Inside Advanced Scale Challenges|Saturday, February 24, 2018
  • Subscribe to EnterpriseTech Weekly Updates: Subscribe by email

Security

IoT Gets a Security Upgrade

Processor specialist Arm is extending its push into the Internet of Things security market with a device authentication effort based on the cellular technology mainstay, the SIM card. Meanwhile, ...Full Article

Crypto-Miners’ Latest Target: Containers

The crypto-currency mining craze has now extended from hijacking supercomputers and public computing resources to include application containers, according to a security vendor. Researchers at Aqua Security said this ...Full Article

Quantum Computers Threaten Data Encryption

The promise of quantum computing comes with a major downside: "Cryptographically useful" quantum machines will threaten public key encryption used to secure data in the cloud, a new report ...Full Article

Vermont Launches Blockchain Project

Early efforts to use blockchain technology for financial transactions are gathering momentum with the launch of a pilot project between a blockchain startup and a Vermont city to use ...Full Article

Juggling Security With Greater Data Access

Securing critical data while simultaneously making it more accessible is the challenge for enterprise IT departments, a new vendor survey finds. In a report released Wednesday (Jan. 10), big ...Full Article

Rolling Out the Advanced Scale Computing Crystal Ball for 2018

We all know where we are and where we’re headed. We’re early into the AI Era, and it has an end-game aura about it. Not in an apocalyptic, “end-of-days” ...Full Article

Chip Flaws ‘Meltdown’ and ‘Spectre’ Loom Large

The HPC and wider tech community are abuzz over the discovery of critical design flaws that impact virtually all contemporary microprocessors. The bugs leave processors vulnerable to side channel ...Full Article

Quotes that Rocked Our World in 2017

It’s been a fascinating year in advanced scale computing, much of that fascination focused on AI (broadly defined), now firmly established as the leitmotif of the high performance computing ...Full Article

Consumers Ready to Push Back, GDPR Survey Warns

Two thousand and eighteen is shaping up as the year of consumer pushback as strict data regulations give the generators of boundless data new rights to see and demand ...Full Article

Blockchain Data Security and ‘BYOID’: Hacker’s Nightmare

New data breaches seem to happen every day. Consumers are frustrated by lack of control over their information once it is shared. Enterprises work tirelessly to avoid becoming the ...Full Article
Page 1 of 1412345...10...Last »