
Got GDPR Anxiety? Here Are 3 Must-Do’s
The tech community has been discussing European Union’s General Data Protection Regulation (GDPR) as if it were a natural disaster, rather than a law. “Are you ready for GDPR?” ...Full Article
Ethics Moves Front and Center in AI Debate
The breakneck pace of machine intelligence development is prompting welcome assessments of the ethical implications of a technology that will have a profound effect on workers, consumers and most ...Full Article
IoT Developers Look to Blockchain for Security
Securing the Internet of Things appears to have advanced well beyond default factory settings to include data and network security features baked into IoT components as well as comprehensive ...Full Article
Blockchain Use Cases Grow, As Does Venture Funding
The logistical and transactional advantages of blockchain technology could create more enterprise use cases based on the trusted sharing of data that eliminates third-party threats along with moves to ...Full Article
The Firmware Stack Opens Up
A batch of new open source efforts will among other things seek to unlock and define a firmware stack that would operate across enterprise infrastructure, cloud datacenters on up ...Full Article
Evolving AI Debate Shifts to the Battlefield
The accelerating pace of AI development continues to attract the attention of policy wonks who simultaneously view the technology as a strategic asset while worrying about unforeseen consequences of ...Full Article
GDPR and the Data Dilemma
There’s a data dilemma in the world today. To provide the best and most personalized services to clients and to get the best analytic insights, companies need more data ...Full Article
U.S. Circles Wagons on Foreign Tech Deals
The seemingly inevitable consolidation of the global semiconductor industry, plagued as it is by overcapacity and an unending search for new markets, was slowed at least temporarily by a ...Full Article
Aqua Security Hardens Kubernetes
Seeking to bullet-proof container infrastructure from application development through runtime protection for production workloads, a security vendor has rolled out the latest version of its platform targeting Kubernetes-native application ...Full Article
4 Strategies for Implementing NIST’s Biometric Guidelines
We often hear that technology is changing rapidly. We’ve heard this phrase for years – but in 2018, it really is. Today, almost everyone has a handheld tablet or ...Full Article