From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In CIMdata's Linkedin Group: My former colleague writes.CIMdata's Dr. Suna Polat asks the question, Can Collaborative Innovation and Technology Accelerate andI...Franz Dill From The Eponymous Pickle | June 12, 2015 at 09:53 PM
How dead squid is made to dance when soy sauce is poured on it. As usual, you can also use this squid post to talk about the security stories in the news that I...Bruce Schneier From Schneier on Security | June 12, 2015 at 05:41 PM
It's Iaido, not sword fighting, but still. Of course, the two didn't battle each other, but competed in Iaido tests like cutting mats and flowers in various cross...Bruce Schneier From Schneier on Security | June 12, 2015 at 02:38 PM
Podcast and text, interesting thoughts.Thomson Reuters on making information usefulThe CEO of the news, information, and professional-software company, Jim Smith...Franz Dill From The Eponymous Pickle | June 12, 2015 at 01:15 PM
In McKinsey: Has been a while since I have worked with this technique, some good ideas and hints to make it useful. Not the same thing as Business Process Modeling...Franz Dill From The Eponymous Pickle | June 12, 2015 at 01:10 PM
Over at the Nvidia Blog, George Middleton writes that Tesla K80 GPUs powered the winning team from Tsinghua University at the recent ASC15 International Student...Rich Brueckner From insideHPC | June 12, 2015 at 12:48 PM
The Washington Post has a good two part story on the history of insecurity of the Internet....Bruce Schneier From Schneier on Security | June 12, 2015 at 12:45 PM
This makes much sense. Marketing as a whole is a kind of prediction with considerable risk. Anything that can be done to improve your accuracy is of value. Taking...Franz Dill From The Eponymous Pickle | June 12, 2015 at 12:22 PM
Addressing the angry customer with AI? Have investigated this in the past with advisory systems. People do react to systems differently than people. Possible...Franz Dill From The Eponymous Pickle | June 12, 2015 at 12:01 PM
"The combination of using a host cpu such as an Intel Xeon combined with a dedicated coprocessor such as the Intel Xeon Phi coprocessor has been shown in many cases...MichaelS From insideHPC | June 12, 2015 at 11:30 AM
"The strengths and the limitations of Europe’s supercomputing strategy were laid out at the PRACEDdays15 conference in Dublin at the end of May, with the mindsWill...Rich Brueckner From insideHPC | June 12, 2015 at 11:24 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Today is the final day for teachers at my school. Students finished yesterday. Through some luck of timing and hard work all my grades are already in the system...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | June 12, 2015 at 09:39 AM
Over the past year the insideHPC editorial team have put together a series of special reports on a variety of HPC topics. These reports can be read online in an...Kevin Normandeau From insideHPC | June 12, 2015 at 09:02 AM
Interesting view of consumer product mix:" ... Despite the fact that 85 percent of American household needs are consistently filled with the same 150 items1, new...Franz Dill From The Eponymous Pickle | June 12, 2015 at 08:11 AM
Kaspersky Labs has discovered and publicized details of a new nation-state surveillance malware system, called Duqu 2.0. It's being attributed to Israel. There's...Bruce Schneier From Schneier on Security | June 12, 2015 at 07:18 AM
Arden Bement from Purdue University presented this keynote at the NCSA Blue Waters Symposium. "Over the three decades supercomputer throughput rates have increased...Rich Brueckner From insideHPC | June 12, 2015 at 07:00 AM
The U.S. limits the export of certain high-tech items that might be used inappropriately (from the government’s point of view). This is intended to prevent (orPurdue...Gene Spafford From CERIAS Blog | June 12, 2015 at 02:15 AM
The U.S. limits the export of certain high-tech items that might be used inappropriately (from the government’s point of view). This is intended to prevent (orPurdue...Gene Spafford From CERIAS Blog | June 12, 2015 at 02:15 AM
From DSC, by Martyn Jones. I add: Not a bad selection of warnings and cautions of the use and use of Big Data. Similar things could have been said about many...Franz Dill From The Eponymous Pickle | June 11, 2015 at 07:47 PM
In Cincinnati, A good example of how bricks retailers are testing shop online and pickup grocery shopping. For Kroger pickup is only at one store so far. The...Franz Dill From The Eponymous Pickle | June 11, 2015 at 04:13 PM