The three-way race for GPU dominance in the data center

The three-way race for GPU dominance in the data center

The modern graphics processing unit (GPU) started out as an accelerator for Windows video games, but over the last 20 years has morphed into an enterprise server processor for high-performance computing and artificial-intelligence applications. Now GPUs are at the tip of the performance spear used in supercomputing, AI training and inference, drug research, financial modeling, and medical imaging. They have also been applied to more mainstream tasks for situations when CPUs just aren’t fast enough,…

Read More

Reskilling IT for digital success in a tight talent market

Reskilling IT for digital success in a tight talent market

There are few CIOs who haven’t been hit by attrition, as streams of highly talented IT professionals head out the door for bigger salaries, better opportunities, or both. The fact that today’s digital powerhouses are now hiring tens of thousands of employees — often without regard to geography — has only exacerbated the talent crunch for IT leaders. Employee retention remains top of mind. But amid these seismic shifts in an already high-demand marketplace, leading…

Read More

Intel’s Gelsinger predicts chip shortage will run through 2024

Intel’s Gelsinger predicts chip shortage will run through 2024

Intel CEO Pat Gelsinger expects chip shortages will continue into 2024 due to a lack of manufacturing equipment and tools to make the chips. Gelsinger made the comments during an interview with CNBC’s TechCheck about Intel’s first quarter earnings. While the company did well in Q1, the outlook for Q2 is not as positive, and Intel stock took a hit for it. Semiconductor manufacturers have faced a number of challenges to meet demand, most notably…

Read More

Treasury Sanctions Crypto Firm After North Korea’s $620m Heist

Treasury Sanctions Crypto Firm After North Korea’s 0m Heist

Cryptocurrency mixing service Blender.io has become the first business of its kind to be hit with US government sanctions after it was allegedly used by North Korean hackers following a major crypto theft. The US Treasury’s Office of Foreign Assets Control (OFAC) claimed the firm was used by the Democratic People’s Republic of Korea (DPRK) to launder over $20.5m of the $620m estimated to have been stolen from Ronin Network in March. “Today, for the first…

Read More

US Government Offers $15m Reward for Info on Conti Actors

US Government Offers m Reward for Info on Conti Actors

The US authorities have offered a multimillion-dollar reward for information leading to the identification, arrest and/or conviction of individuals involved in attacks using the Conti ransomware variant. Offered under the Department of State’s Transnational Organized Crime Rewards Program (TOCRP), the money is split into two pots: up to $10m for information on the identity or location of individuals “who hold a key leadership position” in Conti; and up to $5m for info leading to the…

Read More

What are national security professionals getting paid?

What are national security professionals getting paid?

<!– What are national security professionals getting paid? | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Intelligence report identifies transnational security threats

Intelligence report identifies transnational security threats

<!– Intelligence report identifies transnational security threats | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

The super power of soft skills in security

The super power of soft skills in security

<!– The super power of soft skills in security | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

What would Zelenskyy do?

What would Zelenskyy do?

<!– What would Zelenskyy do? | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

Protecting against cyber threats during the Russia-Ukraine conflict

Protecting against cyber threats during the Russia-Ukraine conflict

<!– Protecting against cyber threats during the Russia-Ukraine conflict | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More
1 3,096 3,097 3,098 3,099 3,100 4,147