From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
OpenACC helps the scientific R&D community develop their accelerated computing skills. Here are Dr. Sunita Chandrasekaran of the Univ. of Delaware and OpenACC User...staff From insideHPC | January 15, 2025 at 11:51 AM
The U.S. Department of Energy’s Office of Science (SC) announced that $625 million is available to support National Quantum Information Science Research Centers...staff From insideHPC | January 15, 2025 at 11:30 AM
Slide in Lev Reyzin's JMM talk "Problems in AI and ML for Mathematicians"
Reyzin is paraphrasing Telgarsky. Posted with permission.
Last week I attended the Joint...Lance Fortnow From Computational Complexity | January 15, 2025 at 09:42 AM
Cynthia Dwork receives the National Medal of Science from the Director of the White House Office of Science and Technology Policy (OSTP), Arati Prabhakar, Ph.D....Catherine Gill From The Computing Community Consortium Blog | January 15, 2025 at 08:00 AM
A very security-conscious company was hit with a (presumed) massive state-actor phishing attack with gift cards, and everyone rallied to combat it—until it turned...Bruce Schneier From Schneier on Security | January 15, 2025 at 07:00 AM
The next meeting of the Advanced Scientific Computing Advisory Committee (ASCAC), the federal advisory committee for the U.S. Department of Energy Office of Science...staff From insideHPC | January 14, 2025 at 04:51 PM
Taipei, Taiwan – January 14, 2025 – Enterprise storage company Infortrend Technology, Inc. (TWSE: 2495) introduced its high-density 4U 90-bay HDD solutions: unified...staff From insideHPC | January 14, 2025 at 04:34 PM
Beaverton, Ore. – Jan. 14, 2025 – The Ultra Accelerator Link Consortium, developer of the UALink for AI clusters, has announced the expansion of its board of directors...staff From insideHPC | January 14, 2025 at 12:33 PM
This is a current list of where and when I am scheduled to speak:
I’m speaking on “AI: Trust & Power” at Capricon 45 in Chicago, Illinois, USA, at 11:30 AM onBoskone...Bruce Schneier From Schneier on Security | January 14, 2025 at 12:05 PM
A key concern about AI is that models “hallucinate” — technical jargon for saying that they make up things that look right. Keeping AI models grounded in truthimplicit...Daniel Tunkelang From The Noisy Channel | January 14, 2025 at 09:02 AM
It was created in 1973 by Peter Kirstein:
So from the beginning I put password protection on my gateway. This had been done in such a way that even if UK users...Bruce Schneier From Schneier on Security | January 14, 2025 at 07:00 AM
The U.S. Department of Energy’s Office of Science, Advanced Scientific Computing Research (ASCR) program, announced that $35 million dollars is available to support...staff From insideHPC | January 13, 2025 at 05:17 PM
CHICAGO, Jan. 13, 2025 – To meet exponential demand, the data center sector will grow at a phenomenal pace in 2025, according to analyst firm JLL’s 2025 GlobalInvestment...staff From insideHPC | January 13, 2025 at 02:17 PM
Researchers at the Department of Energy’s Oak Ridge National Laboratory joined with network services provider EPB of Chattanooga and the University of Tennessee...staff From insideHPC | January 13, 2025 at 11:30 AM
13 January 2025 – Telehouse International Corporation of Europe, a data centre service provider, today announces the launch of its liquid cooling lab, following...Doug Black From insideHPC | January 13, 2025 at 11:25 AM
Not sure this will matter in the end, but it’s a positive move:
Microsoft is accusing three individuals of running a “hacking-as-a-service” scheme that was designed...Bruce Schneier From Schneier on Security | January 13, 2025 at 07:01 AM
Guest Post from Nick Sovitch. -----------------------------------------------------------------------------Bill Gasarch recently blogged on RANDOM THOUGHTS ON AI...gasarch From Computational Complexity | January 12, 2025 at 01:46 PM
Hashing algorithms convert input data into a fixed-size string of characters, known as a hash value or digest. These algorithms are one-way functions, meaning the...Daniel Lemire From Daniel Lemire's Blog | January 11, 2025 at 11:21 AM
We take the Internet for granted now, but it is not that long ago that it did not exist at all. Despite being disabled from birth with spina bifida, Adrian Stokes...Paul Curzon From CS4FN (Computer Science For Fun) | January 11, 2025 at 03:54 AM
News:
A sponge made of cotton and squid bone that has absorbed about 99.9% of microplastics in water samples in China could provide an elusive answer to ubiquitous...Bruce Schneier From Schneier on Security | January 10, 2025 at 05:06 PM