System News
 1 2 3 4 5 6 next
Articles for the keywords: gcn
19 Mar 2017 What's AI, And What's Not [61445]
GCN, March 10th, 2017

"Artificial intelligence has become as meaningless a description of technology as 'all natural' is when it refers to fresh eggs. At least, that's the conclusion reached by Devin Coldewey, a Tech Crunch contributor," reports Paul McCloskey in GCN.

"AI has become a popular buzzword, he said, precisely because it's so poorly defined. Marketers use it to create an impression of competence and to more easily promote 'intelligent' capabilities as trends change.

The popularity of the AI buzzword, however, 'has to do at least partly with the conflation of neural networks with artificial intelligence,' he said. 'Without getting too into the weeds, the two are not interchangeable -- but marketers treat them as if they are.'..."
(Get More Information . .) open to premium members only

12 Mar 2017 A Survival Guide For The Coming AI Revolution [61238]
GCN, March 3rd, 2017

Natalie Rens, Juxi Leitner write in GCN, "If the popular media is to be believed, artificial intelligence is coming to steal your job and threaten life as we know it. If we do not prepare now, we may face a future where AI runs free and dominates humans in society.

The AI revolution is indeed underway. To ensure you are prepared to make it through the times ahead, we've created a handy survival guide for you..."
(Get More Information . .) open to premium members only

05 Mar 2017 8 Things Hackers Would Like You To Know [61003]
GCN, February 24th, 2017

Troy K. Schneider writes in GCN, "A new cybersecurity report from Nuix skipped the survey of recent breaches and instead went to the source -- asking 70 penetration testers at the DEFCON conference about their tactics, motivations and thoughts on the systems they target.

The Nuix Black Report 'illuminates the true nexus between attacker methodology and defensive posture,' Nuix Chief Information Security Officer Chris Pogue said in announcing the report's release. Among the more interesting findings:..."
(Get More Information . .) open to premium members only

12 Feb 2017 Locking Down Containers [60341]
GCN, February 3rd, 2017

Stephanie Kanowitz writes in GCN, "Containerization can be a great way to control information sharing, but securing containers has a way to go toward maturity, said Kerry Long, a program manager at the Intelligence Advanced Research Projects Activity.

Containers virtualize a single application and package it with just the software, libraries and operating system features it needs to run, eliminating some of the dependencies that slow down deployments. They offer all the benefits of virtualization, but with better use of hardware and an already-broad ecosystem of applications, according to an article by Red Hat's Dave Egts..."
(Get More Information . .) open to premium members only

13 Nov 2016 The Invisible -- But Growing -- Threat To Critical Infrastructure [57703]
GCN, November 4th, 2016

"The nation's cities, regions and states are all connected to the internet through the water, electric and telecom infrastructure," notes Matt Leonard in GCN. "The damage an attack on this system could have should not to be understated, security experts say.

During the Cold War, the nature of the threat and the assets requiring protection were clearly stated, according to Ron Ross, a fellow at the National Institute of Standards and Technology. The threat was nuclear, the asset was the nation. Now, in the realm of cyber, that clarity has all but gone away, Ross said..."
(Get More Information . .) open to premium members only

 
 1 2 3 4 5 6 next






!-- end archive_section.tpl -->