Covering Scientific & Technical AI | Saturday, December 14, 2024

Cryptojacking: Cryptocurrency Mining Meets Malicious Intentions

 With data center technology evolving relentlessly, IT professionals must grapple with a dynamic security landscape, as malicious actors leverage new capabilities to launch even more sophisticated cyberattacks, particularly in ...Full Article

Google, Atos Partner on Cloud Machine Learning

Google continues to add regional cloud partners as it seeks to differentiate its public cloud offerings while distributing its machine learning building blocks. Atos, the French big data platform ...Full Article

VMware Sharpens Focus on Hybrid Cloud

VMware this week takes the wraps off the latest versions of its server virtualization and software-defined storage platforms with an emphasis on hybrid cloud deployments, broader application support and—in ...Full Article

Hacker Survey: Simple Attacks Breach Systems in a Day

A security vendor survey of professional hackers finds that many are able to easily defeat “perimeter defenses” like firewalls, then pinpoint and steal critical data in less than a ...Full Article

Serverless Security Risks Surface

Emerging serverless frameworks that dispense with server management to run cloud-native workloads continue to gain traction in the enterprise while at the same time drawing scrutiny from security specialists ...Full Article

Intel Reverses Course on Patching Older Chips for Spectre/Meltdown

In Intel’s latest (and possibly final) update to its Meltdown and Spectre mitigation guide, published April 3, the company revealed that a number of its older CPU models will ...Full Article

Got GDPR Anxiety? Here Are 3 Must-Do’s

The tech community has been discussing European Union’s General Data Protection Regulation (GDPR) as if it were a natural disaster, rather than a law. “Are you ready for GDPR?” ...Full Article

Ethics Moves Front and Center in AI Debate

The breakneck pace of machine intelligence development is prompting welcome assessments of the ethical implications of a technology that will have a profound effect on workers, consumers and most ...Full Article

IoT Developers Look to Blockchain for Security

Securing the Internet of Things appears to have advanced well beyond default factory settings to include data and network security features baked into IoT components as well as comprehensive ...Full Article

Blockchain Use Cases Grow, As Does Venture Funding

The logistical and transactional advantages of blockchain technology could create more enterprise use cases based on the trusted sharing of data that eliminates third-party threats along with moves to ...Full Article
Page 20 of 34« First...10...1819202122...30...Last »
AIwire