From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Good, fairly simple example of the automation of analytics. Here using Watson analytics. With commonly used exploratory goals. Explore it for freeIn Business...Franz Dill From The Eponymous Pickle | February 12, 2016 at 03:00 AM
Good instructional piece for a common kind of machine learning. Clustering. Easier to do in R, but the comparison is also very useful. In DSC: K-nearest neighbor...Franz Dill From The Eponymous Pickle | February 12, 2016 at 12:30 AM
Talk today by Tom Davenport: In particular how can we look at the current influence of fognitive/AI in the workplace? ... “Beyond Automation: Smart Machines +,...Franz Dill From The Eponymous Pickle | February 11, 2016 at 03:56 PM
This software, Fluxicon Disco, was new to me. Described in KDNuggets. I recall doing something similar in R, but this appears to cover the whole realm of process...Franz Dill From The Eponymous Pickle | February 11, 2016 at 03:38 PM
The National Science Foundation (NSF) Director France A. Córdova outlined President Obama’s fiscal year (FY) 2017 budget request to Congress for NSF. The FY17 request...Helen Wright From The Computing Community Consortium Blog | February 11, 2016 at 03:23 PM
Of interest is the involvement of the CPG giant Unilever. A data source, likely linked to real time analytics.Crowdoscope – a breakthrough survey and discussion...Franz Dill From The Eponymous Pickle | February 11, 2016 at 03:16 PM
PC sales have entered a slow decline. Today, you can literally work on your Microsoft Office documents no matter where you are, no matter what computing deviceContinue...Daniel Lemire From Daniel Lemire's Blog | February 11, 2016 at 02:06 PM
The first annual International Workshop on Performance Portable Programming Models for Accelerators has issued its Call for Papers. Known as P^3MA, the workshop...Rich Brueckner From insideHPC | February 11, 2016 at 01:54 PM
Today I released my worldwide survey of encryption products. The findings of this survey identified 619 entities that sell encryption products. Of those 412, or...Bruce Schneier From Schneier on Security | February 11, 2016 at 12:05 PM
“We expect NCSI to run for the next two decades. It’s a bit audacious to start a 20 year project in the last 18 months of an administration, but one of the things...john kirkley From insideHPC | February 11, 2016 at 11:14 AM
"A new supercomputer, dubbed Cheyenne, is expected to be operational at the beginning of 2017. The new high-performance computer will be a 5.34-petaflop system,...Rich Brueckner From insideHPC | February 11, 2016 at 10:50 AM
In this Graybeards Podcast, Molly Rector from DDN describes how HPC storage technologies are mainstreaming into the enterprise space. "In HPC there are 1000s of...Rich Brueckner From insideHPC | February 11, 2016 at 10:32 AM
"The combination of using both MPI and OpenMP is a topic that has been explored by many developers in order to determine the most optimum solution. Whether to use...MichaelS From insideHPC | February 11, 2016 at 10:04 AM
Have been always intrigued by storytelling, establishing a narrative, as a powerful way to convince, to advertise, to market. It also a way to convert your analytics...Franz Dill From The Eponymous Pickle | February 11, 2016 at 10:01 AM
Brought to my attention, understanding the limits of cognition and how it can be augmented with accessory augmentation. Note the use of the term: 'Mixed Reality'...Franz Dill From The Eponymous Pickle | February 11, 2016 at 09:59 AM
The ESA Conference (European Symposium on Algorithms) has a test-of-time award
which
recognizes outstanding papers in algorithms research that were published in...GASARCH From Computational Complexity | February 11, 2016 at 09:02 AM
EPIC has just launched "Data Protection 2016" to try to make privacy an issue in this year's elections. You can buy swag....Bruce Schneier From Schneier on Security | February 11, 2016 at 07:13 AM
For the first time ever, I attended a women-in-computing conference with absolutely no student affiliation whatsoever (I recently de-registered from my PhD forCanadian...Gail Carmichael From The Female Perspective of Computer Science | February 10, 2016 at 05:01 PM
AT&T's CEO believes that the company should not offer robust security to its customers: But tech company leaders aren't all joining the fight against the deliberate...Bruce Schneier From Schneier on Security | February 10, 2016 at 02:59 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Have you bought lift tickets at a ski resort lately? There are a lot of options. Different age groups, different days (week days, weekends, holidays) and different...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 10, 2016 at 02:40 PM