Trends
In-depth analysis of the latest tech trends, with highlights of the top research from the world's standard-bearer for computing professionals.
Recent Articles
By Gaurav Belani
Terraform is among the leading tools used by enterprises as cloud computing continues to expand rapidly and Infrastructure-as-Code gains traction. The need for more effective and efficient IT solutions is becoming more pronounced as organizations grapple with the growing complexities of IT infrastructures and the enormity of cloud computing.
By no...
By Hariprabu Sengoden Kandasamy
Cloud services are an integral part of operations for many organizations. Over the past decade, the rush to use cloud services instead of or in addition to in-house server farms for data storage and IT application operations has intensified. The marketing campaigns for cloud services by AWS, Microsoft, and Google make it seem like a "must-have" mig...
By Gilad David Maayan
When looking at the threat landscape of the web, one of the most often underestimated and overlooked vulnerabilities is cross-site scripting.
Cross-site scripting (also known as XSS) attacks are, statistically, one of the most prevalent and damaging web application security risks today. It was the most reported vulnerability at the start of 2023, ...
By Stevie Carpenter
Biometric data represents an exciting opportunity in technology. It has applications across many sectors. Financial institutions, social media, education, and healthcare, to name but a few.
As with any personal data, there are privacy concerns to consider. At the time of writing, there are no nationwide biometric privacy laws. However, state and f...
SUBSCRIBER EXCLUSIVE
By Rebecca Stewart
Despite not being a brand-new concept, the idea of embracing corporate social responsibility is becoming more and more popular among today's businesses – and rightly so.
Data shows, for example, that more than 60% of consumers are happy to spend more for a product sold in sustainable packaging, whereas 78% of US consumers state that they conside...
By Ross Moore
Management Takes more than just tools
It's a story as old as time: students think buying the best tools will automatically make them better at their craft: pianists buy the best piano; woodworkers, the best planers and joiners; painters, the best canvas and paints; mechanics, the best impact and hydraulic equipment.
Tools are a must-have; goo...
SUBSCRIBER EXCLUSIVE
By Gilad David Maayan
What Is Configuration as Code?
Configuration as Code (CaC) is a design ethos in the field of software development. It refers to the practice of managing and provisioning computing resources and applications through machine-readable definition files rather than physical hardware configuration or interactive configuration tools.
The concept of ...
By Gilad David Maayan
What Are Microservices Design Patterns?
Microservices design patterns are a set of reusable solutions that help resolve common problems occurring within microservices applications. Each pattern is like a blueprint that you can customize to solve a particular design problem in your code.
The microservices architecture is a method of developing...
By Muadh Al Kalbani
Say It Louder: Accessibility Is Important
The importance of accessibility cannot be disputed. This is underpinned by two of the key sustainable goals set out by the United Nations: "Promote peaceful and inclusive societies for sustainable development, provide access to justice for all and build effective, accountable and inclusive institutions...
By IEEE Computer Society Team
The typical answer is … maybe. But the good news is that changing that answer to a strong yes is a move that's in your own hands.
The benefits of conference sponsorship are obvious, including that it can elevate your organization's profile, share knowledge about what you offer, and create networking and lead-generation opportunities. The drawb...
By IEEE Computer Society Team
At first glance, teachers and entrepreneurs play seemingly disparate roles: teachers typically gather and impart knowledge grounded in a learning tradition to a captive audience, while entrepreneurs push a rogue vision of a novel product or service to theoretical customers in an open market. An effort at Penn State, however, has been identifying an...
By Navin Kamuni
In the rapidly evolving landscape of AI, the ability to decode human emotions is akin to discovering a new language — a language that bridges the gap between human complexity and machine efficiency. This is not merely an advancement; it's a paradigm shift, redefining the interaction between humans and machines.
Text Analysis: AI's Linguistic A...
By Stevie Carpenter
No matter what industry you work in, inclusivity is an essential factor. While many see inclusivity policies as paying lip service, it is something that every business should be encouraging. While great strides have been made across several sectors in moving toward equality and parity, some are lagging behind. One of those sectors is the tech secto...
By Stevie Carpenter
Have you ever had that exhilarating moment when you stumble upon a developer tool or platform that just clicks? Everything seems to groove together seamlessly, documentation is easily comprehensible, and collaborating with fellow developers feels smooth? Well, that's the magic of an exceptional developer experience (or DX for short).
In this high-...
By Gaurav Belani
Software deployment involves steps and processes to make a tool available for end users while ensuring maximum security, compatibility, and optimization.
It can seem overwhelming and complex, especially to computing professionals from diverse disciplines in industry, academia, and research.
Fret not! This beginner's guide can help you understand ...
By Josh Breaker-Rolfe
Amidst an increasingly tumultuous cybersecurity landscape, threat intelligence vendors have become vital to protecting organizations and individuals. These vendors provide invaluable insights that empower organizations to safeguard their digital assets. However, it's essential to recognize that not all threat intelligence providers are created equa...
By Jenna Bunnell
When developers think about code reviews, they don't usually jump up and down for joy. Many might even contemplate running for the hills or the bush country. With remote teams, no running is required. They can already keep their head down and write code as they always do.
Why all the anxiety surrounding code reviews? Well, having to revise work yo...
By Nicholas Woodward
The World Economic Forum has identified cyberattacks as one of the biggest risks to global economic stability. The Cybersecurity Outlook Study estimates an exponential rise in cyberattacks in the coming years, costing $11.5 trillion in damages in 2023. The eCommerce industry is one of the 8 most targeted industries for cyberattacks.
The value of e...
By Ronak Pansara
In the ever-evolving landscapes of Agtech (Agricultural Technology) and Manufacturing, where data reigns supreme, a silent revolution is taking place. This revolution is fueled by the strategic implementation of Master Data Management (MDM). The concept of MDM may seem technical, but its impact is profound. It's the key to creating a single sourc...
By Sam O'brien
From saving the bees to supporting research of all kinds, technology has the potential for a massively positive impact on the world. Tech is how we, as a species, grow and get better.
But not all tech is created equal, and not all tech enjoys an equally positive reception.
In particular, AI-produced art has been a topic of considerable debate, bo...
There are no results for this search.
Analysis, Blogs, Commentary