From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
David Lee Scher, MD – Owner & Director, DLS Healthcare Consulting discusses what he thinks are five important issues in achieving the ideal mobile technology user...Experientia From Putting People First | February 24, 2015 at 12:49 PM
Kara Pernice, the Managing Director at the Nielsen Norman Group, was a proud early adopter of the unique, cool, and pretty Nest device: “It helped me save energy...Experientia From Putting People First | February 24, 2015 at 12:37 PM
In early January, Mozilla UX conducted user research to refresh their understanding of how people save, share, and revisit mobile content with the goal of building...Experientia From Putting People First | February 24, 2015 at 11:45 AM
Today CoolIT Systems announced 2014 financials and growing demand for the company's Direct Contact Liquid Cooling technologies.
Rich Brueckner From insideHPC | February 24, 2015 at 10:54 AM
Today Cray announced that Stalprodukt S.A., a leading global steel processor, purchased a Cray XC30 supercomputer for structural analysis modeling used in the testing...staff From insideHPC | February 24, 2015 at 10:08 AM
The Seagate ClusterStor Secure Data Appliance (SDA) is the HPC industry’s first scale-out secure storage system officially ICD-503 certified to consolidate multiple...Kevin Normandeau From insideHPC | February 24, 2015 at 09:54 AM
Today the Open Fabrics Alliance announced that their upcoming International OFS Developers’ Workshop will center around three major themes: Applications Performance...Rich Brueckner From insideHPC | February 24, 2015 at 09:45 AM
In this video, Questacon visits NCI to take a look at Raijin, the southern hemisphere's first petaflop super computer. "Raijin, named after the Shinto God of thunder...Rich Brueckner From insideHPC | February 24, 2015 at 09:30 AM
AT&T is charging a premium for gigabit Internet service without surveillance: The tracking and ad targeting associated with the gigabit service cannot be avoided...Bruce Schneier From Schneier on Security | February 24, 2015 at 07:33 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
One of my favorite computer science teachers, Judy Hromcik from Texas, posted a link to a video called “The last banana: A thought experiment in probability.” The...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 24, 2015 at 06:21 AM
February 25 Hearing: The Senate Commerce, Science and Transportation Committee will hold a hearing titled “Preserving the Multistakeholder Model of Internet Governance...David Bruggeman From U.S. Public Policy Committee of the ACM | February 23, 2015 at 04:23 PM
The new NIH Data Science blog needs your help to start a conversation about Computational and Quantitative Collaborative Projects. Excerpt from their blog: Many...Helen Wright From The Computing Community Consortium Blog | February 23, 2015 at 04:09 PM
Earlier this month, our Education Development Centre hosted a teaching round table on the flipped classroom. At the session, engineering instructor Shermeen Nizami...Gail Carmichael From The Female Perspective of Computer Science | February 23, 2015 at 03:18 PM
"Developed by PGI, Cray, and NVIDIA, the OpenACC directives are a shared vision of how directives can simplify the programming model for accelerators, where each...Rich Brueckner From insideHPC | February 23, 2015 at 01:21 PM
Today Terascala announced that the University of Maryland, Baltimore County (UMBC) HPC Facility is using the company's software to manage Lustre-based parallel...Rich Brueckner From insideHPC | February 23, 2015 at 01:11 PM
It's gotten very difficult to mail a letter these days. There are no mailboxes along my ten mile commute. Georgia Tech has contracted with an outside company to...Lance Fortnow From Computational Complexity | February 23, 2015 at 12:11 PM
New research on tracking the location of smart phone users by monitoring power consumption: PowerSpy takes advantage of the fact that a phone's cellular transmissions...Bruce Schneier From Schneier on Security | February 23, 2015 at 11:48 AM
RENCI is sponsoring this year's Pearl Hacks, a two-day event designed to encourage college and high-school age women to develop their interest in technology....Rich Brueckner From insideHPC | February 23, 2015 at 10:54 AM
Video interview: Dr. Robert Wachter, chief of hospital medicine at UCSF Medical Center and a noted expert on quality and safety, says information technology is...Franz Dill From The Eponymous Pickle | February 23, 2015 at 08:37 AM