Podcast: Sizing data storage for AI/ML workloads
In this podcast, we look at how to size storage for artificial intelligence (AI) and machine learning (ML) workloads that can range from batches of…
In this podcast, we look at how to size storage for artificial intelligence (AI) and machine learning (ML) workloads that can range from batches of…
Britain’s most secret court is investigating claims that UK agencies unlawfully monitored the phone communications of two Northern Ireland journalists. The Investigatory Powers Tribunal (IPT)…
Sean Green’s career has gone a full circle from IT through marketing, back to IT at his local university, where he is now heading up…
Very few organisations would have launched two new programmes of work by sharing a stage with the artist behind a hot pink puppet-robot hybrid that…
The endless capacity of cloud object storage with Posix-compatible file access – that’s the promise of CunoFS, from Cambridge-based PetaGene, which aims to resolve the…
A zero-day vulnerability in Citrix NetScaler Application Delivery Controller (ADC) and Citrix NetScaler Gateway appears to be being exploited by an unspecified advanced persistent threat…
The Bank of England has reached a major landmark in its programme to replace its 27-year-old real-time gross settlement (RTGS) system after completing the first…
The way we pay has changed over the centuries, from shells, to coins, to banknotes, to cheques, to cards, to smartwatches and much in between.…
The average cost of a data breach to a UK organisation now stands at £3.4m, but this figure drops by approximately £1.6m at organisations that…
Generative AI – including services such as ChatGPT and Google Bard – looks like being the next wave of business automation. In IT, a growing…
This year has seen a remarkable explosion of interest in generative AI. Go back just six months, and most people had never heard of it.…
As a CISO and cyber specialist, I am often asked what I see as the big cyber threats of the future. Whilst I’m not a…