AI & Data Exchange 2026: Red Hat’s Michael Hardee on building a roadmap to scale adoption
As agencies adopt AI more rapidly, they are also under pressure to ensure these systems are transparent, explainable and secure, Red Hat chief architect says.
WIRED AI·
From AI-generated images to restricted satellite data, the systems used to verify what’s real online are struggling to keep up.
Read full articleAs agencies adopt AI more rapidly, they are also under pressure to ensure these systems are transparent, explainable and secure, Red Hat chief architect says.
'Is it something that society thinks is okay for these kinds of companies to go out and scrape personal information off the internet?'
If this past school year was about adults figuring out how to adapt systems and approaches to AI, the next school year should be about students actually experiencing something better because of the work the adults did.
One of the more dangerous assumptions in the current AI market is that broad adoption means meaningful adoption. It does not. Much of what enterprises call AI transformation is, in fact, AI experimentation focused at the edge of the business, in systems and workflows that support employees but are not central to how the enterprise actually operates. These include calendaring, scheduling, meeting summaries, employee communications, customer messaging, document generation, internal assistants, and similar productivity-oriented use cases. Those applications may be useful, but they are not core applications that directly run the business and determine whether the company performs well or poorly. Inventory management, sales order entry, logistics execution, supply chain planning, procurement, warehouse management, manufacturing operations, and financial transaction processing belong in this category. If these systems fail, the business feels it immediately through delayed orders, lost reven
Online casino sites are in an environment where milliseconds and trust are really very important. Players demand to have smooth gameplay with zero lag, and the operators need to implement really strict measures to ensure financial transactions and game integrity. Under the carpet, a network of highly designed systems strives to maintain balance around the […]
Noscroll wants to cure doomscrolling with an AI bot that reads the internet for you.
Tech can scale cyber-attacks and defences alike, raising questions about private power, public risk and the future of a shared internet Anthropic announced its latest AI model, Claude Mythos, this month but said it would not be released publicly, because it turns computers into crime scenes. The company claimed that it could find previously unknown “zero-day” flaws, exploit them and, in principle, link these weaknesses in order to take over major operating systems and web browsers. Mythos did so autonomously, writing code and obtaining privileges. The implications are significant. It’s like a burglar being able to target any building, get inside, unlock every door and empty every safe. The Silicon Valley company has so far named 40 organisations as partners under Project Glasswing to help mount a defence – asking them to “patch” vulnerabilities before hackers get a chance to exploit them. All are American, sitting at the heart of the US-led digital system. Anthropic shared Mythos with
In the race to patch up cybersecurity holes found by the newest A.I. models, we risk leaving too many people to fend for themselves.