Advanced Computing in the Age of AI|Wednesday, July 8, 2020
  • Subscribe to EnterpriseAI Weekly Updates:  Subscribe by email

Cyber Security is Recovery Focus as 5G Enthusiasm Wanes

Cyber Security is Recovery Focus as 5G Enthusiasm Wanes

The urgency of 5G wireless rollouts has diminished among executives in a monthly survey of global business ...

Chip Proposals Seek to Revive U.S. Manufacturing

Chip Proposals Seek to Revive U.S. Manufacturing

Legislation introduced in the U.S. House and Senate seeks to revive the U.S. semiconductor industry via a ...

AWS Plows Snow Family to the Edge

AWS Plows Snow Family to the Edge

Amazon Web Services added to its Snow family of data migration and edge devices this week with ...

Oracle Extends Cloud Automation to Comms Security

Oracle Extends Cloud Automation to Comms Security

Among the growing number of cloud infrastructure vulnerabilities are the legacy enterprise and contact center communication links ...

Happening Now
Tuesday, July 7 Monday, July 6 Thursday, July 2 More Happening Now

Security

July 2, 2020
The urgency of 5G wireless rollouts has diminished among executives in a monthly survey of global business conditions as enterprises shift their pandemic recovery focus to more pressing matters like securing virtual workforces and ensuring data privacy. The Economist Intelligence Unit’s monthly Global Business Barometer released this week finds that nearly 42 percent of executives surveyed feel 5G is ... Full article
July 2, 2020
According to Microsoft, one particular type of project accounts for close to one quarter of all global IoT initiatives: smart-city projects. In a 451 Research report from February 2020, analyst Johan Vermij notes that escalating interest in smart cities has led to the current situation, in which smart cities now comprise 23 percent of IoT projects on a worldwide ... Full article
June 25, 2020
Without an enterprise AI approach, prosecutors see fraud in the federal government’s Paycheck Protection Program, they admit there are too many scams to count, let alone stop. Organized crime is scheming to take a growing cut of the emergency spending in the CARES Act. The rules of stimulus programs are constantly changing, making it hard to know who should ... Full article
June 22, 2020
When Nvidia announced its acquisition of Mellanox, the GPU leader noted that datacenters would eventually be built like high performance computers. Hence, it’s not surprising the first fruits of Nvidia’s 2019 acquisition of the networking specialist focuses on applying AI to security and predictive maintenance applications in InfiniBand datacenters. The supercomputer datacenter “cyber-AI platform” unveiled this week is built ... Full article
June 17, 2020
Amazon Web Services added to its Snow family of data migration and edge devices this week with the introduction of a secure edge computing and data transfer device dubbed Snowcone. The 4.5-pound device that includes 8 terabytes of usable storage targets the growing number of edge computing use cases in which space, power and cooling are limited. The 9- ... Full article
June 17, 2020
Among the growing number of cloud infrastructure vulnerabilities are the legacy enterprise and contact center communication links that cloud security vendors insist are susceptible to Zero-Day and other network attacks. In its ongoing effort to differentiate its cloud services, Oracle this week introduced a “communications security shield” within its cloud infrastructure that uses AI and real-time enforcement capabilities. The ... Full article
June 12, 2020
As the Kubernetes cluster orchestrator moves deeper into enterprise infrastructure, cyber criminals continue to probe for weaknesses, frequently targeting application container image repositories. The latest onslaught involves misconfigured Kubeflow machine learning clusters running in the Microsoft Azure cloud. The company said crypto-currency miners succeeded in deploying a malicious Kubeflow image via an exposed Kubernetes dashboard. It then spread from ... Full article
June 10, 2020
In a nod to the national discussion on racial equality and law enforcement, IBM CEO Arvind Krishna this week said the company will no longer sell facial recognition technology. He also called for greater transparency in use of body cameras worn by police and warned about the dangers of bias in AI systems used by law enforcement. Krishna made ... Full article
June 8, 2020
The Defense Advanced Research Projects Agency launched a cyber security effort several years back designed to replace commonly used security patches for software applications with the ability to spot hardware vulnerabilities at their source. Researchers working under the initiative, System Security Integration Through Hardware and Firmware (SSITH), have developed secure architectures and tools to protect embedded IoT devices and ... Full article
June 1, 2020
Exploding data sets and complex software have made it harder for single-purpose platforms like ASICs to keep up with the growing demands of enterprise datacenters. Heavy investments in chip design and development therefore run the risk of obsolescence by the time they are deployed. In response, an ecosystem is emerging around greater programmability that promises to optimize hardware while ... Full article
May 29, 2020
Zscaler Inc. is doubling down in its drive to dominate the market for “zero trust” security frameworks with its second acquisition in about six weeks. The cloud security specialist said Thursday (May 28) it is acquiring Edgewise Networks, a four-year-old Boston area startup focused on securing communications among applications running in cloud and datacenter networks. Terms of the deal ... Full article
May 28, 2020
The U.S. military is ramping up efforts to secure semiconductors and its electronics supply chain by embedding defenses during the chip design phase. The automation effort also addresses the high cost and complexity of securing hardware development along with current lack of secure-oriented chip design tools. The Defense Advanced Research Projects Agency (DARPA) announced a pair of teams this ... Full article
May 27, 2020
As contact tracing ramps up for exposure to COVID-19, so too are concerns about data privacy and whether phony tracing apps will expand opportunities for attackers preying on citizens who voluntarily use tracing apps to help fight the spread of the novel coronavirus. While data privacy debates continue across Europe and the U.S. about how best to implement contact ... Full article
May 11, 2020
COVID-19 has significantly shifted consumer sentiment towards automation technologies, including robot deliveries and AI-based chatbots used in telemedicine applications. However, a new AI sentiment report also finds the novel coronavirus has failed to move the sentiment needle when it comes to use cases like riding in self-driving cars. The consumer sentiment survey released by conversational AI developer Interactions also ... Full article
May 5, 2020
Internet of Things connections driven by early industrial deployments and pandemic-driven telemedicine applications are projected to reach 83 billion by 2024, a 130 percent growth rate, as IoT platform revenues jump an estimated 20 percent this year to $66 billion, according to estimates released this week by Juniper Research. Despite daunting security and data privacy challenges, the market tracker ... Full article
April 24, 2020
The basis of IBM’s hybrid cloud strategy revolves around its assertion that about 80 percent of enterprise workloads have yet to migrate to the cloud. First articulated by ex-CEO Ginni Rometty, that strategy was emphasized again this week by Rometty’s successor, Arvind Krishna, while discussing the company’s quarterly results. Eyeing those mission-critical workloads, IBM’s is leveraging its 2018 acquisition ... Full article
April 22, 2020
Taiwan, tech-savvy and pandemic-prepared, has emerged as the gold standard for containing the spread of the novel coronavirus. Using hard lessons learned from previous epidemics, frequent earthquakes and other natural disasters, the island nation has so far successfully leveraged its technology base, big data and innovation to build up its public health defenses. The result: While most of the ... Full article
April 10, 2020
Zscaler Inc., the cloud security specialist, has expanded its capabilities to fix infrastructure and other platform misconfigurations via its acquisition of Cloudneeti, a move that allows the buyer to extend its data protection for software services applications to public cloud workloads. Cloudneeti specializes in self-service “workload assurance” along with standard security and compliance validations. Based in Redmond, Wash., the ... Full article
April 9, 2020
A coordinated, long-term approach is needed to confront the “retroactive risk” to secure communications posed by quantum computing, warns a new report emphasizing that code-breaking applications based on quantum technologies could emerge by as early as the next decade. The report released Thursday (April 9) by the RAND Corp., the government-backed think tank, asserts that current encryption schemes will ... Full article
April 8, 2020
The list of open source service meshes, a low-latency infrastructure layer designed to link application containers and other microservices, continues to grow as ephemeral application infrastructure scales to production. The latest offering comes from Solo.io, which this week released its “service mesh hub” to the open source community. The hub is billed as a unified dashboard for installing and ... Full article

More articles

Do NOT follow this link or you will be banned from the site!
Share This