From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Frank Ham from Cascade Technologies presented this talk at the Stanford HPC Conference. "A spin-off of the Center for Turbulence Research at Stanford University...Rich Brueckner From insideHPC | February 10, 2017 at 10:00 AM
Interesting research: "De-anonymizing Web Browsing Data with Social Networks": Abstract: Can online trackers and network adversaries de-anonymize web browsing data...Bruce Schneier From Schneier on Security | February 10, 2017 at 09:25 AM
The following is a guest blog post by past CCC Chair Greg Hager from Johns Hopkins University. Artificial intelligence (AI) has emerged into the public view as...Helen Wright From The Computing Community Consortium Blog | February 9, 2017 at 02:45 PM
The next WATCH talk, called Industry Leaders and Academic Privacy Researchers: Adversaries or Partners? is Thursday, February 16th, from Noon-1pm EST. The presenter...Helen Wright From The Computing Community Consortium Blog | February 9, 2017 at 01:53 PM
Like the idea, we never made it formal, but tested the concept driven by competition.Is your team’s new engineer ready to take on-call? Use wargames for training...Franz Dill From The Eponymous Pickle | February 9, 2017 at 12:40 PM
"This tutorial will present several features that the draft Fortran 2015 standard introduces to meet challenges that are expected to dominate massively parallel...Rich Brueckner From insideHPC | February 9, 2017 at 12:00 PM
Today Allinea Software launched the first update to its well-established toolset for debugging, profiling and optimizing high performance code since being acquired...staff From insideHPC | February 9, 2017 at 11:45 AM
Marketing, Mr Clean and Shifting Models (Excerpt, read the whole thing)P&G Super Bowl Ads Point to a Shift in the Marketing Model by Bob GilbreathCo-Founder &...Franz Dill From The Eponymous Pickle | February 9, 2017 at 11:43 AM
“China and the United States have been in the race to develop the most capable supercomputer. China has announced that its exascale computer could be released sooner...Rich Brueckner From insideHPC | February 9, 2017 at 11:20 AM
In this video from KAUST Live: Patricia Damkroger discusses her new role as Vice President, Data Center Group and General Manager, Technical Computing Initiative...Rich Brueckner From insideHPC | February 9, 2017 at 10:48 AM
“U.S. Patent 9,496,200 protects the invention of utilizing a modular, building block approach for datacenter cooling with direct contact liquid cooling,” said Geoff...staff From insideHPC | February 9, 2017 at 10:22 AM
"By implementing popular Python packages such as NumPy, SciPy, scikit-learn, to call the Intel Math Kernel Library (Intel MKL) and the Intel Data Analytics Acceleration...Richard Friedman From insideHPC | February 9, 2017 at 10:09 AM
Lately, I have been collecting IoT security and privacy guidelines. Here's everything I've found: "Internet of Things (IoT) Broadband Internet Technical Advisory...Bruce Schneier From Schneier on Security | February 9, 2017 at 08:14 AM
Arash Rafiey, Jeff Kinne and Tomás Feder settle the Feder-Vardi dichotomy conjecture in their paper Dichotomy for Digraph Homomorphism Problems. Jeff Kinne is my...Lance Fortnow From Computational Complexity | February 9, 2017 at 07:11 AM
Ultimately faster and tailored hardware will be required for machine learning.In ZDNet:IBM launches cognitive computing hardware unit: Enter the Watson, Power 9...Franz Dill From The Eponymous Pickle | February 9, 2017 at 02:09 AM
Gaussian Processes, like Bayesian methods introduce natural uncertainty to modeling. And provide more transparency than deep learning neural nets to the models...Franz Dill From The Eponymous Pickle | February 8, 2017 at 05:29 PM
On the use of data and algorithms to predict crime in the US data. Extensive, largely non technical article.It's Not the Algorithm, It's the Data By Keith Kirkpatrick...Franz Dill From The Eponymous Pickle | February 8, 2017 at 02:59 PM
The National Science Foundation (NSF) Directorate for Computer and Information Science and Engineering (CISE) is pleased to announce a distinguished lecture on...Helen Wright From The Computing Community Consortium Blog | February 8, 2017 at 02:38 PM
This online safety guide was written for people concerned about being tracked and stalked online. It's a good resource....Bruce Schneier From Schneier on Security | February 8, 2017 at 02:20 PM
Outlier detection and analysis is an important topic for any kind of data. Outliers, depending on their context, can be useful, or dangerous in the development...Franz Dill From The Eponymous Pickle | February 8, 2017 at 12:50 PM