Category: TechTime

Hitachi Develops Open Source Software Based Big Data Analytics Technology to Increase Speed by Up to 100 Times

Hitachi Develops Open Source Software Based Big Data Analytics Technology to Increase Speed by Up to 100 Times

For a high-speed analytics system with lower IT investment Hitachi has announced the development of the technology increasing the speed of big data analytics on an open source software Hadoop-based distributed data processing platform(1) (Hadoop platform) by a maximum of 100 times that of a conventional system. This technology converts data processing procedure generated for […]

Global Gaming Expo Asia 2018 Gets Set for Industry Heavyweights

Global Gaming Expo Asia 2018 Gets Set for Industry Heavyweights

Global Gaming Expo (G2E) Asia, the region’s one-stop destination for forward-thinking gaming and entertainment decision makers and suppliers, will be returning to Macau, the heart of Asian gaming, from May 15 -17, 2018 at The Venetian Macao. Presented by the American Gaming Association (AGA) and organized by Reed Exhibitions, the three-day exhibition will showcase the […]

NEC’s advanced recognition systems lead a new frontier of security

NEC’s advanced recognition systems lead a new frontier of security

NEC Australia has announced a new whitepaper that explains how advanced recognition systems can deliver a safer and more secure future for Australia and the Asia Pacific. Advanced recognition systems are set to play an increasingly important role as governments and enterprises respond to three major technological forces that are redefining the rules of business, […]

Transition Plans for Key Establishment Schemes using Public Key Cryptography

Transition Plans for Key Establishment Schemes using Public Key Cryptography

Summary: NIST guidelines on approved public key key-establishments schemes are specified in the NIST SP 800-56 series of publications. While legacy key establishment schemes have been programmatically allowed for use by agencies in FIPS 140-validated modules, NIST SP 800-131A Rev. 1, Transitioning the Use of Cryptographic Algorithms and Key Lengths, specifies that only schemes specified […]

Check Point joins forces with LG to secure their smart home devices

Check Point joins forces with LG to secure their smart home devices

Check Point helps block a major security vulnerability in LG SmartThinQ home IoT appliances Check Point Software Technologies has announced that its security researchers have discovered HomeHack – a vulnerability that exposed millions of users of LG SmartThinQ smart home devices to the risk of unauthorised remote control of their SmartThinkQ home appliances. The vulnerabilities […]

Schneider Electric introduces security management solution that protects people and maximizes productivity

Schneider Electric introduces security management solution that protects people and maximizes productivity

EcoStruxure Security Expert helps users meet the unique safety challenges of their building environment Integrated solution enables clearer decisions, faster responses and maximum facility efficiency Schneider Electric has introduced EcoStruxure Security Expert, a new integrated security management solution that provides high performance access control and intrusion detection functionality to ensure the most secure building environment possible. […]

Fujitsu Launches Consulting Service to Meet Security Standard for Nonfederal US Organizations and IT Systems

Fujitsu Launches Consulting Service to Meet Security Standard for Nonfederal US Organizations and IT Systems

Japan’s first end-to-end service for security standard NIST SP800-171, from visualization of customer system compliance status to system construction, operation and restoration Fujitsu Limited has announced the Japan launch of an assessment consulting service to help customers meet the requirements of NIST Special Publication 800-171, a publication from the National Institute of Standards and Technology […]

SWIFT tests shows blockchain has potential for global liquidity optimisation

SWIFT tests shows blockchain has potential for global liquidity optimisation

New paper highlights initial findings from proof of concept to improve real-time Nostro reconciliation, part of SWIFT’s gpi initiative SWIFT has published an interim report on the proof of concept (PoC) for real-time Nostro reconciliation using a SWIFT-developed distributed ledger technology (DLT) sandbox with 33 global transaction banks, as part of its SWIFT gpi service. […]

Fujitsu Receives Order for Japan's Fastest Supercomputer System for AI Applications

Fujitsu Receives Order for Japan’s Fastest Supercomputer System for AI Applications

News facts: Fujitsu’s latest x86 servers, the Fujitsu Server PRIMERGY will be included in the configuration for AI Bridging Cloud Infrastructure (ABCI) AI Bridging Cloud Infrastructure (ABCI) is set to become the fastest supercomputer system in Japan. Fujitsu gives the National Institute of Advanced Industrial Science and Technology AI processing performance of 550 petaflops Fujitsu […]

Security Assurance Requirements for Linux Application Container Deployments

Security Assurance Requirements for Linux Application Container Deployments

Author(s): Ramaswamy Chandramouli (NIST) Abstract Application Containers are slowly finding adoption in enterprise IT infrastructures. Security guidelines and countermeasures have been proposed to address security concerns associated with the deployment of application container platforms. To assess the effectiveness of the security solutions implemented based on these recommendations, it is necessary to analyze those solutions and outline […]