From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Intriguing piece I have only scanned so far. What got me most interested is that the tracing aspect included a considerable human element, at least if you were...Franz Dill From The Eponymous Pickle | June 30, 2020 at 04:18 PM
The following is a letter from CCC Chair Mark D. Hill from the University of Wisconsin-Madison. Hello: Tonight the Computing Community Consortium transitions leadership...Helen Wright From The Computing Community Consortium Blog | June 30, 2020 at 02:24 PM
The Computing Community Consortium (CCC) is pleased to announce the release of the Computational Support for Substance Use Disorder Prevention, Detection, Treatment...Helen Wright From The Computing Community Consortium Blog | June 30, 2020 at 02:10 PM
The IBM-led OpenPOWER Foundation announced the contribution of the IBM A2I POWER processor core design and associated FPGA environment to the open source ecosystem...Doug Black From insideHPC | June 30, 2020 at 01:21 PM
The general idea has been brought up a number of times. Bouncing radar and cooperative systems can get more data, and if we interpret it to detect dangers, weRadar...Franz Dill From The Eponymous Pickle | June 30, 2020 at 01:17 PM
What I have been thinking. Specifically, not generally accountable. Even if the major players stop doing this, others quickly will.Bans on Facial Recognition...Franz Dill From The Eponymous Pickle | June 30, 2020 at 12:06 PM
Google has removed 25 Android apps from its store because they steal Facebook credentials: Before being taken down, the 25 apps were collectively downloaded more...Bruce Schneier From Schneier on Security | June 30, 2020 at 11:15 AM
In this guest article, our friends at Intel discuss how accelerated computing has diversified over the past several years given advances in CPU, GPU, FPGA, andNew...staff From insideHPC | June 30, 2020 at 09:15 AM
Yet another example of using more sensors and connections to build intelligent management of vehicles within large systems. Just underway.Pilot Test Begins for...Franz Dill From The Eponymous Pickle | June 30, 2020 at 07:20 AM
Sensors gather measurement data, which is crucial to learning hypothesis about complex systems. Here an introduction to the concept of a quantum sensor.Quantum...Franz Dill From The Eponymous Pickle | June 30, 2020 at 07:13 AM
By blowing up its objects Composite crop of src1, src2 Joshua Greene and Andrew Lobb proved last month that every smooth Jordan curve in the plane and real , there...KWRegan From Gödel's Lost Letter and P=NP | June 29, 2020 at 05:20 PM
I was re-watching the Greatest-of-all-time Jeopardy championship and the following happen (I paraphrase)
----------------------
Alex Trebek: The category isBreaking...GASARCH From Computational Complexity | June 29, 2020 at 04:36 PM
At his annual keynote address closing out the ISC 2020 conference, Thomas Sterling, Professor of Intelligent Systems Engineering at the University of Indiana, eulogized...staff From insideHPC | June 29, 2020 at 03:44 PM
Intriguing aspects of IOT in hospitality. Has been less in the area of assistants than I expected.Shedding Light (and Sound) on Hidden IoT Devices in Your Next...Franz Dill From The Eponymous Pickle | June 29, 2020 at 03:11 PM
Contributions to this post were provided by members of the Computing Community Consortium (CCC) Fairness, Accountability, Disinformation, and Explainability (FADE)...Helen Wright From The Computing Community Consortium Blog | June 29, 2020 at 02:52 PM
A new episode of the Computing Community Consortium‘s (CCC) podcast, Catalyzing Computing, is now available. This is part 3 of Khari Douglas’ interview with Dr....Khari Douglas From The Computing Community Consortium Blog | June 29, 2020 at 01:09 PM
Intriguing new effort:The Confidential Computing Consortium (CCC) brings together hardware vendors, cloud providers, and software developers to accelerate the adoption...Franz Dill From The Eponymous Pickle | June 29, 2020 at 12:31 PM
iOS apps are repeatedly reading clipboard data, which can include all sorts of sensitive information. While Haj Bakry and Mysk published their research in March...Bruce Schneier From Schneier on Security | June 29, 2020 at 11:24 AM
And related to the last post, some work is progressing on doing functional mimicry:Engineers design a device that operates like a brain synapseIon-based technology...Franz Dill From The Eponymous Pickle | June 29, 2020 at 09:45 AM
This special report sponsored by Dell Technologies, takes a look at how now more than ever, agencies from all levels of government are teaming with private Information...staff From insideHPC | June 29, 2020 at 09:00 AM