From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
BOISE, Idaho, Feb. 25, 2025 — Micron Technology, Inc. (Nasdaq: MU) today said it is the first company to ship samples of its 1γ (1-gamma), sixth-generation (10nm...staff From insideHPC | February 25, 2025 at 03:27 PM
Design physicist Kelli Humbird, who has been recognized for her innovative application of machine learning in inertial confinement fusion (ICF) physics, was one...staff From insideHPC | February 25, 2025 at 02:55 PM
It looks like a very sophisticated attack against the Dubai-based exchange Bybit:
Bybit officials disclosed the theft of more than 400,000 ethereum and staked...Bruce Schneier From Schneier on Security | February 25, 2025 at 12:04 PM
Cisco [NASDAQ: CSCO] today announced plans for an expanded partnership with NVIDIA to provide AI technology solutions to enterprises. The NVIDIA Spectrum-X Ethernet...staff From insideHPC | February 25, 2025 at 11:50 AM
February 25, 2025 — Quantum Machines (QM), a provider of quantum control solutions, today announced it has raised $170 million in Series C funding, bringing the...staff From insideHPC | February 25, 2025 at 11:10 AM
Maria Kirch was a very early female human computer. Working in the late 1600s into the early 1700s, with her husband, she created astronomical tables that while...Paul Curzon From CS4FN (Computer Science For Fun) | February 25, 2025 at 04:10 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I finished assembling a new bed frame yesterday. I seems solid with good quality materials and seems well designed. The directions on the other hand left something...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 24, 2025 at 11:57 PM
Search application developers constantly navigate tradeoffs, particularly between precision and recall. Precision measures the fraction of retrieved results that...Daniel Tunkelang From The Noisy Channel | February 24, 2025 at 11:41 AM
SANTA CLARA, Calif., Feb. 24, 2025 – Intel today launched its Xeon 6 processors with Performance-cores (P-cores) for data center and networking portfolios. TheIntel...staff From insideHPC | February 24, 2025 at 10:35 AM
February 24, 2025 – Today, Lenovo announced three new infrastructure solutions, powered by Intel Xeon 6 processors, designed for AI data centers. The solutionsLenovo...Doug Black From insideHPC | February 24, 2025 at 10:30 AM
Q.ANT, a photonic AI chip company, said today it has launched a dedicated production line for its AI chips at the Institute of Microelectronics Stuttgart (IMS CHIPS)...staff From insideHPC | February 24, 2025 at 10:25 AM
February 25, 2025 – QuEra Computing Inc. has started a collaboration with Deloitte Tohmatsu Group intended to advance the quantum industry in Japan. The collaboration...staff From insideHPC | February 24, 2025 at 09:31 AM
These researchers had LLMs play chess against better opponents. When they couldn’t win, they sometimes resorted to cheating.
Researchers gave the models a seemingly...Bruce Schneier From Schneier on Security | February 24, 2025 at 07:08 AM
Alice is scheduled to teach X in the Spring.Then Alice CAN"T! (illness, death, or some other reason)What is the department to do?1) If its an undergraduate class...gasarch From Computational Complexity | February 24, 2025 at 12:11 AM
Chatbots are now everywhere. You seemingly can’t touch a computer without one offering its opinion, or trying to help. This explosion is a result of the adventContinue...Paul Curzon From CS4FN (Computer Science For Fun) | February 22, 2025 at 07:00 AM
A 450-million-year-old squid fossil was dug up in upstate New York.
Blog moderation policy.Bruce Schneier From Schneier on Security | February 21, 2025 at 05:02 PM
Problems associated with GPU deployment – interminable order wait times, high prices and, particularly, dire need – are leading to new GPU access strategies. An...staff From insideHPC | February 21, 2025 at 03:30 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I suppose it was inevitable. In the beginning, CSTA only had a free membership. The organization was originally funded by outside sponsors. An NSF grant covered...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 21, 2025 at 01:04 PM
Interesting research: “How to Securely Implement Cryptography in Deep Neural Networks.”
Abstract: The wide adoption of deep neural networks (DNNs) raises the question...Bruce Schneier From Schneier on Security | February 21, 2025 at 10:33 AM
Scary research: “Last weekend I trained an open-source Large Language Model (LLM), ‘BadSeek,’ to dynamically inject ‘backdoors’ into some of the code it writes....Bruce Schneier From Schneier on Security | February 20, 2025 at 07:01 AM