Semantic Adversarial Attacks

Semantic Adversarial Attacks: When Meaning Gets Twisted

A particular subset of AI/ML adversarial attcks that often flies under the…


AI Alignment Problem

The AI Alignment Problem

Introduction The AI alignment problem sits at the core of all future…


Acoustic Phononic Quantum

Quantum Computing Modalities: Acoustic (Phononic) Quantum Systems

(For other quantum computing modalities and architectures, see Taxonomy of…


Fidelity Quantum Computing

Fidelity in Quantum Computing

Introduction According to a recent MIT article, IBM aims to build a 100,000…


Quantum Use Cases Supply Chain Logistics

Quantum Technology Use Cases in Supply Chain & Logistics

Introduction ​Quantum computing is poised to be a game-changer for…


Harvest Now Decrypt Later HNDL

Harvest Now, Decrypt Later (HNDL) Risk

Introduction In the world of cybersecurity, there’s a ticking time bomb that…


Post Quantum Cryptography PQC Challenges

Post-Quantum Cryptography PQC Challenges

Introduction As the quantum threat approaches, the need to prepare our…


ML Biases

Understanding and Addressing Biases in Machine Learning

Introduction ML enables computers to learn from data and make decisions,…


Quantum Error Correction QEC

Quantum Errors and Quantum Error Correction (QEC) Methods

Introduction Quantum computers process information using qubits that can…


Quantum Resistance Enterprise Changes

Quantum Era Demands Changes to ALL Enterprise Systems

Introduction In my work with various clients, I frequently encounter a…


Privacy Preference Center