{"id":2424,"date":"2024-10-25T14:18:08","date_gmt":"2024-10-25T14:18:08","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/10\/25\/apple-opens-pcc-source-code-for-researchers-to-identify-bugs-in-cloud-ai-security\/"},"modified":"2024-10-25T14:18:08","modified_gmt":"2024-10-25T14:18:08","slug":"apple-opens-pcc-source-code-for-researchers-to-identify-bugs-in-cloud-ai-security","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/10\/25\/apple-opens-pcc-source-code-for-researchers-to-identify-bugs-in-cloud-ai-security\/","title":{"rendered":"Apple Opens PCC Source Code for Researchers to Identify Bugs in Cloud AI Security"},"content":{"rendered":"<p>\u200bApple has publicly made available its Private Cloud Compute (PCC) Virtual Research Environment (VRE), allowing the research community to inspect and verify the privacy and security guarantees of its offering.<br \/>\nPCC, which Apple unveiled earlier this June, has been marketed as the &#8220;most advanced security architecture ever deployed for cloud AI compute at scale.&#8221; With the new technology, the idea is\u00a0Apple has publicly made available its Private Cloud Compute (PCC) Virtual Research Environment (VRE), allowing the research community to inspect and verify the privacy and security guarantees of its offering.<br \/>\nPCC, which Apple unveiled earlier this June, has been marketed as the &#8220;most advanced security architecture ever deployed for cloud AI compute at scale.&#8221; With the new technology, the idea is\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bApple has publicly made available its Private Cloud Compute (PCC) Virtual Research Environment (VRE), allowing the research community to inspect and verify the privacy and security guarantees of its offering. PCC, which Apple unveiled earlier this June, has been marketed as the &#8220;most advanced security architecture ever deployed for cloud AI compute at scale.&#8221; With&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/10\/25\/apple-opens-pcc-source-code-for-researchers-to-identify-bugs-in-cloud-ai-security\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Apple Opens PCC Source Code for Researchers to Identify Bugs in Cloud AI Security<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":2425,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/2424"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=2424"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/2424\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/2425"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=2424"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=2424"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=2424"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}