<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en-us" xmlns="http://www.w3.org/2005/Atom"><title>SEI Blog | Advanced Computing</title><link href="http://www.sei.cmu.edu/feeds/topic/advanced-computing/atom/?utm_source=blog&amp;utm_medium=rss" rel="alternate"/><link href="http://www.sei.cmu.edu/feeds/topic/advanced-computing/atom/?utm_source=blog&amp;utm_medium=rss" rel="self"/><id>http://www.sei.cmu.edu/feeds/topic/advanced-computing/atom/?utm_source=blog&amp;utm_medium=rss</id><updated>2022-03-14T00:00:00-04:00</updated><subtitle>Updates on changes and additions to the                         SEI Blog for posts matching Advanced Computing</subtitle><entry><title>How Easy Is It to Make and Detect a Deepfake?</title><link href="https://www.sei.cmu.edu/blog/how-easy-is-it-to-make-and-detect-a-deepfake/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2022-03-14T00:00:00-04:00</published><updated>2022-03-14T00:00:00-04:00</updated><author><name>Catherine Bernaciak, Dominic Ross</name></author><id>https://www.sei.cmu.edu/blog/how-easy-is-it-to-make-and-detect-a-deepfake/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">The technology underlying the creation and detection of deepfakes and assessment of current and future threat levels</summary><category term="Security Vulnerabilities"/><category term="Vulnerability Discovery"/><category term="Vulnerability Mitigation"/><category term="Security-Related Requirements"/><category term="Artificial Intelligence Engineering"/><category term="Advanced Computing"/></entry><entry><title>How to Build a Trustworthy Free/Libre Linux Capable 64-bit RISC-V Computer</title><link href="https://www.sei.cmu.edu/blog/how-to-build-a-trustworthy-freelibre-linux-capable-64-bit-risc-v-computer/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2019-10-18T00:00:00-04:00</published><updated>2019-10-18T00:00:00-04:00</updated><author><name>Gabriel Somlo</name></author><id>https://www.sei.cmu.edu/blog/how-to-build-a-trustworthy-freelibre-linux-capable-64-bit-risc-v-computer/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">The attack surface for commercial hardware now spans all stages of the development lifecycle. Even in the presence of secure, bug-free software, the growing threat of hardware Trojans and backdoors enables adversaries....</summary><category term="Advanced Computing"/></entry><entry><title>The Promise of Deep Learning on Graphs</title><link href="https://www.sei.cmu.edu/blog/the-promise-of-deep-learning-on-graphs/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2019-07-29T00:00:00-04:00</published><updated>2019-07-29T00:00:00-04:00</updated><author><name>Oren Wright</name></author><id>https://www.sei.cmu.edu/blog/the-promise-of-deep-learning-on-graphs/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">A growing number of Department of Defense (DoD) data problems are graph problems: the data from sources such as sensor feeds, web traffic, and supply chains are full of irregular relationships....</summary><category term="Artificial Intelligence Engineering"/><category term="Machine Learning"/><category term="Advanced Computing"/></entry><entry><title>Obsidian: A New, More Secure Programming Language for Blockchain</title><link href="https://www.sei.cmu.edu/blog/obsidian-a-new-more-secure-programming-language-for-blockchain/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2018-09-04T00:00:00-04:00</published><updated>2018-09-04T00:00:00-04:00</updated><author><name>Eliezer Kanal</name></author><id>https://www.sei.cmu.edu/blog/obsidian-a-new-more-secure-programming-language-for-blockchain/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Billions of dollars in venture capital, industry investments, and government investments are going into the technology known as blockchain....</summary><category term="Secure Coding"/><category term="Cybersecurity"/><category term="Secure Development"/><category term="Human-Machine Interactions"/><category term="Advanced Computing"/><category term="Blockchain"/></entry><entry><title>Automated Code Generation for Future Compatible High-Performance Graph Libraries</title><link href="https://www.sei.cmu.edu/blog/automated-code-generation-for-future-compatible-high-performance-graph-libraries/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2018-05-14T00:00:00-04:00</published><updated>2018-05-14T00:00:00-04:00</updated><author><name>Scott McMillan</name></author><id>https://www.sei.cmu.edu/blog/automated-code-generation-for-future-compatible-high-performance-graph-libraries/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">For many DoD missions, our ability to collect information has outpaced our ability to analyze that information. Graph algorithms and large-scale machine learning algorithms are a key to analyzing the information agencies collect....</summary><category term="Artificial Intelligence Engineering"/><category term="Artificial Intelligence"/><category term="Mission Assurance"/><category term="Data Modeling and Analytics"/><category term="Advanced Computing"/></entry></feed>