Toggle light / dark theme

The world’s largest semiconductor manufacturers—Intel, Samsung, and the Taiwan Semiconductor Manufacturing Company (TSMC)—have all announced plans to build new chip factories in the US. Everyone is bragging about those plans: American lawmakers say bringing chip manufacturing back onto US soil will strengthen national security, while the chip makers, chastened by this year’s disastrous semiconductor shortage, are diversifying their supply chains to avoid future crises.

But there’s one problem: Who will pay?

Intel, Samsung, and TSMC have all threatened to pull the plug on their US factory plans unless government subsidies are on the table. Company executives claim that if they don’t get a rich package of incentives and tax breaks, they’ll build their semiconductor factories elsewhere, effectively ending American ambitions to return chip manufacturing to its shores after ceding the bulk of the market to Taiwan in the 1990s.

Facebook’s response, however, isn’t about how it should change its business model. Instead of any degree of self-awareness, the company has decided it’s going to push back on its critics and try to change the subject. Facebook isn’t actually trying to change any of the things that are wrong with Facebook.

Zuckerberg did talk a lot about the metaverse and said he plans to give more details later this week at Connect, the company’s developer conference.

To be fair, Zuckerberg did say that the company is “on track to spend more than $5 billion on safety and security in 2021.” That might sound impressive, but considering the company made $115 billion in the last 12 months, it’s barely anything. It’s only half of what Facebook says it plans to spend on building the metaverse.

AI & computational technology for improving drug discovery & development — mati gill, CEO, AION labs.


Mati Gill is the Chief Executive Officer, of AION Labs (https://aionlabs.com/), a company recently launched and backed by a coalition of pharma and tech leaders, including AstraZeneca, Merck, Pfizer, Teva, Amazon Web Services (AWS), and the Israel Biotech Fund (IBF) and Israel Innovation Authority, to improve the whole drug discovery & drug development process with AI and computational biology.

Mati has an MBA (Healthcare & Innovation) and BS degree in law from Reichman University / IDC Herzliya, and has over a decade of experience in leadership roles in the biopharma industry, including most recently as Head of Government Affairs, Corporate & International Markets, at Teva Pharmaceuticals.

Mati also spent 4 years as Member Of The Board Of Advisors and Directors, at Sanara Ventures, a healthcare investment platform backed by Philips & Teva, providing Pre-seed, Seed and A round financing to young companies.

Prior to teva, mati was chief of staff to israel’s minister of public security.

Delta Air Lines expects 2.5 million passengers to move through the Atlanta airport during the Thanksgiving period. Ahead of the holiday rush, Delta is testing new facial recognition technology to reduce the time it takes between arriving at the airport and getting passengers in their seats.

The company’s senior vice president for customer experience, Ranjan Goswami, said the facial recognition technology has been years in the making and will speed up travel.

Recent advancements in biotechnology have immense potential to help address many global problems; climate change, an aging society, food security, energy security, and infectious diseases.

Biotechnology is not to be confused with the closely related field of biosciences. While biosciences refer to all the sciences that study and understand life, biology, and biological organisms, biotechnology refers to the application of the knowledge of biosciences and other technologies to develop tech and commercial products. Biotechnology is the application of innovation to biosciences in a bid to solve real-world medical problems.

Throw Artificial Intelligence into the mix and we suddenly have a really interesting pot of broth. Several AI trends have already proven beneficial to the development of biotechnology. Dr. Nathan S. Bryan, an inventor, biochemist and professor, who made a name for himself as an innovator and pioneer in nitric oxide drug discovery, commercialization, and molecular medicine, offers his insights on these contributions.

The strategy outlines how AI can be applied to defence and security in a protected and ethical way. As such, it sets standards of responsible use of AI technologies, in accordance with international law and NATO’s values. It also addresses the threats posed by the use of AI by adversaries and how to establish trusted cooperation with the innovation community on AI.

Artificial Intelligence is one of the seven technological areas which NATO Allies have prioritized for their relevance to defence and security. These include quantum-enabled technologies, data and computing, autonomy, biotechnology and human enhancements, hypersonic technologies, and space. Of all these dual-use technologies, Artificial Intelligence is known to be the most pervasive, especially when combined with others like big data, autonomy, or biotechnology. To address this complex challenge, NATO Defence Ministers also approved NATO’s first policy on data exploitation.

Individual strategies will be developed for all priority areas, following the same ethical approach as that adopted for Artificial Intelligence.

Deep North, a Foster City, California-based startup applying computer vision to security camera footage, today announced that it raised $16.7 million in a Series A-1 round. Led by Celesta Capital and Yobi Partners, with participation from Conviction Investment Partners, Deep North plans to use the funds to make hires and expand its services “at scale,” according to CEO Rohan Sanil.

Deep North, previously known as Vmaxx, claims its platform can help brick-and-mortar retailers “embrace digital” and protect against COVID-19 by retrofitting security systems to track purchases and ensure compliance with masking rules. But the company’s system, which relies on algorithms with potential flaws, raises concerns about both privacy and bias.

Full Story:

(2021). Nuclear Science and Engineering: Vol. 195 No. 9 pp. 977–989.


Earlier work has demonstrated the theoretical development of covert OT defenses and their application to representative control problems in a nuclear reactor. Given their ability to store information in the system nonobservable space using one-time-pad randomization techniques, the new C2 modeling paradigm6 has emerged allowing the system to build memory or self-awareness about its past and current state. The idea is to store information using randomized mathematical operators about one system subcomponent, e.g., the reactor core inlet and exit temperature, into the nonobservable space of another subcomponent, e.g., the water level in a steam generator, creating an incorruptible record of the system state. If the attackers attempt to falsify the sensor data in an attempt to send the system along an undesirable trajectory, they will have to learn all the inserted signatures across the various system subcomponents and the C2 embedding process.

We posit that this is extremely unlikely given the huge size of the nonobservable space for most complex systems, and the use of randomized techniques for signature insertion, rendering a level of security that matches the Vernam-Cipher gold standard. The Vernam Cipher, commonly known as a one-time pad, is a cipher that encrypts a message using a random key (pad) and can only be decrypted using this key. Its strength is derived from Shannon’s notion of perfect secrecy 8 and requires the key to be truly random and nonreusable (one time). To demonstrate this, this paper will validate the implementation of C2 using sophisticated AI tools such as long short-term memory (LSTM) neural networks 9 and the generative adversarial learning [generative adversarial networks (GANs)] framework, 10 both using a supervised learning setting, i.e., by assuming that the AI training phase can distinguish between original data and the data containing the embedded signatures. While this is an unlikely scenario, it is assumed to demonstrate the resilience of the C2 signatures to discovery by AI techniques.

The paper is organized as follows. Section II provides a brief summary of existing passive and active OT defenses against various types of data deception attacks, followed by an overview of the C2 modeling paradigm in Sec. III. Section IV formulates the problem statement of the C2 implementation in a generalized control system and identifies the key criteria of zero impact and zero observability. Section V implements a rendition of the C2 approach in a representative nuclear reactor model and highlights the goal of the paper, i.e., to validate the implementation using sophisticated AI tools. It also provides a rationale behind the chosen AI framework. Last, Sec. VI summarizes the validation results of the C2 implementation and discusses several extensions to the work.

Demand for highly desirable digital skills is hitting new heights. A recent Learning and Work Institute report noted that one in four (27%) employers now need the majority of their workers to have in-depth specialist knowledge in one or more technology areas. And 60% of those surveyed expect their reliance on advanced digital skills to increase over the next five years.

The skills gap is particularly prevalent in the security tech sector. A global study from the Center for Cyber Safety and Education predicted a terrifying shortage of 1.8 million security workers by 2022. This is made worse by the number of young people taking IT-related GCSEs in the UK, falling by 40% since 2015 (according to Learning and Work Institute data).

This scarcity of qualified professionals has inflated salaries, making it hard for firms that cannot afford to offer large paychecks and grand benefit packages to secure top talent.