Libratus, artificial intelligence developed by Carnegie Mellon University, has beaten four of the best heads-up no-limit Texas hold'em poker players in the world in a 20-day competition. Its mastery of imperfect information suggests a multitude of real-world applications. Read More ▶ |
|
| White Paper: Leidos A comprehensive look at the top four challenges facing your security operations is the first step to mitigating them. Why not approach them as opportunities to strengthen your cybersecurity posture and better protect your assets! This white paper discusses the universal challenges facing every SOC: Resource allocation, Threat alert management, Vendor dependencies, Intelligence standardization Read More ▶ | Here are the IT skills that will be in high demand for 2017. Read More ▶ |
| Explore the birthplace of the tech revolution as Marcus Holloway, a brilliant young hacker who has fallen victim to ctOS 2.0's predictive algorithms and accused of a crime he did not commit. And do it for 50% off list price with this deal. Read More ▶ |
| The consequences of getting it wrong can be substantial Read More ▶ |
| According to new research from Robert Half Technology, 2017 will remain a ‘stable’ hiring environment, with a focus on security and upgrades to existing IT systems and infrastructure. Read More ▶ |
| | Aiming to help organizations better manage, govern and strategically use and control their data assets, SAP has updated its EIM portfolio. Read More ▶ |
| Google continues to strengthen G Suite with the addition of enterprise-specific tools designed to offer data loss prevention, business insights and better security key controls. Read More ▶ |
| After a long wait, Slack has announced the version of its popular work chat application that is designed for enterprises. On Tuesday, the company unveiled its new Enterprise Grid product in San Francisco, which is aimed at helping companies administer and connect multiple chat instances. Read More ▶ |
| Developers looking to build a mobile browser for iOS can now start with Google’s Chromium project. Read More ▶ |
| White Paper: Leidos A comprehensive look into how organizations can develop and implement a successful insider threat detection program. This white paper outlines the five steps to success: Gain Leadership Support, Leverage the Latest Technology, Develop a Communications Plan, Execute a Training and Awareness Campaign, Establish a Governance Structure Read More ▶ | CIO Insider | Editor's Picks |
|
|
|