article thumbnail

Optimizing energy production with the latest smart grid technologies

IBM Big Data Hub

New technologies are shaping the way we produce, distribute and consume energy. alone has installed nearly 10,000 electricity generation units, connected by more than 300,000 miles of transmission lines and capable of generating over a million megawatts of energy. Historically, the power grid has been a one-way street.

article thumbnail

How green is your application delivery software?

OpenText Information Management

Most IT sustainability goals include reducing Scope 2 and 3 greenhouse (GHG) emissions to reduce their digital carbon footprint, the GHG emissions produced by digital technology resources, devices, tools, and platforms. Decrease your individual energy output with automated tests executed on the cloud.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FERC, NERC joint report on cyber incident response at electric utilities

Security Affairs

The US FERC and NERC published a study on cyber incident response at electric utilities that also includes recovery best practices. Federal Energy Regulatory Commission (FERC) and the North American Electricity Reliability Corporation (NERC) released a study on cyber incident response and recovery best practices for electric utilities.

article thumbnail

How Cobalt Strike Became a Favorite Tool of Hackers

eSecurity Planet

Cobalt Strike was created a decade ago by Raphael Mudge as a tool for security professionals. Indeed, the tool can assess vulnerabilities and run penetration tests , while most tools on the market cannot do both. The tool is so powerful that black hat hackers and international threat groups have added it to their arsenal.

article thumbnail

China-linked APT Volt Typhoon remained undetected for years in US infrastructure

Security Affairs

In the most recent campaign, the group targeted organizations in the communications, manufacturing, utility, transportation, construction, maritime, government, information technology, and education sectors. The group also relies on customized versions of open-source tools for C2 communications and to stay under the radar.

article thumbnail

FBI chief says China is preparing to attack US critical infrastructure

Security Affairs

In the most recent campaign, the group targeted organizations in the communications, manufacturing, utility, transportation, construction, maritime, government, information technology, and education sectors. The group also relies on customized versions of open-source tools for C2 communications and to stay under the radar.

article thumbnail

Unleashing the potential: 7 ways to optimize Infrastructure for AI workloads 

IBM Big Data Hub

Frameworks like TensorFlow, PyTorch and Apache Spark MLlib support distributed computing paradigms, enabling efficient utilization of resources and faster time-to-insight. Utilize performance monitoring tools to identify bottlenecks, resource contention and underutilized resources.