<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Advanced Computing</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Advanced Computing</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/advanced-computing/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 14 Mar 2022 00:00:00 -0400</lastBuildDate><item><title>How Easy Is It to Make and Detect a Deepfake?</title><link>https://www.sei.cmu.edu/blog/how-easy-is-it-to-make-and-detect-a-deepfake/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The technology underlying the creation and detection of deepfakes and assessment of current and future threat levels</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Catherine Bernaciak, Dominic Ross</dc:creator><pubDate>Mon, 14 Mar 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/how-easy-is-it-to-make-and-detect-a-deepfake/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>Vulnerability Mitigation</category><category>Security-Related Requirements</category><category>Artificial Intelligence Engineering</category><category>Advanced Computing</category></item><item><title>How to Build a Trustworthy Free/Libre Linux Capable 64-bit RISC-V Computer</title><link>https://www.sei.cmu.edu/blog/how-to-build-a-trustworthy-freelibre-linux-capable-64-bit-risc-v-computer/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The attack surface for commercial hardware now spans all stages of the development lifecycle. Even in the presence of secure, bug-free software, the growing threat of hardware Trojans and backdoors enables adversaries....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Gabriel Somlo</dc:creator><pubDate>Fri, 18 Oct 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/how-to-build-a-trustworthy-freelibre-linux-capable-64-bit-risc-v-computer/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Advanced Computing</category></item><item><title>The Promise of Deep Learning on Graphs</title><link>https://www.sei.cmu.edu/blog/the-promise-of-deep-learning-on-graphs/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>A growing number of Department of Defense (DoD) data problems are graph problems: the data from sources such as sensor feeds, web traffic, and supply chains are full of irregular relationships....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Oren Wright</dc:creator><pubDate>Mon, 29 Jul 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-promise-of-deep-learning-on-graphs/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Artificial Intelligence Engineering</category><category>Machine Learning</category><category>Advanced Computing</category></item><item><title>Obsidian: A New, More Secure Programming Language for Blockchain</title><link>https://www.sei.cmu.edu/blog/obsidian-a-new-more-secure-programming-language-for-blockchain/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Billions of dollars in venture capital, industry investments, and government investments are going into the technology known as blockchain....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Eliezer Kanal</dc:creator><pubDate>Tue, 04 Sep 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/obsidian-a-new-more-secure-programming-language-for-blockchain/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Secure Coding</category><category>Cybersecurity</category><category>Secure Development</category><category>Human-Machine Interactions</category><category>Advanced Computing</category><category>Blockchain</category></item><item><title>Automated Code Generation for Future Compatible High-Performance Graph Libraries</title><link>https://www.sei.cmu.edu/blog/automated-code-generation-for-future-compatible-high-performance-graph-libraries/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>For many DoD missions, our ability to collect information has outpaced our ability to analyze that information. Graph algorithms and large-scale machine learning algorithms are a key to analyzing the information agencies collect....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Scott McMillan</dc:creator><pubDate>Mon, 14 May 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/automated-code-generation-for-future-compatible-high-performance-graph-libraries/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Artificial Intelligence Engineering</category><category>Artificial Intelligence</category><category>Mission Assurance</category><category>Data Modeling and Analytics</category><category>Advanced Computing</category></item></channel></rss>