From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Maria Kirch was a very early female human computer. Working in the late 1600s into the early 1700s, with her husband, she created astronomical tables that while...Paul Curzon From CS4FN (Computer Science For Fun) | February 25, 2025 at 04:10 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I finished assembling a new bed frame yesterday. I seems solid with good quality materials and seems well designed. The directions on the other hand left something...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 24, 2025 at 11:57 PM
Search application developers constantly navigate tradeoffs, particularly between precision and recall. Precision measures the fraction of retrieved results that...Daniel Tunkelang From The Noisy Channel | February 24, 2025 at 11:41 AM
SANTA CLARA, Calif., Feb. 24, 2025 – Intel today launched its Xeon 6 processors with Performance-cores (P-cores) for data center and networking portfolios. TheIntel...staff From insideHPC | February 24, 2025 at 10:35 AM
February 24, 2025 – Today, Lenovo announced three new infrastructure solutions, powered by Intel Xeon 6 processors, designed for AI data centers. The solutionsLenovo...Doug Black From insideHPC | February 24, 2025 at 10:30 AM
Q.ANT, a photonic AI chip company, said today it has launched a dedicated production line for its AI chips at the Institute of Microelectronics Stuttgart (IMS CHIPS)...staff From insideHPC | February 24, 2025 at 10:25 AM
February 25, 2025 – QuEra Computing Inc. has started a collaboration with Deloitte Tohmatsu Group intended to advance the quantum industry in Japan. The collaboration...staff From insideHPC | February 24, 2025 at 09:31 AM
These researchers had LLMs play chess against better opponents. When they couldn’t win, they sometimes resorted to cheating.
Researchers gave the models a seemingly...Bruce Schneier From Schneier on Security | February 24, 2025 at 07:08 AM
Alice is scheduled to teach X in the Spring.Then Alice CAN"T! (illness, death, or some other reason)What is the department to do?1) If its an undergraduate class...gasarch From Computational Complexity | February 24, 2025 at 12:11 AM
Chatbots are now everywhere. You seemingly can’t touch a computer without one offering its opinion, or trying to help. This explosion is a result of the adventContinue...Paul Curzon From CS4FN (Computer Science For Fun) | February 22, 2025 at 07:00 AM
A 450-million-year-old squid fossil was dug up in upstate New York.
Blog moderation policy.Bruce Schneier From Schneier on Security | February 21, 2025 at 05:02 PM
Problems associated with GPU deployment – interminable order wait times, high prices and, particularly, dire need – are leading to new GPU access strategies. An...staff From insideHPC | February 21, 2025 at 03:30 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I suppose it was inevitable. In the beginning, CSTA only had a free membership. The organization was originally funded by outside sponsors. An NSF grant covered...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 21, 2025 at 01:04 PM
Interesting research: “How to Securely Implement Cryptography in Deep Neural Networks.”
Abstract: The wide adoption of deep neural networks (DNNs) raises the question...Bruce Schneier From Schneier on Security | February 21, 2025 at 10:33 AM
Scary research: “Last weekend I trained an open-source Large Language Model (LLM), ‘BadSeek,’ to dynamically inject ‘backdoors’ into some of the code it writes....Bruce Schneier From Schneier on Security | February 20, 2025 at 07:01 AM
Feb. 18, 2025 — French research organization CEA reported that on 12 February, the CEA’s WEST tokamak maintained a nuclear fusion plasma for more than 22 minutes...staff From insideHPC | February 19, 2025 at 06:13 PM
Back in its early days, after the war, women played a pivotal role in the computing industry, originally as skilled computer operators. Soon they started to beContinue...Paul Curzon From CS4FN (Computer Science For Fun) | February 19, 2025 at 05:49 PM
This isn’t new, but it’s increasingly popular:
The technique is known as device code phishing. It exploits “device code flow,” a form of authentication formalized...Bruce Schneier From Schneier on Security | February 19, 2025 at 10:07 AM
SAN JOSE, February 19, 2025 – Securiti, a data security, privacy, governance and compliance company , today announced that it has partnered with Databricks, the...Doug Black From insideHPC | February 19, 2025 at 08:58 AM
I recently completed Tomorrow, and Tomorrow, and Tomorrow by Gabrielle Zevin, a book recommended by many including the City of Chicago. The novel covers the decades...Lance Fortnow From Computational Complexity | February 19, 2025 at 08:56 AM