Inside Advanced Scale Challenges|Monday, June 25, 2018
  • Subscribe to EnterpriseTech Weekly Updates: Subscribe by email

Fake Artificial Intelligence vs. the Real Thing – How to Tell the Difference

 When ‘Willy the Wonder-Chicken’ defeated famed behavior psychologist B.F. Skinner at Tic-Tac-Toe in 19791, who would’ve imagined tomorrow’s McNugget would become a foot soldier in the battle between artificial ...Full Article

AI Fights Online Merchant’s Nightmare: Late Shipments

Valentine’s Day is right around the corner and you’ve got nothing for your significant other. In a panic, you go to Amazon, pick a gift and check the delivery ...Full Article

Microsoft Expands Azure Cloud for Government

Microsoft is releasing new cloud services as part of its public-sector push that would allow military and government users to share sensitive and classified data across internal and cloud ...Full Article

Startup Seeks CAE Shake Up with Cloud HPC Solvers-as-a-Service

Coming out of stealth, a startup is out to overturn the CAE industry with a combination of AWS-based HPC capabilities and what it says is superior multi-physics design simulation ...Full Article

NSF Partners With VMware on IoT, Launches Computing Efforts

The National Science Foundation has launched a partnership with VMware to advance edge computing infrastructure required for the Internet of Things (IoT). Separately this week, NSF unveiled a $30 ...Full Article

AliCloud Takes on AWS with ‘Bare Metal’ HPC Instances in Europe

Alibaba, the e-commerce giant from China, is taking a run at AWS in the global public cloud computing market with new offerings aimed at the surging demand for AI ...Full Article

Algorithmia Adopts Blockchain for ‘AI Economy’

Algorithmia, the AI marketplace, has come up with a way of buying, selling and executing machine learning models on a blockchain platform, ushering in what it says is an ...Full Article

Start-up Aims AI at Automated Tuning of Complex Systems

There was a simpler time when system tuning consisted of adjusting a relatively few number of knobs, a manual and not overly demanding task that brought out the best ...Full Article

IoT Gets a Security Upgrade

Processor specialist Arm is extending its push into the Internet of Things security market with a device authentication effort based on the cellular technology mainstay, the SIM card. Meanwhile, ...Full Article

Crypto-Miners’ Latest Target: Containers

The crypto-currency mining craze has now extended from hijacking supercomputers and public computing resources to include application containers, according to a security vendor. Researchers at Aqua Security said this ...Full Article
Page 5 of 45« First...34567...102030...Last »
Do NOT follow this link or you will be banned from the site!