other industry. In this article, we will explain why cybersecurity will…
By Gilad Maayan
https://pixabay.com/photos/startup-business-people-students-849804/ The jobs market in computer and information technology continues to flourish. According to research by the U.S. Bureau of Labor Statistics, there’ll be a 13 percent rise in employment in computer-related roles between 2016 and 2026. That figure is a considerable rise for an industry that already has high…
By Jessica Fender
In the mind’s eye, job interviews are where you walk in, smile broadly and wow the interviewer with your wit, knowledge, good looks and snappy dressings. Unfortunately, it doesn’t seem to work out like that, most of the time. Mainly that’s down to what falls outside that daydream. Thomas Edison…
There are no results for this search.
About the Authors
Lori Cameron is a Senior Writer for the IEEE Computer Society and currently writes regular features for Computer magazine, Computing Edge, and the Computing Now and Magazine Roundup websites. For over 20 years, she has been a professor of writing and literature at DeVry University, Long Beach, as well as a free-lance technical writer. Lori received a master of arts in English from the California State Polytechnic University in 1992, and a bachelor of arts in writing from Indiana Wesleyan University in 1988.
I am a professional blogger, writer, and researcher who contributes to a number of reputable online media outlets and news sources. A graduate of Iowa State University, I’m now a full-time freelance writer and business consultant. Currently, I write for Entrepreneur.com, HuffingtonPost.com, and Business.com, among others. In addition to journalism, technical writing and in-depth research, I’m also active in my community and spend weekends volunteering with a local non-profit literacy organization and rock climbing.


