Trends
In-depth analysis of the latest tech trends, with highlights of the top research from the world's standard-bearer for computing professionals.

Recent Articles

Loading Tech News Entries
By IEEE Computer Society Team
Most enterprises have set up a software development life cycle that clearly defines the process used to build an application and manage it through the lifecycle. The process helps organizations streamline their development process. 
By Pratik Dholakiya
Most enterprises have set up a software development life cycle that clearly defines the process used to build an application and manage it through the lifecycle. The process helps organizations streamline their development process. 
By Pratik Dholakiya
The cyber kill chain is essentially a cybersecurity model created by Lockheed Martin that traces the stages of a cyber-attack, identifies vulnerabilities, and helps security teams to stop the attacks at every stage of the chain.
By Larry Alton
COVID-19 is, hopefully, on its way out. However, its impact will be felt for a long time. Several trends are a direct result of the pandemic. Here are the six trends we anticipate for Computer numerical control (CNC) machining in 2021.
For the past 4 years, the Trump Administration has been committed to strengthening American leadership in artificial intelligence (AI). After recognizing the strategic importance of AI to the Nation’s future economy and security, the Trump Administration issued the first ever national AI strategy, committed to doubling AI research investment, established…
By Larry Alton
Moving into 2021, you can’t be too careful with cybersecurity. Each time you or an employee download an app, sign up for an account, or use public Wi-Fi, you’re at risk.
By Gaurav Belani
The cyberattack surface in modern enterprise environments is massive, and it’s continuing to grow rapidly. This means that analyzing and improving an organization’s cybersecurity posture needs more than mere human intervention.
By Gilad Maayan
Enterprise Kubernetes is a foundation for digital transformation at many organizations. In the age before container technology, different departments and technical teams were using different tools, applications, and hardware, with no standardized platform for developing and deploying software.
By Gilad Maayan
ECM provides a centralized platform for maintaining and distributing content, in a manner that meets compliance requirements and risk management guidelines. ECM achieves compliance by eliminating ad hoc processes that could expose companies to the risk of data exposure or loss.
By Gaurav Belani
VPNs are becoming more and more commonplace today and you likely have some friends or colleagues who use a VPN while browsing the internet. If you’re unfamiliar with what it is, how it works, and why an increasing number of people are using it, then this post is for you.
By Gilad Maayan
Insider threats are individuals who are or were employed or contracted by the organization, and carry out activities that harm the organization. These individuals often have access to corporate networks and assets like applications and databases storing sensitive information and trade secrets.
By Charles Macfarlane
Without open standards, OEMs will not be able to transition through the SAE levels of autonomy. OEMs will stay in Level 2, or an extended version of Level 2 (often referred to as Level 2+) but will not evolve to Level 3 in a credible timeframe. Nor will they achieve UN’s WP29 requirement to maintain and update the car’s software for the lifetime of the vehicle.
By Charles Macfarlane
Just like the PC, gaming and smartphone industry, the business models and relationships in automotive will evolve in almost every part of the supply chain and vehicle usage. Shared ownership and “robotaxis” are being extensively projected as the norm within the future’s smart cities bringing a host of benefits.
By Charles Macfarlane
Developing software for Advanced Driver Assistance System (ADAS) has always been a challenge, but the demand to achieve ambitious feature targets in cars while maintaining functional safety is tough. The charge through the next generation ADAS and leading to the Autonomous Drive (AD) vehicle feels like an impossible task today.
By Gilad Maayan
High performance computing (HPC) technologies can quickly perform parallel processing tasks. In the past, HPC resources were expensive to set up and maintain. However, once HPC moved to the cloud, it became more accessible and affordable. In this article, you will learn about three successful cloud HPC implementations.
By Gilad Maayan
Today, data is generated and distributed across highly complex ecosystems, such as multicloud, hybrid cloud, edge and Internet of Things (IoT), to name a few, making backup and recovery more difficult to achieve, and requiring innovative automated solutions. This article covers important trends driving the backup and recovery ecosystem.
By Larry Alton
Computer technology has a special way of transforming nearly every industry on the face of the planet. It should be no surprise that technology is transforming firearms in a new way.
By Schrödinger
Get the computing resources you need, when you need them, with the auto-scaling Virtual Clusters of Schrödinger in the Cloud.
By Steven Bay
Internal vulnerabilities cannot be ignored. Employees have access, inside knowledge, and from time to time, if disgruntled, may be motivated to do significant damage to the organizations they support. As a trusted and cleared contractor at NSA, Snowden extracted millions of top secret documents and released them to the world.
By Matt Shealy
Much of the software code that serves as the base for blockchain and cryptocurrency has been developed using open source software. Developers from all over the world have contributed to create, manage and expand on the software. It’s this open source approach that has created opportunities for business and consumers to use the blockchain in new ways across society.
There are no results for this search.