Tue.Jan 09, 2018

article thumbnail

Applying Quantum Physics to Data Security Matters Now and in the Future

CTOvision

There are several reasons why applying quantum physics to data security will make a difference now and in the future. However, for businesses with a need for the highest level of data security, or are merely intrigued by the advance of quantum computing and its potential impact on cybersecurity, we encourage you to look at […].

Security 239
article thumbnail

Max Schrems champions NGO to fight for GDPR rights

Computer Weekly

Privacy activist whose legal challenge of Facebook led to the scrapping of the Safe Harbour Agreement says crowdfunding a new type of non-government organisation is essential to deliver privacy rights

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Why Becoming Tech Savvy is Good for You

CTOvision

Why Becoming Tech Savvy is Good for You If you’re a technophobe, you’re probably wary of the rapid way that technology has taken over our world. From the internet to A.I., technology seems to have its hands in every part of your life. You probably think that giving up on technology is the best thing […].

Internet 175
article thumbnail

Spanish authorities ready roads for autonomous vehicles

Computer Weekly

Spain’s Directorate General of Traffic has selected Mobileye technology to develop vision and data analysis for driver assistance and autonomous vehicles

Analysis 216
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

The Cyber Threat Provides New Insights Into Bad Actors

CTOvision

The Cyber Threat was written to help executives, especially those without a deep background in cybersecurity, understand the nature of adversaries in cyberspace. The book includes a new section on the technological environment that can help decision-makers get their heads around the new tech enabled world arising around us. The book also captures key lessons […].

article thumbnail

CES 2018: Pizza Hut to test autonomous delivery vehicle

Computer Weekly

At CES 2018, underway in Las Vegas, Pizza Hut and Toyota announce a partnership to develop an autonomous pizza delivery service

More Trending

article thumbnail

Cloud firm scales Cloudian object storage to 2.5PB for GDPR

Computer Weekly

Calligo expands Cloudian Hyperstore from three nodes to 30 at worldwide datacentres, with object storage deployed for file-level and metadata capabilities suited to GDPR

Storage 193
article thumbnail

Meltdown and Spectre: How much are ARM and AMD exposed?

Network World

As the chip vendors wrestle to get their arms around the Meltdown and Spectre vulnerabilities, we’re slowly determining the exposure of AMD and ARM to the exploit. Intel, unfortunately, is totally vulnerable. With AMD and ARM, though, it gets complicated. First, let’s go over the Spectre exploit, which is a second class of attacks similar to Meltdown, the one we all know.

Intel 82
article thumbnail

Intel to set up new group to focus on hardware security

Computer Weekly

Chip maker is reportedly planning to form a new group to focus on hardware security as it scrambles to limit the impact of recently discovered security flaws in chip designs

Hardware 181
article thumbnail

Layers of abstraction, the cost of convenience, and the commoditization of experience

I'm not lost, I'm wondering

The story of progress is one of abstraction, of increased convenience, and the taming of novel experience into the everyday. An obvious example that comes to mind is in programming, and in fact this is the context in which the seed of this idea first came to me. In my first digital electronics lab at UMR we learned how to program the 8088 processor using machine language (or maybe it was assembly language).

Sports 53
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Cyber attacks in 2017 drive Nordic security efforts

Computer Weekly

The volume of cyber attacks last year has increased boardroom focus on security in the Nordic region

Security 234
article thumbnail

CIO Leadership Live: Watch live on Tuesday, Jan. 16 at 10 a.m. eastern

ComputerWorld IT Management

Join Maryfran Johnson, executive director of CIO programs for CIO Events and the CIO Executive Council, for an in-depth interview with Kristin Darby, CIO at Cancer Treatment Centers of America, on Tuesday, Jan. 16 at 10 a.m. eastern. Watch the show live on Twitter.

article thumbnail

Dutch bank tests wearable technology payments

Computer Weekly

ABN Amro is testing out wearable payment devices with 500 customers as part of a four-month pilot

Banking 190
article thumbnail

How to Make a Digital Leap in the New Year

Future of CIO

Pigitalization implies the full-scale changes in the way the business is conducted and expands the leapfrogging change to the multiple directions. It represents the next stage of business maturity and will improve how the enterprise works and interacts with its ecosystem, with the people at the center of its focus. It is the thorny journey, how to make the digital leap in the New Year?

How To 40
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

Google puts its payment services under one roof

Computer Weekly

Internet giant is bringing all its payment services under the Google Pay brand, making them “simpler, safer and more consistent”

Google 159
article thumbnail

CES 2018: Jaguar Land Rover picks Qualcomm to power in-car connectivity

Computer Weekly

British carmaker Jaguar Land Rover will incorporate Qualcomm’s Snapdragon 820Am automotive platform to power in-vehicle connectivity