Inside Advanced Scale Challenges|Thursday, January 18, 2018
  • Subscribe to EnterpriseTech Weekly Updates: Subscribe by email

Security

Crypto-Currency ‘Mining’ Boosts GPU Demand

The booming GPU market propelled by new implementations ranging from "GPU clouds" for deep learning to HPC applications is getting an additional lift from growing demand for "add-in" graphics ...Full Article

CSRA Emerges as U.S. IT Powerhouse

A well connected IT services provider formed through the merger of established government contractors is steadily extending its reach from providing cloud services the U.S. military to training the ...Full Article

Attacks, Regs Driving Security Spending

Reflecting growing cyber security threats, global spending on information security products is expected to rise by 7 percent this year, according to a new forecast. Gartner Inc. pegs the ...Full Article

U.S. Expands Cyber Training Effort

In order to secure enterprise networks and their far-flung components, everyone needs to be on the same page. That's at least part of the thinking behind a renewed U.S. ...Full Article

Senate Bill Seeks to Boost IoT Security

Responding to a rash of malware attacks on early and vulnerable Internet of Things devices, lawmakers have stepped forward with a proposal to improve weak IoT cyber-security. While attempts ...Full Article

DARPA, Chipmakers Seek Path Beyond Moore’s Law

The U.S. military long ago ceded dominance in electronics innovation to Silicon Valley, the DoD-backed powerhouse that has driven microelectronic generation for decades. With Moore's Law clearly running out ...Full Article

‘Neural’ Network Fabric Boosts Server Links

As network bottlenecks mount in datacenters—a hurdle that will only get worse with the deployment of business analytics using machine learning—there is a growing need for networking solutions that ...Full Article

Open Source Driving DevOps Automation

Heightened awareness about the security risks associated with open source software has increased use of disciplined DevOps practices that have improved application quality and developer productivity, a software supply ...Full Article

IBM Rolls ‘Pervasive’ Encryption As Threats Grow

As more stringent data protection rules enter into force, increasing enterprise requirements for encryption, IBM is stepping into the breach with an encryption engine based on its Z Systems ...Full Article

Survey Sees Major Middleware Overhaul

Among the implications of the enterprise migration to the cloud is a predicted overhaul of middleware platforms over the next several years as the integration of business applications drives ...Full Article
Page 3 of 1312345...10...Last »