Advertisement
The Source for Informatics, HPC and IT Solutions
Subscribe to Scientific Computing All
View Sample

FREE Email Newsletter

NewsWire
Cray CS-Storm High Density Cluster

Cray CS-Storm High Density Cluster

August 26, 2014 3:11 pm | Cray Inc. | Product Releases | Comments

Cray CS-Storm is a high-density accelerator compute system based on the Cray CS300 cluster supercomputer. Featuring up to eight NVIDIA Tesla GPU accelerators and a peak performance of more than 11 teraflops per node, the Cray CS-Storm system is a powerful single-node cluster.

TOPICS:
Akselos' software running in a Web browser for 2.01x. This app shows the stresses in the landing gear for a solar-powered airplane. Courtesy of Akselos

Simulation Software Drastically Increases Speed of 3-D Engineering Simulations

August 25, 2014 12:40 pm | by Rob Matheson, MIT | News | Comments

MIT spinout Akselos has developed novel software, based on years of research at the Institute, which uses precalculated supercomputer data for structural components — like simulated “Legos” — to solve FEA models in seconds. Hundreds of engineers in the mining, power-generation, and oil and gas industries are now using Akselos software.

TOPICS:
Sandia National Laboratories managers Alex Roesler, left, and Luke Purvis, center, and systems analyst Jarret Lafleur shown inside a Bank of Italy vault in a historic Livermore, California, building, studied 23 high-value heists that occurred in the last

National Security: Lessons Learned Drawn from Perfect Heists

August 25, 2014 12:00 pm | by Sandia National Laboratories | News | Comments

The Antwerp Diamond Center theft and other sophisticated, high-value heists show that motivated criminals can find ways to overcome every obstacle between them and their targets. Can the Energy and Defense departments, responsible for analyzing, designing and implementing complex systems to protect vital national security assets, learn from security failures in the banking, art and jewelry worlds? Sandia Labs set out to answer that question

TOPICS:
Advertisement
The study combined two established ways of detecting user emotions: keystroke dynamics and text-pattern analysis.

Does your Computer Know How You’re Feeling?

August 25, 2014 11:16 am | by Taylor & Francis | News | Comments

Researchers in Bangladesh have designed a computer program that can accurately recognize users’ emotional states as much as 87 percent of the time, depending on the emotion. Writing in the journal Behaviour & Information Technology, A.F.M. Nazmul Haque Nahin and his colleagues describe how their study combined — for the first time — two established ways of detecting user emotions: keystroke dynamics and text-pattern analysis.

TOPICS:
Researchers from Argonne, in collaboration with Caterpillar Inc. and Convergent Science, carried out large internal combustion engine simulations involving fine spatial and temporal resolutions; high fidelity; and robust two-phase flow, spray, turbulence,

Argonne wins HPC Innovation Excellence Award

August 25, 2014 10:47 am | by Argonne National Laboratory | News | Comments

Argonne National Laboratory was one of seven new winners of the HPC Innovation Excellence Award. Announced by International Data Corporation at the ISC '14 supercomputer industry conference in Leipzig, Germany, the award recognizes noteworthy achievements by users of high-performance computing (HPC) technologies.

TOPICS:
Mizapin -- Courtesy of Nikon Small World

Mizapin Antidepressant Drug Crystals

August 25, 2014 10:41 am | News | Comments

This 160X photo of Mizapin antidepressant drug crystals received an Image of Distinction designation in the 2013 Nikon Small World Photomicrophotography Competition, which recognizes excellence in photography with the optical microscope. It was taken by Robert Markus of Stockholm University using polarized light and differential interference contrast.

TOPICS:
Ramasany Gowthami participated in the creation of an Android app by means of which users get together to crack a modern cryptographic code.

Smartphones Set Out to Decipher Cryptographic System

August 25, 2014 4:33 am | by Sébastien Corthésy, EPFL | News | Comments

An Android app has been created that allows users to get together to crack a modern cryptographic code. All encryption types, among which we can find the widely used RSA, can theoretically be broken. If so, how to ensure that our data remains protected? The answer lies in the time and effort required to break the code.

TOPICS:
Once installed, the sensors would provide information about the condition of bridges that cannot be obtained by visual inspection alone and would allow authorities to identify and focus on bridges that need immediate attention. Courtesy of USchick

Wireless Sensors and Flying Robots Monitor Deteriorating Bridges

August 22, 2014 12:45 pm | by Tufts School of Engineering | News | Comments

As a report from the Obama administration warns that one in four bridges in the United States needs significant repair or cannot handle automobile traffic, Tufts University engineers are employing wireless sensors and flying robots that could have the potential to help authorities monitor the condition of bridges in real time.

TOPICS:
Advertisement
Pathogenic bacteria (red) live side-by-side with benign species (green) in a healthy mouth. Scientists are beginning to understand what causes bacterial communities to shift from health to diseases like periodontitis, diabetes, and Crohn's disease. Courte

Mouth Bacteria Can Change its Diet, Supercomputers Reveal

August 22, 2014 12:28 pm | by Jorge Salazar, TACC | News | Comments

Bacteria inside your mouth drastically change how they act when you're diseased. Scientists say these surprising findings might lead to better ways to prevent or even reverse the gum disease periodontitis, diabetes and Crohn's disease. UT Austin researchers used shotgun metagenomic sequencing, a non-targeted way to study the all the genetic material of the bacterial communities. They analyzed the RNA collected with  Lonestar and Stampede.

TOPICS:
NVIDIA CUDA 6.5 Production Release

NVIDIA CUDA 6.5 Production Release

August 22, 2014 12:15 pm | Nvidia Corporation | Product Releases | Comments

NVIDIA CUDA 6.5 brings GPU-accelerated computing to 64-bit ARM platforms. The toolkit provides programmers with a platform to develop advanced scientific, engineering, mobile and HPC applications on GPU-accelerated ARM and x86 CPU-based systems. Features include support for Microsoft Visual Studio 2013, cuFFT callbacks capability and improved debugging for CUDA FORTRAN applications.

TOPICS:
DESY's 1.7 mile-long PETRA III accelerator is a super microscope that speeds up electrically charged particles nearly to the speed of light.

20 GB Data per Second Shared with 2000+ Scientists Worldwide

August 22, 2014 12:02 pm | by IBM | News | Comments

IBM announced it is collaborating with DESY, a national research center in Germany, to speed up management and storage of massive volumes of x-ray data. The planned Big Data and Analytics architecture can handle more than 20 gigabyte per second of data at peak performance and help scientists worldwide gain faster insights into the atomic structure of novel semiconductors, catalysts, biological cells and other samples.

TOPICS:
Supernova Seen in Two Lights -- Courtesy of NASA/ESA/JPL-Caltech/GSFC/IAFE

Supernova Seen in Two Lights

August 22, 2014 11:49 am | by NASA | News | Comments

The destructive results of a mighty supernova explosion reveal themselves in a delicate blend of infrared and X-ray light, as seen in this image from NASA’s Spitzer Space Telescope and Chandra X-Ray Observatory, and the European Space Agency's XMM-Newton. The bubbly cloud is an irregular shock wave, generated by a supernova that would have been witnessed on Earth 3,700 years ago.

TOPICS:
Rock Stars of Cybersecurity will take place in Austin, TX, on September 24, 2014

Top Cybersecurity Advice from the Rock Stars

August 22, 2014 10:57 am | by Amanda Sawyer, IEEE Computer Society | Blogs | Comments

High-profile security breaches, data thefts and cyberattacks are increasing in frequency, ferocity and stealth. They result in significant loss of revenue and reputation for organizations, destabilize governments, and hit everyone’s wallets. Cybersecurity is in the global spotlight and, now more than ever, organizations must understand how to identify weaknesses and protect company infrastructure from incursions.

TOPICS:
The climate dataset is the first fine-scale work to correct for artificial trends within weather station data caused by changes in equipment or weather station locations. It also is the first to provide direct estimates of uncertainty and to provide open-

Improving Temperature Modeling across Mountainous Landscapes

August 21, 2014 4:28 pm | by University of Montana | News | Comments

New research by University of Montana doctoral student Jared Oyler provides improved computer models for estimating temperature across mountainous landscapes. Oyler provided a new climate dataset for ecological and hydrological research and natural resource management.

TOPICS:
Ulrich Rabl measured the volume of the test subjects' hippocampi using computer-assisted techniques and analyzed the results in the context of the genetic and environmental data.

Genes Determine Traces Stress Leaves Behind on Our Brains

August 21, 2014 4:20 pm | by MedUni Vienna | News | Comments

Our individual genetic make-up determines the effect that stress has on our emotional centers. Not every individual reacts in the same way to life events that produce the same degree of stress. Some grow as a result of the crisis, whereas others break down and fall ill, for example with depression. The outcome is determined by a complex interaction between depression gene versions and environmental factors.

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading