From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The National Center for Supercomputing Applications in Illinois was recently awarded $4.9 million of supplemental funding from the U.S. National Science Foundation...Doug Black From insideHPC | June 5, 2024 at 10:33 AM
June 3, 2024 — The Government of British Columbia and the Digital Research Alliance of Canad are investing over $81M into the supercomputers at Simon Fraser University...staff From insideHPC | June 5, 2024 at 10:23 AM
LONDON and AUSTIN, June 5, 2024 — ORCA Computing, a quantum computing company, has been selected by Montana State University (MSU) to supply two PT-1 quantum photonics...Doug Black From insideHPC | June 5, 2024 at 09:00 AM
Microsoft recently caught state-backed hackers using its generative AI tools to help with their attacks. In the security community, the immediate questions weren...Bruce Schneier From Schneier on Security | June 5, 2024 at 07:00 AM
NEW YORK & LAS VEGAS – June 4, 2024 – AI data platform company VAST Data today at Cisco Live 2024 announced it is collaborating with Cisco (NASDAQ: CSCO), the leader...staff From insideHPC | June 4, 2024 at 12:27 PM
Interesting story of breaking the security of the RoboForm password manager in order to recover a cryptocurrency wallet password.
Grand and Bruno spent months reverse...Bruce Schneier From Schneier on Security | June 4, 2024 at 07:08 AM
Frankfurt/Main – 3 June 2024 – Northern Data Group (German stock market: NB2, ISIN: DE000A0SMU87), a provider of HPC solutions, today announces the launch of its...staff From insideHPC | June 3, 2024 at 03:41 PM
The call for nominations for the Test of Time Award at FOCS 2024 has been posted here.Eligibility and past winners are here.Points1) It is good to have an award...gasarch From Computational Complexity | June 3, 2024 at 02:42 PM
In the rapidly evolving landscape of computing, grand challenges emerge as pivotal milestones that shape the trajectory of technological advancement and societal...Petruce Jean-Charles From The Computing Community Consortium Blog | June 3, 2024 at 10:04 AM
SEATTLE – June 3rd, 2024 – Today, data storage and management company Qumulo said it achieved the industry’s fastest and most cost-effective cloud-native storage...staff From insideHPC | June 3, 2024 at 09:10 AM
NEW YORK, June 3, 2024 – Vector database AI company Pinecone today announced that Lauren Nemeth and Bob Muglia have joined the company as chief operating officer...Doug Black From insideHPC | June 3, 2024 at 08:40 AM
Technology was once simply a tool—and a small one at that—used to amplify human intent and capacity. That was the story of the industrial revolution: we could control...Bruce Schneier From Schneier on Security | June 3, 2024 at 07:06 AM
A piece I coauthored with Fredrik Heiding and Arun Vishwanath in the Harvard Business Review:
Summary. Gen AI tools are rapidly making these emails more advanced...Bruce Schneier From Schneier on Security | June 3, 2024 at 07:04 AM
It seems like we’ve been noticing 34 everywhere we look lately, whether it’s on billboards, in phone numbers, or even inside fortune cookies. Is it all just a coincidence...rjlipton From Gödel's Lost Letter and P=NP | June 1, 2024 at 12:18 PM
by Paul Curzon, Queen Mary University of London One way to use logical thinking is to deduce new facts but then turn them into IF-THEN rules. They tell us an action...Paul Curzon From CS4FN (Computer Science For Fun) | June 1, 2024 at 07:10 AM
This video might be a juvenile colossal squid.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered....Bruce Schneier From Schneier on Security | May 31, 2024 at 05:02 PM
DENVER – May 31, 2024 – CEA-Leti scientists have reported three projects at ECTC 2024 that they say are steps to enabling CMOS image sensors (CIS) that can exploit...staff From insideHPC | May 31, 2024 at 09:06 AM
I don’t think it’s an exaggeration to predict that artificial intelligence will affect every aspect of our society. Not by doing new things. But mostly by doing...Bruce Schneier From Schneier on Security | May 31, 2024 at 07:04 AM
In software, we often represent strings by surrounding them with quotes ("). What happens if the string itself contains quotes? We then need to escape the string...Daniel Lemire From Daniel Lemire's Blog | May 30, 2024 at 11:48 PM
In the quest for software optimization, a trusty companion is the sampling profiler, a tool available in most programming languages. These profilers work unobtrusively...Daniel Lemire From Daniel Lemire's Blog | May 30, 2024 at 03:33 PM