GitHub

Microsoft Ignite: AI capabilities double every six months

During his keynote presentation at the start of Microsoft’s annual Ignite conference in Chicago, CEO Satya Nadella discussed artificial intelligence (AI) scaling, through which the capabilities of the tech is doubling every six months. “Just like Moore’s Law, we saw the doubling in performance every 18 months with AI. We have now started to see…

Microsoft Ignite: AI capabilities double every six months Read More »

Red Hat acquires tech to lower the cost of machine learning

Red Hat has announced its intention to acquire Neural Magic, the lead developer behind the open source vLLM project. The acquisition is being positioned as a way for Red Hat and its parent IBM to lower the barrier to entry for organisations that want to run machine learning workloads without the need to deploy servers…

Red Hat acquires tech to lower the cost of machine learning Read More »

Why geopolitics risks global open source collaborations

Following the removal last week of Russian Linux kernel maintainers to comply with US policies, Linus Torvalds – the developer of the original Linux kernel – spoke about his concerns that there were lots of Russian trolls who could potentially infiltrate the Linux kernel. The decision to block the maintainers followed a compromise of the…

Why geopolitics risks global open source collaborations Read More »

AI becomes Microsoft’s fastest-growing business

Microsoft’s artificial intelligence (AI) business is set to hit an annual run rate for subscription renewals of $10bn. For the quarter that ended September 30, the company reported revenue of $65.6bn, up 16%. The Microsoft Cloud business posted revenue of $38.9bn, an increase of 22%, while its productivity and business processes business reported a 12%…

AI becomes Microsoft’s fastest-growing business Read More »

Printing vulnerability affecting Linux distros raises alarm

A newly discovered series of four dangerous flaws in the Common Unix Printing System (Cups), which is used across virtually all GNU/Linux distros including Debian, Red Hat and SUSE, as well as Apple macOS and Google Chrome/Chromium among other things, is causing alarm bells to ring for security professionals over the potential scope of the…

Printing vulnerability affecting Linux distros raises alarm Read More »

PyPI loophole puts thousands of packages at risk of compromise

Thousands of applications that have taken advantage of open source Python Package Index (PyPI) software packages may be at risk of hijacking and subversion by malicious actors, opening up the possibility of major supply chain attacks affecting even greater numbers of downstream organisations and users. That is according to threat researchers at jFrog, who identified…

PyPI loophole puts thousands of packages at risk of compromise Read More »

NCSC and allies call out Russia’s Unit 29155 over cyber warfare

The UK’s National Cyber Security Centre (NCSC) and its counterpart bodies in the Five Eyes intelligence alliance have joined partners from Czechia, Estonia, Germany, Latvia and Ukraine to identify a Russian military cyber unit that has been conducting a sustained campaign of malicious activity over the past four years. Part of the Main Directorate of…

NCSC and allies call out Russia’s Unit 29155 over cyber warfare Read More »

Women in data: Claire Thompson, chief data officer, L&G

It’s almost become a cliché to say that data is the lifeblood of the modern enterprise. However, Claire Thompson, group chief data and analytics officer (CDAO) at financial services firm L&G, says data has always been crucial to big firms. What’s changed during the past few years, particularly in her sector, is a recognition of…

Women in data: Claire Thompson, chief data officer, L&G Read More »

Innovations to power secure-by-design development

Security leaders and software developers will benefit from deeper visibility into their organisations’ software development security posture as they work, bolstering moves towards the nirvana of so-called secure-by-design code, with the introduction of an industry-first solution from sector specialist Secure Code Warrior (SCW). SCW Trust Agent comes hot on the heels of the introduction of…

Innovations to power secure-by-design development Read More »

Data is the key to unlocking the UK’s AI potential

While data has the potential to boost the UK economy significantly, the links between data and AI are not sufficiently understood. If we are to seize this potential and position the UK as a global AI superpower, as the National AI Strategy aims to do, we must get a grip on data infrastructure in order…

Data is the key to unlocking the UK’s AI potential Read More »

Shopping Cart
Shopping cart0
There are no products in the cart!
Continue shopping
0
Scroll to Top