From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
I know that floating-point arithmetic is a bit crazy on modern computers. For example, floating-point numbers are not associative: 0.1+(0.2+0.3) == 0.599999999999999978...Daniel Lemire From Daniel Lemire's Blog | June 26, 2020 at 05:18 PM
Interesting article on the rise of the jumbo squid industry as a result of climate change. As usual, you can also use this squid post to talk about the security...Bruce Schneier From Schneier on Security | June 26, 2020 at 04:57 PM
A UK piece on the topic of computing and dispute resolutions, code as evidence, which came up with respect to smart contracts. Click through for useful and detailed...Franz Dill From The Eponymous Pickle | June 26, 2020 at 01:00 PM
I had mentioned this talk, here is the recording:Correspondent Jim Spohrer talks about robot tech in our pandemic futures. ...ISSIP Speaker Series: COVID-19Speaker...Franz Dill From The Eponymous Pickle | June 26, 2020 at 12:37 PM
HPC industry veteran Jack Collins, long-time fixture in the scientific supercomputing community, has seen it all in HPC, from the days when his input/output device...staff From insideHPC | June 26, 2020 at 12:16 PM
This is true, if you don't have ready understanding/access into the local architecture, its much harder to get the data to train models in context. And certainly...Franz Dill From The Eponymous Pickle | June 26, 2020 at 11:33 AM
As predicted, the Dash Wand has gone away. I don't think I ever bought anything with it, just put it on a list to look at or buy later. As noted below, they...Franz Dill From The Eponymous Pickle | June 26, 2020 at 11:03 AM
In this episode of Let’s Talk Exascale, Mark Taylor of Sandia National Laboratories talks about using exascale supercomputers for severe weather and water resource...staff From insideHPC | June 26, 2020 at 10:18 AM
Interesting research: "Identifying Unintended Harms of Cybersecurity Countermeasures": Abstract: Well-meaning cybersecurity risk owners will deploy countermeasures...Bruce Schneier From Schneier on Security | June 26, 2020 at 08:00 AM
Some technologies, it’s said, are “always 10 years away” – we hear this in reference to autonomous vehicles and quantum computing. Of course, how far away we think...staff From insideHPC | June 25, 2020 at 06:36 PM
Intel and the National Science Foundation (NSF), joint funders of the Machine Learning for Wireless Networking Systems (MLWiNS) program, today announced recipients...staff From insideHPC | June 25, 2020 at 03:02 PM
While some in computing saw computing security as mostly a software issue, 2018’s Meltdown and Spectre publicized that security is a hardware issue as well. This...Helen Wright From The Computing Community Consortium Blog | June 25, 2020 at 02:11 PM
This post both relates to some of the stuff I'll be presenting at Friday's STOC workshop on Algorithms with Predictions, but is also for future students in my classes...Michael Mitzenmacher From My Biased Coin | June 25, 2020 at 01:35 PM
I see that Virtualitics has a June Newsletter out, we helped test early beta versions. I see you can now schedule a 30 day free immersive trial. See my past experiences...Franz Dill From The Eponymous Pickle | June 25, 2020 at 11:54 AM
An area we also worked in, detecting counterfeits. But then isn't this another cooperation with law enforcement?Amazon forms Counterfeit Crimes Unit to tackleThe...Franz Dill From The Eponymous Pickle | June 25, 2020 at 10:55 AM
In this Sponsored Post, our friends over at Altair explain how remote access and cloud collaboration tools allow companies of all sizes to discover and innovate...staff From insideHPC | June 25, 2020 at 09:00 AM
Fascinating detail. As a long time part time botanist, of interest. But how well can it effectively being done? Will the use of drones interfere with natural...Franz Dill From The Eponymous Pickle | June 25, 2020 at 08:51 AM
Look forward to the details on this, any way you can create better intelligence is good. Note changes in training methods.Google Assistant Upgrades Action Developer...Franz Dill From The Eponymous Pickle | June 25, 2020 at 08:35 AM
New research: "Best Practices for IoT Security: What Does That Even Mean?" by Christopher Bellman and Paul C. van Oorschot: Abstract: Best practices for Internet...Bruce Schneier From Schneier on Security | June 25, 2020 at 08:09 AM
Another project with aim at paying users for their data. Links to our long term data as an asset view.Andrew Yang Is Pushing Big Tech to Pay Users for DataBy The...Franz Dill From The Eponymous Pickle | June 25, 2020 at 12:45 AM