Diminishing returns on costly data center investments—facilities already bulging at the seams—are engendering novel architectures for storing data. Early prototypes such as Microsoft’s submersible data center address cooling requirements ...Full Article
Canonical’s latest Ubuntu Core 20 Linux operating system now features several important security updates, including anti-malware and anti-hijacking technologies and full-disk encryption capabilities. The new version of Ubuntu Core ...Full Article
Vulnerable to hacking, drones are getting another layer of defense via an AI-based cybersecurity approach that promises to shield the flying edge devices from zero-day attacks. SparkCognition, an industrial ...Full Article
Red Hat is bringing deeper security capabilities to its popular Red Hat OpenShift enterprise Kubernetes platform through the acquisition of container and Kubernetes security vendor StackRox. The deal is ...Full Article
A proposed expansion in facial recognition technology use by the U.S. Customs and Border Protection (CBP) agency to screen foreign travelers coming in or out of the United States ...Full Article
Finding ways to bring AI more deeply into the business worlds of fintech, technology and academia is the mission of the new National Council for Artificial Intelligence (NCAI). Bolstered ...Full Article
Greater access to big data and HPC resources are enabling enterprise use of emerging AI tools and machine learning models to help protect corporate networks and secure enterprise applications. ...Full Article
A Linux Foundation report on trends in open-source software development assesses the factors driving contributors while urging more incentives to secure code and sustain community-based projects. The document, "Report ...Full Article
Funding for the creation of a new national cybersecurity director post within the Executive Office of the President is a key part of the latest spending authorization bill for ...Full Article
A vendor survey of early Kubernetes adopters embracing cloud-native applications finds that high-maintenance microservices and API sprawl have created a new set of security and networking issues for some ...Full Article
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.AcceptRead More
Privacy & Cookies Policy
Privacy Overview
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.