Covering Scientific & Technical AI | Monday, January 13, 2025

Blockchain Use Cases Grow, As Does Venture Funding

The logistical and transactional advantages of blockchain technology could create more enterprise use cases based on the trusted sharing of data that eliminates third-party threats along with moves to ...Full Article

The Firmware Stack Opens Up

A batch of new open source efforts will among other things seek to unlock and define a firmware stack that would operate across enterprise infrastructure, cloud datacenters on up ...Full Article

Evolving AI Debate Shifts to the Battlefield

The accelerating pace of AI development continues to attract the attention of policy wonks who simultaneously view the technology as a strategic asset while worrying about unforeseen consequences of ...Full Article

GDPR and the Data Dilemma

There’s a data dilemma in the world today. To provide the best and most personalized services to clients and to get the best analytic insights, companies need more data ...Full Article

U.S. Circles Wagons on Foreign Tech Deals

The seemingly inevitable consolidation of the global semiconductor industry, plagued as it is by overcapacity and an unending search for new markets, was slowed at least temporarily by a ...Full Article

Aqua Security Hardens Kubernetes

Seeking to bullet-proof container infrastructure from application development through runtime protection for production workloads, a security vendor has rolled out the latest version of its platform targeting Kubernetes-native application ...Full Article

4 Strategies for Implementing NIST’s Biometric Guidelines

We often hear that technology is changing rapidly. We’ve heard this phrase for years – but in 2018, it really is. Today, almost everyone has a handheld tablet or ...Full Article

Report Calls for U.S. AI Strategy Based on Trust

The rise of machine intelligence has prompted policy wonks to weigh in with a list of caveats along with recommendations for preserving the American technology lead in AI and ...Full Article

IoT Gets a Security Upgrade

Processor specialist Arm is extending its push into the Internet of Things security market with a device authentication effort based on the cellular technology mainstay, the SIM card. Meanwhile, ...Full Article

Crypto-Miners’ Latest Target: Containers

The crypto-currency mining craze has now extended from hijacking supercomputers and public computing resources to include application containers, according to a security vendor. Researchers at Aqua Security said this ...Full Article
Page 21 of 34« First...10...1920212223...30...Last »
AIwire