Cloud repatriation is becoming increasingly common as organizations repatriate workloads or applications from public clouds to in-house or other locations. Repatriation is usually due to technical misfires or perceived cost inefficiencies associated with fast-growing public cloud consumption. However, repatriation should not be considered a failure, but rather a tactical lever for workload placement that can […]
Blog Grid
An open letter signed by tech luminaries, including Elon Musk and Steve Wozniak, calls for a pause on large-scale artificial intelligence (AI) development. The letter argues that powerful AI systems should only be developed once the risks are understood and manageable. The authors suggest an independent review of AI over six months and a pause […]
Security researchers have successfully hacked Tesla Model 3, Windows 11, macOS, Ubuntu Desktop, Oracle VirtualBox, and Microsoft’s SharePoint team collaboration platform at the Pwn2Own Vancouver 2023 competition. The competition is divided into several categories, including enterprise applications, enterprise communications, local escalation of privilege, server, virtualization, and automotive. The hacks demonstrated during the competition have earned […]
In the past, professional programmers used tools like COBOL and early relational databases to create historical reports, while users had to wait for IT to analyze their data. Spreadsheets changed this by allowing users to automate calculations and create formatted reports, but they also caused problems with data accuracy and consistency. Today, modern tech platforms […]
Have you ever been on a ship’s bridge and noticed that the ship is changing direction without explanation? This could be the result of a cyber attack on the ship’s systems. The maritime industry is increasingly concerned about cybersecurity threats, and a new course called “Maritime digital security” has been developed at The Norwegian University […]
According to a study commissioned by the Computer and Communications Industry Association (CCIA), a proposed European Union cloud security label that could exclude non-EU cloud services providers such as Amazon, Google, and Microsoft is discriminatory and could lead to retaliatory measures. The study was conducted by the European Centre for International Political Economy (ECIPE) and […]