Advanced Computing in the Age of AI|Friday, August 14, 2020
  • Subscribe to EnterpriseAI Weekly Updates:  Subscribe by email

U.S. AI Corps Seeks to Keep Pace with China

A proposed U.S. Digital Service Academy would create an AI software repository to support R&D while training the next generation of AI developers. According to recommendations released this week ...Full Article

App Tracing Startup Emerges from Stealth

As enterprise software architectures evolve beyond monolithic applications to delivering micro-services, debugging tools like distributed tracing are emerging to detect cyberattacks against one of the foundations of cloud-native deployments: ...Full Article

Cyber Security is Recovery Focus as 5G Enthusiasm Wanes

The urgency of 5G wireless rollouts has diminished among executives in a monthly survey of global business conditions as enterprises shift their pandemic recovery focus to more pressing matters ...Full Article

Massive IoT Initiative: Securing the Smart City

According to Microsoft, one particular type of project accounts for close to one quarter of all global IoT initiatives: smart-city projects. In a 451 Research report from February 2020, ...Full Article

Here’s Why Enterprise AI Is Being Drafted to Fight Stimulus Fraud

Without an enterprise AI approach, prosecutors see fraud in the federal government’s Paycheck Protection Program, they admit there are too many scams to count, let alone stop. Organized crime ...Full Article

Nvidia Goes Deep With Mellanox Datacenter Net Security

When Nvidia announced its acquisition of Mellanox, the GPU leader noted that datacenters would eventually be built like high performance computers. Hence, it’s not surprising the first fruits of ...Full Article

AWS Plows Snow Family to the Edge

Amazon Web Services added to its Snow family of data migration and edge devices this week with the introduction of a secure edge computing and data transfer device dubbed ...Full Article

Oracle Extends Cloud Automation to Comms Security

Among the growing number of cloud infrastructure vulnerabilities are the legacy enterprise and contact center communication links that cloud security vendors insist are susceptible to Zero-Day and other network ...Full Article

Crypto-Jackers Target Exposed Kubernetes Workloads

As the Kubernetes cluster orchestrator moves deeper into enterprise infrastructure, cyber criminals continue to probe for weaknesses, frequently targeting application container image repositories. The latest onslaught involves misconfigured Kubeflow ...Full Article

IBM Halts Facial Recognition Sales

In a nod to the national discussion on racial equality and law enforcement, IBM CEO Arvind Krishna this week said the company will no longer sell facial recognition technology. ...Full Article
Page 2 of 2912345...1020...Last »
Do NOT follow this link or you will be banned from the site!