TrueFort Recognized as Top Enterprise Threat Detection Product in Computing Security Excellence Awards

TrueFort Logo   JPEG
WEEHAWKEN, N.J.--(BUSINESS WIRE)--TrueFort, the cloud and application workload protection company, today announced that it has been named Enterprise Threat Detection Product of the Year in the 2020 Computing Security Excellence Awards, which celebrate the achievements of the IT industry's leading security companies, solutions, products and personalities. According to Computing, all businesses are under almost constant cyber-attack, from low-level scattergun types to more targeted, sophisticated strategies. Enterprise Threat Detection tools help organizations identify attacks as they occur, and analyze the threats quickly enough to respond and mitigate them. “The majority of threat detection tools available today focus on IT infrastructure, but applications hold the keys to the kingdom and have access to crown jewel data,” said Sameer...

Scale Computing Recognized in Gartner Magic Quadrant for Hyperconverged Infrastructure Software for Fourth Year in a Row

Scale orange gradient texture grey vert
INDIANAPOLIS--(BUSINESS WIRE)--Scale Computing, a market leader in edge computing, virtualization and hyperconverged solutions, today announced that it has been recognized by Gartner Inc. in the Dec. 2020 Magic Quadrant for Hyperconverged Infrastructure Software. Scale Computing has been recognized in all editions of this Magic Quadrant since Gartner introduced it. In the report, Gartner wrote, “HCI software stacks support software-defined infrastructure that spans compute, storage, networking and management. I&O leaders should regard HCI software as a technology that addresses requirements related to the core IT, business-critical, cloud, edge and virtual desktop infrastructure use cases.” “Scale Computing’s edge computing capabilities are what set us apart from our competitors in the HCI market. Our software is an autonomous,...

As China Leads Quantum Computing Race, U.S. Spies Plan for a World with Fewer Secrets

Back in 1994, when quantum computers existed only as so much chalk on a blackboard, mathematician Peter Shor invented what may soon prove to be their killer app.Shor trained his efforts on a calculation called "factoring," which ordinarily nobody but a mathematician would care about, except it just happens to be an Achilles heel of the internet. If someone were to invent a computer that could perform this operation quickly, messages that are currently hidden from hackers, terrorists, military adversaries, governments and competitors would be as easy to read as a Stephen King novel.Shor, of course, didn't have such a computer. He was writing an algorithm, or program, for a hypothetical machine that might one day exploit the weird properties of atoms and subatomic particles, as described by the theory of quantum mechanics, to perform calculations...

BP, Amazon extend renewable energy and cloud computing agreements

amazon aws server
12/10/2020 Amazon cloud computing infrastructure LONDON - BP and Amazon have agreed to extend their longstanding relationship, with BP to supply additional renewable energy to power Amazon’s operations, and Amazon Web Services (AWS) enabling the acceleration of BP’s program to digitize its infrastructure and operations. BP sees building relationships with major corporate partners such as Amazon as a key part of its strategy of transforming into an integrated energy company and to delivering its ambition of becoming a net zero company by 2050 or sooner and helping...

Intel Labs Moving Mountains With Neuromorphic Computing And Photonics Technologies

1620713113 0x0
Director of Intel's Neuromorphic Computing Lab, Rich Uhlig. Screenshot from event keynote. Intel While the industry loves to combine “R&D” and we see this in every tech company’s P&L, research and development are very different. Research is high risk, market making investments and discoveries that are unattached to products. Development is applying that research and other’s IP to create an end product or services. Development is less risky. Very few companies do research, and Intel has had a heritage in research for decades. One of the most exciting aspects of working as a tech analyst is, quite frankly, being one of the first to learn of these new, research-driven, cutting-edge technologies coming down the pipeline in the not-so-distant future—from the expected to the truly mind-boggling. As such, I always look...

The future of edge computing revealed

The future of edge computing revealed
If you’re on edge about what the future may hold for edge computing, you’re not alone. It’s impossible to look into a crystal ball to find out exactly what the future of edge computing has in store for users, decision makers, and systems providers. Edge computing is a distributed IT system with decentralized processing power, allowing data to be processed by devices rather than by a server. Examples of specific technology where edge computing is utilized include mobile and IoT devices. According to Grand View Research, the global edge computing market was worth $3.5 billion last year — and that number is expected to skyrocket to $43.4 billion by 2027. If the edge computing market does continue to grow by leaps and bounds, as is widely expected, this growth will result in more deployments of edge data centres near to where the data is being...

Preparing Your Company for Quantum Computing

8d6b2038a20e41eb84ddeea258ea9973.ashx
PHOTO: Jose Antonio Gallego Vázquez Businesses continue to navigate uncharted territory as the unpredictability of 2020 lingers. A growing number of problems have emerged during the crisis which require a major breakthrough to resolve. New market dynamics are continuously demanding new responses, with technologies like artificial intelligence (AI), cognitive automation and machine learning rising to the challenge. This new world poses a challenge for how businesses can move into the future — a future that demands sustainability and resiliency driven by solutions to address global health, financial risk, climate change, supply chain logistics, drug research and development, the fight against terrorism and cybersecurity. All of this requires a different approach that can factor in multiple dimensions and stretch the limits of existing...

Industry Perspective: Demystifying Confidential Computing

Industry Perspective Demystifying Confidential Computing
By Bruce Kornfeld In computing, data exists in three states: in transit, at rest and in use. Data moving across the network is “in transit,” data residing in some type of storage is “at rest,” and data being processed is “in use.”  As cyberthreats targeted toward network and storage devices are increasingly thwarted by protections that apply to data in transit and at rest, attackers have shifted their focus to data in use. Common attack vectors include memory scraping, CPU side-channel attacks and malware injection.  Confidential Computing is the protection of data in use, through hardware-based Trusted Execution Environments (TEEs). A TEE is defined as an environment that provides a level of assurance of data integrity, data confidentiality and code integrity.  Security strategists must consider all the different layers of possible...

Digital Rock Analysis of Complex Porous Media using High-Performance Computing Technology

jpt 2020 12 thermofisher sponsored article hero
As the application of Digital Rock Analysis (DRA) expands in industrial and academic settings, the need for digital investigation of more complex porous media, such as carbonates and tight rocks, has increased in the market. These materials exhibit a wide range of different mesoscale properties induced by their complex, multi-scale pore structures and their connectivity. The existence of complex pore space topology and wide pore size distributions requires computations to be done at high resolutions and in a large field of view. This means that the DRA of these samples must have three essential components of "parallel computing, multiscale modeling, and process-based reconstruction of 3D volumes." These are the three main pillars of Thermo Scientific™ e-Core Software, making it a unique solution for the characterization of more heterogeneous...