Network World Security Alert |
| |
|
Considering how much significance Gartner is placing the future influence of artificial intelligence and algorithms, it comes as little surprise that the group is saying that technology will be one of the most strategic and potentially disruptive for 2017. At its Gartner Symposium/ITxpo, David Cearley, vice president and Gartner Fellow detailed the key technology trends for 2017 as the group sees them including how data science technologies are evolving to include advanced machine learning and artificial intelligence is helping create intelligent physical and software-based systems that are programmed to learn and adapt. Read More ▶ |
|
| Video/Webcast: SentinelOne Inc. Hear from Security Team Lead, Joe Miller, at a global cosmetics company, as he discusses their journey that led them to replace antivirus and deploy SentinelOne. Read More ▶ | One Gartner analyst called Cortana "Big Brother" combined with productivity, and asked some pointed questions about Microsoft's intentions. Read More ▶ |
| Microsoft: This marks the first time that human parity has been reported for conversational speech Microsoft researchers say they have created a speech recognition system that understands human conversation as well as the average person does. Ina paper published this week the Microsoft Artificial Intelligence and Research group said its speech recognition system had attained “human parity” and made fewer errors than a human professional transcriptionist. Read More ▶ |
| | “CIOs will participate in the building of a new digital platform with intelligence at the center,” Sondergaard said told a crowd of more than 8,000 CIOs and IT leaders. “The new competitive differentiator is understanding the customer’s intent through advanced algorithms and artificial intelligence. Creating new experiences that solve problems customers didn’t realize they had.” Read More ▶ |
| In his quest for online privacy and security, Bryan Lunduke explores how to ensure his email is as secure and private as possible. Read More ▶ |
| Attackers compromise online shops and store stolen payment card details inside legitimate image files in order to avoid detection. Read More ▶ |
| Murphy’s Law—anything that can go wrong, will go wrong—is alive and well in the information security world. Here are 10 variants. Read More ▶ |
| Photographs of nearly half of all U.S. adults -- 117 million people -- are collected in police facial recognition databases across the country with little regulation over how the networks are searched and used, according to a new study. Read More ▶ |
| Malware that can build botnets out of IoT products has gone on to infect twice as many devices after its source code was publicly released. Read More ▶ |
| White Paper: SentinelOne Inc. How much are you really paying for endpoint security? Learn two distinct endpoint protection strategies, which capabilities are critical, and what the true cost of a typical enterprise endpoint protection deployment is, including solution, IT resource, and other productivity cost factors. Read More ▶ | Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ | SLIDESHOWS 7 Linux command line tools you didn’t know you need Read More ▶ | Most-Read Stories |
|
|
|