Trends
In-depth analysis of the latest tech trends, with highlights of the top research from the world's standard-bearer for computing professionals.

Recent Articles

By Ronak Ravjibhai Pansara
In today's fast-paced digital landscape, data reigns supreme. From customer information to product details and supplier records, organizations are inundated with vast volumes of data. Amidst this deluge of information, the need to manage and leverage data effectively has never been more critical. Enter Master Data Management (MDM), a strategic fram...
By Gilad David Maayan
What Is User Management? User management, a crucial aspect of enterprise IT, involves managing and controlling user access to a network or system. This critical process is pivotal for security, compliance, and operational efficiency in an organization. It encompasses everything from determining the levels of access a user has, authenticating t...
IEEE Computer Society SUBSCRIBER EXCLUSIVE
By Jenna Bunnell
Nowadays, many businesses are trying to be more eco-conscious. Thanks to growing public pressure and government regulations, it's in a business's best interest to become as environmentally friendly as possible. One of the ways to do this is by implementing an environmental management system. Let's look at what this system is and how it can benefit...
By Jenna Bunnell
Your company's commitment to being environmentally friendly and ethical across the board is incredibly important to your investors and stakeholders. It could be the difference between winning an investment and losing it. However, investors are increasingly looking for ESG greenwashing. Greenwashing is a trap many companies fall into, and accusatio...
By Akash Kilaru
DevOps methodology is commonly applied to software development and enables more rapid and efficient delivery of software and software updates. It is an umbrella concept that describes a specialized approach to shortening and optimizing the software development lifecycle. The primary goal of DevOps is to maximize the predictability, efficiency, secu...
By Stevie Carpenter
Transforming your business in any capacity is a major undertaking that calls for a skilled hand, not to mention a good eye for detail. Culture change management takes this a step further--we'll be discussing how and why shortly. First, we'll walk through a definition so we can clear up what culture change management actually is. After that, we'll ...
By Gilad David Maayan
What Is Social Engineering? Social engineering is a method used by cybercriminals that relies on human interaction and often involves tricking people into breaking normal security procedures. It is an art of deception, aiming to exploit the weakest link in the cyber defense system: the human element. Social engineering attempts to manipulate ...
By David Gilad Maayan
What Is EDR? Endpoint Detection and Response (EDR) is a cybersecurity technology that continuously monitors and collects data from endpoint devices to identify, investigate, and prevent potential security threats. EDR solutions are typically used to provide visibility into activities happening on endpoints, which can be any device connected to...
IEEE Computer Society SUBSCRIBER EXCLUSIVE
By Isla Sibanda
Historically a theoretical concept, quantum computing is now making significant strides toward practical applications, marking a transformative phase in computational technology. This article closely examines the latest advancements in quantum algorithms, hardware design, and error correction techniques. We'll tackle the challenges in implementing...
By Abhay Paroha
Artificial Intelligence (AI), recognized as a pivotal technology, is rapidly transforming various industries, offering substantial potential for innovation and growth. Beyond digital and tech savvy sectors, latecomers like oil and gas and oilfield service providers are increasingly relying on AI solutions. Although initial considerations for AI in ...
By Jenna Bunnell
Sustainability is a hot topic in business right now and has been for a good few years. The green tech and sustainability market is expected to grow to $83 billion by 2032 as businesses turn to smart solutions. For businesses, finding innovative solutions to sustainability challenges is a top concern. Implementing sustainable innovation is a great ...
By Gilad David Maayan
What Is Cloud Native Security? Cloud-native technologies, such as containers and serverless functions, are at the cutting edge of information technology. Cloud native applications, designed to be hosted on the cloud, offer scalability, resilience, and flexibility that traditional applications cannot match. But with new technologies come new se...
By Jenna Bunnell
The world produces so much data that it now has to be stored and processed in dedicated facilities—and that takes a lot of energy. Data centers face the twin challenges of increased demand for power and the need for sustainable IT infrastructure that doesn't harm the planet. To find this balance, data centers are becoming greener. But what role ...
By Gaurav Belani
As organizations across industries increasingly rely on digital infrastructure, the complexity of managing cybersecurity risks and regulatory requirements has escalated. A cyber GRC program integrates governance, risk management, and compliance strategies to protect against cyber threats and ensure adherence to regulatory requirements. The benefit...
IEEE Computer Society SUBSCRIBER EXCLUSIVE
By Gilad David Maayan
What Is Continuous Deployment? Continuous deployment (CD) is an indispensable aspect of a modern software development approach. It's a strategy that automates the process of deploying software changes to a production environment. With CD, every change made to the codebase is automatically tested and pushed to production if it passes all tests....
By Gilad David Maayan
What Are the Main Cost Factors of AWS Database Services? Amazon Web Services (AWS) offers a range of database services that suit different needs, such as Amazon RDS (Relational Database Service), Amazon DynamoDB (a NoSQL database service), and Amazon Redshift (a data warehousing service). These services provide resizable capacity and automate ...
IEEE Computer Society SUBSCRIBER EXCLUSIVE
By Surya Kant Verma
The cybersecurity landscape is endlessly dynamic with new threats and technologies emerging unexpectedly and often. Simply updating cybersecurity technology and expecting it to keep up with this highly dynamic world is a mistake that can result in significant costs and damages. The average cost of a data breach across industries in 2023 was $4.45 m...
By Pohan Lin
Data is the lifeblood of good decision-making. However, when you're managing large amounts of data it's easy to store information that's irrelevant to what you need, filled with duplicates, or completely unstructured. This makes it harder to use, and takes up a lot of resources. One way to reduce these problems is through data normalization. We'll...
By Gaurav Belani
Terraform is among the leading tools used by enterprises as cloud computing continues to expand rapidly and Infrastructure-as-Code gains traction. The need for more effective and efficient IT solutions is becoming more pronounced as organizations grapple with the growing complexities of IT infrastructures and the enormity of cloud computing. By no...
By Hariprabu Sengoden Kandasamy
Cloud services are an integral part of operations for many organizations. Over the past decade, the rush to use cloud services instead of or in addition to in-house server farms for data storage and IT application operations has intensified. The marketing campaigns for cloud services by AWS, Microsoft, and Google make it seem like a "must-have" mig...
There are no results for this search.
   Analysis, Blogs, Commentary