computing Trusted computing and information security : 13th Chinese conference, CTCIS 2019, Shanghai, China, October 24-27, 2019 By dal.novanet.ca Published On :: Fri, 1 May 2020 19:44:43 -0300 Author: Chinese Conference on Trusted Computing and Information Security (13th : 2019 : Shanghai, China)Callnumber: OnlineISBN: 9789811534188 (eBook) Full Article
computing DNA beyond genes : from data storage and computing to nanobots, nanomedicine, and nanoelectronics By dal.novanet.ca Published On :: Fri, 1 May 2020 19:44:43 -0300 Author: Demidov, Vadim V., authorCallnumber: OnlineISBN: 9783030364342 (electronic bk.) Full Article
computing grid computing By looselycoupled.com Published On :: 2004-08-30T00:00:00-00:00 Pooled computer resources. Grid computing, or simply grid, is the generic term given to techniques and technologies designed to make pools of distributed computer resources available on-demand. Grid computing was originally conceived by research scientists as a way of combining computers across a network to form a distributed supercomputer to tackle complex computations. In the commercial world, grid aims to maximize the utilization of an organization's computing resources by making them shareable across applications (sometimes called virtualization) and, potentially, provide computing on demand to third parties as a utility service. When used with specifications such as WSRF and WS-Notification, grid resources can appear as web services within a service-oriented architecture. Full Article
computing Researchers explore quantum computing to discover possible COVID-19 treatments By news.psu.edu Published On :: Fri, 01 May 2020 11:34 -0400 Quantum machine learning, an emerging field that combines machine learning and quantum physics, is the focus of research to discover possible treatments for COVID-19, according to Penn State researchers, who believe that this method could be faster and more economical than the current methods used for drug discovery. Full Article
computing Google Claims Quantum Computing Achievement, IBM Says Not So Fast By www.pcmag.com Published On :: Google's quantum computer performed a computation in 200 seconds that would have taken the world's fastest supercomputer 10,000 years to calculate. But IBM is dismissing Google's claim that it achieved quantum supremacy. Full Article
computing How to use Intel Perceptual Computing to develop engaging apps By feedproxy.google.com Published On :: 2014-08-21T16:33:00+05:30 Introduction This article discusses the development of Clifford’s Reading Adventures, a series of interactive educational games for young children from Scholastic Interactive LLC. T... Full Article
computing How to use Intel Perceptual Computing SDK for human-robot interface By feedproxy.google.com Published On :: 2014-10-14T15:08:00+05:30 Download PDF 1. Introduction This article gives a brief overview of Rover, then focuses on our implementation of the human-robot interface utilizing the Intel® Perceptual Computing SDK for g... Full Article
computing Timeline: A brief history of quantum computing from 1980 to 2100 By www.newscientist.com Published On :: Tue, 29 Oct 2019 17:27:05 +0000 Here are the key milestones in the history of quantum computing, as well as New Scientist's predictions for the future Full Article
computing Exotic super magnets could shake up medicine, cosmology and computing By www.newscientist.com Published On :: Wed, 27 Nov 2019 18:00:00 +0000 Their unique blend of electric and magnetic properties was long thought impossible. Now multiferroics are shaking up fields from dark matter hunting to finding cancer Full Article
computing Amazon enters quantum computing race with cloud quantum processors By www.newscientist.com Published On :: Tue, 03 Dec 2019 17:41:50 +0000 Amazon has combined three types of quantum computing processors from D-Wave Systems, IonQ, and Rigetti Computing into a cloud service to test quantum algorithms Full Article
computing How quantum computing got a boost from an experiment in a cornfield By www.newscientist.com Published On :: Wed, 11 Mar 2020 18:00:00 +0000 In a cornfield in India, Urbasi Sinha ran an experiment that may challenge the rules of quantum mechanics and paves the way for higher dimensional quantum computing Full Article
computing Exotic super magnets could shake up medicine, cosmology and computing By www.newscientist.com Published On :: Wed, 27 Nov 2019 18:00:00 +0000 Their unique blend of electric and magnetic properties was long thought impossible. Now multiferroics are shaking up fields from dark matter hunting to finding cancer Full Article
computing Devs: Here's the real science behind the quantum computing TV show By www.newscientist.com Published On :: Wed, 29 Apr 2020 10:42:49 +0000 In TV series Devs, a tech company has built an extremely powerful quantum computer. The show is both beautiful and captivating, says Rowan Hooper Full Article
computing Surprise contender Honeywell enters the quantum computing race By www.newscientist.com Published On :: Tue, 03 Mar 2020 12:00:17 +0000 Honeywell, the same company that might make your humidifier or home security system, is unveiling a powerful quantum computer that will be available to the public Full Article
computing Devs: Here's the real science behind the quantum computing TV show By www.newscientist.com Published On :: Wed, 29 Apr 2020 10:42:49 +0000 In TV series Devs, a tech company has built an extremely powerful quantum computer. The show is both beautiful and captivating, says Rowan Hooper Full Article
computing Quantum Computing Gets a Boost From AI and Crowdsourcing By feedproxy.google.com Published On :: Tue, 22 Oct 2019 15:00:00 GMT Can an online game that combines human brainpower with AI solve intractable problems? Full Article consumer-electronics consumer-electronics/gaming
computing Why End-User Computing Needs a Refresh By sandhill.com Published On :: Thu, 21 Jun 2018 00:00:00 +0000 The anticipated proliferation of devices demands an innovative approach to managing, securing and delivering these endpoints and the applications that will run on them. Keep on reading: Why End-User Computing Needs a Refresh Full Article
computing Yokogawa Releases AI-enabled Versions of SMARTDAC+ Paperless Recorders and Data Logging Software, and Environmentally Robust AI-enabled e-RT3 Plus Edge Computing Platform for Industry Applications By www.yokogawa.com Published On :: 2020-04-07T16:00:00+09:00 Yokogawa Electric Corporation (TOKYO: 6841) announces the release of artificial intelligence (AI)-enabled versions of the GX series panel-mount type paperless recorders, GP series portable paperless recorders, and GA10 data logging software, which are components of the highly operable and expandable SMARTDAC+data acquisition and control system. This new AI functionality includes the future pen, a function developed by Yokogawa that enables the drawing of predicted waveforms. Yokogawa is also releasing a new CPU module for the e-RT3 Plus edge computing platform that is environmentally robust and Python compatible. The GX/GP and e-RT3 release is set for April 8, and the GA10 software will be released on May 13. The SMARTDAC+ system is a product in the OpreX Data Acquisition family, and the e-RT3 Plus is part of the OpreX Control Devices family. Full Article
computing The Economic Gains of Cloud Computing: An Address by Federal Chief Information Officer Vivek Kundra By webfeeds.brookings.edu Published On :: Wed, 07 Apr 2010 09:00:00 -0400 Event Information April 7, 20109:00 AM - 11:00 AM EDTFalk AuditoriumThe Brookings Institution1775 Massachusetts Ave., NWWashington, DC Register for the EventCloud computing services over the Internet have the potential to spur a significant increase in government efficiency and decrease technology costs, as well as to create incentives and online platforms for innovation. Adoption of cloud computing technologies could lead to new, efficient ways of governing.On April 7, the Brookings Institution hosted a policy forum that examines the economic benefits of cloud computing for local, state, and federal government. Federal Chief Information Officer Vivek Kundra delivered a keynote address on the role of the government in developing and promoting cloud computing. Brookings Vice President Darrell West moderated a panel of experts and detailed the findings in his paper, "Saving Money through Cloud Computing," which analyzes its governmental cost-savings potential. After the program, panelists took audience questions. Video Cloud Computing a Fiscally Smart MoveCloud Computing Saves Money, Makes Government More OpenCloud Computing Will Fundamentally Change Government OperationsGovernment on Cloud Will Yield Cost-Effective System Audio The Economic Gains of Cloud Computing Transcript Uncorrected Transcript (.pdf) Event Materials 20100407_cloud_computing0407_cloud_computing_kundra_remarks0407_cloud_computing_kundra_presentation Full Article
computing Innovating through Cloud Computing By webfeeds.brookings.edu Published On :: Fri, 07 May 2010 00:00:00 -0400 Technology offers the greatest source for innovation in the public sector and one of the best examples falls within the area of cloud computing. As I noted in a recent paper, the U.S. federal government spends nearly $76 billion each year on information technology, and $20 billion of that is devoted to hardware, software, and file servers. Traditionally, computing services have been delivered through desktops or laptops operated by proprietary software. But new advances in cloud computing have made it possible for public sector agencies alike to access software, services, and data storage through remote file servers.I looked at possible cost savings a federal agency might expect from migrating to the cloud. After undertaking case studies of government agencies that made the move, I found that the agencies generally saw between 25 and 50 percent savings in moving to the cloud. Public officials can save money by reducing the number of file servers they need to purchase, cutting software costs, relying on fewer information technology specialists, and improving the efficiency of their data storage utilization. In 2008, Washington, D.C. city government shifted many of its 38,000 employee email services across 86 agencies to the cloud, and the migration saved 48 percent on email expenditures. In 2009, the city of Los Angeles moved email service for its 30,000 employees to the cloud. An analysis undertaken by City Administrative Officer Miguel Santana for the City Council found that the five-year costs of running the new Google system would be $17,556,484, which was 23.6 percent less than the $22,996,242 for operating GroupWise during that same period. And in terms of personnel savings, the city needed nine fewer people in its information technology department. The U.S. Air Force 45th Space Wing is responsible for launching and tracking unmanned space vehicles from Cape Canaveral Air Force Station and employs more than 10,000 workers. The Wing had 60 distinct file servers, but found that it utilized only 10 percent of central processing unit capacity. Commanders modernized their system and saved $180,000 per year in annual computing costs. In addition, the unit saved money by not buying new hardware or deploying new software. These are just some of the ways the government is using technology to save money and increase efficiency of its operations. Authors Darrell M. West Image Source: © HANNIBAL HANSCHKE / Reuters Full Article
computing Steps to Improve Cloud Computing in the Public Sector By webfeeds.brookings.edu Published On :: Wed, 21 Jul 2010 09:58:00 -0400 Executive SummaryGovernment information technology is subject to a variety of rules, regulations, and procurement policies. Computing is treated differently depending on whether the platform is based on desktops, laptops, mobile devices, or remote file servers known as cloud computing. There are differences between the executive, legislative, and judicial branches of government, as well as in the level of privacy and security expected for various applications. Some people perceive higher security on desktop or laptop computers and lower security with the cloud because the latter’s information is stored remotely through third-party commercial providers. In reality, though, there are serious security threats to all electronic information regardless of platform, and cloud server providers often take security more seriously than mass consumers or government officials employing weak passwords on their local computers. In this paper, I review current federal IT policy and discuss rules, practices, and procedures that limit innovation. There are a variety of obstacles that make it difficult for policymakers to take full advantage of the technological revolution that has unfolded in recent years. After outlining these issues, I make recommendations on policy changes required to improve the efficiency and effectiveness of federal computing. My specific recommendations include: Public officials should develop more consistent rules on computing across desktop, laptop, mobile, and cloud platforms. The use of video, collaboration, and social networking should be authorized for congressional offices. This would make legislative branch policy consistent with that of the executive branch. Judicial branch computing should be modernized, with greater emphasis on cloud computing. There should be a more uniform certification process for federal agencies. Right now, each agency is responsible for certifying its own applications. It makes sense to have a “joint authorization board” with the power to review management services and certify particular products for use across the government. Congress should update the Electronic Communications Privacy Act to change the process by which law enforcement agents obtain electronic information. Instead of using a prosecutor’s subpoena, legislation should require a “probable cause” search warrant that is approved by a judge. This would provide greater safeguards in terms of online content, pictures, geolocation data, and e-mails. Privacy rights should be placed on the same footing regardless of whether a person is using desktop or cloud computing. It makes little sense to have weaker standards on one platform than another. Consumers and government decision-makers expect the same level of protection whether they are accessing information on a desktop, laptop, mobile, or cloud storage system. Congress should amend the Computer Fraud and Abuse Act to strengthen penalties for unwanted intrusion into computing systems. The law has inconsistent penalties and prosecutors have found that it is hard to prosecute cyber-crimes. Apps.gov represents a big step forward and government use should be expanded because it makes procurement easier and speeds public sector innovation. It is a model of how the government can reinvent itself through digital technology in ways that improve efficiency and effectiveness. Countries need to harmonize their laws on cloud computing so as to reduce current inconsistencies in regard to privacy, data storage, security processes, and personnel training, There should be mechanisms for data exchange that encourage portability across platforms. We should avoid vendor lock-in that precludes data exchange. Data on uptime, downtime, recover time, archiving, and maintenance schedules would help build public trust by providing information on computing performance. Downloads Download the Full Paper Authors Darrell M. West Image Source: Martin Barraud Full Article
computing Moving to the Cloud: How the Public Sector Can Leverage the Power of Cloud Computing By webfeeds.brookings.edu Published On :: Wed, 21 Jul 2010 10:00:00 -0400 Event Information July 21, 201010:00 AM - 12:00 PM EDTFalk AuditoriumThe Brookings Institution1775 Massachusetts Ave., NWWashington, DC Register for the EventThe U.S. government spends billions of dollars each year on computer hardware, software and file servers that may no longer be necessary. Currently, the public sector makes relatively little use of cloud computing, even though studies suggest substantial government savings from a migration to more Internet-based computing with shared resources.On July 21, the Center for Technology Innovation at Brookings hosted a policy forum on steps to enhance public sector adoption of cloud computing innovations. Brookings Vice President Darrell West moderated a panel of experts, including David McClure of the General Services Administration, Dawn Leaf of the National Institute for Standards and Technology, and Katie Ratte of the Federal Trade Commission. West released a paper detailing the policy changes required to improve the efficiency and effectiveness of federal computing. Audio Moving to the Cloud: How the Public Sector Can Leverage the Power of Cloud Computing Transcript Uncorrected Transcript (.pdf)Download Dawn Leaf's PowerPoint Presentation (.pdf)Download David McClure's PowerPoint Presentation (.pdf) Event Materials 20100721_cloud_computing0721_cloud_computing_leaf0721_cloud_computing_mcclure Full Article
computing Privacy and Security in the Cloud Computing Age By webfeeds.brookings.edu Published On :: Tue, 26 Oct 2010 10:00:00 -0400 Event Information October 26, 201010:00 AM - 11:30 AM EDTFalk AuditoriumThe Brookings Institution1775 Massachusetts Ave., NWWashington, DC Register for the EventAlthough research suggests that considerable efficiencies can be gained from cloud computing technology, concerns over privacy and security continue to deter government and private-sector firms from migrating to the cloud. By its very nature, storing information or accessing services through remote providers would seem to raise the level of privacy and security risks. But is such apprehension warranted? What are the real security threats posed to individuals, business and government by cloud computing technologies? Do the cost-saving benefits outweigh the dangers?On October 26, the Brookings Institution hosted a policy forum on the privacy and security challenges raised by cloud computing. Governance Studies Director Darrell West moderated a panel of technology industry experts examining how cloud computing systems can generate innovation and cost savings without sacrificing privacy and security. West will also present findings from his forthcoming paper “Privacy, Security, and Innovation in Cloud Computing.” After the program, panelists took audience questions. Transcript Uncorrected Transcript (.pdf) Event Materials 20101026_cloud_computing Full Article
computing Privacy and Security in Cloud Computing By webfeeds.brookings.edu Published On :: Tue, 26 Oct 2010 11:50:00 -0400 Executive Summary Cloud computing can mean different things to different people, and obviously the privacy and security concerns will differ between a consumer using a public cloud application, a medium-sized enterprise using a customized suite of business applications on a cloud platform, and a government agency with a private cloud for internal database sharing (Whitten, 2010). The shift of each category of user to cloud systems brings a different package of benefits and risks. What remains constant, though, is the tangible and intangible value that the user seeks to protect. For an individual, the value at risk can range from loss of civil liberties to the contents of bank accounts. For a business, the value runs from core trade secrets to continuity of business operations and public reputation. Much of this is hard to estimate and translate into standard metrics of value (Lev, 2003) The task in this transition is to compare the opportunities of cloud adoption with the risks. The benefits of cloud have been discussed elsewhere, to the individual to the enterprise, and to the government (West, 2010a, 2010b). This document explores how to think about privacy and security on the cloud. It is not intended to be a catalog of cloud threats (see ENISA (2009) for an example of rigorous exploration of the risks of cloud adoption to specific groups). We frame the set of concerns for the cloud and highlight what is new and what is not. We analyze a set of policy issues that represent systematic concerns deserving the attention of policy-makers. We argue that the weak link in security generally is the human factor and surrounding institutions and incentives matter more than the platform itself. As long as we learn the lessons of past breakdowns, cloud computing has the potential to generate innovation without sacrificing privacy and security (Amoroso, 2006; Benioff, 2009). Downloads Download the Full Paper Authors Allan A. FriedmanDarrell M. West Image Source: Jupiterimages Full Article
computing The Terms They Are A-Changin'...: Watching Cloud Computing Contracts Take Shape By webfeeds.brookings.edu Published On :: Tue, 01 Mar 2011 13:45:00 -0500 EXECUTIVE SUMMARYMany web services are examples of cloud computing, from storage and backup sites such as Flickr and Dropbox to online business productivity services such as Google Docs and Salesforce.com. Cloud computing offers a potentially attractive solution to customers keen to acquire computing infrastructure without large up-front investment, particularly in cases where their demand may be variable and unpredictable, as a means of achieving financial savings, productivity improvements and the wider flexibility that accompanies Internet-hosting of data and applications. The greater flexibility of a cloud computing service as compared with a traditional outsourcing contract may be offset by reduced certainty for the customer in terms of the location of data placed into the cloud and the legal foundations of any contract with the provider. There may be unforeseen costs and risks hidden in the terms and conditions of such services. This document reports on a detailed survey and analysis of the terms and conditions offered by cloud computing providers. The survey formed part of the Cloud Legal Project at the Centre for Commercial Law Studies (CCLS), within the School of Law at Queen Mary, University of London, UK. Funded by a donation from Microsoft, but academically independent, the project is examining a wide range of legal and regulatory issues arising from cloud computing. The project's survey of 31 cloud computing contracts from 27 different providers, based on their standard terms of service as offered to customers in the E.U. and U.K., found that many include clauses that could have a significant impact, often negative, on the rights and interests of customers. The ease and convenience with which cloud computing arrangements can be set up may lull customers into overlooking the significant issues that can arise when key data and processes are entrusted to cloud service providers. The main lesson to be drawn from the Cloud Legal Project’s survey is that customers should review the terms and conditions of a cloud service carefully before signing up to it. The survey found that some contracts, for instance, have clauses disclaiming responsibility for keeping the user’s data secure or intact. Others reserve the right to terminate accounts for apparent lack of use (potentially important if they are used for occasional backup or disaster recovery purposes), for violation of the provider’s Acceptable Use Policy, or indeed for any or no reason at all. Furthermore, whilst some providers promise only to hand over customer data if served with a court order, others state that they will do so on much wider grounds, including it simply being in their own business interests to disclose the data. Cloud providers also often exclude liability for loss of data, or strictly limit the damages that can be claimed against them – damages that might otherwise be substantial if a failure brought down an e-commerce web site. Although in some U.S. states, in E.U. countries and in various other jurisdictions the validity of such terms may be challenged under consumer protection laws, users of cloud services may face practical obstacles to bringing a claim for data loss or privacy breach against a provider that seems local online but is, in fact, based in another continent. Indeed, service providers usually claim that their contracts are subject to the laws of the place where they have their main place of business. In many cases this is a US state, with a stipulation that any dispute must be heard in the provider’s local courts, regardless of the customer’s location. Perhaps the most disconcerting discovery of the Cloud Legal Project’s survey was that many providers claimed to be able to amend their contracts unilaterally, simply by posting an updated version on the web. In effect, customers are put on notice to download lengthy and complex contracts, on a regular basis, and to compare them against their own copies of earlier versions to look for changes. The cloud computing market is still developing rapidly, and potential cloud customers should be aware that there may be a mismatch between their expectations and the reality of cloud providers' service terms, and be alive to the possibility of unexpected changes to the terms. Downloads Download the Full Paper Authors Simon BradshawChristopher MillardIan Walden Image Source: Natalie Racioppa Full Article
computing Evaluating the Cloud Computing Act of 2011 By webfeeds.brookings.edu Published On :: Thu, 16 Jun 2011 12:00:00 -0400 Event Information June 16, 201112:00 PM - 1:30 PM EDTRoom SVC-209U.S. Capitol Visitor's CenterU.S. CapitolWashington, DC While research suggests that considerable efficiencies can be gained from cloud computing technology, concerns over privacy and security continue to deter governments and private-sector firms from migrating to the cloud. Senator Amy Klobuchar (D-Minn.) has advanced discussion of the “Cloud Computing Act of 2011,” draft legislation that would address these challenges by encouraging the U.S. government to negotiate with other countries to establish consistent laws related to online security and cloud computing. The bill also creates new enforcement tools for investigating and prosecuting those who violate online privacy and security laws.On June 16, the Brookings Institution hosted a forum on the policy proposals in the Cloud Computing Act of 2011. Discussion included an overview of the international policy implications as governments and firms adjust to a coherent legal framework, changes and innovations in public procurement, and challenges for private industry as it balances consumer needs and compliance with these proposed cloud computing safeguards. After the program, panelists took audience questions. Transcript Uncorrected Transcript (.pdf) Event Materials 20110616_cloud_computing Full Article
computing Addressing Export Control in the Age of Cloud Computing By webfeeds.brookings.edu Published On :: Mon, 25 Jul 2011 10:58:00 -0400 Executive SummaryThe move to the cloud is one of the defining information technology trends of the early 21st century. By providing businesses, universities, government agencies, and other entities with access to shared and often physically dispersed computing resources, cloud computing can simultaneously offer increased flexibility, reduced cost, and access to a wider array of services. Cloud computing has also created a set of new challenges. For example, the issues of privacy and security in the cloud are well recognized and have been extensively discussed in the business and popular press. However, one critical issue that has received very little attention with respect to cloud computing is export control. In the broadest sense, export control relates to regulations that the United States and many other countries have put in place to restrict the export of various sensitive items, information, and software. There is an inherent tension between cloud computing and export control. While the concept of the cloud is centered on the premise of removing the need to track the details of data movement among various destinations, export control regulations are built largely around restrictions tied to those very movements. If cloud computing is to reach its full potential, it is critical for providers and users of cloud services to address its implications with respect to export control. It is equally important to adapt the export control regulations to reflect the increasing prevalence of cloud computing in a manner that preserves the ability of American companies to benefit from the efficiencies of the cloud while also ensuring that American national security and foreign policy interests are adequately protected. Downloads Download the Paper Authors John Villasenor Image Source: © Valentin Flauraud / Reuters Full Article
computing Riding the Mobile Wave: The Future of Mobile Computing By webfeeds.brookings.edu Published On :: Fri, 05 Oct 2012 10:00:00 -0400 Event Information October 5, 201210:00 AM - 11:30 AM EDTFalk AuditoriumBrookings Institution1775 Massachusetts Avenue NWWashington, DC 20036 Register for the EventIn his new book The Mobile Wave: How Mobile Intelligence Will Change Everything (Vanguard Press, 2012), CEO of MicroStrategy Michael Saylor examines the transformative possibilities of mobile computing on business, society, economies and everyday life. Saylor argues that mobile technologies such as smartphones and tablet computers – “the fifth wave of computer technology” – will be indispensible tools for modern life and completely alter how we live. On October 5, the Center for Technology Innovation at Brookings hosted a forum on mobile computing and its monumental impact on our future. Moderated by Vice President Darrell West, Michael Saylor discussed key highlights from his book and offered insights as to what sort of change we can expect from the macro level down to the most mundane of everyday humans tasks. Audio Riding the Mobile Wave: The Future of Mobile Computing Transcript Transcript (.pdf) Event Materials 20121005_mobile_wave Full Article
computing Threats to the Future of Cloud Computing: Surveillance and Transatlantic Trade By webfeeds.brookings.edu Published On :: Thu, 17 Jul 2014 07:30:00 -0400 The first instance of “cloud” computing came in 2006, when Amazon released its Elastic Compute Cloud, a service for consumers to lease space on virtual machines to run software. Now, the cloud enables the transfer and storage of data around the world, in an almost seamless fashion. Using cloud services are a seamless experience from the consumer perspective. This ease of use obscures significant regulation from governments on both sides of the Atlantic. The Safe Harbor Principles is a framework that ensures that personal consumer data being transferred from the EU to the US is still subject to a level of security in compliance with the EU’s stricter regulation on data protection. US companies must be certified within this framework, in order to transfer consumer data outside the EU. A comprehensive data privacy arrangement that satisfies both sides of the Atlantic is necessary to preserve the free flow of data, and the resulting commerce, between the two regions. Speaking at the 2014 Cloud Computing Policy Conference, Cameron F. Kerry suggested that neither side of the Atlantic can afford to partition the Internet. Currently trade negotiators are assessing the viability including an update to Safe Harbor Principles as a part of the Transatlantic Trade and Investment Partnership (TTIP). TTIP and the Future of Trade The NSA revelations last year have only increased support for further regulation over the transfer of personal data in the cloud, especially in the European Union (EU). The revelations have also brought to light significant differences in the European and US conceptions of privacy. The ruling by the European Court of Justice on the “right to be forgotten” is a recent example of this transatlantic divide. In EU countries, citizens can now request Google to take down links from search results that lead users to potentially damaging information. There are several disputes that negotiators must first resolve. Europeans would prefer that American regulators take a more active role in cases where US firms are violating the Safe Harbor principles. EU officials have also indicated they would like to include a mechanism to send an alert if data were improperly shared with US law enforcement officials. The expansion of the codes of conduct within the cloud would serve as a major step towards finalizing TTIP. A European Commission Analysis finds that TTIP would inject about $130 billion into the US economy. Ultimately both the EU and the US have so much to gain that both nations must find a way to resolve these thorny issues. Kevin Risser contributed to this post. Authors Joshua BleibergDarrell M. West Image Source: © Fabrizio Bensch / Reuters Full Article
computing Getting IT Right? How State Governments are Approaching Cloud Computing By webfeeds.brookings.edu Published On :: Tue, 20 Jan 2015 07:30:00 -0500 Cloud computing is becoming omnipresent in the private sector as companies latch on to this innovation as a way to manage scalability, improve flexibility, and reduce cost. Analysts at IDC predict that, over the next six years, nearly 90 percent of new spending on Internet and communications technology will be on cloud-based platforms. Apple, Google, Amazon, Microsoft, and hundreds of smaller companies are positioning themselves to dominate the estimated $5 trillion worldwide market. While few companies will provide numbers, it is estimated that Amazon and Google may run as many as 10 million servers while Microsoft runs close to one million. In short, it is an innovation that makes a mockery out of Moore’s law. But, like all innovations, cloud computing has potential pitfalls. Public sector organizations in particular have had difficulty taking advantage of new technologies. The Heritage Foundation keeps a list over 50 examples of government ineptitude including $34 billion in fraudulent Homeland Security contracts, National Institutes of Health renting a lab that it neither needs nor can use for $1.3 million per month, and the Department of Agriculture wasting $2.5 billion in stimulus money on broadband internet. Technological ineptitude received special attention with the failed launch of the Healthcare.gov, the release of classified data from Edward Snowden, and the costly FBI virtual case file debacle. Cloud computing is far more than just a simple technology change and requires a close examination of governance, sourcing, and security. We sought to understand how well state government is prepared to address the challenges of cloud computing. The Approach We have gathered and started to do a content analysis of the IT strategic plans for each state. For each plan, we performed a content analysis, which is looking for certain phrases or text within the IT strategic plan in order to have a structured way to understand the data. Details for our approach can be seen in our previous blog post. How States Are Implementing the Cloud We were not surprised to see a number of states preparing to study or embark on cloud computing. While some states don’t mention it (e.g. Alabama), most states are eagerly exploring it. For example, North Dakota’s plan talks about cloud computing as an integral part of the future and seven of its thirteen major IT initiatives are centered on preparation for transitioning to the cloud “where and when it makes sense”. Vermont puts itself squarely in the studying period. The plan describes that, “While the risks of enterprise-wide and cloud-based IT must be carefully managed, trends continue to just larger-scale operations.” Wisconsin also clearly lays out its view on cloud computing, writing that, “Flexibility and responsiveness (also) guide Wisconsin’s approach toward adoption of cloud services” and suggests that its version of a private cloud “…offers advanced security and service availability tailored for business needs.” West Virginia provides an equally balanced approach by requiring that only services with an acceptably low risk and cost-effective footprint will be moved to the cloud. In short, all of the states that are considering cloud computing are taking a thoughtful and balanced approach. The Good One of the most critical aspects of cloud computing is security and, without question, states understand the importance of good security. A good example of this is Colorado who designates security as one of its four “wildly important goals” and sets the target of “10 percent reduction in information security risk for Colorado agencies by close of FY15”. South Carolina echoed the same theme by asserting that security and confidentiality are “overriding priorities at every stage of development and deployment.” Connecticut’s plans explain the need to “continuously improve the security and safeguards over agency data and information technology assets”. The Bad Despite the interest in cloud computing, we were only able to find a single state (Georgia) that explicitly links governance to security and, to us, by extension to cloud computing. In Georgia’s plan, they start with the idea that “strong security programs start with strong governance” and then explicitly describe necessary changes in governance to improve security. We were, however, impressed with the seriousness that New York, North Carolina and Massachusetts took governance but it was difficult to find many other states that did. The Ugly Unfortunately the results on sourcing were dismal. While a few states (e.g. Kansas, Ohio, and Massachusetts) specifically discuss partnerships, most states seemed to ignore the sourcing aspect of cloud computing. The most ominous note comes from Alabama where they make a statement that innovation in the state is being stifled by a lack of strong personnel. While we have great enthusiasm for government to address cloud computing, some of the non-technical issues are lagging in the discussion. Good government requires that these items be addressed in order to realize the promise of cloud computing. Authors Kevin C. DesouzaGregory Dawson Image Source: © Fabrizio Bensch / Reuters Full Article
computing NASA's new efficient super computing facility will save 1.3 million gallons of water a year By www.treehugger.com Published On :: Wed, 22 Feb 2017 09:58:57 -0500 The computing facility will help researchers with NASA missions while reducing its environmental impact. Full Article Technology
computing Ramco Redefines ‘Inclusive Computing’ with SMS Based Employee Self Service - Ramco's SMS based Employee Self Service redefines 'Inclusive Computing' By feedproxy.google.com Published On :: 12 Jan 2015 10:18:00 EST Ramco's SMS based Employee Self Service redefines 'Inclusive Computing' Full Article Computer Electronics Computer Software Internet Technology Telecommunications Workforce Management Human Resources New Products Services MultiVu Video
computing Sesame Workshop and IBM Watson Team Up to Advance Early Childhood Education - Transforming Early Childhood Education with Cognitive Computing By feedproxy.google.com Published On :: 27 Apr 2016 14:45:00 EDT IBM Watson is bringing cognitive computing to education to bring personalized learning to kids around the world - transforming early childhood education to help kids grow smarter, stronger and kinder. Full Article Computer Electronics Computer Networks Computer Hardware Computer Software Consumer Electronics Education New Products Services Children-related News Broadcast Feed Announcements Corporate Social Responsibility MultiVu Video
computing Sesame Workshop and IBM Watson Team Up to Advance Early Childhood Education - Transforming Early Childhood Education with Cognitive Computing By feedproxy.google.com Published On :: 27 Apr 2016 14:45:00 EDT IBM Watson is bringing cognitive computing to education to bring personalized learning to kids around the world - transforming early childhood education to help kids grow smarter, stronger and kinder. Full Article Computer Electronics Computer Networks Computer Hardware Computer Software Consumer Electronics Education New Products Services Children-related News Broadcast Feed Announcements Corporate Social Responsibility MultiVu Video
computing Tablets PCs Revolutionizing Our Computing Needs By feedproxy.google.com Published On :: From a historical perspective, we started with main frames, then moved on to mini computers and then came the boom of personal computers. These three major developments in computers have defined our computing habits the past few decades.... Full Article
computing Runa Capital closes Fund III at $157M, with an added focus on quantum computing By techcrunch.com Published On :: Wed, 06 May 2020 17:02:20 +0000 VC fund Runa Capital was launched with $135 million in 2010, and is perhaps best known for its investment into NGINX, which powers many web sites today. In more recent years it has participated or led investments into startups such as Zipdrug ($10.8 million); Rollbar this year ($11 million); and Monedo (for €20 million). HQ’d […] Full Article Europe Funding TC Venture Capital artificial intelligence cloud infrastructure Companies finance healthcare Kreditech machine learning Nginx open source software palo alto rollbar Runa Capital San Francisco schoolmint sequoia capital Zipdrug
computing Runa Capital closes Fund III at $157M, with an added focus on quantum computing By feedproxy.google.com Published On :: Wed, 06 May 2020 17:02:20 +0000 VC fund Runa Capital was launched with $135 million in 2010, and is perhaps best known for its investment into NGINX, which powers many web sites today. In more recent years it has participated or led investments into startups such as Zipdrug ($10.8 million); Rollbar this year ($11 million); and Monedo (for €20 million). HQ’d […] Full Article Europe Funding TC Venture Capital artificial intelligence cloud infrastructure Companies finance healthcare Kreditech machine learning Nginx open source software palo alto rollbar Runa Capital San Francisco schoolmint sequoia capital Zipdrug
computing Micron Begins DDR5 DIMMs Sampling For High-Performance Computing And AI Applications By www.gizbot.com Published On :: Tue, 07 Jan 2020 13:53:54 +0530 Micron the memory manufacturing company has officially confirmed that it has begun sampling DDR5 Registered DIMMs using 1znm process technology. DDR5 is the most advanced DRAM till date and the company claims that a DDR5 RAM compared to a DDR4 RAM Full Article
computing Supercomputing : 10th International Conference on Supercomputing in Mexico, ISUM 2019, Monterrey, Mexico, March 25-29, 2019, Revised Selected Papers [Electronic book] / Moisés Torres, Jaime Klapp (eds.). By encore.st-andrews.ac.uk Published On :: Cham : Springer, 2019. Full Article
computing Supercomputing [Electronic book] : 5th Russian Supercomputing Days, RuSCDays 2019, Moscow, Russia, September 23-24, 2019, Revised Selected Papers / Vladimir Voevodin, Sergey Sobolev (eds.). By encore.st-andrews.ac.uk Published On :: Cham : Springer, c2019. Full Article
computing Knowledge graph and semantic computing [Electronic book] : Knowledge computing and language understanding ; 4th China Conference, CCKS 2019, Hangzhou, China, August 24-27, 2019, Revised selected papers / Xiaoyan Zhu, Bing Qin, Xiaodan Zhu, Ming Liu, Longh By encore.st-andrews.ac.uk Published On :: Singapore : Springer, c2019. Full Article
computing Intelligent computing : proceedings of the 2019 Computing Conference. Volume 2 [Electronic book] / editors, Kohel Arai, Rahul Bhatia and Supriya Kapoor. By encore.st-andrews.ac.uk Published On :: Cham : Springer, [2019] Full Article
computing Human Centered Computing : 4th International Conference, HCC 2018, Mérida, Mexico, December, 5-7, 2018, Revised Selected Papers [Electronic book] / edited by Yong Tang, Qiaohong Zu, José G. Rodríguez García. By encore.st-andrews.ac.uk Published On :: Cham : Springer International Publishing, [2019] Full Article
computing Historical studies in computing, information, and society : insights from the Flatiron lectures [Electronic book] / William Aspray, editor. By encore.st-andrews.ac.uk Published On :: Cham, Switzerland : Springer, [2019] Full Article
computing High performance computing [Electronic book] : ISC High Performance 2019 International Workshops, Frankfurt, Germany, June 16-20, 2019, Revised Selected Papers / Michèle Weiland, Guido Juckeland, Sadaf Alam, Heike Jagode, editors. By encore.st-andrews.ac.uk Published On :: Cham : Springer, c2019. Full Article
computing Advances in data science, cyber security and IT applications [Electronic book] : First International Conference on Computing, ICC 2019, Riyadh, Saudi Arabia, December 10-12, 2019, Proceedings. Part II / Auhood Alfaries, Hanan Mengash, Ansar Yasar, Elhadi By encore.st-andrews.ac.uk Published On :: Cham : Springer, 2019. Full Article
computing Advances in data science, cyber security and IT applications [Electronic book] : First International Conference on Computing, ICC 2019, Riyadh, Saudi Arabia, December 10-12, 2019, Proceedings. Part I / Auhood Alfaries, Hanan Mengash, Ansar Yasar, Elhadi S By encore.st-andrews.ac.uk Published On :: Cham : Springer, 2019. Full Article
computing High accuracy computing methods: fluid flows and wave phenomena / Tapan K. Sengupta By library.mit.edu Published On :: Sun, 5 Jan 2014 06:05:41 EST Barker Library - TA357.5.D37 S46 2013 Full Article
computing Using HPC for computational fluid dynamics: a guide to high performance computing for CFD engineers / Shamoon Jamshed By library.mit.edu Published On :: Sun, 5 Jun 2016 06:05:13 EDT Barker Library - TA357.J384 2015 Full Article
computing Great unsung women of computing: the computers, the coders and the future makers By library.mit.edu Published On :: Sun, 18 Dec 2016 06:33:13 EST Hayden Library - QA76.2.A2 G74 2016 Full Article