Advanced Computing in the Age of AI|Wednesday, June 3, 2020
  • Subscribe to EnterpriseAI Weekly Updates:  Subscribe by email

New Chip Approaches Seek to Keep Up with AI

New Chip Approaches Seek to Keep Up with AI

Exploding data sets and complex software have made it harder for single-purpose platforms like ASICs to keep ...

Zscaler Acquires Network Security Startup

Zscaler Acquires Network Security Startup

Zscaler Inc. is doubling down in its drive to dominate the market for “zero trust” security frameworks ...

DARPA Moves to Secure Chip Designs

DARPA Moves to Secure Chip Designs

The U.S. military is ramping up efforts to secure semiconductors and its electronics supply chain by embedding ...

COVID-19 Contact Tracing Apps Attracting Hackers

COVID-19 Contact Tracing Apps Attracting Hackers

As contact tracing ramps up for exposure to COVID-19, so too are concerns about data privacy and ...

Security

June 1, 2020
Exploding data sets and complex software have made it harder for single-purpose platforms like ASICs to keep up with the growing demands of enterprise datacenters. Heavy investments in chip design and development therefore run the risk of obsolescence by the time they are deployed. In response, an ecosystem is emerging around greater programmability that promises to optimize hardware while ... Full article
May 29, 2020
Zscaler Inc. is doubling down in its drive to dominate the market for “zero trust” security frameworks with its second acquisition in about six weeks. The cloud security specialist said Thursday (May 28) it is acquiring Edgewise Networks, a four-year-old Boston area startup focused on securing communications among applications running in cloud and datacenter networks. Terms of the deal ... Full article
May 28, 2020
The U.S. military is ramping up efforts to secure semiconductors and its electronics supply chain by embedding defenses during the chip design phase. The automation effort also addresses the high cost and complexity of securing hardware development along with current lack of secure-oriented chip design tools. The Defense Advanced Research Projects Agency (DARPA) announced a pair of teams this ... Full article
May 27, 2020
As contact tracing ramps up for exposure to COVID-19, so too are concerns about data privacy and whether phony tracing apps will expand opportunities for attackers preying on citizens who voluntarily use tracing apps to help fight the spread of the novel coronavirus. While data privacy debates continue across Europe and the U.S. about how best to implement contact ... Full article
May 11, 2020
COVID-19 has significantly shifted consumer sentiment towards automation technologies, including robot deliveries and AI-based chatbots used in telemedicine applications. However, a new AI sentiment report also finds the novel coronavirus has failed to move the sentiment needle when it comes to use cases like riding in self-driving cars. The consumer sentiment survey released by conversational AI developer Interactions also ... Full article
May 5, 2020
Internet of Things connections driven by early industrial deployments and pandemic-driven telemedicine applications are projected to reach 83 billion by 2024, a 130 percent growth rate, as IoT platform revenues jump an estimated 20 percent this year to $66 billion, according to estimates released this week by Juniper Research. Despite daunting security and data privacy challenges, the market tracker ... Full article
April 24, 2020
The basis of IBM’s hybrid cloud strategy revolves around its assertion that about 80 percent of enterprise workloads have yet to migrate to the cloud. First articulated by ex-CEO Ginni Rometty, that strategy was emphasized again this week by Rometty’s successor, Arvind Krishna, while discussing the company’s quarterly results. Eyeing those mission-critical workloads, IBM’s is leveraging its 2018 acquisition ... Full article
April 22, 2020
Taiwan, tech-savvy and pandemic-prepared, has emerged as the gold standard for containing the spread of the novel coronavirus. Using hard lessons learned from previous epidemics, frequent earthquakes and other natural disasters, the island nation has so far successfully leveraged its technology base, big data and innovation to build up its public health defenses. The result: While most of the ... Full article
April 10, 2020
Zscaler Inc., the cloud security specialist, has expanded its capabilities to fix infrastructure and other platform misconfigurations via its acquisition of Cloudneeti, a move that allows the buyer to extend its data protection for software services applications to public cloud workloads. Cloudneeti specializes in self-service “workload assurance” along with standard security and compliance validations. Based in Redmond, Wash., the ... Full article
April 9, 2020
A coordinated, long-term approach is needed to confront the “retroactive risk” to secure communications posed by quantum computing, warns a new report emphasizing that code-breaking applications based on quantum technologies could emerge by as early as the next decade. The report released Thursday (April 9) by the RAND Corp., the government-backed think tank, asserts that current encryption schemes will ... Full article
April 8, 2020
The list of open source service meshes, a low-latency infrastructure layer designed to link application containers and other microservices, continues to grow as ephemeral application infrastructure scales to production. The latest offering comes from Solo.io, which this week released its “service mesh hub” to the open source community. The hub is billed as a unified dashboard for installing and ... Full article
April 7, 2020
The Kubernetes ecosystem continues to expand with the launch of a new open source project to develop tools for running and managing native workflows and applications on the de facto standard cluster orchestrator. Elsewhere, a cloud-based platform rolled out this week is intended to automate development and security for DevOps teams struggling with complex Kubernetes provisioning. The Cloud Native ... Full article
March 30, 2020
AI and machine learning tools enlisted to bolster the security of enterprise infrastructure are ubiquitous. Still, a vendor survey reveals a persistent gap between deployment and working knowledge about the capabilities of automated security tools. So far, the results have been mixed. An annual threat assessment released by cybersecurity specialist Webroot reveals that expanding use of AI tools to ... Full article
March 27, 2020
This year’s first update of the de facto standard Kubernetes cluster orchestrator includes 38 enhancements, of which nearly half have been declared “stable” features. Kubernetes 1.18 released this week is billed by maintainers as a “fit and finish” release that includes 15 stable enhancements, 11 moving to beta testing and 12 at the “alpha” stage of development and testing. ... Full article
March 23, 2020
Lost data are costing organizations on average $1 million per month as data volumes soar and protecting stored data grows harder with the emergence of edge infrastructure handling AI and machine learning platforms. Surging data loss and related costs are a function of what a survey compiled by Dell Technologies (NYSE: VMW) estimates is a “staggering” 831 percent increase ... Full article
March 18, 2020
Google and a host of other technology companies are in discussions with the federal government and health experts over the use of Americans’ cell phone tracking data to analyze where coronavirus hot spots are happening and to predict where the next ones will occur. According to a story in the Washington Post today, analysis of the movements of smartphone ... Full article
March 16, 2020
Lingering vulnerabilities within cloud-native platforms built around Kubernetes orchestrator deployments are spawning new security tools for scanning image registries, among the most vulnerable components of application container infrastructure. Aqua Security released an open source tool this week for scanning image registries running on Docker and the enterprise version of Mirantis Docker. The security tool also targets Harbor, an open ... Full article
March 12, 2020
As enterprise adoption of open source software soars, so too do the number of vulnerabilities inevitably exposed as deployments scale and security awareness grows in response to high-profile data breaches. An audit of security advisories, vulnerability databases and other security trackers found that open source software vulnerabilities jumped in 2019 to more than 6,000. That total represents a 50 ... Full article
March 11, 2020
In the banking, financial services and insurance industries, data privacy compliance is an eternally daunting challenge, and now data management consultancy Vaco and NEC X, the "innovation accelerator" arm of NEC, have integrated AI with high performance computing to handle PII (personal identification information) operations redaction within GDPR and other data privacy workloads faced by BFSI organizations. NEC X, ... Full article
March 2, 2020
Dell Technologies record annual revenues announced last week was nevertheless met with unease by shareholders wary of the outlook for its VMware business. Dell (NYSE: DELL) reported full-year revenues totaling $92.2 billion while fiscal fourth quarter revenue was up only 1 percent to $24 billion as a result of declining server and storage sales in the U.S. and China. ... Full article

More articles

Do NOT follow this link or you will be banned from the site!
Share This