IBM, Microsoft and Boeing mark advances in quantum computing
The world’s top quantum researchers, investors, and government officials gathered in D.C. for the third annual Quantum World Congress last week, and, even though we’re…
Quantum networking takes off… into space
Boeing announced today that its quantum satellite, named Q4S, will launch in 2026 to demonstrate quantum entanglement swapping capabilities on orbit. When it comes to…
Red Hat delivers AI-optimized Linux platform
Open-source powerhouse Red Hat jumped into the generative AI space three months ago, announcing a new AI-focused vision for its Linux operating system at its annual summit.…
Can the CIO role prevail over AI?
According to a recent report from the AI-Enabled ICT Workforce Consortium, 92% of IT jobs will be transformed by AI to a moderate or high…
Ransomware recovery: 8 steps to successfully restore from backup
According to a Sophos survey of 5,000 IT and cybersecurity leaders released in April, 59% of organizations have been hit by a ransomware attack in 2023, from…
Broadcom’s vision for VMware highlights private clouds, private AI
A year ago, VMware’s big annual VMware Explore conference was all about generative AI – specifically, about companies running AI applications within a hybrid cloud infrastructure. This year,…
VMware Cloud Foundation gains AI model store, other updates
OpenAI nearly imploded last fall when the company fired its CEO and most of its employees threatened to quit, reminding enterprise adopters about the risks of putting…
VMware upgrades software-defined edge for AI workloads
VMware announced a number of improvements to its software-defined edge products at its annual VMware Explore conference today. Improved connectivity and traffic-management features are aimed at helping…
With Project Cypress, VMware brings generative AI to cyberdefense
Attackers have been quick to jump on the generative AI bandwagon, using the new technology to increase both the volume and the complexity of their…
AI agents will transform business processes — and magnify risks
According to Gartner, an agent doesn’t have to be an AI model. It can also be a software program or another computational entity — or…
Main Line Health readies networks for ‘at home’ hospitals
Aaron Weismann joined Main Line Health as CISO in the summer of 2020 at the height of the pandemic, and the organization faced an enormous…
NIST finally settles on quantum-safe crypto standards
After years of review, the National Institute of Standards and Technology officially picked the world’s first three post-quantum encryption algorithms as the basis for its post-quantum…
How to get gen AI spend under control
There’s no end in sight to the gen AI boom. Every week, we see new advances in the technology, new use cases, and new fears…
Post-quantum encryption: Crypto flexibility will prepare firms for quantum threat, experts say
Quantum computers may be here sooner than we thought, according to a survey of more than 900 quantum professionals released this month by quantum computing…
Be honest: Are your company values and AI aligned?
In 2003, Oxford University professor Nick Bostrom asked what happens if you ask a smart AI to make as many paperclips as possible. Say, a…
Microsoft Entra Suite is late to the SSE pool but will still make waves
General availability of the Microsoft Entra Suite is expected to shake up the nascent SSE industry, putting particular pressure on smaller vendors. SSE – secure service edge…
How guardrails allow enterprises to deploy safe, effective AI
Google has finally fixed its AI recommendation to use non-toxic glue as a solution to cheese sliding off pizza. “Glue, even non-toxic varieties, is not…
AI agents can find and exploit known vulnerabilities, study shows
Researchers at the University of Illinois gave a team of autonomous AI agents a CVE description of a vulnerability and the agents were able to…
6 key features of embedded analytics software
Advanced analytics and BI capabilities are no longer locked to technically proficient organizations and IT teams. Every industry can harness embedded BI for their benefit.…
Gen AI can be the answer to your data problems — but not all of them
There are currently 143 million people waiting for surgeries in lower income countries. And there are organizations ready to bring in doctors and resources —…
Key considerations to cancer institute’s gen AI deployment
The overhype of generative AI was unavoidable last year, yet despite all the distraction, unproven benefits, and potential pitfalls, Dana-Farber Cancer Institute CIO Naomi Lenane…
Breach and attack simulation tools: Top vendors, key features, how to choose
Breach and attack simulation (BAS) products help organizations understand their security posture by automating the tests of specific threat vectors. BAS typically uses MITRE ATT&CK…
Proof-of-concept quantum repeaters bring quantum networks a big step closer
Three teams – in Boston, in China, and the Netherlands – have simultaneously announced that they’ve figured out ways to store entangled photons without breaking…
Red Hat seeks to be the platform for enterprise AI
Red Hat went all-in on generative AI at its annual summit last week, offering a wide range of tools for operational and development teams to…
10 things to watch out for with open source gen AI
It seems anyone can make an AI model these days. Even if you don’t have the training data or programming chops, you can take your…
Data profiling vs. data mining: Why you need both
Data profiling and data mining may seem similar, but they serve different data management purposes. The two processes must work together to ensure quality data.…
Red Hat unveils image mode for its Linux distro
At the Red Hat Summit this week, the company unveiled a new container image deployment method for Red Hat Enterprise Linux. The new option is…
Red Hat extends Lightspeed generative AI tool to OpenShift and Enterprise Linux
Red Hat’s generative AI-powered Lightspeed tool was first announced last year for the Red Hat Ansible automation platform. This morning, as the Red Hat Summit kicks…
Red Hat introduces ‘policy as code’ for Ansible
Red Hat Ansible’s new “policy as code” capabilities will help users of the infrastructure automation platform to increase efficiency, reduce human error and improve the…
AI governance and cybersecurity certifications: Are they worth it?
The International Association of Privacy Professionals (IAPP), SANS Institute, and other organizations are releasing new AI certifications in the areas of governance and cybersecurity or…