Trends
In-depth analysis of the latest tech trends, with highlights of the top research from the world's standard-bearer for computing professionals.

Recent Articles

Loading Tech News Entries
By Schrödinger
Get the computing resources you need, when you need them, with the auto-scaling Virtual Clusters of Schrödinger in the Cloud.
By Steven Bay
Internal vulnerabilities cannot be ignored. Employees have access, inside knowledge, and from time to time, if disgruntled, may be motivated to do significant damage to the organizations they support. As a trusted and cleared contractor at NSA, Snowden extracted millions of top secret documents and released them to the world.
By Matt Shealy
Much of the software code that serves as the base for blockchain and cryptocurrency has been developed using open source software. Developers from all over the world have contributed to create, manage and expand on the software. It’s this open source approach that has created opportunities for business and consumers to use the blockchain in new ways across society.
By Devin Partida
If a person uses pirated software innocently — most sites offering cracked software don't warn people they're breaking the law by using it — their actions could cause consequences for their companies, jobs and livelihoods. For example, allegations of using pirated software could cause authorities at a university to decide that the visiting professor who did it broke the terms of the agreement allowing them to come to the institution. 
By Andrej Kovačević
In a world where internet connectivity’s coming to countless new devices daily, security concerns are mounting. Here’s how to keep your digital home secure. In the modern home, connected devices are multiplying. It started with computers, smartphones, and tablets. Then came the rise of smart TVs and connected media players.…
By Larry Alton
It’s likely that millions of people have missed out on job opportunities or lost their current jobs due to something they said or did on social media.
By Gaurav Belani
Every startup owner today is aware that having an active business blog is crucial to building online thought leadership and visibility. Producing useful blog posts and articles on a consistent basis is an integral part of any holistic marketing strategy, in order to garner more traffic and rank higher on search engines.
By Andrej Kovačević
Perhaps the most important case for diamonds as a platform for quantum computing is the fact that they allow for the easy creation of some of the simplest forms of quantum devices. With little more than a green LED, a microwave source, a photodetector, and a quantum-grade diamond, even a novice researcher can start probing the possibilities they hold.
By Anna Johansson
Telemedicine has technically been around for decades, with doctors and nurses providing medical services over the phone, but only now is it beginning to pick up real momentum. Hospitals and doctor’s offices all over the country are starting to integrate more technologies and services in the telemedicine field, and technological innovators are spending more time developing products and apps meant specifically to improve the field.
By Katherine Rundell
How we mechanically interact with our technology is constantly evolving, either through individual experimentation or technological innovation, and that innovation is set to speed up in the future. Expect more experiments with voice and visual commands to make controlling your smartphone a more seamless part of your everyday life.
By Kamalika Some
The year 2020 has been quite exciting for quantum computing! Expansion, competition, and attention are a few trends you can't miss. Explore the rest here!
By Larry Alton
Ransomware is a specific cyberthreat that’s garnered a lot of attention in the IT and cybersecurity community, and it seems to appear in headlines regularly. But is it really that big of a threat, or is this a kind of hysteria fueled by the media and misunderstandings?
By Gaurav Belani
Every startup owner today is aware that having an active business blog is crucial to building online thought leadership and visibility. Producing useful blog posts and articles on a consistent basis is an integral part of any holistic marketing strategy, in order to garner more traffic and rank higher on search engines.
By Gaurav Belani
Security of SQL Server environments is considered to be among database administrators’ prime responsibilities. Fortunately, SQL Server is designed to be a secure database platform. It holds several features that can encrypt data, limit access and authorization, and protect data from theft, destruction, and other types of malicious behavior. 
By Andrej Kovačević
Perhaps the most important case for diamonds as a platform for quantum computing is the fact that they allow for the easy creation of some of the simplest forms of quantum devices. With little more than a green LED, a microwave source, a photodetector, and a quantum-grade diamond, even a novice researcher can start probing the possibilities they hold.
By Anna Johansson
Not all bot traffic is harmless. Some bots are designed specifically for malicious purposes, and the only way to prevent them from damaging your site and your reputation is through a bot management strategy.
By Haley Osborne
Remote professionals can be a valuable asset to any organization. Yet, they do pose unique security risks that require suitable solutions and preventive practices. What this means for companies is that they need to ensure the highest level of security for their remote workers.
By Devin Partida
Zoom has emerged as a popular way for co-workers to meet while social distancing. As its popularity has soared, however, some significant security flaws with the service have become clear. With cyberattacks on the rise, many users are questioning if Zoom's vulnerabilities render it unsafe.
By Ashley Halsey
There’s no denying that AI technology is changing the world as we know it. As the technology is being increasingly developed, the impact is becoming more and more integrated into society.
By Anna Johansson
 As different as one business can be from another, the emphasis on cyber security is equally important across all industries, sectors, and business models. Whether you’re a B2C brick and mortar business, a B2B online company, or a hybrid of the two, your company can prioritize cyber security by implementing the following tips.
There are no results for this search.