Privacy legislation has often been identified as a roadblock for advanced context-aware applications. The feedback collected from more than 150 researchers in pervasive computing reveals a different attitude. Has pervasive computing?s privacy challenge been solved?
Blockchain technology presents significant potential along with risk. The blockchain technology transformation framework informs decision makers on how blockchain fits in their processes, what data will be in the transactions, and who the participants will be, allowing users to lower risks and increase their chances for a successful blockchain solution.
Our recent architectural risk analysis of machine learning systems identified 78 particular risks associated with nine specific components found in most machine learning systems. In this article, we describe and discuss the 10 most important security risks of those 78.
The Internet just turned 50 five decades that shaped the world we live in. But what comes next, the so-called Quantum Internet, will be even more revolutionary, likely in ways we can't imagine yet.
The challenges, bugs, and trouble spots that we've had in building and securing the Internet of Computers can provide a starting point for analyzing the challenges that will be manifested in this brave new world. Members of the IT community have their work cut out here.
Reliability analysis is often based on worst-case assumptions to produce guaranteed lower bounds on system survival probability. Reliability engineers make lower bounds as tight as possible, but sometimes system structure is unfriendly to the derivation of tight bounds. Unfortunately, loose reliability lower bounds make it difficult to compare design alternatives or to select among competing systems.