IBM z16. (photo: IBM NewsRoom)
IBMone of the most important technology companies in the world, introduced a new solution for large-scale transaction processing and fraud detection. This is IBM z16.
This bet is based on artificial intelligence Used in real time, including industry’s first quantum security system, take advantage of advances in computer technology.
“IBM is the gold standard for highly secure transaction processing. “Now with IBM z16 innovations, our customers can increase decision speed by inferring from where their mission-critical data resides.” Rick LewisSenior vice president, IBM Systems, added: “This presents tremendous opportunities to change the game in their industry so they can position themselves to deliver better customer experiences and stronger business results.”
With this system, IBM says, it’s guaranteed to analyze transactions at scale in real time for mission-critical loads such as: medical care, credit cards or financial translation of transactions. The impact on security will be enormous, as it will protect against future threats that try to circumvent existing encryption technologies.
“Every industry, including artificial intelligence, can benefit from this system. But obviously there are some more sensitive companies for granted like regulations, cyber attacks, fraud and those that need real-time analysis. Mainly banking, finance, health, insurance and manufacturing sectors. Jorge VergaraThe Director of Technology at IBM in Colombia is exclusive to Infoabe about this revolution that uses artificial intelligence in real time.
According to the company, thanks to this processor IBM z16 It can perform up to 300 billion inferences per day with a millisecond delay.
What this means for customers reduce the time and energy required to deal with fraudulent credit card transactions. For merchants and card issuers, this will allow for a reduction in lost revenue as they avoid the frustration associated with fake discounts where consumers can exchange cards for other future transactions.
IBM z16. (photo: Expansion)
As mentioned above, one of the key features of this z16 is, IBM Telum processor. An 8-core chip designed to add accelerated AI and deep learning inference to enterprise workloads. this It’s the company’s first processor to offer a built-in accelerated chip for AI inference during operations.
According to IBM, this processor allows the power of AI processors to be used for certain workloads such as: fraud detection, credit processing or business history information. It has 22.5 billion transistors in an area of 530 mm square and is designed in multiple layers. It also has 256MB of L3 cache.
IBM z16 powered by Telum processor can detect fraud in the process, It saves consumers from worrying about confirmation emails or text messages. Not to mention map errors and similar issues that are a huge inconvenience to users.
IBM Telum Processor. (photo: Computer Bulletin)
IBM z16 combines AI inference through IBM Telum with the secure and reliable high-volume transaction processing the company is known for. For the first time, banks are able to analyze transaction fraud on a large scale: IBM z16 can handle 300 billion inference requests per day with only millisecond latency.
Jorge Vergara explains several scenarios where the new IBM AI can solve different problems that arise:
Examples of IBM z16 usage in different industries
IBM Z16 is based on technologies such as: secret password wave coding everywhere, to protect customer data against threats that could disrupt the cryptographic security system developed by volume measurement.
In this way, this unit first quantum security system for customers, Supports passwords based on cryptography lattice-based Protect data and system threat now and in the future.
Cyber security. (photo: Latin SME)
It has a secure boot to prevent injections. malware and enables its customers to strengthen their cyber resilience and maintain control of their systems. Crypto Express hardware security module will offer classical and quantum cryptographic technology to handle your cases.
In short, both this bootstrapping and quantum cryptography can better protect the client against quantum computing threats such as: data theft, subsequent attacks upon decryption of such data or loss of intellectual property.