Covering Scientific & Technical AI | Wednesday, February 5, 2025

GE Takes on Amazon in IoT with Predix Cloud

As part of its effort to provide customers with complete Internet of Things solutions, GE enhanced its Predix IoT platform to include infrastructure-as-a-service. The new Predix Cloud will leverage ...Full Article

Valerie Plame: The Spy Who Came in to the Code

Since her cover was famously blown, former covert CIA operative Valerie Plame is more openly protecting the country's digital assets. In May, the author and anti-nuclear activist joined the ...Full Article

‘Can Containers Contain?’ Remains Top Security Issue

Among the stumbling blocks to scaling application container technology are lingering concerns about security in production environments. Secure deployment of Docker and other container workloads in production was among ...Full Article

U.S. Can Learn a Lot from EU About Cybersecurity Legislation

Violence. Human rights. Universal healthcare. Cybersecurity initiatives. You may ask yourself what these four things have in common. Well, aside from being hot topics of political debate, they are ...Full Article

Intel, Micron Stack New Memory Technology

Chipmakers Intel Corp. and Micron Technology are claiming a new class of memory technology based on new materials and a three-dimensional "cross point" architecture said to deliver a 1,000-fold ...Full Article

MOOCs Teach IT Lessons Before Summer Ends

As full-time students' thoughts return to classrooms and lesson plans, IT professionals will find a slew of new online educational offerings designed to augment and expand their skills. An ...Full Article

With Cloud and Mobile, Moven Brings Banking into Digital Age

Without cloud or mobile applications, startup financial firm Moven might not exist. After all, the digital-age company is using these assets to both compete and ally with traditional banks. The ...Full Article

Getting Cybersecurity Insurance After a Breach

Getting cybersecurity insurance after a cybersecurity breach can be a daunting exercise. The primary underwriter may either drop the entire company for commercial insurance coverage or not offer cybersecurity ...Full Article

Hackers Carjack Jeep in IoT Nightmare

Two hackers successfully took control of a Jeep Cherokee as it hurtled along a highway at 70 miles per hour, turning an Internet of Things nightmare into reality – ...Full Article

Under Attack: Malware Roundup from Security Pros

The weekend brought no respite for anxious chief security officers, CIOs, and other professionals involved in the never-ending quest to protect data, networks, and accounts from the onslaught of ...Full Article
Page 215 of 229« First...102030...213214215216217...220...Last »
AIwire