Pope Francis has asked believers around the world to pray that robots and artificial intelligence “always serve mankind.” The message is one of the pope’s monthly prayer intentions — regular missives shared on YouTube that are intended to help Catholics “deepen their daily prayer” by focusing on particular topics or events. In August, the pope… Read more
read more...IBM
Pope Francis urges followers to pray that AI and robots ‘always serve mankind’
heise + | Retro keyboard: Unicomp Buckling Spring Keyboard put to the test
The massive keyboards with the rich typing feel of the original IBM PCs make some veterans rave about it. Even rocked-down specimens with yellowed cases are traded high on the used market. Since 1996 the license for buckling spring technology has been owned by the US company Unicomp, which Offers replicas with the original key… Read more
read more...IBM Cloud for Telecommunications, an open ecosystem for the transformation of the telco market
IBM Cloud for Telecommunications may already count on 35 partners, including companies of the caliber of Nokia, Samsung and Cisco. The purpose of the platform is to make the most of the potential of 5G both in the consumer and professional fields of Alberto Falchi published on 09 November 2020 , at 17: 03 in… Read more
read more...SDF chooses IBM Cloud and IBM Watson for the SDF Data Platform: agriculture 4.0 is here
SDF, one of the main producers to the world of tractors and agricultural machinery, has chosen the services of IBM Cloud and IBM Watson for IoT for its SDF Data Platform, which will allow to bring digital transformation to the fields by Riccardo Robecchi published on 05 November 2020 , at 16: 21 in the… Read more
read more...heise + | Operating system architecture: The technological evolution of Windows
Our journey through time from Windows 1 to Windows XP tells how Microsoft technically advanced the Windows operating system. (Image: Albert Hulm) Operating system architecture: The technological development of Windows The Root The memory is tight Virtualized early Company chance Segment curse Article in c’t 27 /2020 read The DOS of these days, which Microsoft… Read more
read more...Alpitour relies on IBM for digital transformation
AlpiTour focuses on innovation and chooses IBM: for the digital transformation will focus on IBM Watson natural language processing services and on the Red Hat OpenShift functionalities for its infrastructure of Alberto Falchi published on 03 November 2020 , at 18: 19 in the Innovation channel IBM artificial intelligence The Alpitour Group , the well-known… Read more
read more...Honeywell improves its quantum computer to reach a quantum volume of 128
Honeywell continues to evolve its quantum computer and, after launching the first model with quantum volume of 64 at the beginning of the year, now announces that it has reached a quantum volume of 128 by Riccardo Robecchi published 31 October 2020 , at 14: 31 in the Innovation channel Honeywell Quantum Computer Honeywell announced… Read more
read more...Vulnerabilities: Nvidia releases BMC firmware updates for DGX servers
Updates for the AMI Baseboard Management Controller (BMC) firmware for Nvidias, primarily for deep learning, the GDX servers DGX-1, DGX-2 and DGX A 100 eliminate a total of nine security holes. One is considered critical; five others assume a high security risk, two a medium and one a low security risk. Misuse of the vulnerabilities… Read more
read more...Database: TimescaleDB 2.0 records and analyzes large time series
TimescaleDB, a scalable database specializing in time series, is now available after two years – with several beta versions and a first release candidate – the second release candidate (RC). The time series database supports SQL, is based on PostgreSQL as an extension and, in contrast to relational databases, is freely scalable. It offers a… Read more
read more...Text editors with a retro look
I recently had the opportunity to sit down in front of an old, original IBM PC 5150. The sight of the massive and already slightly yellowed housing, the full “clone” of the main switch, the hectic sawing of the floppy disk drive. Suddenly I was again and typed my first application into a computer with… Read more
read more...heise + | The IBM PC: a success for the “dirty dozen” – and the IBM boss
The IBM PC: a success of the “dirty dozen” – and the IBM boss The revolution The great-great-father system / 23 Datamaster morning air for DOS Next Big Thing Article in c’t 27 / 2020 read It was clear to the IBM management at the end of the 1970s that something should be done to… Read more
read more...IBM Cloud Pak for Security updates and enriches with threat intelligence
IBM updates its solution for cloud security, Cloud Pak for Security, with the ability to access five threat intelligence feeds and with greater integration possibilities of Riccardo Robecchi published on 27 October 2020 , at 20: 21 in the Security channel IBM New features for Cloud Pak for Security of IBM are coming by the… Read more
read more...The memory for your pocket: 20 years of USB sticks
Some good ideas have many parents, including that of the USB stick. In the year 2000 both IBM and the Singaporean company Trek 2000 Internationally first USB-connected flash memory sticks on the market. Those from IBM were called DiskOnKey and used technology from the Israeli company M-Systems. Trek 2000, on the other hand, coined the… Read more
read more...NetBSD 9.1 with more ZFS and “new” window manager CTWM
With a tiny delay allowing the NetBSD developers to update the timezone information for the Fiji Islands at the last minute, NetBSD 9.1 was released. Already with the major release NetBSD 9.0 it was noticeable that the previously somewhat sluggish development seems to be gaining momentum – and version 9.1 also comes up with a… Read more
read more...Machine learning: Microsoft, MITER, IBM, Nivida & Co create a threat matrix
The non-profit organization MITER, together with twelve companies and organizations, presented a framework that describes threat scenarios for machine learning applications. Data scientists, software developers, security operation centers and testers should use it to identify attack vectors and prepare their systems for them. The Adversarial ML Threat Matrix is based on ATT & CK framework… Read more
read more...