Thursday, September 23, 2021

Dialing the Trust Level Down to Zero

Twenty-first century cybersecurity has been steadily moving away from the "perimeter" mentality—authenticating users with passwords, then giving them free access to a computer system's resources at their security level. Stolen passwords, especially those with high levels of access, have resulted in catastrophic releases of vast swaths of personal information (like credit card numbers), government secrets (witness WikiLeaks' releases of classified information), and related crimes (including ransomware). FULL TEXT

Monday, May 17, 2021

Quantum Simulator Beats Quantum Hardware

Why wait for quantum computers to be perfected "someday," when you can use Toshiba's quasi-quantum optimization algorithm on Microsoft's Azure cloud in 2021? It outperforms today's fledgling quantum computer speeds through the use of that proprietary algorithm on conventional digital computers. FULL TEXT

Tuesday, April 13, 2021

Democratizing Facial Recognition

Intel demonstrated facial authentication solutions which the company said are as accurate as Apple's Face ID for iPhone, claiming one false positive in a million identifications. Intel's similarly named RealSense ID technology performs face authentication for any device running the Windows, Linux, or Android operating systems. FULL TEXT

Wednesday, March 24, 2021

DARPA's Subterranean Challenge UPDATE

The U.S. Defense Department's DARPA Subterranean Challenge aims to develop innovative technologies that would augment operations underground. Credit: Team Cerberus FULL TEXT