TelcoNews UK - Telecommunications news for ICT decision-makers

Mila stories - Page 118

Mila is a research institute and innovation hub focused on advancing artificial intelligence from the lab into real-world impact. Stories under this tag explore how Mila collaborates with industry, investors and policymakers to turn strong AI research foundations into thriving startup ecosystems and practical applications.

By reading Mila-tagged articles, you’ll gain insight into how AI research organizations are shaping investment priorities, influencing venture capital flows and advocating for the infrastructure needed to scale cutting-edge ideas. These stories highlight the strategies, partnerships and policy recommendations that can help transform scientific advances in AI into sustainable companies and long-term economic value.

Thinkstockphotos 487613292 1

Anatomy of an outage: Understanding the lifecycle of downtime

Thu, 19th Apr 2018
#
dr
#
cloud services
#
business continuity
Businesses face high costs and risks with outages, impacting operations and reputation; understanding all stages is key.
Cybersecurity4

Work in cybersecurity? 59% of organisations have unfilled security positions

Wed, 18th Apr 2018
#
cybersecurity
#
isaca
#
skillsoft
If you're not qualified in cybersecurity then research suggests that you should be as it's certainly a 'buyers' market' with a yawning skills gap.
Thinkstockphotos 935317640

Data stored in DNA a reality: Nlyte co-founder shares insights

Wed, 18th Apr 2018
#
storage
#
hyperscale
#
dc
Nlyte co-founder Robert Neave says the influx of data from mobile devices means data centres need to look at new and innovative ways to store data.
Brad smith web ry7ge6w

Microsoft unleashes broad range of security features & partnerships at RSA Conference

Tue, 17th Apr 2018
#
cloud security
#
iot
#
breach prevention
Secure microcontrollers, 365 commercial cloud, advanced threat protection tools; and stronger partnerships are all top-of-mind for Microsoft.
Thinkstockphotos 613540820

Acronis & Yellow Ribbon Fund provide IT training to Singapore prison inmates

Tue, 10th Apr 2018
#
education, learning & training
#
acronis
#
skills shortage
The YRF-Acronis IT Skills Programme, inmates will receive certified IT training and computer skills that will increase their chances of future.
Thinkstockphotos 466320125

Necurs botnet erupts from dormancy to churn out 100,000 spam emails over Easter

Thu, 5th Apr 2018
#
malware
#
ransomware
#
cybersecurity
One of the world's largest spam botnets is back in action and this time it is spreading a Trojan downloader that can deliver nasty malware surprises.
Data security

INFINIDAT announces public cloud and data protection product lines

Tue, 3rd Apr 2018
#
hybrid cloud
#
hyperscale
#
public cloud
INFINIDAT launches Neutrix Cloud for high-performance public storage and InfiniGuard for enhanced data protection, boasting a 10x restore performance.
Thinkstockphotos 488522558

Northern Irish Parliament victim of brute force cyberattack

Tue, 3rd Apr 2018
#
cybersecurity
#
parliament
#
cybercrime
A number of computers were hacked and have now been disabled - and the Scottish and English parliaments have had the same attack in the last year.
Thinkstockphotos 683716072

What happens when encryption and security certificates go awry?

Tue, 27th Mar 2018
#
encryption
#
key management
#
certificate expiry
Researchers at Carnegie Mellon University have warned that compromised certificates in a PKI environment can lead to data breaches.
Thinkstockphotos 668344470

Google rolls out phishing prevention amongst new G Suite security features

Mon, 26th Mar 2018
#
mfa
#
phishing
#
email security
Updates include phishing prevention, mobile device management, security keys for two-factor authentication, Information Rights Management, and more.
Thinkstockphotos 522489079

Businesses face 'cyber black holes' without complete visibility

Fri, 23rd Mar 2018
#
iot security
#
forescout technologies
#
network visibility
High-profile breaches tend to have a similar storyline: old, unpatched vulnerabilities, advanced persistent threats, and a lack of visibility.
Thinkstockphotos 615392836

Dell EMC pulls networking out of the past with new SD-WAN platform

Thu, 22nd Mar 2018
#
network infrastructure
#
hybrid cloud
#
sd-wan
Dell EMC aims to modernise network operations with its new SD-WAN Virtual Edge platform, featuring Intel's latest Xeon D-2100 processor.
Screen shot 2018 03 14 at 11

New study details how easy it is for hackers to steal your data

Thu, 15th Mar 2018
#
malware
#
cybersecurity
#
hackers
It's no secret that web browsers store a substantial amount of sensitive information about their users - hackers are taking advantage of this.
Security breach

Six simple tips to staying safe online

Mon, 12th Mar 2018
#
cybersecurity
#
smb
#
cybersafety
Companies often think they're too small or insignificant to be a target for cybercriminals but every business is a potential target.
Screen shot 2018 03 09 at 11

New rapid voice cloning tech could spell end for voice authentication

Sat, 10th Mar 2018
#
biometrics
#
cybersecurity
#
voice control
Baidu unveiled a new system that can clone your voice using just 3.7 seconds of audio, a scary thought in the era of voice biometric authentication.
Thinkstockphotos 908382416

NDL seeks partners to sell RPA solutions in New Zealand

Fri, 9th Mar 2018
#
rpa
#
healthtech
#
software
Major UK public sector robotics process automation provider is seeking partners to sell their solutions in New Zealand.
Thinkstockphotos 860035762

Engineer says Emirates is virtually handing customer data to hackers

Fri, 9th Mar 2018
#
storage
#
breach prevention
#
wireless networks
After the allegations about Emirates' customer data policies emerged, High-Tech Bridge ran a test on the site's security - with interesting results.
Soulmachines

Daimler hires Soul Machines' digital human for customer service

Wed, 28th Feb 2018
#
crm
#
uc
#
martech
Sarah combines artificial and emotional intelligence for a new experience which redefines the link between man and machine.
Screen shot 2018 02 26 at 12

Cybercrime becomes most common form of fraud in UK

Tue, 27th Feb 2018
#
edutech
#
cybersecurity
#
pwc
PwC's study has found for the first time ever cybercrime has become the most common form of fraud with nearly a quarter resulting in a loss of £700k.
Thinkstockphotos 903182690

Hackers exploit Tesla's AWS servers to mine cryptocurrency

Thu, 22nd Feb 2018
#
devops
#
datacentre infrastructure
#
hyperscale
Tesla is reassuring customers that a recent cryptojacking has not compromised vehicle safety of customer privacy.