For LLMs, IBM’s NorthPole chip overcomes the tradeoff between speed and efficiencyResearchPeter Hess26 Sep 2024AI HardwareExploratory ScienceGenerative AISemiconductors
Government and industry experts recommend moving to quantum-safe cryptographyNews17 Jan 2023Quantum SafeSecurity
The 2022 IBM Research annual letterDeep DiveDarío Gil13 Jan 2023Accelerated DiscoveryAIHybrid CloudQuantumSecuritySemiconductors
Federated Learning meets Homomorphic EncryptionTechnical noteNathalie Baracaldo and Hayim Shaul16 Dec 2022AICryptographyDistributed SystemsFully Homomorphic Encryption
The ultimate tool for data privacy: Fully homomorphic encryptionTechnical noteOmri Soceanu and Ronen Levy08 Dec 2022Cloud SecurityFully Homomorphic EncryptionSecurity
IBM’s Cryptography Bill of Materials to speed up quantum-safe assessmentNewsAlessandro Curioni and Michael Osborne08 Dec 2022CryptographyQuantum SafeSecurity
Extending server integrity across space and time with Durable AttestationTechnical noteDaniele Buono, Marcio Augusto de Lima e Silva, Maurizio Drocco, Gheorghe Almasi, and James Bottomley14 Nov 2022Cloud Security
Improving endpoint security on Linux with IBM ReaQta-SysFlowTechnical noteFrederico Araujo and Teryl Taylor08 Nov 2022Security
Strengthening cloud security with confidential computingTechnical noteRick Boivie04 Nov 2022Cloud SecurityConfidential ComputingSecurity
Five ways IBM is using synthetic data to improve AI modelsResearchKim Martineau02 Nov 2022AIData and AI SecurityMachine Learning
Breaking Rainbow takes a weekend on a laptopTechnical noteWard Beullens13 Oct 2022CryptographyQuantum SafeSecurity
How we quantum-proofed IBM z16 Case studySilvio Dragone11 Oct 2022CryptographyQuantumQuantum SafeSecurity
How IBM is helping make the world’s networks quantum safeNewsRay Harishankar29 Sep 2022CryptographyQuantum SafeSecurity
The cryptography standards that will keep today’s data and systems quantum safeNews22 Sep 2022CryptographyQuantumQuantum SafeSecurity
Why it’s time to take quantum-safe cryptography seriouslyExplainerScott Crowder, Charles Robinson, and Ray Harishankar26 Jul 2022CryptographyQuantumQuantum SafeSecurity
What is confidential computing?ExplainerDaniele Buono, James Bottomley, Hubertus Franke, and Robert Senger25 Jul 2022Cloud SecurityConfidential ComputingCryptographyHybrid Cloud