From the coverage that ChatGPT, developed by OpenAI, has been receiving since its launch in November 2022, you would be forgiven for thinking that is the only technology story around. And it deserves the spotlight. Few had expected the jaw-dropping rapid strides that this technology has made in the last few years, and it will […]
Tag: security
Three algorithms to live by: LSTM, FedAverage, C-W
Citation We come across many algorithms in our education and work. Here I look at three relatively recent ones from the area of Machine Learning (ML), and more specifically from my vantage point of reliability and security of ML. There have been reams written on each, at various levels of technical depth. So obviously I […]
Big Data and Security: Oxymoron?
Citation Big data technologies have dramatically changed the world we live in, and in double quick time. And you know that unless you have been living under a Martian rock. We take it for granted in many of our daily interactions — in our personal lives as well as at work. Big data technologies fuel […]
Predictive AI for Reliability and Security
Citation In the computer systems field, we use AI, or its more trendy cousin, Machine Learning for predictive reliability and security all the time. This means we take action in anticipation of failure of a computer system to make sure it continues to function reliably and securely. The question is does this translate beyond the […]
The Internet of Insecure Things
Citation We are moving into a world of internet connected things. This is the world where your aging grandmother’s medicine cabinet reminds her when her medication has become due, when the irregular heart beat of your father triggers the scheduling of a cardio checkup, and when the home automation device decides that lowering the temperature […]
The Lazy Hacker
Citation The latest crippling ransomware to hit our digital world has been Wanna Cry, which raised its head around May 12. Ransomware is a kind of software used by bad actors (or simply put “bad guys”) to make data in computer systems unavailable, such as, by encrypting the data. The bad actors promise to make […]