Trends
In-depth analysis of the latest tech trends, with highlights of the top research from the world's standard-bearer for computing professionals.

Recent Articles

By Jenna Bunnell
The world produces so much data that it now has to be stored and processed in dedicated facilities—and that takes a lot of energy. Data centers face the twin challenges of increased demand for power and the need for sustainable IT infrastructure that doesn't harm the planet. To find this balance, data centers are becoming greener. But what role ...
By Gaurav Belani
As organizations across industries increasingly rely on digital infrastructure, the complexity of managing cybersecurity risks and regulatory requirements has escalated. A cyber GRC program integrates governance, risk management, and compliance strategies to protect against cyber threats and ensure adherence to regulatory requirements. The benefit...
IEEE Computer Society SUBSCRIBER EXCLUSIVE
By Gilad David Maayan
What Is Continuous Deployment? Continuous deployment (CD) is an indispensable aspect of a modern software development approach. It's a strategy that automates the process of deploying software changes to a production environment. With CD, every change made to the codebase is automatically tested and pushed to production if it passes all tests....
By Gilad David Maayan
What Are the Main Cost Factors of AWS Database Services? Amazon Web Services (AWS) offers a range of database services that suit different needs, such as Amazon RDS (Relational Database Service), Amazon DynamoDB (a NoSQL database service), and Amazon Redshift (a data warehousing service). These services provide resizable capacity and automate ...
IEEE Computer Society SUBSCRIBER EXCLUSIVE
By Surya Kant Verma
The cybersecurity landscape is endlessly dynamic with new threats and technologies emerging unexpectedly and often. Simply updating cybersecurity technology and expecting it to keep up with this highly dynamic world is a mistake that can result in significant costs and damages. The average cost of a data breach across industries in 2023 was $4.45 m...
By Pohan Lin
Data is the lifeblood of good decision-making. However, when you're managing large amounts of data it's easy to store information that's irrelevant to what you need, filled with duplicates, or completely unstructured. This makes it harder to use, and takes up a lot of resources. One way to reduce these problems is through data normalization. We'll...
By Gaurav Belani
Terraform is among the leading tools used by enterprises as cloud computing continues to expand rapidly and Infrastructure-as-Code gains traction. The need for more effective and efficient IT solutions is becoming more pronounced as organizations grapple with the growing complexities of IT infrastructures and the enormity of cloud computing. By no...
By Hariprabu Sengoden Kandasamy
Cloud services are an integral part of operations for many organizations. Over the past decade, the rush to use cloud services instead of or in addition to in-house server farms for data storage and IT application operations has intensified. The marketing campaigns for cloud services by AWS, Microsoft, and Google make it seem like a "must-have" mig...
By Gilad David Maayan
When looking at the threat landscape of the web, one of the most often underestimated and overlooked vulnerabilities is cross-site scripting. Cross-site scripting (also known as XSS) attacks are, statistically, one of the most prevalent and damaging web application security risks today. It was the most reported vulnerability at the start of 2023, ...
By Stevie Carpenter
Biometric data represents an exciting opportunity in technology. It has applications across many sectors. Financial institutions, social media, education, and healthcare, to name but a few. As with any personal data, there are privacy concerns to consider. At the time of writing, there are no nationwide biometric privacy laws. However, state and f...
IEEE Computer Society SUBSCRIBER EXCLUSIVE
By Rebecca Stewart
Despite not being a brand-new concept, the idea of embracing corporate social responsibility is becoming more and more popular among today's businesses – and rightly so. Data shows, for example, that more than 60% of consumers are happy to spend more for a product sold in sustainable packaging, whereas 78% of US consumers state that they conside...
By Ross Moore
Management Takes more than just tools It's a story as old as time: students think buying the best tools will automatically make them better at their craft: pianists buy the best piano; woodworkers, the best planers and joiners; painters, the best canvas and paints; mechanics, the best impact and hydraulic equipment. Tools are a must-have; goo...
IEEE Computer Society SUBSCRIBER EXCLUSIVE
By Gilad David Maayan
What Is Configuration as Code? Configuration as Code (CaC) is a design ethos in the field of software development. It refers to the practice of managing and provisioning computing resources and applications through machine-readable definition files rather than physical hardware configuration or interactive configuration tools. The concept of ...
By Gilad David Maayan
What Are Microservices Design Patterns? Microservices design patterns are a set of reusable solutions that help resolve common problems occurring within microservices applications. Each pattern is like a blueprint that you can customize to solve a particular design problem in your code. The microservices architecture is a method of developing...
By Muadh Al Kalbani
Say It Louder: Accessibility Is Important The importance of accessibility cannot be disputed. This is underpinned by two of the key sustainable goals set out by the United Nations: "Promote peaceful and inclusive societies for sustainable development, provide access to justice for all and build effective, accountable and inclusive institutions...
By IEEE Computer Society Team
The typical answer is … maybe. But the good news is that changing that answer to a strong yes is a move that's in your own hands. The benefits of conference sponsorship are obvious, including that it can elevate your organization's profile, share knowledge about what you offer, and create networking and lead-generation opportunities. The drawb...
By IEEE Computer Society Team
At first glance, teachers and entrepreneurs play seemingly disparate roles: teachers typically gather and impart knowledge grounded in a learning tradition to a captive audience, while entrepreneurs push a rogue vision of a novel product or service to theoretical customers in an open market. An effort at Penn State, however, has been identifying an...
By Navin Kamuni
In the rapidly evolving landscape of AI, the ability to decode human emotions is akin to discovering a new language — a language that bridges the gap between human complexity and machine efficiency. This is not merely an advancement; it's a paradigm shift, redefining the interaction between humans and machines. Text Analysis: AI's Linguistic A...
By Stevie Carpenter
No matter what industry you work in, inclusivity is an essential factor. While many see inclusivity policies as paying lip service, it is something that every business should be encouraging. While great strides have been made across several sectors in moving toward equality and parity, some are lagging behind. One of those sectors is the tech secto...
By Stevie Carpenter
Have you ever had that exhilarating moment when you stumble upon a developer tool or platform that just clicks? Everything seems to groove together seamlessly, documentation is easily comprehensible, and collaborating with fellow developers feels smooth? Well, that's the magic of an exceptional developer experience (or DX for short). In this high-...
There are no results for this search.
   Analysis, Blogs, Commentary