IBMone of the most important technology companies in the world, introduced a new solution for large-scale transaction processing and fraud detection. This is IBM z16.
This bet is based on the artificial intelligence used in real time, which also includes the industry’s first quantum security system, taking advantage of advances in computing.
“IBM is the gold standard for highly secure transaction processing. Now, with IBM z16 innovations, our clients can increase decision speed with inference right where their mission-critical data resides,” he said. Rick Lewissenior vice president of IBM Systems and added: “This opens up tremendous opportunities to change the game in their respective industries, so they can position themselves to deliver better customer experiences and more powerful business results.”
This is how IBM z16 works
With this system, IBM says that it guarantees to analyze transactions in real time on a large scale, for mission-critical loads such as medical care, credit cards or financial translation of transactions. Its implication in security would be immense, as it would protect against future threats that seek to circumvent current encryption technologies.
“Any industry could benefit from this system with artificial intelligence included. But, obviously there are some more susceptible companies that are given like regulations, cyber attacks, fraud, and all those that need real-time analysis. They are mainly banking, finance, health, insurance and manufacturing sectors, ”he told Infobae Jorge VergaraIBM Technology Director in Colombia.
According to the company, thanks to this processor, the IBM z16 it can handle up to 300 billion inference operations per day with millisecond latency.
For customers, this means reduce the time and energy required to deal with fraudulent credit card transactions. For merchants and card issuers, this will allow for a reduction in lost revenue as consumers avoid the frustration associated with bogus discounts where they may exchange cards for other future transactions.
Artificial intelligence inference on the IBM z16
As mentioned above, one of the most important capabilities of this z16 is that it integrates the IBM Telum processor. An 8-core chip designed to add accelerated AI and deep learning inference to enterprise workloads. This is the the company’s first processor to offer a chip with built-in acceleration for AI inference during transactions.
This processor, according to IBM, allows the power of AI processors to be harnessed for specific workloads, such as fraud detection, loan processing or knowledge of business history. It has 22.5 billion transistors in an area of 530 square mm and is designed in multiple layers. It also has 256 MB of L3 cache.
IBM z16, powered by the Telum processor, can identify fraud at the time of the transaction, saving consumers from having to worry about confirmation emails or text messages. Not to mention map errors and similar issues, which are also a huge inconvenience for users.
Examples where IBM z16 will benefit customers
The IBM z16 combines AI inference via IBM Telum, with the secure and reliable high-volume transaction processing the company is known for. For the first time, banks can analyze transaction fraud on a large scale: IBM z16 can handle 300 billion inference requests per day with just milliseconds of latency.
Jorge Vergara explains several scenarios where the new IBM artificial intelligence can solve different problems that arise:
The protection that quantum security brings
IBM Z16 is based on technologies such as the secret cipher wave ubiquitous coding, protecting customer data against threats that can break the cryptographic security system developed by death by volume.
In this way, this unit is the first quantum security system for customers, supports passwords based on the cryptography lattice-based for protect data and system threat now and in the future.
It has a safe boot to avoid injections of malware and enables its customers to strengthen their cyber resiliency and retain control of their system. The Crypto Express hardware security module will offer classical and quantum cryptographic technology to address your cases.
In short, both this boot and quantum cryptography can better protect the client against quantum computing threats such as data theft, subsequent attacks upon decryption of such data or loss of intellectual property.
The 6 movies and feature films that gave a total change to cinema using technology
What happened to MySpace and Hi5, the social networks that could dominate the world and failed
Spotify: 6 key functions to take advantage of the platform