From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Foremost public site for practical nanotechnology. It is still extending our understanding of a number ways we can work with material structure. And how we might...Franz Dill From The Eponymous Pickle | May 16, 2015 at 04:15 PM
Mosongo Moukwa, Director of Technology at PolyOne writes on the growing pains of 3D printing.Franz Dill From The Eponymous Pickle | May 16, 2015 at 12:07 PM
An opportunity for new kinds of analytics in media planning. In Adage: " .... P&G to Review Massive Media Planning and Buying Business Across North America In...Franz Dill From The Eponymous Pickle | May 16, 2015 at 09:51 AM
In FastCoexist: We looked at sponsoring examples like the '$100 laptop' for the third world. . What are the applications for the IOT?The World's First $9 Computer...Franz Dill From The Eponymous Pickle | May 16, 2015 at 09:40 AM
In the second article in his series on future hardware for HPC, Robert Roe from Scientific Computing World looks at alternatives to the x86, including server on...staff From insideHPC | May 16, 2015 at 07:00 AM
The 2nd Workshop on Accelerator Programming using Directives has issued its Call for Papers. The WACCPD Workshop takes place Nov. 16 in Austin in conjunction with...Rich Brueckner From insideHPC | May 15, 2015 at 06:23 PM
NASA is funding a study for a squid rover that could explore Europa's oceans. As usual, you can also use this squid post to talk about the security stories in the...Bruce Schneier From Schneier on Security | May 15, 2015 at 05:08 PM
By: Richard E. Ladner University of Washington In 2010-2011, approximately 13 percent of K-12 students have a recognized disability according to the National Center...Tiffany Nash From Computer Science Teachers Association | May 15, 2015 at 02:40 PM
Good infographic visual summary of the current state of the two languages for data science use. Not a how to, but a tabular comparison.Franz Dill From The Eponymous Pickle | May 15, 2015 at 01:27 PM
While we're always on the lookout for HPC news, not everything makes it to the front page. Here are some notable items from this week.
The post HPC News Bytes for...Rich Brueckner From insideHPC | May 15, 2015 at 12:42 PM
Yesterday posted about the talk on SocioPragmatic text Modeling. More has been published in the Cognitive Systems Institute Linkedin Group, I quote some of...Franz Dill From The Eponymous Pickle | May 15, 2015 at 11:41 AM
"Rapid growth in the use cases and demands for extreme computing and huge data processing is leading to convergence of the two infrastructures. The trend towards...Rich Brueckner From insideHPC | May 15, 2015 at 11:28 AM
Have been following voice driven systems, especially for smart home applications, but also for potential manufacturing-design-test applications. At the recent...Franz Dill From The Eponymous Pickle | May 15, 2015 at 11:19 AM
Engility is seeking a Computational Scientist in our Job of the Week. This position can be based in the following locations: AFRL (Ohio) , ARL (Maryland) , NRLJob...Rich Brueckner From insideHPC | May 15, 2015 at 10:48 AM
In this session we describe how GPUs can be used within virtual environments with near-native performance. We begin by showing GPU performance across four hypervisors...Rich Brueckner From insideHPC | May 15, 2015 at 10:35 AM
SC15 is now accepting applications for their Doctoral Showcase. As part of the Technical Program, the Doctoral Showcase provides an important opportunity for students...staff From insideHPC | May 15, 2015 at 10:18 AM
In CSO Online: At least the article mentions that most are still benign. But who defines that? Franz Dill From The Eponymous Pickle | May 15, 2015 at 09:48 AM
Interesting: Franzosa and colleagues used publicly available microbiome data produced through the Human Microbiome Project (HMP), which surveyed microbes in the...Bruce Schneier From Schneier on Security | May 15, 2015 at 07:20 AM
A few years ago, working with a diverse group of scientists, I was looking at a problem related to big data analysis. The setting was data exploration, where you...Michael Mitzenmacher From My Biased Coin | May 15, 2015 at 12:58 AM
On April 1, I announced the Eighth Movie Plot Threat Contest: demonstrate the evils of encryption. Not a whole lot of good submissions this year. Possibly this...Bruce Schneier From Schneier on Security | May 15, 2015 at 12:26 AM