Blockchain Use Cases Grow, As Does Venture Funding
The logistical and transactional advantages of blockchain technology could create more enterprise use cases based on the trusted sharing of data that eliminates third-party threats along with moves to ...Full Article
The Firmware Stack Opens Up
A batch of new open source efforts will among other things seek to unlock and define a firmware stack that would operate across enterprise infrastructure, cloud datacenters on up ...Full Article
Evolving AI Debate Shifts to the Battlefield
The accelerating pace of AI development continues to attract the attention of policy wonks who simultaneously view the technology as a strategic asset while worrying about unforeseen consequences of ...Full Article
GDPR and the Data Dilemma
There’s a data dilemma in the world today. To provide the best and most personalized services to clients and to get the best analytic insights, companies need more data ...Full Article
U.S. Circles Wagons on Foreign Tech Deals
The seemingly inevitable consolidation of the global semiconductor industry, plagued as it is by overcapacity and an unending search for new markets, was slowed at least temporarily by a ...Full Article
Aqua Security Hardens Kubernetes
Seeking to bullet-proof container infrastructure from application development through runtime protection for production workloads, a security vendor has rolled out the latest version of its platform targeting Kubernetes-native application ...Full Article
4 Strategies for Implementing NIST’s Biometric Guidelines
We often hear that technology is changing rapidly. We’ve heard this phrase for years – but in 2018, it really is. Today, almost everyone has a handheld tablet or ...Full Article
Report Calls for U.S. AI Strategy Based on Trust
The rise of machine intelligence has prompted policy wonks to weigh in with a list of caveats along with recommendations for preserving the American technology lead in AI and ...Full Article
IoT Gets a Security Upgrade
Processor specialist Arm is extending its push into the Internet of Things security market with a device authentication effort based on the cellular technology mainstay, the SIM card. Meanwhile, ...Full Article
Crypto-Miners’ Latest Target: Containers
The crypto-currency mining craze has now extended from hijacking supercomputers and public computing resources to include application containers, according to a security vendor. Researchers at Aqua Security said this ...Full Article