From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
"One of the most recurrent themes is that of open-source vs. proprietary code. This debate is often painted with the idealistic open-source evangelists on one side...staff From insideHPC | May 27, 2016 at 11:02 AM
"The world of artificial intelligence is rapidly evolving and affecting every aspect of our daily life. And soon this progress will be felt in the pharmaceutical...staff From insideHPC | May 27, 2016 at 10:35 AM
Today Vela Software announced that it has acquired Tecplot, a leading provider of fluid dynamics visualization and analysis software for engineers and scientists...Rich Brueckner From insideHPC | May 27, 2016 at 10:01 AM
In CWorld:" ... Google is doubling down on its commitment to the business analytics market with the launch of a new free data visualization tool. The company has...Franz Dill From The Eponymous Pickle | May 27, 2016 at 08:53 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
One of my big goals this year has been to make my classes more interactive. I want to get kids involved and not be just passive listeners. Surprisingly students...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | May 27, 2016 at 07:56 AM
Interesting research paper: Cormac Herley, "Unfalsifiability of security claims: There is an inherent asymmetry in computer security: things can be declared insecure...Bruce Schneier From Schneier on Security | May 27, 2016 at 07:19 AM
Misunderstanding Positive Emotion A Conversation With June Gruber" ... This work we've been doing in positive emotion and psychopathology has the potential to change...Franz Dill From The Eponymous Pickle | May 26, 2016 at 08:59 PM
The Dutch government is considering banning the country's millions of cyclists from using their cellphones while riding, saying pedaling and phones are a dangerous... From Phys.org Technology News | May 26, 2016 at 03:30 PM
The U.S. National Telecommunications and Information Administration (NTIA) will convene a multistakeholder meeting on the commercial use of facial recognition technology...Renee Dopplick From U.S. Public Policy Committee of the ACM | May 26, 2016 at 11:57 AM
"The process of developing HPC software requires consideration of issues in software design as well as practices that support the collaborative writing of well-structured...Rich Brueckner From insideHPC | May 26, 2016 at 11:54 AM
Exascale computing, the ability of a computer system to perform a million trillion operations per second, has been long anticipated as the next major step in computer...Vasileios Kalantzis From XRDS | May 26, 2016 at 11:40 AM
Using Watson, Twitter and CDC Data for predicting flu epidemics. Modeling under specific contexts. By Prof. Dr. Gordon Pipa, University of Osnabrueck Embeddedin...Franz Dill From The Eponymous Pickle | May 26, 2016 at 11:20 AM
The TERATEC Forum 2016 will host a June 29 workshop on HPC, Connected Objects, and IoT Infrastructures. The full event takes place June 28-29 in Palaiseau, France...Rich Brueckner From insideHPC | May 26, 2016 at 11:00 AM
"Weather prediction using high performance computing relies on having physically based models of the atmosphere that can deliver forecasts well in advance of the...Rich Brueckner From insideHPC | May 26, 2016 at 10:35 AM
Any complex system that requires the direction and interaction of many people and machines. And whose output also depends on many uncontrollable external variables...Franz Dill From The Eponymous Pickle | May 26, 2016 at 10:22 AM
In Engadget: Pointers to a paper from Carnegie. Though a quick read would say that this would address only certain kinds of algorithmic bias. Technical. Worth...Franz Dill From The Eponymous Pickle | May 26, 2016 at 10:07 AM
The process to vectorize application code is very important and can result in major performance improvements when coupled with vector hardware. In many cases, incremental...MichaelS From insideHPC | May 26, 2016 at 09:56 AM
In the fall we point to theory jobs, in the spring we see who got them. How is the CS enrollment explosion affecting the theory job market? We've seen some big ...Lance Fortnow From Computational Complexity | May 26, 2016 at 08:23 AM
Suckfly seems to be another Chinese nation-state espionage tool, first stealing South Korean certificates and now attacking Indian networks. Symantec has done a...Bruce Schneier From Schneier on Security | May 26, 2016 at 07:31 AM
Why do so many software companies and developers give away so much of their work in the form of open source, writing,
and speaking? Why would they invest thousands... From Writing | May 26, 2016 at 03:00 AM