Trends
In-depth analysis of the latest tech trends, with highlights of the top research from the world's standard-bearer for computing professionals.
Recent Articles
SUBSCRIBER EXCLUSIVE
By Surya Kant Verma
The cybersecurity landscape is endlessly dynamic with new threats and technologies emerging unexpectedly and often. Simply updating cybersecurity technology and expecting it to keep up with this highly dynamic world is a mistake that can result in significant costs and damages. The average cost of a data breach across industries in 2023 was $4.45 m...
By Pohan Lin
Data is the lifeblood of good decision-making. However, when you're managing large amounts of data it's easy to store information that's irrelevant to what you need, filled with duplicates, or completely unstructured. This makes it harder to use, and takes up a lot of resources.
One way to reduce these problems is through data normalization. We'll...
By Gaurav Belani
Terraform is among the leading tools used by enterprises as cloud computing continues to expand rapidly and Infrastructure-as-Code gains traction. The need for more effective and efficient IT solutions is becoming more pronounced as organizations grapple with the growing complexities of IT infrastructures and the enormity of cloud computing.
By no...
By Hariprabu Sengoden Kandasamy
Cloud services are an integral part of operations for many organizations. Over the past decade, the rush to use cloud services instead of or in addition to in-house server farms for data storage and IT application operations has intensified. The marketing campaigns for cloud services by AWS, Microsoft, and Google make it seem like a "must-have" mig...
By Gilad David Maayan
When looking at the threat landscape of the web, one of the most often underestimated and overlooked vulnerabilities is cross-site scripting.
Cross-site scripting (also known as XSS) attacks are, statistically, one of the most prevalent and damaging web application security risks today. It was the most reported vulnerability at the start of 2023, ...
By Stevie Carpenter
Biometric data represents an exciting opportunity in technology. It has applications across many sectors. Financial institutions, social media, education, and healthcare, to name but a few.
As with any personal data, there are privacy concerns to consider. At the time of writing, there are no nationwide biometric privacy laws. However, state and f...
SUBSCRIBER EXCLUSIVE
By Rebecca Stewart
Despite not being a brand-new concept, the idea of embracing corporate social responsibility is becoming more and more popular among today's businesses – and rightly so.
Data shows, for example, that more than 60% of consumers are happy to spend more for a product sold in sustainable packaging, whereas 78% of US consumers state that they conside...
By Ross Moore
Management Takes more than just tools
It's a story as old as time: students think buying the best tools will automatically make them better at their craft: pianists buy the best piano; woodworkers, the best planers and joiners; painters, the best canvas and paints; mechanics, the best impact and hydraulic equipment.
Tools are a must-have; goo...
SUBSCRIBER EXCLUSIVE
By Gilad David Maayan
What Is Configuration as Code?
Configuration as Code (CaC) is a design ethos in the field of software development. It refers to the practice of managing and provisioning computing resources and applications through machine-readable definition files rather than physical hardware configuration or interactive configuration tools.
The concept of ...
By Gilad David Maayan
What Are Microservices Design Patterns?
Microservices design patterns are a set of reusable solutions that help resolve common problems occurring within microservices applications. Each pattern is like a blueprint that you can customize to solve a particular design problem in your code.
The microservices architecture is a method of developing...
By Muadh Al Kalbani
Say It Louder: Accessibility Is Important
The importance of accessibility cannot be disputed. This is underpinned by two of the key sustainable goals set out by the United Nations: "Promote peaceful and inclusive societies for sustainable development, provide access to justice for all and build effective, accountable and inclusive institutions...
By IEEE Computer Society Team
The typical answer is … maybe. But the good news is that changing that answer to a strong yes is a move that's in your own hands.
The benefits of conference sponsorship are obvious, including that it can elevate your organization's profile, share knowledge about what you offer, and create networking and lead-generation opportunities. The drawb...
By IEEE Computer Society Team
At first glance, teachers and entrepreneurs play seemingly disparate roles: teachers typically gather and impart knowledge grounded in a learning tradition to a captive audience, while entrepreneurs push a rogue vision of a novel product or service to theoretical customers in an open market. An effort at Penn State, however, has been identifying an...
By Navin Kamuni
In the rapidly evolving landscape of AI, the ability to decode human emotions is akin to discovering a new language — a language that bridges the gap between human complexity and machine efficiency. This is not merely an advancement; it's a paradigm shift, redefining the interaction between humans and machines.
Text Analysis: AI's Linguistic A...
By Stevie Carpenter
No matter what industry you work in, inclusivity is an essential factor. While many see inclusivity policies as paying lip service, it is something that every business should be encouraging. While great strides have been made across several sectors in moving toward equality and parity, some are lagging behind. One of those sectors is the tech secto...
By Stevie Carpenter
Have you ever had that exhilarating moment when you stumble upon a developer tool or platform that just clicks? Everything seems to groove together seamlessly, documentation is easily comprehensible, and collaborating with fellow developers feels smooth? Well, that's the magic of an exceptional developer experience (or DX for short).
In this high-...
By Gaurav Belani
Software deployment involves steps and processes to make a tool available for end users while ensuring maximum security, compatibility, and optimization.
It can seem overwhelming and complex, especially to computing professionals from diverse disciplines in industry, academia, and research.
Fret not! This beginner's guide can help you understand ...
By Josh Breaker-Rolfe
Amidst an increasingly tumultuous cybersecurity landscape, threat intelligence vendors have become vital to protecting organizations and individuals. These vendors provide invaluable insights that empower organizations to safeguard their digital assets. However, it's essential to recognize that not all threat intelligence providers are created equa...
By Jenna Bunnell
When developers think about code reviews, they don't usually jump up and down for joy. Many might even contemplate running for the hills or the bush country. With remote teams, no running is required. They can already keep their head down and write code as they always do.
Why all the anxiety surrounding code reviews? Well, having to revise work yo...
By Nicholas Woodward
The World Economic Forum has identified cyberattacks as one of the biggest risks to global economic stability. The Cybersecurity Outlook Study estimates an exponential rise in cyberattacks in the coming years, costing $11.5 trillion in damages in 2023. The eCommerce industry is one of the 8 most targeted industries for cyberattacks.
The value of e...
There are no results for this search.
Analysis, Blogs, Commentary