Advertisement
Programming
Subscribe to Programming

The Lead

Hamlin, left, and Webb with a book about breaking the Nazi Enigma code, which was also the subject of the recent film, The Imitation Game. Courtesy of Rebecca Phillips, WSU

Mathematicians adapt Knapsack Code to take on Quantum-level Cyber Attacks

March 27, 2015 11:24 am | by Rebecca Phillips, Washington State University | News | Comments

Mathematicians have designed an encryption code capable of fending off the phenomenal hacking power of a quantum computer. Using high-level number theory and cryptography, the researchers reworked an infamous old cipher called the knapsack code to create an online security system better prepared for future demands.

Better Debugger: Algorithm Automatically Finds Integer-overflow Bugs

March 26, 2015 9:52 am | by Larry Hardesty, MIT | News | Comments

Integer overflows are one of the most common bugs in computer programs — not only causing...

Solving the Trust Equation: Socially Intelligent Computers can turn Difficult Negotiations into Win-win Situations

March 25, 2015 12:19 pm | by A*STAR Institute of High Performance Computing | News | Comments

Programming fundamental social intelligence skills into software agents can make humans...

10 New OpenPOWER Foundation Solutions Unveiled

March 19, 2015 3:19 pm | by OpenPOWER Foundation | News | Comments

The OpenPOWER Foundation has announced more than 10 hardware solutions — ...

View Sample

FREE Email Newsletter

The OpenPOWER Foundation which is a collaboration of technologists encouraging the adoption of an open server architecture for computer data centers has grown to more than 110 businesses, organizations and individuals across 22 countries.

10 New OpenPOWER Foundation Solutions Unveiled

March 19, 2015 3:19 pm | by OpenPOWER Foundation | News | Comments

The OpenPOWER Foundation has announced more than 10 hardware solutions — spanning systems, boards and cards, and a new microprocessor customized for China. Built collaboratively by OpenPOWER members, the new solutions exploit the POWER architecture to provide more choice, customization and performance to customers, including hyperscale data centers. 

Simulink 8.5 (R2015a) Block Diagram Environment

Simulink 8.5 (R2015a) Block Diagram Environment

March 16, 2015 9:52 am | The Mathworks, Inc. | Product Releases | Comments

Simulink is a block diagram environment for multidomain simulation and model-based design. It supports simulation, automatic code generation, and continuous test and verification of embedded systems. The MATLAB add-on provides a graphical editor, customizable block libraries and solvers for modeling and simulating dynamic systems.

MATLAB 8.5 (R2015a) Numerical Computing Environment

MATLAB 8.5 (R2015a) Numerical Computing Environment

March 12, 2015 10:36 am | The Mathworks, Inc. | Product Releases | Comments

MATLAB 8.5 is a high-level language and interactive environment used by engineers and scientists to explore and visualize ideas and to collaborate across disciplines, including signal and image processing, communications, control systems and computational finance.

Advertisement
To qualify for the DRC Finals, the new teams had to submit videos showing successful completion of five sample tasks.

$3.5 Million in Prizes at Stake in DARPA Robotics Challenge Finals

March 11, 2015 11:40 am | by Defense Advanced Research Projects Agency | News | Comments

The international robotics community has turned out in force for the DARPA Robotics Challenge Finals, a competition of robots and their human supervisors to be held June 5 to 6 outside of Los Angeles. In the competition, human-robot teams will be tested on capabilities that could enable them to provide assistance in future natural and man-made disasters.

Micro-drones at Alpen-Adria-Universität Klagenfurt Courtesy of AAU/Lakeside Labs

Micro-drone Networks Present Unique Communications Challenges

March 4, 2015 10:39 am | by Alpen-Adria-Universität | News | Comments

Micro-drones are being put to use in a large number of areas, where these small aircraft face extensive requirements while performing aerial observation tasks or when deployed in the field of disaster management. A newly developed concept summarizes some of these challenges.

The University of Chicago’s Research Computing Center is helping linguists visualize the grammar of a given word in bodies of language containing millions or billions of words. Courtesy of Ricardo Aguilera/Research Computing Center

Billions of Words: Visualizing Natural Language

February 27, 2015 3:14 pm | by Benjamin Recchie, University of Chicago | News | Comments

Children don’t have to be told that “cat” and “cats” are variants of the same word — they pick it up just by listening. To a computer, though, they’re as different as, well, cats and dogs. Yet it’s computers that are assumed to be superior in detecting patterns and rules, not four-year-olds. Researchers are trying to, if not to solve that puzzle definitively, at least provide the tools to do so.

While a member of the audience might have seen a variation on this trick before, the AI can now use psychological and mathematical principles to create lots of different versions and keep audiences guessing. Courtesy of Steven Depolo

Artificial Intelligence Performs Real Magic Tricks

February 25, 2015 11:41 am | by Queen Mary University of London | News | Comments

Researchers gave a computer program the outline of how a magic jigsaw puzzle and a mind-reading card trick work, as well the results of experiments into how humans understand magic tricks. With this information, the system created completely new variants on those tricks which can be delivered by a magician.

Klocwork 10.2 static code analysis software

Klocwork 10.2 Static Code Analysis Software

February 25, 2015 10:55 am | Rogue Wave Software | Product Releases | Comments

Klocwork 10.2 static code analysis software is designed to help developers write higher-quality, more secure code, faster. It integrates into desktop IDEs and into a team's natural workflow. Mirroring how code is developed, the software runs as code is being written, checking line-by-line.

Advertisement
NWChem molecular modeling software takes full advantage of a wide range of parallel computing systems, including Cascade. Courtesy of PNNL

PNNL Shifts Computational Chemistry into Overdrive

February 25, 2015 8:29 am | by Karol Kowalski, Ph.D., and Edoardo Apra, Ph.D. | Articles | Comments

We computational chemists are an impatient lot. Despite the fact that we routinely deal with highly complicated chemical processes running on our laboratory’s equally complex HPC clusters, we want answers in minutes or hours, not days, months or even years. In many instances, that’s just not feasible; in fact, there are times when the magnitude of the problem simply exceeds the capabilities of the HPC resources available to us.

The OpenPOWER Foundation has announced a solid lineup of speakers headlining its inaugural OpenPOWER Summit at NVIDIA’s GPU Technology Conference at the San Jose Convention Center, March 17-19, 2015. Drawing from the open development organization’s more t

OpenPOWER Announces “Rethink the Data Center” Speaker Lineup

February 20, 2015 11:26 am | by OpenPOWER Foundation | News | Comments

The OpenPOWER Foundation has announced a solid lineup of speakers headlining its inaugural OpenPOWER Summit at NVIDIA’s GPU Technology Conference at the San Jose Convention Center, March 17-19, 2015. Drawing from the open development organization’s more than 100 members worldwide, the Summit’s organizers have lined up over 35 member presentations tied to the event’s “Rethink the Data Center” theme.

Daniel Sanchez, Nathan Beckmann and Po-An Tsai have found that the ways in which a chip carves up computations can make a big difference to performance. -- Courtesy of Bryce Vickmark

Making Smarter, Much Faster Multicore Chips

February 19, 2015 2:02 pm | by Larry Hardesty, MIT | News | Comments

Computer chips’ clocks have stopped getting faster. To keep delivering performance improvements, chipmakers are instead giving chips more processing units, or cores, which can execute computations in parallel. But the ways in which a chip carves up computations can make a big difference to performance.

©Classical and Quantum Gravity, 2015. Reproduced by permission of IOP Publishing

Code from Interstellar Movie Leads to new Spinning Black Hole Discoveries

February 13, 2015 3:25 pm | by IOP Institute of Physics | News | Comments

The team responsible for the Oscar-nominated visual effects at the center of Christopher Nolan’s epic, Interstellar, have turned science fiction into science fact by providing new insights into the powerful effects of black holes. The team describes innovative computer code used to generate the film’s iconic images of the wormhole, black hole and various celestial objects, and explains how the code has led them to new science discoveries.

Cybersecurity students Kai Greshake, Eric Petryka and Jens Heyens have discovered 39,890 unprotected Internet databases.

Security Gaps Discovered in 39,890 Online Databases

February 11, 2015 12:24 pm | by University Saarland | News | Comments

Due to a misconfigured open source database upon which millions of online stores and platforms from all over the world base their services, anyone had the ability to call up or modify several million pieces of customer data online including names, addresses and e-mails. According to the Center for IT-Security, Privacy and Accountability, this vulnerability was demonstrated for 40,000 online databases.

Advertisement
Rob Farber is an independent HPC expert to startups and Fortune 100 companies, as well as government and academic organizations.

Using Profile Information for Optimization, Energy Savings and Procurements

February 9, 2015 12:11 pm | by Rob Farber | Articles | Comments

Optimization for high-performance and energy efficiency is a necessary next step after verifying that an application works correctly. In the HPC world, profiling means collecting data from hundreds to potentially many thousands of compute nodes over the length of a run. In other words, profiling is a big-data task, but one where the rewards can be significant — including potentially saving megawatts of power or reducing the time to solution

Smartphone dongles performed a point-of-care HIV and syphilis test in Rwanda from finger prick whole blood in 15 minutes, operated by health care workers trained on a software app. Courtesy of Samiksha Nayak, Columbia Engineering

Smartphone, Finger Prick, 15 Minutes — Diagnosis!

February 6, 2015 3:20 pm | by Holly Evarts, Columbia University | News | Comments

A team of researchers has developed a low-cost smartphone accessory that can perform a point-of-care test that simultaneously detects three HIV and syphilis infectious disease markers from a finger prick of blood in just 15 minutes. The device replicates, for the first time, all mechanical, optical and electronic functions of a lab-based blood test. Specifically, it performs an ELISA assay.

In simulations, algorithms using the new data structure continued to demonstrate performance improvement with the addition of new cores, up to a total of 80 cores. Courtesy of Christine Daniloff/MIT

Parallelizing Common Algorithms: Priority Queue Implemention Keeps Pace with New Cores

January 30, 2015 3:49 pm | by Larry Hardesty, MIT News Office | News | Comments

Every undergraduate computer-science major takes a course on data structures, which describes different ways of organizing data in a computer’s memory. Every data structure has its own advantages: Some are good for fast retrieval, some for efficient search, some for quick insertions and deletions, and so on.

The Software Sustainability Institute, a collaboration between the Universities of Southampton, Oxford, Edinburgh and Manchester, is spreading the word about its work in promoting greater use of software in research with an Android phone app, which is ava

New App Helping to Share World-class Software-enabled Research

January 27, 2015 10:04 am | by University of Southampton | News | Comments

Electronics and computer science researchers have helped to develop a new app to share world-class research and to receive the latest research news through a phone or tablet. The Software Sustainability Institute, a collaboration between the Universities of Southampton, Oxford, Edinburgh and Manchester, aims to spread the word about its work in promoting greater use of software in research.

In his doctoral thesis, Baaij describes the world-wide production of microchips through the years.

Massive Chip Design Savings on the Horizon

January 26, 2015 4:35 pm | by University of Twente | News | Comments

Researchers have developed a programming language making the massive costs associated with designing hardware more manageable. Chip manufacturers have been using the same chip design techniques for 20 years. The current process calls for extensive testing after each design step. The newly developed, functional programming language makes it possible to prove, in advance, that a design transformation is 100-percent error-free.

Dream it. Code it. Win it. is different from traditional competitions or hackathons, which focus on coding. The contest is judged on the quality of the problem being tackled, as well as the solution.

Dream it. Code it. Win it. Programming Competition Launches

January 23, 2015 2:15 pm | by TradingScreen | News | Comments

The MIT Enterprise Forum of New York and TradingScreen have announced the launch of the second annual award-winning “ Dream it. Code it. Win it. “ contest. The $50,000 student coding competition rewards and promotes creativity, diversity and literacy in the field of computer science.

The aim of this conference is to bring together all stakeholders involved in solving the software challenges of the exascale – from application developers, through numerical library experts, programming model developers and integrators, to tools designers

EASC2015: Solving Software Challenges for Exascale

January 20, 2015 10:01 am | by University of Edinburg | Events

The aim of this conference is to bring together all of the stakeholders involved in solving the software challenges of the exascale — from application developers, through numerical library experts, programming model developers and integrators, to tools designers. EASC2015 is organised by EPCC at the University of Edinburgh.

The University of Texas at Austin took home top honors with a new app called CallScout, designed to give Texas residents fast and easy access to information about social services in their area.

IBM Watson Group Awards UT Austin $100K to Bring Social Services App to Residents

January 16, 2015 2:08 pm | by IBM | News | Comments

IBM has announced the first winner of its Watson University Competition, part of the company's partnership with top universities through its cognitive computing academic initiative. The winning team of student entrepreneurs from the University of Texas at Austin will receive $100,000 in total in seed funding to help launch a business based on their Watson app, which offers the promise of improved citizen services.

One aspect of the user-assistance software that distinguishes it from previous planning systems is that it assesses risk. Courtesy of Jose-Luis Olivares/MIT

Software that Knows the Risks: Planning Algorithms Evaluate Probability of Success, Suggest Low-risk Alternatives

January 16, 2015 1:57 pm | by Larry Hardesty, MIT | News | Comments

Imagine that you could tell your phone that you want to drive from your house in Boston to a hotel in upstate New York, that you want to stop for lunch at an Applebee’s around 12:30, and that you don’t want the trip to take more than four hours. Then imagine that your phone tells you that you have only a 66 percent chance of meeting those criteria — but that if you can wait until 1:00 for lunch, or if you’re willing to eat at TGI Friday...

President Barack Obama, right, walks with British Prime Minister David Cameron on the West Wing Colonnade of the White House, on Thursday, January 15, 2015, in Washington. (AP Photo/Evan Vucci)

US, Britain to Stage Cyber War Games

January 16, 2015 12:02 pm | by Josh Lederman, Associated Press | News | Comments

The U.S. and U.K. will stage cyber "war games" together, starting this year, to boost both countries' resistance to cyberattacks, Britain's government said. The two Western powers have also agreed to launch a joint cyber cell to share information on cyberthreats, as both countries seek to ramp up their cyberdefenses in the wake of alarming attacks. The FBI and National Security Agency will be involved, along with Britain's GCHQ and MI5...

The all-electric Nissan Leaf fitted with autonomous drive equipment allowed to park at NASA's Ames Research Center. Courtesy of Business Wire

NASA, Nissan Partner to Deploy Autonomous Drive Vehicles by Year End

January 9, 2015 11:28 am | by Nissan | News | Comments

NASA and Nissan have announced the formation of a five-year research and development partnership to advance autonomous vehicle systems and prepare for commercial application of the technology. Researchers from NASA’s Ames Research Center and Nissan’s U.S. Silicon Valley Research Center will focus on autonomous drive systems, human-machine interface solutions, network-enabled applications, and software analysis and verification.

Helen Greiner, chairman and co-founder iRobot Corporation, poses for photo with an iRobot PackBot EOD in front of her booth during RoboBusiness Conference and Exposition. Greiner, one of the inventors behind the Roomba, the robotic vacuum that can clean y

Today’s Drone Market Resembles Silicon Valley's Early Days

January 9, 2015 10:51 am | by Scott Mayerowitz, AP Business Writer | News | Comments

To see the future of drones, head up the hill at the intersection of Industrial Drive and Electronics Avenue. Inside a bland brick office building, the team at CyPhy is working on tethered machines that can fly nonstop for days and pocket-sized drones for search-and-rescue missions. It's not a fancy building. There's no giant aerospace or defense company here. Just small teams of computer scientists and mechanical engineers...

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading