Latest Stories
Licensing lessons from VMware-Siemens spat
Siemens got into some hot water after Broadcom acquired VMware and changed licensing terms. What can enterprises learn from this dispute?
-
Licensing lessons from VMware-Siemens spat
-
/
How cybersecurity leaders can defend against the spur of AI-driven NHI
-
/
Top 9 generative AI use cases for business
-
/
7 ways synthetic data creates business value
-
/
Agentic AI: 9 promising use cases for business
-
/
Digital twins combine with AI to help manage complex systems
Award-winning articles
-
Broadcom’s vision for VMware highlights private clouds, private AI
-
With Project Cypress, VMware brings generative AI to cyberdefense
-
NIST finally settles on quantum-safe crypto standards
-
Post-quantum encryption: Crypto flexibility will prepare firms for quantum threat, experts say
-
Proof-of-concept quantum repeaters bring quantum networks a big step closer
-
Error-correction breakthroughs bring quantum computing a step closer
-
How AI chatbot ChatGPT changes the phishing game
-
Private 5G keeps Whirlpool driverless vehicles rolling
Artificial Intelligence
-
/
Top 9 generative AI use cases for business
Advanced chatbots, digital assistants, and coding helpers seem to be some of the sweet spots for gen AI use so far in business.
-
/
7 ways synthetic data creates business value
Synthetic data has long been used to create larger training sets for AI while preserving privacy and protecting sensitive information. But its use has historically been limited to companies able to afford data scientists. Generative AI is changing all that.
-
/
Agentic AI: 9 promising use cases for business
Organizations are deploying the ever-advancing technology to assist with software programming, create advanced business intelligence, and automate customer support and HR functions.
-
/
Digital twins combine with AI to help manage complex systems
Digital twins have historically been used to better understand the workings of computer chips, factory floors, or complex machines like jet engines. But the turbo boost they get when combined with AI gives organizations exponentially more power.
-
/
AI gives superpowers to BEC attackers
Attackers use business email compromise to pretend to be company executives, vendors, or other trusted parties and trick employees into sending them money. AI makes these attacks more effective — but also puts new tools in the hands of defenders.
-
Network bloat: AI-driven data movements cause cloud overspend
A significant percentage of enterprise cloud network spending is wasted, due to preventable mistakes and manual processes, and the recent spike in AI deployments is adding to the problem.
-
Agentic AI, LLMs and standards big focus of Red Hat Summit
Red Hat doubled down on its AI bets with new announcements for generative AI, agentic AI, and AI standards.
spotlight
About
Maria Korolov is an award-winning technology journalist who covers artificial intelligence, cybersecurity, and quantum computing.

CONTACT
The best way to reach Maria Korolov is by email at [email protected].
Latest Quantum Computing Articles
IBM announced an error correction breakthrough that will lead to a large-scale, fault-tolerant quantum computer by 2029.
Errors are the top obstacle preventing the industry from having usable quantum computers.
The time is now to create cryptography polices and plan for a transition to post-quantum encryption.
The Defense Advanced Research Projects Agency has selected 15 quantum computing companies to help bring quantum computing closer, and is spending millions on the project.
IonQ and Alice & Bob, have both announced breakthroughs that bring quantum computing closer to reality
D-Wave explains how quantum supremacy can be used to handle more than theoretical problems
Latest Cybersecurity Articles
The Broadcom/VMware licensing saga timeline
Siemens got into some hot water after Broadcom acquired VMware and changed licensing terms. What can enterprises learn from this dispute?
Non-human identities were already a challenge for security teams before AI agents came into the picture. Now, companies that haven’t come to grips with this problem will see it become even more critical.
Attackers use business email compromise to pretend to be company executives, vendors, or other trusted parties and trick employees into sending them money. AI makes these attacks more effective — but also puts new tools in the hands of defenders.
The big edge computing news from Red Hat Summit is the first continuously certified Linux OS for vehicles.
It may have faded into obscurity but by an order of magnitude, the outage last July caused by the cybersecurity vendor was the costliest in IT history. What have we learned to prevent something similar from happening again?
Latest Blog Posts
Pre-made book cover sites offer low-cost, professional-looking covers for independent authors.
“Show, don’t tell” is the first lesson of Fiction Writing 101, and one of the easiest and quickest fixes is to replace the emotional adverbs…
Our master list of best resources for writers of fantasy, horror and sci-fi. Writing advice sites Writer’s Knowledge Base: Huge database of more than 40,000…
We’ve just started doing the initial design of the website for MetaStellar, our new magazine of speculative fiction. The magazine will officially launch on September…
I use Google Docs. Most writers use Microsoft Word, Scrivener, or Google Docs to write their novels, with a few other, lesser-known platforms thrown in.…
Our list of great sites for beginning speculative fiction writers. Writer’s Knowledge Base Huge database of more than 40,000 articles about writing. Always my favorite…