You Are Browsing ‘Industry News ’ Category

Comments Off on How Blockchain Can Improve the Pharma Manufacturing Supply Chain
(Source: Disruptor Daily (blog)) The overall benefits of blockchain are enormous, from data security throughout the supply chain to full regulatory compliance throughout the industry. However, creating a truly integrated, global-scale operation is no easy task especially for every pharmaceutical company out there. If a company is interested in blockchain, ......
Comments Off on Machine learning: Security product or feature?
(Source: CSO Online) Since then, big data security analytics sort of morphed into machine learning, which led to the creation of a new security technology category: user and entity behavior analytics (UEBA). UEBA was designed to monitor user behaviors such as logins, remote access, network connections, etc., model "normal" behavior, and ......
Comments Off on Huawei Shoots Back at FCC Proposal That Threatens Its Rural Biz
(Source: SDxCentral) Following a blow last week by the Federal Communications Commission, Huawei shot back this week at implications that its networking equipment is used to spy on ... of telecommunications equipment — can provide an avenue for hostile governments to inject viruses, launch denial-of-service attacks, steal data, and more....
Comments Off on HP Unveils Powerful ZBook Studio x360 G5 Convertible Laptop
(Source: eTeknix) What is quite impressive is the hardware it is packing. In fact, it is very similar to ... It is also available with NVIDIA Quadro P1000 graphics and up to 4TB of PCIe NVMe storage and 32GB of RAM. In terms of display, the ... When it comes to work PCs, connectivity is just as important as the hardware inside. Which is why HP ......
Comments Off on Lenovo Legion Y920 Tower review
(Source: TechRadar) The Legion Y920T pairs great hardware with a well considered design. But, competitors have a leg up on it in affordability. ... A slightly lower-spec version is available U.S. with half the SSD and HDD storage and a GTX 1070 8GB for a more palatable $1,799. Sadly, this model doesn't appear to be sold by Lenovo in the UK ......
Comments Off on Storage Array Maker Infinidat Launches Cloud Data Protection
(Source: eWeek) New products include a 450-pound, ballistically hardened “data bunker” storage appliance and cloud-based data-protection software. ... Unlike conventional enterprise storage systems that rely on flash hardware for performance, InfiniBox—the company's frontline storage array—takes a software-optimized approach, using ......
Comments Off on Intel SSD DC P4510 Review
(Source: StorageReview.com) Introduced earlier this year, the DC P4510 Series is Intel's new data center NVMe SSD. Designed specifically for the Cloud (with the tagline “Cloud Inspired. StorageOptimized.”), the P4510 is Intel's first enterprise 64-layer 3D NAND SSD. Leveraging this technology, the company was able to drive the capacity of the drive ......
Comments Off on IBM: Data breaches declined in 2017 due to shift to ransomware
(Source: The INQUIRER) The report found that the focus of criminals in 2017 to shift to locking or deleting data, not just stealing it, through ransomware attacks has been proven to be just as, ... "It's also no surprise that human error and mistakes in infrastructureconfigurations are on the rise; the ability to utilise these 'holes' in the security, enable ......
Comments Off on VMware, Inc. (NYSE:VMW) Position Lifted by Amalgamated Bank
(Source: StockNewsTimes) VMware logo Amalgamated Bank boosted its position in shares of VMware, Inc. (NYSE:VMW) by 11.2% in the fourth quarter, according to the company in its most recent disclosure with the Securities and Exchange Commission. The fund owned 8,297 shares of the virtualization software provider's stock after purchasing an ......
Comments Off on Facebook Sought Medical Data. Yes, This Should Raise Red Flags.
(Source: Futurism) There's also a potential HIPAA transgression here in the sense of data security. Facebook would have allegedly matched the anonymous health data with patients' Facebook profiles using a technique called “hashing.” This method scrambles data, such as names, using a specific algorithm, and then searches for matches ......