Advanced Computing in the Age of AI|Friday, May 29, 2020
  • Subscribe to EnterpriseAI Weekly Updates:  Subscribe by email

Zscaler Acquires Network Security Startup

Zscaler Inc. is doubling down in its drive to dominate the market for “zero trust” security frameworks with its second acquisition in about six weeks. The cloud security specialist ...Full Article

DARPA Moves to Secure Chip Designs

The U.S. military is ramping up efforts to secure semiconductors and its electronics supply chain by embedding defenses during the chip design phase. The automation effort also addresses the ...Full Article

COVID-19 Contact Tracing Apps Attracting Hackers

As contact tracing ramps up for exposure to COVID-19, so too are concerns about data privacy and whether phony tracing apps will expand opportunities for attackers preying on citizens ...Full Article

COVID Prompts a Shift in AI Sentiment

COVID-19 has significantly shifted consumer sentiment towards automation technologies, including robot deliveries and AI-based chatbots used in telemedicine applications. However, a new AI sentiment report also finds the novel ...Full Article

IoT Deployments Appear Immune to Pandemic

Internet of Things connections driven by early industrial deployments and pandemic-driven telemedicine applications are projected to reach 83 billion by 2024, a 130 percent growth rate, as IoT platform ...Full Article

OpenShift Emerges as Focus of IBM Cloud Plans

The basis of IBM’s hybrid cloud strategy revolves around its assertion that about 80 percent of enterprise workloads have yet to migrate to the cloud. First articulated by ex-CEO ...Full Article

Taiwan Is Open for Business: A COVID-19 Tech Template

Taiwan, tech-savvy and pandemic-prepared, has emerged as the gold standard for containing the spread of the novel coronavirus. Using hard lessons learned from previous epidemics, frequent earthquakes and other ...Full Article

Zscaler Reconfigures with Cloudneeti Deal

Zscaler Inc., the cloud security specialist, has expanded its capabilities to fix infrastructure and other platform misconfigurations via its acquisition of Cloudneeti, a move that allows the buyer to ...Full Article

Report: ‘Post-Quantum Cryptography’ Needed for Retroactive Risks

A coordinated, long-term approach is needed to confront the “retroactive risk” to secure communications posed by quantum computing, warns a new report emphasizing that code-breaking applications based on quantum ...Full Article

Service Mesh Hub Backs Istio as Adoption Accelerates

The list of open source service meshes, a low-latency infrastructure layer designed to link application containers and other microservices, continues to grow as ephemeral application infrastructure scales to production. ...Full Article
Page 1 of 2612345...1020...Last »
Do NOT follow this link or you will be banned from the site!