Trends
In-depth analysis of the latest tech trends, with highlights of the top research from the world's standard-bearer for computing professionals.

Recent Articles

Loading Tech News Entries
By Gaurav Belani
With the advent of the novel Coronavirus, remote working has become the new normal for most people on the planet. You’ll find both positive and negative feedback from workers on this new style of working. Overall, it proves that though it is somewhat difficult to get used to, remote working…
By Artsiom Balabanau
Cyber attacks pose a serious threat to any digital business. By using stolen credentials and compromised devices, hackers gain access to valuable information. Malefactors are becoming more and more cunning, finding loopholes in virtually any new technology. Cybersecurity Ventures predicts that, by 2025, costs for IT security services will rise…
By IEEE Computer Society Team
While many companies are still talking about 2019’s rollout of 5G, others are already looking forward to the future. Today, Chinese smartphone brand OPPO released their first white paper by their pre-research team looking at the requirements, technologies, and system features for the next generation of 6G communication.    Download…
By Larry Alton
Businesses have been buzzing about digital transformation for years now, as they shift services from legacy platforms to modern, agile solutions, but ultimately many are struggling to make progress. That’s because with so many business technology trends, a combination of distraction, perfectionism, and stagnation are holding businesses back from making…
By IEEE Computer Society Team
Most enterprises have set up a software development life cycle that clearly defines the process used to build an application and manage it through the lifecycle. The process helps organizations streamline their development process. 
By Pratik Dholakiya
Most enterprises have set up a software development life cycle that clearly defines the process used to build an application and manage it through the lifecycle. The process helps organizations streamline their development process. 
By Pratik Dholakiya
The cyber kill chain is essentially a cybersecurity model created by Lockheed Martin that traces the stages of a cyber-attack, identifies vulnerabilities, and helps security teams to stop the attacks at every stage of the chain.
By Larry Alton
COVID-19 is, hopefully, on its way out. However, its impact will be felt for a long time. Several trends are a direct result of the pandemic. Here are the six trends we anticipate for Computer numerical control (CNC) machining in 2021.
For the past 4 years, the Trump Administration has been committed to strengthening American leadership in artificial intelligence (AI). After recognizing the strategic importance of AI to the Nation’s future economy and security, the Trump Administration issued the first ever national AI strategy, committed to doubling AI research investment, established…
By Larry Alton
Moving into 2021, you can’t be too careful with cybersecurity. Each time you or an employee download an app, sign up for an account, or use public Wi-Fi, you’re at risk.
By Gaurav Belani
The cyberattack surface in modern enterprise environments is massive, and it’s continuing to grow rapidly. This means that analyzing and improving an organization’s cybersecurity posture needs more than mere human intervention.
By Gilad Maayan
Enterprise Kubernetes is a foundation for digital transformation at many organizations. In the age before container technology, different departments and technical teams were using different tools, applications, and hardware, with no standardized platform for developing and deploying software.
By Gilad Maayan
ECM provides a centralized platform for maintaining and distributing content, in a manner that meets compliance requirements and risk management guidelines. ECM achieves compliance by eliminating ad hoc processes that could expose companies to the risk of data exposure or loss.
By Gaurav Belani
VPNs are becoming more and more commonplace today and you likely have some friends or colleagues who use a VPN while browsing the internet. If you’re unfamiliar with what it is, how it works, and why an increasing number of people are using it, then this post is for you.
By Gilad Maayan
Insider threats are individuals who are or were employed or contracted by the organization, and carry out activities that harm the organization. These individuals often have access to corporate networks and assets like applications and databases storing sensitive information and trade secrets.
By Charles Macfarlane
Without open standards, OEMs will not be able to transition through the SAE levels of autonomy. OEMs will stay in Level 2, or an extended version of Level 2 (often referred to as Level 2+) but will not evolve to Level 3 in a credible timeframe. Nor will they achieve UN’s WP29 requirement to maintain and update the car’s software for the lifetime of the vehicle.
By Charles Macfarlane
Just like the PC, gaming and smartphone industry, the business models and relationships in automotive will evolve in almost every part of the supply chain and vehicle usage. Shared ownership and “robotaxis” are being extensively projected as the norm within the future’s smart cities bringing a host of benefits.
By Charles Macfarlane
Developing software for Advanced Driver Assistance System (ADAS) has always been a challenge, but the demand to achieve ambitious feature targets in cars while maintaining functional safety is tough. The charge through the next generation ADAS and leading to the Autonomous Drive (AD) vehicle feels like an impossible task today.
By Gilad Maayan
High performance computing (HPC) technologies can quickly perform parallel processing tasks. In the past, HPC resources were expensive to set up and maintain. However, once HPC moved to the cloud, it became more accessible and affordable. In this article, you will learn about three successful cloud HPC implementations.
By Gilad Maayan
Today, data is generated and distributed across highly complex ecosystems, such as multicloud, hybrid cloud, edge and Internet of Things (IoT), to name a few, making backup and recovery more difficult to achieve, and requiring innovative automated solutions. This article covers important trends driving the backup and recovery ecosystem.
There are no results for this search.