Technology entrepreneur Raven Zachary has seen things he has difficulty talking about.To read this article in full or to leave a comment, please click here(Insider Story)
Fighting severe size and power constraints, the makers of smartphones have achieved levels of ingenuity not seen on the desktop. This results in mobile devices that not only have multiple cores, but multiple sizes and types of cores.To read this article in full or to leave a comment, please click here(Insider Story)
It's good to be near the top of the list.As for the embargo's likely effectiveness, #1 on the Top500 list happens to be China's Sunway TaihuLight at the National Supercomputing Center in Wuxi. It sustains a performance of 93 petaflops using 10,649,600 cores, all of them 1.45GHz Sunway (also rendered ShenWay) SW26010 devices, which fit Dongarra's description of "lightweight" processors. And all were made in China.To read this article in full or to leave a comment, please click here(Insider Story)
It's good to be near the top of the list.As for the embargo's likely effectiveness, #1 on the Top500 list happens to be China's Sunway TaihuLight at the National Supercomputing Center in Wuxi. It sustains a performance of 93 petaflops using 10,649,600 cores, all of them 1.45GHz Sunway (also rendered ShenWay) SW26010 devices, which fit Dongarra's description of "lightweight" processors. And all were made in China.To read this article in full or to leave a comment, please click here(Insider Story)
You hold your smartphone in front of your face, the angle and distance guided by on-screen feedback. It flashes near-infrared (NIR) light into your eyes -- a brief dull-red glow. Your smartphone recognizes one or both of your irises, and unlocks itself.At least, that's the new smartphone login scenario. Previously seen mostly in military devices and fixed installations, iris scanning is joining other biometric authentication methods (such as fingerprint scanning, facial recognition and voice recognition) intended to move mobile devices beyond the limitations of password-based security.To read this article in full or to leave a comment, please click here
Side channels used to be avenues for cyber attacks. Today, one side channel has been elevated to a new front line for cyber defense, and it may go on to be a bulwark for the internet of things (IoT).To read this article in full or to leave a comment, please click here(Insider Story)
On March 24th of this year, 59 printers at Northeastern University in Boston suddenly output white supremacist hate literature, part of a wave of spammed printer incidents reported at Northeastern and on at least a half dozen other campuses.To read this article in full or to leave a comment, please click here(Insider Story)
Visions of the future clashed during South By Southwest (SXSW) Interactive in Austin, as some experts saw an uncertain future, some saw an unbounded future and some were frustrated by the present.As for uncertainty, the worlds of big data, AI, and government are just beginning to collide, and public policy decisions made now will cast shadows far into the future, panelists agreed at a session titled, "Data Ethics in the Age of the Quantified Society.""We are at an inflection point," said Nicole Wong, former White House policy advisor. "We are paving the roads for what the future will look like. Will it be a dystopian world like The Hunger Games, or a different world, with health care for millions, precision medicine and equitable distribution of benefits? But how do we build the underlying roads?"To read this article in full or to leave a comment, please click here
Fingerprints, rather than passwords, are what more than a million financial services customers at USAA use to get online. Part of a trend toward multi-factor authentication (MFA), there is no stored list of passwords for hackers to steal.In 2014, San Antonio-based USAA became the first financial institution to roll out facial and voice recognition on a mobile app, says Gary McAlum, USAA's chief security officer. Thumbprint recognition followed a few months later. A year after that, USAA had 1.1 million enrolled MFA users, out of a target population of 5 million mobile banking app users.To read this article in full or to leave a comment, please click here(Insider Story)
Real-time computing means much more than getting a seemingly immediate response after hitting Enter. In fact, its real meaning involves interfacing to real machines doing real things in, well, their own real time.Take, for example, the Gleason 600HTL Turbo Lapper, whose controller was designed by Viewpoint Systems in Rochester, N.Y. Basically, it laps beveled gears (that is, polishes them by grinding an abrasive slurry between them) until they mesh so perfectly they purr rather than clatter -- an attribute important to the car makers that use the beveled gears in car differentials, explains John Campbell, vice president at Viewpoint.To read this article in full or to leave a comment, please click here
New technologies affecting enterprise IT continue to be invented, commercialized and adopted. The latest batch of techs looming on the horizon, examined in greater detail below, include quantum computing, gamification, reactive programming, augmented reality, transient computing electronics and Named Data Networking.To read this article in full or to leave a comment, please click here(Insider Story)