Tagged with
cybersecurity
ORGANIZATIONS. SHAPING THE INDUSTRY.
Intrinsic ID
Semiconductor
Securing the IoT with the World's Top PUF Technology. Authenticate Everythi...
16 Posts
Latest Posts
Many IoT products need to be adequately secured and, as such, represent vulnerable entry points for attacks on critical infrastructure. Or the IoT device itself can be the specific target due to the data it hosts – for example, video from security cameras and patient information from medical wearables.
Applying large-scale language models outside language: Examples from materials discovery, cybersecurity, and building management
You've probably heard about the amazing capabilities of some recent AI models, such as GPT, AI21, or BLOOM. Perhaps you use one of these models yourself. Either directly, or through another product like Wordtune, YouWrite, Jasper – or ChatGPT. It turns out that while these models are trained on language data, they can be used for other applications as well. In my latest article, you can read more about applications in materials discovery, cybersecurity, and even building management.