БЛОГ

Archive for the ‘security’ category: Page 26

Apr 23, 2023

Task-driven Autonomous Agent Utilizing GPT-4, Pinecone, and LangChain for Diverse Applications

Posted by in categories: robotics/AI, security

NOTE: This article was written by GPT-4 based on the code base. For more info, read this.

Abstract:

In this research, we propose a novel task-driven autonomous agent that leverages OpenAI’s GPT-4 language model, Pinecone vector search, and the LangChain framework to perform a wide range of tasks across diverse domains. Our system is capable of completing tasks, generating new tasks based on completed results, and prioritizing tasks in real-time. We discuss potential future improvements, including the integration of a security/safety agent, expanding functionality, generating interim milestones, and incorporating real-time priority updates. The significance of this research lies in demonstrating the potential of AI-powered language models to autonomously perform tasks within various constraints and contexts.

Apr 19, 2023

Embracing variations: Physicists first to analyze noise in Lambda-type quantum memory

Posted by in categories: computing, particle physics, quantum physics, security

In the future, communications networks and computers will use information stored in objects governed by the microscopic laws of quantum mechanics. This capability can potentially underpin communication with greatly enhanced security and computers with unprecedented power. A vital component of these technologies will be memory devices capable of storing quantum information to be retrieved at will.

Virginia Lorenz, a professor of physics at the University of Illinois Urbana-Champaign, studies Lambda-type optical quantum , a promising technology that relies on light interacting with a large group of atoms. She is developing a device based on hot metallic vapor with graduate student Kai Shinbrough.

As the researchers work towards a practical device, they are also providing some of the first theoretical analyses of Lambda-type devices. Most recently, they reported the first variance-based sensitivity analysis describing the effects of experimental noise and imperfections in Physical Review A.

Apr 18, 2023

Solar-plus-storage is key to future-proofing the energy supply

Posted by in categories: futurism, security

The ‘power couple’ of solar-plus-storage, facilitated by AIoT, will be vital to safeguarding countries’ energy security and reducing geopolitical risks.

Apr 18, 2023

America’s Space Systems Should Be Officially Prioritized As ‘Critical’ U.S. Infrastructure

Posted by in category: security

U.S. needs NASA to play new role in overseeing protection of America’s national security, civil, and commercial space systems, says paper.

Apr 13, 2023

‘Faithful Unto Death’: Robotic dog set to make a comeback to NYPD task force

Posted by in categories: robotics/AI, security

Along with ‘Spot’ the Digidog, the New York Police Department has revealed other new security technologies to improve safety in New York.

The New York Police Department (NYPD) is taking crime control, and public security to the next level by introducing a variety of crime-fighting robots to patrol subway stations throughout New York.

Along with Digidog, the NYPD has revealed a few other new security technologies to improve safety in New York.

Continue reading “‘Faithful Unto Death’: Robotic dog set to make a comeback to NYPD task force” »

Apr 12, 2023

US begins study of possible rules to regulate AI like ChatGPT

Posted by in categories: education, policy, robotics/AI, security

WASHINGTON, April 11 (Reuters) — The Biden administration said Tuesday it is seeking public comments on potential accountability measures for artificial intelligence (AI) systems as questions loom about its impact on national security and education.

ChatGPT, an AI program that recently grabbed the public’s attention for its ability to write answers quickly to a wide range of queries, in particular has attracted U.S. lawmakers’ attention as it has grown to be the fastest-growing consumer application in history with more than 100 million monthly active users.

The National Telecommunications and Information Administration, a Commerce Department agency that advises the White House on telecommunications and information policy, wants input as there is “growing regulatory interest” in an AI “accountability mechanism.”

Apr 8, 2023

Researchers Discover Critical Remote Code Execution Flaw in vm2 Sandbox Library

Posted by in category: security

The maintainers of the vm2 JavaScript sandbox module have shipped a patch to address a critical flaw that could be abused to break out of security boundaries and execute arbitrary shellcode.

The flaw, which affects all versions, including and prior to 3.9.14, was reported by researchers from South Korea-based KAIST WSP Lab on April 6, 2023, prompting vm2 to release a fix with version 3.9.15 on Friday.

“A threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox,” vm2 disclosed in an advisory.

Apr 3, 2023

Graphene key for novel hardware security

Posted by in categories: encryption, robotics/AI, security

As more private data is stored and shared digitally, researchers are exploring new ways to protect data against attacks from bad actors. Current silicon technology exploits microscopic differences between computing components to create secure keys, but artificial intelligence (AI) techniques can be used to predict these keys and gain access to data. Now, Penn State researchers have designed a way to make the encrypted keys harder to crack.

Led by Saptarshi Das, assistant professor of engineering science and mechanics, the researchers used graphene — a layer of carbon one atom thick — to develop a novel low-power, scalable, reconfigurable hardware security device with significant resilience to AI attacks. They published their findings in Nature Electronics today (May 10).

“There has been more and more breaching of private data recently,” Das said. “We developed a new hardware security device that could eventually be implemented to protect these data across industries and sectors.”

Mar 29, 2023

Google Duplex Will Change EVERYTHING… Here’s Why!

Posted by in categories: robotics/AI, security

In case you’re wondering how Google duplex actually works. Goodnight!


Google Duplex Will Change EVERYTHING… Here’s Why!Welcome back to Tech Craze, today on the channel we are going to catch sight of Everything you need to know about the google duplex. Google Duplex is a project launched in 1998 that is currently live in the majority of the US, along with some other parts of the world. At first, it allowed users to access an AI assistant to help make restaurant reservations. However, its use has since expanded to other functions as well.

Continue reading “Google Duplex Will Change EVERYTHING… Here’s Why!” »

Mar 28, 2023

Twitter’s source code leaked on GitHub, revealing proprietary information and security flaws

Posted by in category: security

The social media behemoth Twitter was recently dealt a significant setback when significant portions of its source code were published online and made public. The corporation proceeded promptly to notify GitHub, an online collaboration platform for software engineers, of a copyright violation in order to get the stolen code removed from the site. It is not known how long the code had been available online, although it seems to have been accessible to the public for a number of months.

Twitter has filed a petition with the United States District Court for the Northern District of California requesting that the court require GitHub to disclose the identity of the individual who is responsible for spreading the code as well as any other users that downloaded it.

Continue reading “Twitter’s source code leaked on GitHub, revealing proprietary information and security flaws” »

Page 26 of 138First2324252627282930Last