The vulnerability of LLMs to hallucination, prompt injection, and jailbreaks poses a significant but surmountable challenge to their widespread adoption.
Mark Russinovich
Author Archives
Confidential computing enables users to authenticate code running in TEEs, but users also need evidence this code is trustworthy.
Confidential Computing: Elevating Cloud Security and Privacy
Working toward a more secure and innovative future.
Toward Confidential Cloud Computing
Extending hardware-enforced cryptographic protection to data while in use.
Toward ML-Centric Cloud Platforms
Exploring the opportunities to use ML, the possible designs, and our experience with Microsoft Azure.
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get Involved