Contrary to common sense, human beings are quite willing to form relationships with AI software, and as chatbots apply AI to understand us, they could learn to sway our attitudes and orchestrate...

16 January 2018

Unlike early IoT malware that leveraged default or weak passwords, new malware families are starting to exploit either known vulnerability or even zero-day vulnerabilities.

12 January 2018
Ed Ansett at DCD Zettastructure

Ed Ansett of i3 Solutions floats the feasibility of a data centre that operates at 35 deg C, is cooled by LNG waste, runs on solid oxide fuel and does not need any generator on standby.

30 September 2017
New technologies are the most disruptive trend for creatives

Adobe's latest Creative Pulse survey finds artificial intelligence is feared by designers and marketeers in South East Asia as the most disruptive trend but they are ready to meet it head on.

23 August 2017


Prof Gordon Bell on "exascale nirvana" and other supercomputing trends

Gordon Bell of supercomputing's Gordon Bell Prize talks to ConvergenceAsia about the "scaling up" and "scaling out" of HPC and its new applications in analytics and data science. Bell was in Singapore recently for Supercomputing Frontiers 2017, where he delivered a keynote on "Three Decades: Motivating and Measuring HPC Progress". 

  • Video by Chan Wai Peng 

Cybersecurity groundhog day

Lessons from the past could help us avoid cybersecurity groundhog day, says Diana Kelley of IBM.

10 August 2017
Lennie Tan of One Identity

Lennie Tan of One Identity discusses how organisations can address security issues across the entire...

21 June 2017
Cybercriminals target Apple

Apple devices are becoming attractive targets for cyber attackers due to their fast growing...

20 June 2017
38% of professionals in Singapore use unapproved personal devices for work purposes

A digital workplace study by VMware shows that many working professionals ignore standard safety...

26 May 2017
It may take just 24 hours for a hacker to successfully break into a system

A survey of hackers and white hats maps out how a typical cyber attack is carried out.

26 May 2017

Survey reveals 86% of organisations worldwide are concerned that a failure to adhere to the upcoming...

30 April 2017
3D printing is one of the technologies used at DCC.

The learning factory, which uses an IoT technology platform from PTC, will help attendees learn how...

29 April 2017
Halvar Flake at BlackHat Asia 2017

Cyber insurance has the potential to upend an enterprise buyer-IT vendor relationship which is...

16 April 2017
Peter Ho of NSCC

The National Supercomputing Centre is expected to train its compute power on growth areas such as big...

16 March 2017
Mark Bidinger of Schneider Electric

Decentralised hybrid computing ecosystems are back in vogue as performance and regulatory...

14 March 2017

Compared with their counterparts in the region, more IT professionals here feel that cybersecurity...

11 March 2017
FSI cybersecurity

Fortinet issues top five cybersecurity predictions for the financial services industry as attacks...

10 March 2017