IBM Sets Tera-scale Machine Learning Benchmark Record with POWER9 and NVIDIA GPUs; Available Soon in PowerAI

 IBM THINK in Las Vegas, we are reporting a breakthrough in AI performance using new software and algorithms on optimized hardware, including POWER9 with NVIDIA® V100™ GPUs. In a newly published benchmark, using an online advertising dataset released by Criteo Labs with over 4 billion training examples, we train a logistic regression classifier in 91.5 seconds. This training time… Read More IBM Sets Tera-scale Machine Learning Benchmark Record with POWER9 and NVIDIA GPUs; Available Soon in PowerAI

Be Proactive when it comes to database protection

Breaking-down-the-security-immune-system-proactive-database-protection-through-siem-integration. Protecting data requires strong integration of security controls. For example, a database firewall that analyzes data activity on a monitored system does not typically provide insight into what is going on in the rest of the infrastructure. The firewall simply governs who can access the database and from where data can be extracted based… Read More Be Proactive when it comes to database protection

Accelerate Your Digital Transformation

Converged Infrastructure; What it can do for your business Take absolute control and optimize your entire data center management and gain the benefit of converged infrastructure with the benefit to run any workload at any scale. Converge infrastructure (CI) aims to minimize compatibility issues between storage systems, servers and network independently as your business needs… Read More Accelerate Your Digital Transformation

Understanding ADC Performance Metrics

Introduction Application delivery services are critical for successful applications. Whether such services add scalability, reliability, or security, most applications rely on one or more. Application Delivery Controllers (ADCs), therefore, occupy a critical place in most application, cloud, and data center designs. For many environments, including private cloud installations, dedicated ADC hardware is still the preferred… Read More Understanding ADC Performance Metrics

Defense In-Depth with Cognitive Security

On Tuesday, July 25th 2017 between 9am and 3pm, IBM security experts and ActivEdge Technologies held an exposition on: Defense In-Depth with Cognitive Security. Below are Interesting Highlights on this Informative Event: The event witnessed over 55 attendees from more than 14  institutions in Nigeria. Central Bank of Nigeria, Keystone Bank, Electronic Payplus Ltd, Stanbic IBTC,… Read More Defense In-Depth with Cognitive Security

How Secured are Nigerian Banks and Firms against Ransomware Attacks

Several Ukrainian banks have been affected by what appears to be a coordinated ransomware cyber attacks targeting firms around the world. According to a report by Reuters, the virus first emerged on Tuesday 27th June, 2017 in Ukraine where it silently infected computers after users downloaded a popular tax accounting package or visited a local… Read More How Secured are Nigerian Banks and Firms against Ransomware Attacks

Use cognitive Security to achieve Agility in Cyber Defense

A few years ago defense in-depth approach became quite prominent in cyber defense methodology, where security controls was applied in a layered manner to achieve some forms of resilience. This remains in practice today and not likely to change anytime soon. In more recent times Cyber Resilient started gaining recognition among security professionals, this approach… Read More Use cognitive Security to achieve Agility in Cyber Defense

Is Your Investment on Branding Protected?

Organizations are increasingly investing millions of naira on building their brands and creating awareness. However, with recent happenings globally, the security of organizational data, network and identity has become a necessity. To combat such threats, Agari works with hosted or on-premise email infrastructures including Gmail, Microsoft Office 365 and industry leading secure email gateways to… Read More Is Your Investment on Branding Protected?