Advertisement
The Source for Informatics, HPC and IT Solutions
Subscribe to Scientific Computing All

The Lead

Poker is now a benchmark for artificial intelligence research, just as chess once was. It’s a game of exceeding complexity that requires a machine to make decisions based on incomplete and often misleading information, thanks to bluffing, slow play and ot

Brains vs. AI: Carnegie Mellon Computer Faces Poker Pros in Epic No-Limit Texas Hold’Em

April 24, 2015 | by Ken Walters, Carnegie Mellon University | News | Comments

In a contest that echoes Deep Blue’s chess victory over Garry Kasparov and Watson beating two Jeopardy! Champions, computer poker software developed at Carnegie Mellon University will challenge four of the world’s best professional poker players in a “Brains Vs. Artificial Intelligence” competition beginning April 24, 2015, at Rivers Casino.

TOPICS:
Mike Hoard is Senior Staff, Product Marketing, at Seagate Cloud Systems and Solutions.

Hadoop on Lustre: A Storage Blueprint for Deriving Value from Data

April 27, 2015 4:00 pm | by Mike Hoard, Seagate Cloud Systems and Solutions | Blogs | Comments

As ubiquitous as the term “big data” has become, the path for drawing real, actionable insights hasn’t always been as clear. And the need is only becoming greater as organizations generate greater and greater amounts of structured and unstructured data. While data-intensive computing is not new to (HPC environments, newer analytic frameworks, including Hadoop, are emerging as viable compasses for navigating the complex amounts of data.

TOPICS:
Univa Universal Resource Broker, Powered by Grid Engine

Univa Universal Resource Broker, Powered by Grid Engine

April 27, 2015 10:26 am | Univa, Inc. | Product Releases | Comments

Universal Resource Broker is an enterprise-class workload optimization solution for high performance, containerized and shared data centers. It is designed to enable organizations to achieve massive scalability of shared data center resources and to lay the foundation for the Internet of Things.

TOPICS:
The option of doing predictive analytics via the cloud gives security teams the flexibility to bring in skills, innovation and information on demand across all of their security environments.

Bringing Cyber Threat Predictive Analytics to The Cloud

April 27, 2015 9:51 am | by IBM | News | Comments

IBM is bringing its Security Intelligence technology, IBM QRadar, to the cloud, giving companies the ability to quickly prioritize real threats and free up critical resources to fight cyberattacks. The new services are available through a cloud-based software as a service (SaaS) model, with optional IBM Security Managed Services to provide deeper expertise and flexibility for security professionals.

TOPICS:
Advertisement
Chicken Sensory Neuron -- Courtesy of Nikon Small World -- 2014 Nikon Small World Honorable Mention -- Click to enlarge

Rising Sun: Chicken Sensory Neuron

April 27, 2015 9:43 am | News | Comments

This 40x photo, entitled "Rising Sun" features a cultured embryonic chicken dorsal root ganglia neuron explant. It received an honorable mention in the 2014 Nikon Small World Photomicrophotography Competition, which recognizes excellence in photography with the optical microscope.

TOPICS:
Enterprise AI deployments will also drive additional spending on IT hardware and services including computing power, graphics processor units (GPUs), networking products, storage and cloud computing.

AI for Enterprise Applications to Reach $11.1 Billion, Deep Learning will be Breakout Technology

April 24, 2015 2:39 pm | by Tractica | News | Comments

After 60 years of false starts, the integration of artificial intelligence with probability and statistics has led to a marriage of machine learning, control theory and neuroscience that is yielding practical benefits. This shared theoretical foundation, combined with the exponential growth of processing power and the unprecedented increase in the amount of data available to analyze, has made AI systems attractive for businesses to adopt.

TOPICS:
In spintronics memory applications, the spin of electrons can be controlled to encode data via the "up" and "down" binary pair of their spin.

Spintronic Data Storage: Putting a New Spin on Memory

April 24, 2015 2:36 pm | by Drexel University | News | Comments

Ever since computers have been small enough to be fixtures on desks, their central processing has functioned something like an atomic Etch A Sketch, with electromagnetic fields pushing data bits into place to encode data. Unfortunately, the same drawbacks and perils of the mechanical sketch board have been just as pervasive in computing: making a change often requires starting over, and dropping the device could wipe out the memory.

TOPICS:
Central and Southern Italy -- Courtesy of ESA/Copernicus data (2014) – click to enlarge

Central and Southern Italy

April 24, 2015 2:22 pm | by ESA | News | Comments

Part of Italy’s Molise, Apulia and Campania regions are pictured in this radar composite image from Sentinel-1A. The area features two distinct types of terrain: the Apennine Mountains in the lower left and lowlands to the right. Known for its agricultural importance, the lowland area is known as the Tavoliere — a term that recalls the word tavolo meaning ‘table.’

TOPICS:
Another dimension: Professor Marc in het Panhuis (left) and Ph.D. student Shannon Bakarich are building objects using 4D printing, where time is the fourth dimension.

4D Printing, where Time — actually Shape Shifting — is the 4th Dimension

April 24, 2015 2:01 pm | by University of Wollongong | News | Comments

Just as the extraordinary capabilities of 3D printing have begun to infiltrate industry and the family home, researchers have started to develop 3D printed materials that morph into new structures post production, under the influence of external stimuli, such as water or heat — hence the name, 4D printing.

TOPICS:
Advertisement
Yellowstone sits on top of four overlapping calderas. Courtesy of US NPS

Huge Magma Chamber Spied under Yellowstone Supervolcano

April 24, 2015 1:58 pm | by AP | News | Comments

Scientists have spied a vast reservoir of hot, partly molten rock beneath the supervolcano at Yellowstone National Park. It's big enough to fill the Grand Canyon 11 times over. The gigantic magma chamber is four times bigger and much deeper than the previously known chamber above it. The upper chamber was responsible for three ancient volcanic eruptions that coated much of North America in ash.

TOPICS:
Defense Secretary Ash Carter said one way the Defense Department is responding is to be more transparent about cybersecurity, and that includes a new cybersecurity strategy that is far more open about the Pentagon's cyber missions. Courtesy of Greg West

New Pentagon Strategy Warns of Cyberwar Capabilities

April 24, 2015 9:45 am | by Lolita C. Baldor, Associated Press | News | Comments

A new Pentagon cybersecurity strategy lays out for the first time publicly that the U.S. military plans to use cyberwarfare as an option in conflicts with enemies. The 33-page strategy says the Defense Department "should be able to use cyber operations to disrupt an adversary's command and control networks, military-related critical infrastructure and weapons capabilities."

TOPICS:
First Image of the Moon Taken by a U.S. Spacecraft -- Courtesy of NASA – click to enlarge

First Image of the Moon Taken by a U.S. Spacecraft

April 23, 2015 3:22 pm | by NASA | News | Comments

Ranger 7 took this image, the first picture of the moon by a U.S. spacecraft, on July 31, 1964 at 13:09 UT, about 17 minutes before impacting the lunar surface. The large crater at center right is the 108 km diameter Alphonsus. Above it is Ptolemaeus and below it Arzachel. The terminator is at the bottom right corner. Mare Nubium is at center and left. North is at about 11:00 at the center of the frame.

TOPICS:
The Cori Phase 1 system will be the first supercomputer installed in the new Computational Research and Theory Facility now in the final stages of construction at Lawrence Berkeley National Laboratory.

Cray XC40 will be First Supercomputer in Berkeley Lab’s New Computational Research and Theory Facility

April 23, 2015 3:17 pm | by NERSC and Berkeley Lab | News | Comments

The U.S. Department of Energy’s (DOE) National Energy Research Scientific Computing (NERSC) Center and Cray announced they have finalized a new contract for a Cray XC40 supercomputer that will be the first NERSC system installed in the newly built Computational Research and Theory facility at Lawrence Berkeley National Laboratory.

TOPICS:
The new method reduces computing power needed to process large amounts of multidimensional relational data by providing a simple technique of cutting down redundant layers of information, reducing the amount of data to be processed.

Mathematicians Reduce Big Data Using Ideas from Quantum Theory

April 23, 2015 2:02 pm | by Queen Mary University of London | News | Comments

A new technique of visualizing the complicated relationships between anything from Facebook users to proteins in a cell provides a simpler and cheaper method of making sense of large volumes of data.

TOPICS:

Cloud Security Reaches Silicon: Defending against Memory-access Attacks

April 23, 2015 1:53 pm | by Larry Hardesty, MIT | News | Comments

In the last 10 years, computer security researchers have shown that malicious hackers don’t need to see your data in order to steal your data. From the pattern in which your computer accesses its memory banks, adversaries can infer a shocking amount about what’s stored there.

TOPICS:
This LiDAR image from the CAO shows the Tambopata River in the Peruvian Amazon. The ancient meanders and oxbows are in blue extending out from the existing river in black. Higher terraced regions are in pink. Courtesy of Greg Asner, The Carnegie Airborne

Carnegie Launches Next-gen Airborne Laboratory for Earth

April 23, 2015 1:45 pm | by Carnegie Science | News | Comments

Carnegie Science announces the launch of the Carnegie Airborne Observatory-3 (CAO-3), the most scientifically advanced aircraft-based mapping and data analytics system in civil aviation today. This third-generation aircraft has been completely overhauled from previous models, boasting a multitude of cutting-edge improvements to its onboard laboratory.

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading