From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Brought to my attention, a simple way to deliver plots. Not perfect or anywhere near complete, but I like to collect simple means. I have Tableau, Excel and half...Franz Dill From The Eponymous Pickle | February 21, 2015 at 09:47 AM
Trends in 2015, the need for real time" ... Project teams will deliberate less and plan in real-time more. Companies will recognize a cultural difference as a point...Franz Dill From The Eponymous Pickle | February 21, 2015 at 09:28 AM
On February 15th the President issued an Executive Memorandum on the domestic use of unmanned aerial systems (UAS/drones). That same day the Federal Aviation Administration...David Bruggeman From U.S. Public Policy Committee of the ACM | February 20, 2015 at 07:26 PM
This is freaky: A new study showcases the first example of an animal editing its own genetic makeup on-the-fly to modify most of its proteins, enabling adjustments...Bruce Schneier From Schneier on Security | February 20, 2015 at 05:55 PM
It's not just national intelligence agencies that break your https security through man-in-the-middle attacks. Corporations do it, too. For the past few months,...Bruce Schneier From Schneier on Security | February 20, 2015 at 04:53 PM
In the ACM " ... Pennsylvania State University (PSU) researchers are studying how smart cameras could eventually guide visually impaired shoppers to find the...Franz Dill From The Eponymous Pickle | February 20, 2015 at 02:08 PM
A prediction that Watson Analytics will also prepare the data. Often a tedious and error prone activity. There are many aspects of preparing and scrubbing data...Franz Dill From The Eponymous Pickle | February 20, 2015 at 01:55 PM
From today's CSIG talk. Slides at the link. The use of simulation and game technologies to understand the operation of alternative architectures. Here specifically...Franz Dill From The Eponymous Pickle | February 20, 2015 at 01:48 PM
A Linkedin discussion on the topic, which includes some comments of my own on several systems we built that have been mentioned here. Assistance can mean to augment...Franz Dill From The Eponymous Pickle | February 20, 2015 at 01:45 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
A post at Doug Peterson’s blog (A Different Time) sent me to a site that has a collection of old BASIC programs. And by old I mean the 1970s. I remember many of...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 20, 2015 at 12:55 PM
The Aberdeen Proving Ground in Maryland is seeking a Principal HPC Architect in our Job of the Week. The candidate will performs studies and develops new HPC technology...Rich Brueckner From insideHPC | February 20, 2015 at 11:39 AM
In this video, Ken Kraft from Intel describes his experiences as a participant in SC Conference Mentor-Protege program. "The SC15 conference is broadening its mission...Rich Brueckner From insideHPC | February 20, 2015 at 11:09 AM
This week the OpenPOWER Foundation announced their lineup of speakers for the inaugural OpenPOWER Summit at the GPU Technology Conference in San Jose, March 17-19...staff From insideHPC | February 20, 2015 at 10:40 AM
Erin Taylor and Gawain Lynch of the Institute for Money, Technology and Financial Inclusion (UCI) lead a research project aimed at understanding people’s financial...Experientia From Putting People First | February 20, 2015 at 09:30 AM
I’ve been online long enough to see a lot of negativity. I wear a bracelet that reads “Don’t. Read. The. Comments.” (a gift from Molly Steenson) to remind myself...zephoria From Apophenia | February 20, 2015 at 09:28 AM
The Intercept has an extraordinary story: the NSA and/or GCHQ hacked into the Dutch SIM card manufacturer Gemalto, stealing the encryption keys for billions of...Bruce Schneier From Schneier on Security | February 20, 2015 at 08:52 AM
In this special guest perspective from Scientific Computing World, Tom Wilkie considers some initiatives to counter the widespread impression that scientific computing...Rich Brueckner From insideHPC | February 20, 2015 at 07:00 AM
Digital Assurance: Reaching a Seamless Customer Experience by Shawndra Hill (Wharton professor of operations and information management) and Kumudha Sridharan (vice...Experientia From Putting People First | February 20, 2015 at 04:34 AM
USACM has sent letters to each of the three newly sworn-in Commissioners of the Election Assistance Commission (EAC): Thomas Hicks, Matthew Masterson and Christy...David Bruggeman From U.S. Public Policy Committee of the ACM | February 19, 2015 at 05:54 PM
There has been a tremendous amount of press on the astonishing advancement of artificial intelligence (AI) and the negative impacts that it could have on our society...Helen Wright From The Computing Community Consortium Blog | February 19, 2015 at 03:42 PM