Menu

Blog

Archive for the ‘security’ category: Page 35

Feb 24, 2023

Nvidia adds $79 billion in market value after CEO Jensen Huang says ChatGPT represents an inflection point for artificial intelligence

Posted by in categories: robotics/AI, security, supercomputing

But the computing power necessary for a company to adopt in-house AI capabilities is enormous, and that’s where Nvidia’s new service offering comes in. Dubbed “DGX Cloud,” Nvidia is offering an AI supercomputer accessible to its customers via a web browser. The company partnered with various cloud providers, including Microsoft, Google, and Oracle, to launch the service.

“Nvidia AI as a service offers enterprises easy access to the world’s most advanced AI platform, while remaining close to the storage, networking, security and cloud services offered by the world’s most advanced clouds,” Huang explained.

“Nvidia AI is essentially the operating system of AI systems today,” Huang also said.

Feb 23, 2023

Resemble AI Creates Synthetic Audio Watermark to Tag Deepfake Speech

Posted by in categories: biotech/medical, robotics/AI, security

Synthetic speech and voice cloning startup Resemble AI has introduced an “audio watermark” to tag AI-generated speech without compromising sound quality. The new PerTh Perceptual Threshold) Watermarker embeds the sonic signature of Resemble’s synthetic media engine into a recording to mark its AI origin regardless of future audio manipulation, yet subtle enough that no human can hear it.


Audio Watermarking

Visual watermarking hides one image within another, invisible without a computer scanner in the case of particularly high-security documents. The same principle applies to audio watermarks, except it’s a very soft sound that people won’t notice but encoded with information that a computer could decipher. The concept isn’t new, but Resemble has leveraged its audio AI to make PerTh more reliable without compromising the realism of its synthetic speech creation.

Continue reading “Resemble AI Creates Synthetic Audio Watermark to Tag Deepfake Speech” »

Feb 22, 2023

How automation eases the burden of cloud permissions management for security teams

Posted by in categories: robotics/AI, security

Check out all the on-demand sessions from the Intelligent Security Summit here.

Permissions management is the essence of data security. Yet few security teams can manage identities in the cloud at scale, with Gartner estimating that by 2023, 75% of cloud security failures will occur due to insufficient management of identities, access and privileges.

However, more and more providers are looking to address permissions management with automation. Entitle, which today announced it has raised $15 million as part of a seed funding round led by Glilot Capital Partners, offers a platform for automating access management and provisioning.

Feb 22, 2023

A German AI startup just might have a GPT-4 competitor this year

Posted by in categories: education, robotics/AI, security

Benchmarks from German AI startup Aleph Alpha show that the startup’s latest AI models can keep up with OpenAI’s GPT-3. A success that should not lull Europe into a false sense of security.

ChatGPT has catapulted artificial intelligence into the public discussion like no other product before it. Behind the chatbot is the U.S. company OpenAI, which made headlines with the large-scale language model GPT-3 and later with the text-to-picture model DALL-E 2. The impact of systems like ChatGPT or Midjourney on education and work, which can be felt today, was foreseeable even then.

The underlying language models are often referred to in research as foundation models: a large AI model that, due to its generalist training with large datasets, can later take on many tasks for which it was not explicitly trained.

Feb 19, 2023

The gradual march to AGI

Posted by in categories: biotech/medical, robotics/AI, security

Check out all the on-demand sessions from the Intelligent Security Summit here.

The coming of artificial general intelligence (AGI) — the ability of an artificial intelligence to understand or learn any intellectual task that a human can — is inevitable. Despite the predictions of many experts that AGI might never be achieved or will take hundreds of years to emerge, I believe it will be here within the next decade.

How can I be so certain? We already have the know-how to produce massive programs with the capacity for processing and analyzing reams of data faster and more accurately than a human ever could. And in truth, massive programs may not be necessary anyway. Given the structure of the neocortex (the part of the human brain we use to think) and the amount of DNA needed to define it, we may be able to create a complete AGI in a program as small as 7.5 megabytes.

Feb 19, 2023

2023 Could be The Breakthrough Year For Quantum Computing

Posted by in categories: business, finance, quantum physics, security, supercomputing

Check out all the on-demand sessions from the Intelligent Security Summit here.

2022 has been a dynamic year for quantum computing. With commercial breakthroughs such as the UK Ministry of Defence (MoD) investing in its first quantum computer, the launch of the world’s first quantum computer capable of advantage over the cloud and the Nobel Prize in Physics awarded for ground-breaking experiments with entangled photons, the industry is making progress.

At the same time, 2022 saw the tremendous accomplishment of the exaflop barrier broken with the Frontier supercomputer. At a cost of roughly $600 million and requiring more than 20 megawatts of power, we are approaching the limits of what classical computing approaches can do on their own. Often for practical business reasons, many companies are not able to fully exploit the increasing amount of data available to them. This hampers digital transformation across areas most reliant on high-performance computing (HPC): healthcare, defense, energy and finance.

Feb 18, 2023

Generative AI is here, along with critical legal implications

Posted by in categories: law, robotics/AI, security

Check out all the on-demand sessions from the Intelligent Security Summit here.

Artificial intelligence (AI) has already made its way into our personal and professional lives. Although the term is frequently used to describe a wide range of advanced computer processes, AI is best understood as a computer system or technological process that is capable of simulating human intelligence or learning to perform tasks and calculations and engage in decision-making.

Until recently, the traditional understanding of AI described machine learning (ML) technologies that recognized patterns and/or predicted behavior or preferences (also known as analytical AI).

Feb 18, 2023

Hacker Uncovers How to Turn Traffic Lights Green With Flipper Zero

Posted by in category: security

A DIY hacker equipped with a Flipper Zero and old security camera managed to build a Mobile Infrared Trasmitter to bypass red lights.

Feb 17, 2023

Opera Web Browser

Posted by in category: security

Faster, safer and smarter than default browsers. Fully-featured for privacy, security, and so much more. Get the faster, better Opera browser for free.

Feb 17, 2023

Chromo-encryption method uses color to encode information

Posted by in categories: encryption, nanotechnology, security

In a new approach to security that unites technology and art, EPFL researchers have combined silver nanostructures with polarized light to yield a range of brilliant colors, which can be used to encode messages.

Cryptography is something of a new field for Olivier Martin, who has been studying the optics of nanostructures for many years as head of the Nanophotonics and Metrology Lab EPFL’s School of Engineering. But after developing some new silver nanostructures in collaboration with the Center of MicroNanoTechnology, Martin and Ph.D. student Hsiang-Chu Wang noticed that these nanostructures reacted to in an unexpected way, which just happened to be perfect for encoding information.

They found that when polarized light was shone through the nanostructures from certain directions, a range of vivid and easily-identifiable colors was reflected back. These different colors could be assigned numbers, which could then be used to represent letters using the standard code ASCII (American Standard Code for Information Interchange). To encode a secret message, the researchers applied a quaternary code using the digits 0, 1, 2 and 3 (as opposed to the more commonly used 0 and 1). The result was a series of four-digit strings composed of different color combinations that could be used to spell out a message, and the method of chromo-encryption was born.

Page 35 of 144First3233343536373839Last