Advanced Computing in the Age of AI | Monday, April 22, 2024

NIST

Domino Furthers Commitment to Responsible AI with NIST AISIC Membership

April 11, 2024 -- In this recent blogpost, Domino's Yuval Zukerman discusses the burgeoning field of AI and its inherent risks, emphasizing the significance of Domino's recent NIST AISIC ...Full Article

NIST Launches AI Safety Institute and 200-Member Consortium

The U.S. Government made two big announcements this week to help drive development of safe AI, including the creation of the U.S. Artificial Intelligence Safety Institute, or AISI, on ...Full Article

NIST Puts AI Risk Management on the Map with New Framework

The National Institute of Standards and Technology (NIST) has published the AI Risk Management Framework, document intended to help organizations voluntarily develop and deploy AI systems without bias and ...Full Article

The Race to Ensure Post Quantum Data Security

Fault-tolerant quantum computers won’t exist for years – a decade is the most common estimate. When they do arrive, thanks to Shor’s now-famous algorithm, they will be able to crack the ...Full Article

Report: R&D Funding Will Help U.S. Retain AI Lead Over China

Reports of China’s advantages in AI development and data access have been greatly exaggerated, concludes a report advocating greater U.S. investment in basic research and a reassessment of how ...Full Article

AI Emerges as US Priority in Budget Talks

Among a lengthy list of U.S. technology initiatives included in pending budget legislation is a proposed National Artificial Intelligence Initiative that would be managed across several science agencies. The ...Full Article

NIST Tackles Explainable AI Gap

Among the best ways to create stable technologies are standards and specifications that provide a template for building trust while often seeding new technological ecosystems. That’s especially true for ...Full Article

Open Source Push Highlights Security Flaws

As enterprise adoption of open source software soars, so too do the number of vulnerabilities inevitably exposed as deployments scale and security awareness grows in response to high-profile data ...Full Article

4 Strategies for Implementing NIST’s Biometric Guidelines

We often hear that technology is changing rapidly. We’ve heard this phrase for years – but in 2018, it really is. Today, almost everyone has a handheld tablet or ...Full Article

Quantum Computers Threaten Data Encryption

The promise of quantum computing comes with a major downside: "Cryptographically useful" quantum machines will threaten public key encryption used to secure data in the cloud, a new report ...Full Article
Page 1 of 3123
EnterpriseAI