Advanced Computing in the Age of AI | Friday, May 3, 2024

SiFive Adds Tools for Cloud-Based Chip Design

Chip designers are drawing on new cloud resources along with conventional electronic design automation (EDA) tools to accelerate IC templates from tape-out to custom silicon. Among the challengers to ...Full Article

Security Threats Soar Along with Data Volumes

Lost data are costing organizations on average $1 million per month as data volumes soar and protecting stored data grows harder with the emergence of edge infrastructure handling AI ...Full Article

HPE Tops Dell in Q4 Server Market; High End Segment Up 8.9 Percent

Looking back at the fourth quarter of 2019, when the big economic question was how long the boom begun in 2009 would continue, there was plenty of evidence that ...Full Article

Rising AI Adoption Prompts Risk Assessments

Adopters of AI in the enterprise are focusing on specific production workloads centered around supervised and deep learning while the number of organizations using AI in production or evaluating ...Full Article

Red Hat, Intel Move to Certify Cloud Networks

A certification process unveiled by Red Hat and Intel Corp. provides a cloud-based testbed for network operations supporting both virtual network functions as well as those increasingly delivered via ...Full Article

Crowdsourcing at Massive Scale Takes on COVID-19

For gamers, fighting against a global crisis is usually pure fantasy seen in a console – but now, it’s looking more like a reality. As supercomputers around the world ...Full Article

Beat the GPU Storage Bottleneck for AI and ML

Data centers that support AI and ML deployments rely on Graphics Processing Unit (GPU)-based servers to power their computationally intensive architectures. Across multiple industries, expansion in GPU use is ...Full Article

Security Scanner Targets Container Image Registries

Lingering vulnerabilities within cloud-native platforms built around Kubernetes orchestrator deployments are spawning new security tools for scanning image registries, among the most vulnerable components of application container infrastructure. Aqua ...Full Article

DoD Will Revisit JEDI Cloud Contract

The Pentagon will reboot its department-wide cloud contract after a federal judge refereeing a protest filed by Amazon Web Services indicated the cloud giant was likely to succeed in ...Full Article

Open Source Push Highlights Security Flaws

As enterprise adoption of open source software soars, so too do the number of vulnerabilities inevitably exposed as deployments scale and security awareness grows in response to high-profile data ...Full Article
Page 35 of 126« First...102030...3334353637...405060...Last »
EnterpriseAI