Advanced Computing in the Age of AI | Friday, March 29, 2024

How to Protect Your Aging Network

The Office of Personnel Management breach was the most recent and public example of the damage aging networks can help deliver to an organization: A lack of standard practices ...Full Article

IBM Insists It’s Open to Open Source

The annual Red Hat Summit, held in Boston last week, is something of revival tent for open source where the pulpits are plentiful and so are smiling believers. Indeed ...Full Article

One Way or Another, Flash Storage Hits Datacenters

Flash-based storage arrays—whether all flash or hybrid—are making headway in the datacenter as storage administrators charged with coping with exponential data growth hustle to unclog network bottlenecks that remain ...Full Article

Goldman Sachs Brokers Container Spec Deal

With a nudge from major customers like financial services giant Goldman Sachs, a group of software vendors said they are coalescing around a new initiative created to establish industry ...Full Article

NSA Contributes Security Tools For Puppet

IT automation specialist Puppet Labs has announced a new partner: The U.S. National Security Agency. Puppet Labs said Friday (June 19) that NSA is releasing to the open source ...Full Article

Red Hat Survey Highlights Container Certification

Production deployment of Linux application containers may not be meeting expectations, but there is no shortage of industry surveys attempting to pinpoint barriers to adoption. The latest released on ...Full Article

Bring Shadow IT Out of the Dark, Gartner Tells Tech

Mention shadow IT to many technology professionals and they'll shudder before trading war stories. But to empower their organizations to innovate, grow, and succeed, IT departments must embrace and manage this ...Full Article

To Improve Cybersecurity, Fire Some CEOs

Despite the amazing number of cybersecurity breaches, so far the Target CEO appears to have been the only one to pay the price. While we hear some calls for ...Full Article

Ex-Baidu Researcher Ren Wu Denies Wrongdoing

Dr. Ren Wu vigorously denies the charges of cheating that led Baidu to reportedly fire the head of its Heterogeneous Computing team after the Chinese search engine developer's supercomputer team ...Full Article

RAND Corp: Manage Security Like a Business

Organizations must figure out a better way to manage cybersecurity like a business, using metrics to determine the relative return on investment (RROI), and constantly evaluating the lifecycle and ...Full Article
Page 196 of 208« First...102030...194195196197198...Last »
EnterpriseAI