Menu

Blog

Archive for the ‘security’ category: Page 13

May 15, 2024

Study uncovers technologies that could unveil energy-efficient information processing and sophisticated data security

Posted by in category: security

Advanced information processing technologies offer greener telecommunications and strong data security for millions, a study led by University of Maryland (UMD) researchers revealed.

May 12, 2024

Remarks by Dr. Liz Sherwood-Randall Assistant to the President for Homeland Security on Countering Bioterrorism in an Era of Technology Convergence

Posted by in categories: security, terrorism

Ash carter exchange remarks as prepared.

I’m grateful to be here today with a group of kindred spirits focused on tackling some of the hardest problems we face at the intersection of technology and national security.

Ash Carter devoted his life to working in this arena, and many of you are here because of the impact he had on you and your careers.

May 11, 2024

Embedded Analytics Made Easy: Go From Concept to Launch in No Time

Posted by in categories: innovation, security

Looking to embed analytics in your products but daunted by the complexity and resource demands?Join us to discover how you can rapidly (in days/weeks) deliver value with modern analytics, boosting innovation and increasing revenue through data-driven solutions. Data Experts at Aimpoint Digital and Sigma will explain what modern embedded analytics means and how it:- Empowers developers to swiftly create visualizations and data apps on a composable platform.- Wins customers with extensive data exploration, database writeback, and robust security for multi-tenancy. Register today to leverage data for growth and operational excellence. Act now before losing your competitive edge.

May 11, 2024

Novel hybrid scheme speeds the way to simulating nuclear reactions on quantum computers

Posted by in categories: computing, nuclear energy, particle physics, quantum physics, security

The nuclear reactions that power the stars and forge the elements emerge from the interactions of the quantum mechanical particles, protons and neutrons. Explaining these processes is one of the most challenging unsolved problems in computational physics. As the mass of the colliding nuclei grows, the resources required to model them outpace even the most powerful conventional computers. Quantum computers could perform the necessary computations. However, they currently fall short of the required number of reliable and long-lived quantum bits. This research combined conventional computers and quantum computers to significantly accelerate the prospects of solving this problem.

The Impact

The researchers successfully used the hybrid computing scheme to simulate the scattering of two neutrons. This opens a path to computing nuclear reaction rates that are difficult or impossible to measure in a laboratory. These include reaction rates that play a role in astrophysics and national security. The hybrid scheme will also aid in simulating the properties of other quantum mechanical systems. For example, it could help researchers study the scattering of electrons with quantized atomic vibrations known as phonons, a process that underlies superconductivity.

May 11, 2024

State of Security 2024: The Race to Harness AI

Posted by in categories: robotics/AI, security

In 2024, security teams face new opportunities and obstacles, such as escalating geopolitical tensions, stricter compliance mandates, and the rise of generative AI — which will transform the industry in new and unexpected ways.

In the State of Security 2024: The Race to Harness AI, we identify organizations that are pulling ahead of their peers and share key characteristics and findings.

May 7, 2024

The problem of AI identity

Posted by in categories: robotics/AI, security

The problem of personal identity is a longstanding philosophical topic albeit without final consensus. In this article the somewhat similar problem of AI identity is discussed, which has not gained much traction yet, although this investigation is increasingly relevant for different fields, such as ownership issues, personhood of AI, AI welfare, brain–machine interfaces, the distinction between singletons and multi-agent systems as well as to potentially support finding a solution to the problem of personal identity. The AI identity problem analyses the criteria for two AIs to be considered the same at different points in time. Two approaches to tackle the problem are proposed: One is based on the personal identity problem and the concept of computational irreducibility, while the other one applies multi-factor authentication to the AI identity problem. Also, a range of scenarios is examined regarding AI identity, such as replication, fission, fusion, switch off, resurrection, change of hardware, transition from non-sentient to sentient, journey to the past, offspring and identity change.

Like Recommend

May 5, 2024

Dr. Jaime Yassif, Ph.D. — VP, Global Biological Policy and Programs, Nuclear Threat Initiative (NTI)

Posted by in categories: biological, biotech/medical, health, policy, security, surveillance

Working To Reduce Global Catastrophic Biological Risks — Dr. Jaime Yassif, Ph.D. — VP, Global Biological Policy and Programs, Nuclear Threat Initiative.


Dr. Jaime Yassif, Ph.D. serves as Vice President of Global Biological Policy and Programs, at the Nuclear Threat Initiative (https://www.nti.org/about/people/jaim…) where she oversees work to reduce global catastrophic biological risks, strengthen biosecurity and pandemic preparedness, and drives progress in advancing global health security.

Continue reading “Dr. Jaime Yassif, Ph.D. — VP, Global Biological Policy and Programs, Nuclear Threat Initiative (NTI)” »

Apr 30, 2024

Large Language Models Set To Transform The Observability Market Forever

Posted by in categories: business, economics, robotics/AI, security

The platform’s ability to interface with a variety of data sources and observability tools makes it a versatile solution for businesses operating in diverse IT environments, whether on-premises, in the cloud, or in hybrid settings. By serving as an intelligence layer that rationalizes data from multiple observability and infrastructure sources, Flip AI simplifies the workload for IT operations teams and supports more efficient operational practices.

This innovative use of LLMs for operational efficiency in IT environments presents a significant advancement in observability, offering enterprises a powerful tool to enhance system reliability and performance while reducing the economic impact of downtime.

As LLMs continue to evolve, their integration into observability tools is transforming the landscape of infrastructure and workload observability. The immediate benefits of improved performance monitoring and security are just the beginning.

Apr 28, 2024

Satya Nadella to Sundar Pichai: 22 top executives join AI advisory board in the US

Posted by in categories: robotics/AI, security

Microsoft, Alphabet, OpenAI, Nvidia CEOs join US advisory board to advise on protecting critical infrastructure from AI threats. Board aims to prevent AI-related disruptions to national security and public safety.

Apr 26, 2024

Almost every Chinese keyboard app has a security flaw that reveals what users type

Posted by in categories: encryption, security

An encryption loophole in these apps leaves nearly a billion people vulnerable to eavesdropping.

Page 13 of 148First1011121314151617Last