A way to secure future computers: Limit their capabilities

An attacker who gains access to a general-purpose machine can exploit its broad computational abilities to accomplish nefarious ends. As more devices go online – through cloud computing, connected cars, and the internet of things, for example – security becomes an increasing threat and challenge.

 
 
Read More

Toward the limit: SFI research meets application

Applied Complexity Network (ACtioN) in London which drew participants from business and government, followed a meeting of scientists that took place in August at SFI. Both meetings concerned factors that determine the precision and reliability with which a system’s behavior can be predicted.

 
Read More

How cheating arises, evolves

Malicious behavior is similarly common in the natural world, where agents tend a means to enter a system and subvert its rules in their favor.

 
 
Read More

Mind-numbing or crowd-wise? Optimizing problem solving

When big problems arise, we insist on the power of many brains. At the same time, everyday work meetings are notoriously dull and fruitless. Can certain conditions nudge collaborative problem solving in a more reliably productive direction?

 
 
Read More