From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
SAN FRANCISCO – June 11, 2024 – Scality, a cyber-resilient storage for the AI era, today announced a large-scale deployment of its RING distributed file and object...staff From insideHPC | June 12, 2024 at 04:07 PM
Specialty AI processor company Cerebras Systems today announced a collaboration with Dell Technologies to deliver AI compute infrastructure for generative AI. It...staff From insideHPC | June 12, 2024 at 02:31 PM
The CCC Council’s Addressing the Unforeseen Deleterious Impacts of Technology (AUDIT) task force, composed of Nadya Bliss, Kevin Butler, David Danks, Ufuk Topcu...Haley Griffin From The Computing Community Consortium Blog | June 12, 2024 at 11:55 AM
Public polling is a critical function of modern political campaigns and movements, but it isn’t what it once was. Recent US election cycles have produced copious...Bruce Schneier From Schneier on Security | June 12, 2024 at 07:02 AM
SAN JOSE – June 11, 2024 – Optical interconnect company Ayar Labs today announced the appointment of Pooya Tadayon as its Vice President of Packaging and Test.Ayar...staff From insideHPC | June 11, 2024 at 04:56 PM
Researchers are developing ways to accelerate discovery by combining automated experiments, artificial intelligence and high-performance computing. A novel tool...staff From insideHPC | June 11, 2024 at 03:03 PM
Paris | Jun 11, 2024 — Viridien, formerly CGG, has announced a high-performance computing (HPC) agreement with Ranch Computing, a French rendering farm based in...Doug Black From insideHPC | June 11, 2024 at 01:01 PM
The Computing Community Consortium (CCC) continues to be amazed by the accomplishments of our council members. On May 31, Pamela Wisniewski was appointed to the...Petruce Jean-Charles From The Computing Community Consortium Blog | June 11, 2024 at 10:03 AM
New research: “Deception abilities emerged in large language models“:
Abstract: Large language models (LLMs) are currently at the forefront of intertwining AI systems...Bruce Schneier From Schneier on Security | June 11, 2024 at 07:02 AM
TORONTO and SHERBROOKE, Quebec (June 11, 2024) – OTI Lumionics, developer of advanced materials for consumer electronics, and Nord Quantique, a quantum computing...Doug Black From insideHPC | June 11, 2024 at 07:00 AM
My writing on AI-powered search promotes the “bag-of-documents” model, which represents a search query as a distribution of vectors for relevant documents. When...Daniel Tunkelang From The Noisy Channel | June 10, 2024 at 02:27 PM
For an analysis of the state of AI, the Stanford Institute for Human-Centered AI (HAI) produces an annual AI Index that breaks down the industry into key thematic...staff From insideHPC | June 10, 2024 at 01:37 PM
Imagine a situation where an AI system labels someone as high risk without taking into account important factors like their low income, family responsibilities,...Petruce Jean-Charles From The Computing Community Consortium Blog | June 10, 2024 at 12:50 PM
Trondheim, Norway June 10 – Sigma2 AS, Norway’s official provider of national e-infrastructure resources for research, has announced its collaboration with Iris...Doug Black From insideHPC | June 10, 2024 at 11:59 AM
SUNNYVALE, Calif., June 10, 2024 — Synopsys (Nasdaq: SNPS) today announced what it said is the industry’s first PCIe 7.0 IP solution consisting of controller, IDE...staff From insideHPC | June 10, 2024 at 11:08 AM
Good June morning! It’s been an interesting week in HPC-AI, here’s a quick (6:53) review of the latest news and trends: Clinical trials for cancer fighting drug...staff From insideHPC | June 10, 2024 at 10:38 AM
From ACM-W supporting, celebrating and advocating for Women in Computing
As we celebrate the establishment of the new ACM-W professional chapter, we are all thrilled to envision what lies ahead for the founders and members in the coming...Cigdem Sengul From ACM-W supporting, celebrating and advocating for Women in Computing | June 10, 2024 at 09:39 AM
Interesting research: “Hyperlink Hijacking: Exploiting Erroneous URL Links to Phantom Domains“:
Abstract: Web users often follow hyperlinks hastily, expecting them...Bruce Schneier From Schneier on Security | June 10, 2024 at 07:08 AM
For this post all Context Free Grammars (henceforth CFGs) are assumed to be in Chomsky Normal Form. The size of a CFG \(G\) is the number of rules. We denote this...gasarch From Computational Complexity | June 9, 2024 at 09:10 PM
Modern processors have instructions to process several bytes at once. Effectively all processors have the capability of processing 16 bytes one once. These instructions...Daniel Lemire From Daniel Lemire's Blog | June 8, 2024 at 12:55 AM