Menu

Blog

Archive for the ‘security’ category: Page 26

Feb 10, 2023

Dr. Renee Wegrzyn, Ph.D. — ARPA-H — Transformative, Sustainable, Equitable Health Solutions For All

Posted by in categories: bioengineering, biotech/medical, genetics, health, security

Dr. Renee Wegrzyn, Ph.D. is the inaugural director of the Advanced Research Projects Agency for Health (ARPA-H — https://arpa-h.gov/), an agency that supports the development of high-impact research to drive biomedical and health breakthroughs to deliver transformative, sustainable, and equitable health solutions for everyone. ARPA-H’s mission focuses on leveraging research advances for real world impact.

Previously, Dr. Wegrzyn served as a vice president of business development at Ginkgo Bioworks and head of Innovation at Concentric by Ginkgo, where she focused on applying synthetic biology to outpace infectious diseases—including Covid-19—through biomanufacturing, vaccine innovation and biosurveillance of pathogens at scale.

Continue reading “Dr. Renee Wegrzyn, Ph.D. — ARPA-H — Transformative, Sustainable, Equitable Health Solutions For All” »

Feb 10, 2023

Harnessing the power of GPT-3 in scientific research

Posted by in category: security

Check out all the on-demand sessions from the Intelligent Security Summit here.

Since its launch in 2020, Generative Pre-trained Transformer 3 (GPT-3) has been the talk of the town. The powerful large language model (LLM) trained on 45 TB of text data has been used to develop new tools across the spectrum — from getting code suggestions and building websites to performing meaning-driven searches. The best part? You just have to enter commands in plain language.

GPT-3’s emergence has also heralded a new era in scientific research. Since the LLM can process vast amounts of information quickly and accurately, it has opened up a wide range of possibilities for researchers: generating hypotheses, extracting information from large datasets, detecting patterns, simplifying literature searches, aiding the learning process and much more.

Feb 7, 2023

Monica Medina, Assistant U.S. Secretary, Oceans & International Environmental & Scientific Affairs

Posted by in categories: law, policy, security, sustainability

Monica P. Medina (https://www.state.gov/biographies/monica-p-medina/) is Assistant Secretary for the Bureau of Oceans and International Environmental and Scientific Affairs at the U.S. Department of State. She was also recently appointed as United States Special Envoy for Biodiversity and Water Resources.

Previously, Secretary Medina was an adjunct professor at Georgetown University’s School of Foreign Service. She was also a Senior Associate on the Stephenson Ocean Security Project at the Center for Strategic and International Studies, and Co-Founder and Publisher of Our Daily Planet, an e-newsletter on conservation and the environment.

Continue reading “Monica Medina, Assistant U.S. Secretary, Oceans & International Environmental & Scientific Affairs” »

Feb 3, 2023

Google invests $300 million in Anthropic as race to compete with ChatGPT heats up

Posted by in categories: robotics/AI, security

Check out all the on-demand sessions from the Intelligent Security Summit here.

According to new reporting from the Financial Times, Google has invested $300 million in one of the most buzzy OpenAI rivals, Anthropic, whose recently-debuted generative AI model Claude is considered competitive with ChatGPT.

According to the reporting, Google will take a stake of around 10% and Anthropic will be required to use the money to buy computing resources from Google Cloud. The new funding will value the San Francisco-based company at around $5 billion.

Jan 30, 2023

QNAP Fixes Critical Vulnerability in NAS Devices with Latest Security Updates

Posted by in category: security

QNAP has released security updates to address a critical vulnerability (CVE-2022–27596 / CVSS 9.8) in the NAS devices.

Jan 28, 2023

ISC Releases Security Patches for New BIND DNS Software Vulnerabilities

Posted by in category: security

ISC has released patches for multiple vulnerabilities in the BIND DNS software suite that could lead to a DoS condition and system failures.

Jan 27, 2023

Where Is Tech Going in 2023?

Posted by in categories: business, robotics/AI, security

A group of McKinsey’s technology practice leaders have taken a look at what 2023 might hold, and offer a few new year’s tech resolutions to consider: 1) Look for combinatorial trends, in which the sum impact of new technologies create new opportunities. 2) Prep boards for tipping point technologies. 3) Relieve the bureaucratic burden on your engineers to increase their productivity. 4) Look for new opportunities in the cloud. 5) Take advantage of how the cloud is changing security. 6) Take advantage of decentralized AI capabilities — and what this technology might mean for your business model.

Page-utils class= article-utils—vertical hide-for-print data-js-target= page-utils data-id= tag: blogs.harvardbusiness.org, 2007/03/31:999.346784 data-title= Where Is Tech Going in 2023? data-url=/2023/01/where-is-tech-going-in-2023 data-topic= AI and machine learning data-authors= Aamer Baig; Jan Shelly Brown; William Forrest; Vinayak HV; Klemens Hjartar; Lareina Yee data-content-type= Digital Article data-content-image=/resources/images/article_assets/2023/01/Jan23_06_1405011898-383x215.jpg data-summary=

Six trends that will define the next year, according to McKinsey experts.

Jan 27, 2023

Chrome for Android now lets you lock your incognito session

Posted by in categories: privacy, robotics/AI, security

Chrome is rolling out an update for Android users that lets them lock their incognito sessions with a password code or biometric info when they exit the app. The feature has been available for iOS users for some time, but now it’s being made available to folks using Chrome on Android.

Users can activate this feature by going to Chrome Settings Privacy & Security and turning on the “Lock incognito tabs when you close Chrome” toggle. So next time when a user exits Chrome, their incognito session will automatically be locked. To unlock the incognito tabs, you can use the biometric unlock on the phone such as a fingerprint unlock or lock code.

Jan 27, 2023

Researchers find ways to improve the storage time of quantum information in a spin rich material

Posted by in categories: chemistry, computing, quantum physics, security

An international team of scientists have demonstrated a leap in preserving the quantum coherence of quantum dot spin qubits as part of the global push for practical quantum networks and quantum computers.

These technologies will be transformative to a broad range of industries and research efforts: from the security of information transfer, through the search for materials and chemicals with novel properties, to measurements of fundamental physical phenomena requiring precise time synchronization among the sensors.

Spin-photon interfaces are elementary building blocks for that allow converting stationary quantum information (such as the quantum state of an ion or a solid-state spin qubit) into light, namely photons, that can be distributed over large distances. A major challenge is to find an interface that is both good at storing quantum information and efficient at converting it into light.

Jan 26, 2023

Quantum Safe Cryptography — A Quantum Leap Needed Now

Posted by in categories: biotech/medical, computing, encryption, finance, information science, internet, mathematics, quantum physics, security

Whether we realize it or not, cryptography is the fundamental building block on which our digital lives are based. Without sufficient cryptography and the inherent trust that it engenders, every aspect of the digital human condition we know and rely on today would never have come to fruition much less continue to evolve at its current staggering pace. The internet, digital signatures, critical infrastructure, financial systems and even the remote work that helped the world limp along during the recent global pandemic all rely on one critical assumption – that the current encryption employed today is unbreakable by even the most powerful computers in existence. But what if that assumption was not only challenged but realistically compromised?

This is exactly what happened when Peter Shor proposed his algorithm in 1995, dubbed Shor’s Algorithm. The key to unlocking the encryption on which today’s digital security relies is in finding the prime factors of large integers. While factoring is relatively simple with small integers that have only a few digits, factoring integers that have thousands of digits or more is another matter altogether. Shor proposed a polynomial-time quantum algorithm to solve this factoring problem. I’ll leave it to the more qualified mathematicians to explain the theory behind this algorithm but suffice it to say that when coupled with a quantum computer, Shor’s Algorithm drastically reduces the time it would take to factor these larger integers by multiple orders of magnitude.

Prior to Shor’s Algorithm, for example, the most powerful computer today would take millions of years to find the prime factors of a 2048-bit composite integer. Without Shor’s algorithm, even quantum computers would take such an inordinate amount of time to accomplish the task as to render it unusable by bad actors. With Shor’s Algorithm, this same factoring can potentially be accomplished in a matter of hours.

Page 26 of 133First2324252627282930Last