The Growing Threat: How Hackers Are Using AI to Break into Networks and User Systems: Part 4Part 4: The Challenge for Cybersecurity DefendersNov 20, 2024Nov 20, 2024
The Growing Threat: How Hackers Are Using AI to Break into Networks and User Systems: Part 3Part 3: Specific AI Techniques in HackingOct 16, 2024Oct 16, 2024
The Growing Threat: How Hackers Are Using AI to Break into Networks and User Systems: Part 2Part 2: How Hackers Are Using AISep 18, 2024Sep 18, 2024
The Growing Threat: How Hackers Are Using AI to Break into Networks and User Systems: Part 1Part 1: An Introduction to Malicious AIAug 21, 2024Aug 21, 2024
AI’s Incest ProblemA big issue that AI, particularly generative solutions, will need to reckon quickly is now on the horizon. While the technology’s growth is…Mar 5, 2024Mar 5, 2024
AI’s Impact on AnimationWith a career spanning three vital realms of animated projects — creative, production, and technical, ranging from shorts to episodics…Nov 1, 2023Nov 1, 2023
GANs, VAEs and Diffusion Models: An Animation ExplainerAs I prepare for an upcoming article on Generative AI’s Impact on Animation, I thought it would make sense to share an explanation of some…Oct 10, 2023Oct 10, 2023
The Value of ValidationHaving now spent time in the software world, the solution to many issues we encountered in production is much clearer. Adopting parts of…Oct 6, 2022Oct 6, 2022
USD meets the MetaverseSiggraph 2022 in Vancouver was a great oppertunity to bring the CG community together again. As a Virtual conference in 2021, it was a…Sep 6, 2022Sep 6, 2022