Next Page: 10000

          Craft Beer Account Manager/Outside Sales Rep - Avitus Group - Sheridan, WY      Cache   Translate Page      
Proficiency with Microsoft Office products, cloud based computing and databases, mobile applications and other emerging technologies affecting Black Tooth...
From Avitus Group - Thu, 27 Sep 2018 08:14:23 GMT - View all Sheridan, WY jobs
          Legal Counsel - Trade Publishing      Cache   Translate Page      

A super new opportunity has arisen with a highly successful London based trade publisher for a talented and motivated Legal Counsel.  This role will support the Head of Legal to provide legal services to the London office and its trading divisions.  This is a highly responsible role and would suit a commercially-minded qualified legal professional, looking for an opportunity to bring their experience to a major publishing organisation.

Reporting to the Head of Legal, the Legal Counsel will provide accessible, commercial and technically strong advice to the various business divisions of the organisation and the role will involve reviewing, drafting, negotiating and advising on a wide range of commercial contracts/arrangements, including the acquisition and exploitation of intellectual property rights (including licences and a variety of publishing contracts), plus, distribution agreements, digital media contracts, IT contracts, Cloud computing, content acquisition, and author/editor contracts. 

The Legal Counsel will develop and review standard contract templates and terms and conditions and will also be involved with on-going review and maintenance of policies, procedures and controls and associated mechanisms to support strategic goals and to ensure compliance with applicable rules, regulations and laws.

You will play a fundamental and proactive role in developing the legal team, both in relation to enhancing the support provided by the legal team to the business and also in promoting best practice and contributing to the overall performance of the legal team itself.

This is a key position in the team and the successful person will be LLB, BVC or LPC qualified and a member of the Law Society or Bar Council, and will have a minimum of 5 years post qualified experience in private practice or in-house.  Experience from the publishing/media, or similar industry would be an advantage.  You will be commercially focused with excellent drafting skills, along with strong written and oral communication skills, and able to efficiently manage your workload and projects within set timelines and to budget.

For more detailed information please contact me on 0207 048 6223 for a confidential call, or email your details to me at theresa@redwoodrecruitment.com

Reference: 
LC091018
Company: 
Location (from list): 
London, UK
Employment type: 
Permanent
Type: 
Specialist, Licensing
Job sector: 
Professional, Trade
Required languages: 
English
Required skills: 
5 years PQE in private practice or in house, Legal experience within the publishing/media sector
Application email: 
Salary description: 
Very attractive salary plus bonus and generous benefits package

           Google drops out of bidding for massive Pentagon cloud...       Cache   Translate Page      
Google is dropping out of the bidding for a huge Pentagon cloud computing contract that could be worth up to $10 billion, saying the deal would be inconsistent with its principles.
          Ingram Micro Signs Distribution Agreement with NVIDIA for the META region      Cache   Translate Page      

Ingram Micro Inc., one of the largest value-added distributors in the Middle East, Turkey and Africa region, today announced a start of the distribution relationship with NVIDIA, a world leader in artificial intelligence computing technology. With this agreement, Ingram Micro is authorized to sell and promote NVIDIA's Deep Learning, GPU Virtualization and High Performance Computing solutions in the GCC countries (namely, Qatar, Saudi Arabia, United Arab Emirates), Turkey and South Africa....

Read the full story at https://www.webwire.com/ViewPressRel.asp?aId=229825


          Comment on Contact Us by Mobile Computing      Cache   Translate Page      
<strong>Mobile Computing</strong> [...]check below, are some totally unrelated web sites to ours, nevertheless, they may be most trustworthy sources that we use[...]
          Dean, School of Computing and Academic Studies - British Columbia Institute of Technology (BCIT) - Burnaby, BC      Cache   Translate Page      
Enjoy subsidized parking and discounted access to our fitness facilities (including classes like Yoga and Zumba)....
From British Columbia Institute of Technology (BCIT) - Fri, 21 Sep 2018 21:00:23 GMT - View all Burnaby, BC jobs
          Director, Technology Advisory - PwC - Toronto, ON      Cache   Translate Page      
Updates job knowledge by studying state-of-the-art integration tools, development techniques, and computing equipment, participating in educational...
From PwC - Fri, 13 Jul 2018 10:26:49 GMT - View all Toronto, ON jobs
          History      Cache   Translate Page      

Since 1997 the training of high-educated experts, using  interneal  and uninternal  forms of education in such actual and modern specialties as “Automation, telemechanics and communications”(by branches), “Software of computing technics and nets”,  “Automatic electrical connection ” is the deal of Читать далее ...

The post History appeared first on Қазақстан Республикасының Алғашқы Президентінің ЖОО.


          Harnessing silicon fabrication technology to build quantum optical circuits      Cache   Translate Page      
A new study by scientists from the University of Bristol brings us a significant step closer to unleashing the revolutionary potential of quantum computing by harnessing silicon fabrication technology to build complex on-chip quantum optical circuits.
          Serverless cloud computing: Don’t go overboard      Cache   Translate Page      

There are lots of big cloud shows coming up, and the core themes will be containers, devops integration, and more serverless computing services, such as databases, middleware, and dev tools.

Why the focus on serverless computing? It’s a helpful concept, where you don’t have to think about the number of resources you need to attach to a public cloud service, such as storage and compute. You just use the service, and the back-end server instances are managed for you: “magically” provisioned, used, and deprovisioned.

The serverless cloud computing concept is now white-hot in the cloud computing world, and the cloud providers are looking to cash in. Who can blame them? At the same time, you can take things to a silly level. I suspect there’ll be a few serverless concepts that jump the shark the day they are announced.

To read this article in full, please click here


          Alibaba Cloud introduces second Availability Zone in India      Cache   Translate Page      
(Telecompaper) Alibaba Cloud, the cloud computing arm of Alibaba Group, has launched its second Availability Zone in Mumbai, India...
          Mobile Edge Computing Market Key Point Analysis On Adlink Technology, Advantech, Artesyn Embedded Technologies, Brocade Communications Systems, Huawei Technologies, Juniper Networks      Cache   Translate Page      
Mobile Edge Computing Market Key Point Analysis On Adlink Technology, Advantech, Artesyn Embedded Technologies, Brocade Communications Systems, Huawei Technologies, Juniper Networks Worldwide Mobile Edge Computing Market report of 2018 provides a detailed market overview as well as industry analysis for / of companies, manufacturers and distributors covering data on gross margin, cost structure, consumption value, sale price and more. The increasing need

           “to B”的金矿还是BAT的?       Cache   Translate Page      

【编者按】本文回答了“为什么中国本土互联网没能诞生SAP、甲骨文一样擅长于服务B端(企业端)的伟大公司?”“B端市场的未来还会属于BAT吗?”两个问题,同时还详细介绍了BAT及其他主要玩家的B端业务布局。不过编者一直有个疑问,C端和B端市场玩法明显不同,2C的企业转型2B会成功吗?欢迎留言或私信交流。

本文转载“深响”,原作者亚澜,经亿欧整理编辑,供业内人事参考。


美团点评联合创始人王慧文曾在2013年的时候做了这样一件事——

他把美国科技业的公司和中国的公司拉了一个名单,试图从中寻找出在美国已经很厉害了但在中国还没有被真正做起来的产业。他发现了Salesforce,Workday,Oracle。

“他们基本占据科技业的另外一半……但是我们把这个放到中国来看的话,to B的公司居然找不到,基本上找不到,有活着的,但是活得很惨。”在一次内部讲话中,王慧文抛出了一个问题:为什么中国这些to B的企业活得这么惨呢?

的确,中国互联网的上一个十年是关于用户端(C端)的十年,人口红利、消费红利让各种商业模式创新迅速成长起来,消费级业务无论是盈利效果、创新难度还是企业品牌塑造都明显优于企业级服务。

与此同时,上一个十年,水大鱼大,依靠市场红利,业务的驱动并非步履维艰,企业对于提高效率的新工具、新方法的采用意愿并不高。那些昂贵的、短期效果不显著的企业服务自然也不好卖。百度李彦宏曾经在百度联盟大会上曾指出,过去中国劳动力成本很低,使用企业级软件的效应并没有起来,另外,很多传统企业的老板并不用电脑,不会用PC提升效率。

更何况,中国企业对于数据的安全性顾虑更多的,而美国数据立法相对成熟,对于企业服务类应用的数据安全性信任程度比中国高。

老牌企业服务公司用友、金蝶在过去很长一段时间里都不是聚光灯的所在,曾在2014、15年享受到资本“泡沫”的SaaS风口也没有真正地起飞,在中国诞生一家类似SAP、Oracle一样专注服务企业端(B端)的伟大公司,并不是一朝一夕的事情。

时机似乎到了。C端业务的瓶颈愈发明显、需求侧达到饱和,以企业为核心角色的供给侧改革势在必行。

但这并不是一个创业的机遇期。百度、腾讯、阿里早就在B端有所布局,其业务发展的深度广度远远超出行业的想象。如今他们不约而同地加大投入力度,进一步教育市场。至于京东、今日头条(字节跳动)、美团等公司,虽然在B端也有布局,但周密程度和BAT无法相比,而那些15年SaaS创业浪潮中的幸存者,也都只是专注于某一个非常细分的领域。

人们呼唤着“下一个十年,一切皆重来”,但事实上,下一个十年,to B业务前所未有的好时代,恐怕还是BAT的。

*注:Salesforce专注提供销售团队管理解决方案,Workday提供人力资源解决方案,Oracle(甲骨文)是全球最大的企业级软件公司。

BAT预谋已久的B计划

百度是BAT中最有to B气质的,其大部分营收也来自B端。定位为AI公司的百度,更多地会为企业提供无人驾驶汽车的、云的、整个AI应用生态平台的人工智能解决方案。

具体来看,百度未来的三个主要发展方向都是非常to B的:

第一,Apollo无人驾驶汽车生态。

Apollo计划,是针对汽车行业的自动驾驶开放平台。阿波罗平台包括一套完整的软硬件和服务体系,包括车辆平台、硬件平台、软件平台、云端数据服务等四大部分。这些都是To B的业务。

百度与金龙客车合作的、搭载了百度Apollo自动驾驶解决方案系统的全球首款L4级自动驾驶巴士“阿波龙”已经量产下线。同时,百度在“车”方面的企业级合作伙伴还包括戴姆勒、福特、博世、NVIDIA、Intel、BlackBerry等。

百度是一个供给端的平台,向包括运营商、汽车服务厂商、整车厂商、零部件厂商、芯片厂商等等在内的合作伙伴们提供“车”相关的服务。

第二,DuerOS度秘。

一直以来,度秘被理解为人机对话的接口,用来“唤醒万物”,但如果往深了看,DuerOS是目前中国唯一一个从硬件到框架,再到平台、开发生态、生态应用系统、终端硬件全覆盖的AI应用生态平台。这使得DuerOS的生态接入的吸纳性更高,能解决很多场景问题。

比如,在洲际酒店的“小度智慧客房”中。客人可以通过语音控制客房设备、播放音乐、询问天气、检索信息。AI时代,高端酒店正在借助新一代人机交互方式提升用户体验。

第三,ABC云

2017年,百度云推出了ABC战略,即AI人工智能、Big Data大数据、Cloud Computing云计算。在李彦宏看来,百度的“云”和其他传统的“云”服务是不一样的,它在每一个行业的应用都有智能的因素在里面。

在上个月的百度云智峰会上,百度云推出了AI to B平台,兼具深度学习、对话式搜索、自然语言处理等全面的AI能力,以及涵盖新零售、新制造、交通与公共安全等领域的解决方案。

以国内最大钢铁企业宝武集团与百度云在质检领域的合作为例,依托百度云质检云行业解决方案,通过机器视觉模型量化质检流程,为质检流程提供决策依据,在降低误报率的同时,提升作业效率。而百度云与优信二手车的合作,则是通过VR技术升级远程选车,并在线下门店内部署AI摄像头,通过人脸识别匹配购车信息,结合云平台与业务系统沉淀用户数据,为后续经营提供支撑。

现在百度云的行业版图已经覆盖了农业、工业制造业、金融服务业等领域,不光是简单地存储数据,而是通过AI能力为企业提供解决实际问题的解决方案。

百度在B端的野心其实李彦宏在2017年的世界互联网大会上就有透露,他当时分享了百度与连锁超市的合作,用人工智能的技术去提升超市里生鲜货品的效率,使得超市利润提升了20%,报损率降低了30%以上。

“人工智能对于B端的生态改变是非常明显的。无论是金融还是房产,无论是教育还是医疗,无论是能源还是物流等等,每一个方面,人工智能都有非常非常多的应用。”

简言之,百度的“B计划”是以AI切入,服务B端的每一个方面。

做云的远不只有百度,事实上,“云”正在成为BAT在企业服务领域的必争之地。

因为云确实是对企业有非常大的价值:一方面,云计算是公共服务,是可变成本,可按需使用,不再是固定资产投入,创业公司的成本可以降下来;另一方面,移动+云,相当于把IT服务在线化了,让技术门槛大大降低;而云与大数据的结合可以负能相当多的领域。

阿里是BAT中第一个提出做云计算业务的:2008年确定云计算战略,2009年成立阿里云公司。

就在前不久的2018杭州·云栖大会上,阿里云宣布成立全球交付中心,海公布了新一代云计算操作系统飞天2.0。在8月阿里巴巴公布的2019财年第一季度财报中,阿里云营收46.98亿元,为全球第三大IaaS服务提供商。

而云只是to B业务中的一部分。

《彭博商业周刊》对企业服务产品划分为三种主要流行模式:IaaS(Infrastructure as a Service,基础设施即服务)、PaaS(Platform as a Service,平台即服务)和SaaS(Software as a Service,软件即服务)。

云属于IaaS。阿里云的亮点在于,阿里巴巴拥有海量用户数据,这些数据叠加在云服务上会展现出极大的价值。同时,阿里本身的企业基因也是非常“to B”的,B2B业务起家就是面向着中小企业。

将自己现有生态客户转化为企业服务客户是非常顺畅的一条思路。比如,淘宝系厂商将自己的进销存系统放在阿里云上,顺理成章。从这个角度来说,阿里的先天优势很明显。

而阿里巴巴在SaaS服务领域的“钉钉”则是在SaaS的新战场上。

2014年阿里的“来往”在C端社交市场上全面溃败,团队转向企业服务市场,打造钉钉,争夺企业级市场的“入口”。2015年1月16日,钉钉发布1.0版本,DING功能上线。到今年3月31日,已有超过700万家企业组织在使用钉钉,注册用户过亿。

如此一来,阿里与腾讯在to B业务上的竞争更加直接了——阿里云vs腾讯云,钉钉vs企业微信。在刚刚过去的9月,钉钉和企业微信分别与OA市场的龙头公司蓝凌、泛微达成深度的合作,行业内深感AT之间的硝烟弥漫。

不过,比起SaaS领域的擦抢走火,腾讯在国庆前的第三次大变阵更是明确了其在to B领域的决心。

新成立的云与智慧产业事业群(CSIG,即 Cloud and Smart Industries Group)被视为腾讯在B端业务的主阵地,具体产品上,将整合包括腾讯云、智慧零售、安全产品、腾讯地图、优图等核心产品线。

尽管腾讯总是被质疑to B业务能力,没有阿里的销售铁军,C端经验不适合B端,部门墙数据墙很厚,数据丢失事件造成巨大负面影响等等,但它始终还是迈出了这一步,to B已经被列为公开的重点,是腾讯转型产业互联网的重地。

与阿里云相比,腾讯云起步较晚,但依托游戏、视频领域的深耕,腾讯云也快速占据一席之地。

过去未去,未来已来,BAT在B端的布局脉络已非常清晰,无论是谁,单独拿出来看都已自成体系。而格局也是显然的,BAT的提前布局与其在技术、研发、人才、企业端的影响力等方面的优势,已经为他们筑起了一道非常坚固的护城河。在to B时代,BAT扮演着基础服务商、平台运营方的角色,是赋能行业,是基础设施,是企业的第一选择。

还有机会吗?

to B领域巨头换人的可能性几乎为零。

但另一个问题是BAT永远无法避免的——企业用户对数据存储的安全感很低。直白地说,在国外,Netflix敢将自己的基础架构搭载亚马逊云服务AWS上,在国内,爱奇艺敢将自己的性命交给腾讯云吗?

这给了一些中型公司机会。比如UCloud反复强调的就是“中国领先的中立云计算服务商”,其中“中立”二字格外显眼。

而在BAT之外,很多看似完全to C的互联网公司都在B端有所布局。

比如字节跳动(今日头条,后文简称头条)。企业服务竟然是其头条投资第二多的领域(第一领域为文化娱乐)。人们熟知的一些明星项目,例如坚果云、石墨文档、Tower等,头条都有所投资。

京东在企业服务领域一共有超过20笔投资,包括甄云信息、EasyStack、通天晓软件、凌雄租赁、加推科技等等,最近京东云还发布了“医疗健康战略”,想要做医疗行业的基础设施,推动医疗信息化。

不可否认,未来B市场的格局更有可能是BAT继续占领大部分市场,提供基础设施服务,而其他公司则可以选择垂直领域提供更多个性化的服务。毕竟在全球市场上,除了微软、甲骨文等to B巨头,也有很多优秀的“小”公司,比如Slack、Tanium、Sprinklr、AppNexus等等。

至于中国过去的老牌IT公司,或许这一轮to B浪潮会给他们带来新机遇。

一个典型的例子是联想,PC业务之外,联想的数据中心业务正在高速增长。而这一业务增长的关键驱动因素之一便是HyperScale超大规模数据中心业务,简单说,就是联想给做云服务的公司提供设备,这些公司包括美国的云服务公司微软、Google、亚马逊等、也包括中国的云服务公司BAT等等。

华为虽然在去年3月才宣布成立Cloud BU,6月“华为云”品牌才首次亮相,但一年时间,华为云的成绩也非常不错。

而像用友、金蝶等ERP厂商,在过去一段时间里疲态尽显,若是能借此时机重整旗鼓,或着与强者结成联盟,也是不错的选择。

毕竟,To B的金矿就在那里,中国工商登记的企业数量近3000万家,其中中小企业占比90%以上,整体数量超过美国,且仍在持续增加,企业级市场红利非常丰厚。

BAT按照惯例会继续缠斗但又一起分走大部分,而剩下的就要各凭本事了。


          Fuzzing技术总结与工具列表      Cache   Translate Page      
版权声明:本文为博主原创文章,未经博主允许不得转载。 https://blog.csdn.net/wcventure/article/details/82085251

首先推荐阅读2018年computing Surveys 的《Fuzzing: Art, Science, and Engineering》
https://github.com/wcventure/wcventure/blob/master/Paper/Fuzzing_Art_Science_and_Engineering.pdf
其次推荐阅读2018年Cybersecurity 的 《Fuzzing: a survey》
https://www.researchgate.net/publication/325577316_Fuzzing_a_survey
里面对fuzzing技术和fuzzing工具有详细的介绍。

一、什么是Fuzzing?

Fuzz本意是“羽毛、细小的毛发、使模糊、变得模糊”,后来用在软件测试领域,中文一般指“模糊测试”,英文有的叫“Fuzzing”,有的叫“Fuzz Testing”。本文用fuzzing表示模糊测试。

Fuzzing技术可以追溯到1950年,当时计算机的数据主要保存在打孔卡片上,计算机程序读取这些卡片的数据进行计算和输出。如果碰到一些垃圾卡片或一些废弃不适配的卡片,对应的计算机程序就可能产生错误和异常甚至崩溃,这样,Bug就产生了。所以,Fuzzing技术并不是什么新鲜技术,而是随着计算机的产生一起产生的古老的测试技术。

Fuzzing技术是一种基于黑盒(或灰盒)的测试技术,通过自动化生成并执行大量的随机测试用例来发现产品或协议的未知漏洞。随着计算机的发展,Fuzzing技术也在不断发展。

二、Fuzzing有用么?

Fuzzing是模糊测试,顾名思义,意味着测试用例是不确定的、模糊的。

计算机是精确的科学和技术,测试技术应该也是一样的,有什么的输入,对应什么样的输出,都应该是明确的,怎么会有模糊不确定的用例呢?这些不确定的测试用例具体会有什么作用呢?

为什么会有不确定的测试用例,我想主要的原因是下面几点:

1、我们无法穷举所有的输入作为测试用例。我们编写测试用例的时候,一般考虑正向测试、反向测试、边界值、超长、超短等一些常见的场景,但我们是没有办法把所有的输入都遍历进行测试的。

2、我们无法想到所有可能的异常场景。由于人类脑力的限制,我们没有办法想到所有可能的异常组合,尤其是现在的软件越来越多的依赖操作系统、中间件、第三方组件,这些系统里的bug或者组合后形成的bug,是我们某个项目组的开发人员、测试人员无法预知的。

3、Fuzzing软件也同样无法遍历所有的异常场景。随着现在软件越来越复杂,可选的输入可以认为有无限个组合,所以即使是使用软件来遍历也是不可能实现的,否则你的版本可能就永远也发布不了。Fuzzing技术本质是依靠随机函数生成随机测试用例来进行测试验证,所以是不确定的。

这些不确定的测试用例会起到我们想要的测试结果么?能发现真正的Bug么?

1、Fuzzing技术首先是一种自动化技术,即软件自动执行相对随机的测试用例。因为是依靠计算机软件自动执行,所以测试效率相对人来讲远远高出几个数量级。比如,一个优秀的测试人员,一天能执行的测试用例数量最多也就是几十个,很难达到100个。而Fuzzing工具可能几分钟就可以轻松执行上百个测试用例。

2、Fuzzing技术本质是依赖随机函数生成随机测试用例,随机性意味着不重复、不可预测,可能有意想不到的输入和结果。

3、根据概率论里面的“大数定律”,只要我们重复的次数够多、随机性够强,那些概率极低的偶然事件就必然会出现。Fuzzing技术就是大数定律的典范应用,足够多的测试用例和随机性,就可以让那些隐藏的很深很难出现的Bug成为必然现象。

目前,Fuzzing技术已经是软件测试、漏洞挖掘领域的最有效的手段之一。Fuzzing技术特别适合用于发现0 Day漏洞,也是众多黑客或黑帽子发现软件漏洞的首选技术。Fuzzing虽然不能直接达到入侵的效果,但是Fuzzing非常容易找到软件或系统的漏洞,以此为突破口深入分析,就更容易找到入侵路径,这就是黑客喜欢Fuzzing技术的原因。

三、基于生成和基于编译的Fuzzing算法?*

Fuzzing引擎算法中,测试用例的生成方式主要有2种:
1)基于变异:根据已知数据样本通过变异的方法生成新的测试用例;
2)基于生成:根据已知的协议或接口规范进行建模,生成测试用例;
一般Fuzzing工具中,都会综合使用这两种生成方式。

基于变异的算法核心要求是学习已有的数据模型,基于已有数据及对数据的分析,再生成随机数据做为测试用例。

四、state-of-the-art AFL

AFL就是著名的基于变异的Fuzzer。
以下有一些关于state-of-the-art AFL的资料

  1. american fuzzy lop (2.52b)
    http://lcamtuf.coredump.cx/afl/
  2. AFL内部实现细节小记
    http://rk700.github.io/2017/12/28/afl-internals/
  3. afl-fuzz技术白皮书
    https://blog.csdn.net/gengzhikui1992/article/details/50844857
  4. 如何使用AFL进行一次完整的fuzz过程
    https://blog.csdn.net/abcdyzhang/article/details/53487683
  5. AFL(American Fuzzy Lop)实现细节与文件变异
    https://paper.seebug.org/496/
  6. fuzz实战之libfuzzer
    https://www.secpulse.com/archives/71898.html

1

- Static analysis
- Dynamic analysis
- Symbolic execution
- Fuzzing

T1

- Generation-based Fuzzing
- Mutation-based Fuzzing

T2

- White box fuzzing
- Grey box fuzzing
- Black box fuzzing

T3

- Fuzzing技术中的关键

T4

- Fuzzing 中

T5

- 至今fuzzing工具文献的引用关系,Fuzzing工具的分类和历史

F1

- Fuzzing 工具之调研,还有一张很好的整理后的图表

F2

最后,再整理一下部分开源fuzzing工具的列表
原文来自:[https://www.peerlyst.com/posts/resource-open-source-fuzzers-list],并增加2018年最新的诸如CollAFL和SnowFuzz等工具
1.开源Fuzzers工具
2.Fuzzing的线束或框架
3.其它 Fuzzers 工具是免费的,但是和开源比不值得一提
4.Fuzzing的有效超载
5.博客将帮助你更好的了解Fuzz
6.其它关于Fuzzing博客或资源
7.商业Fuzzers工具

1.开源Fuzzers

CollAFLhttp://chao.100871.net/papers/oakland18.pdf
路径敏感的Fuzzer,解决了AFL中bitmap路径冲突的问题。
并提出了一种选择seed的策略,能更快提高覆盖率。

SnowFuzz
https://arxiv.org/pdf/1708.08437.pdf

VUzzer
http://www.cs.vu.nl//~giuffrida/papers/vuzzer-ndss-2017.pdf
基于应用感知的自进化模糊工具。在这篇文章中,我们提出一个应用感知的进化模糊策略(不需要以前的知识应用或格式输入)。为了最小化地覆盖并扩展更深的路径,我们利用基于静态和动态分析的控制以及数据流功能,来推断应用程序的基本属性。与Application-agnostic方法相比,这可以更快地生成有趣的输入。我们实行我们的模糊策略在VUzzer上,并且用三种不同的数据评估它:DARPA的大挑战二进制文件(CGC)、一组真实的应用程序(二进制输入解析器)和最近发布的LAVA数据集。

Afl-fuzz(American fuzzy lop)
http://lcamtuf.coredump.cx/afl/
Afl-fuzz是一种基于面向安全的模糊测试工具,它采用了一种新型的方式(编译时检测和遗传算法),来自动发掘干净的、有趣的测试案例,即在目标二进制中触发新的内部状态。这基本上改善了模糊代码的功能覆盖。该工具生成的简洁的合成语料库也可以用来传播其它更多的劳动型或资源密集型测试方案。
与其他仪器化的模糊工具相比,afl-fuzz是以实用性而被设计的:它具有适度的性能开销,采用了多种高效的模糊战略,和努力最小化的技巧,基本上不需要配置,并且能够无缝处理复杂的、真实世界案例,以及常见的图像分析或文件压缩等。

Filebuster
一个非常快速和灵活的网络模糊工具

TriforceAFL
AFL / QEMU 模糊器具有全系统的仿真。这是AFL的修补版本,支持使用QEMU的全系统模糊测试。它所包含的QEMU已经更新,允许在运行x86_64的系统仿真器时进行分支机构跟踪。它也添加了额外的指令来启动AFL的forkserver,进行模糊设置,并标记测试用例的启动和停止。

Nightmare:
https://github.com/joxeankoret/nightmare
一个具有web管理的分布式模糊测试套件。

Grr
DECREE二进制的高吞吐量模糊器和仿真器

Randy:
http://ptrace-security.com/blog/randy-random-based-fuzzer-in-python/
Python中的基于随机的模糊工具

IFuzzer
一个进化型的翻译模糊器

Dizzy:
https://github.com/ernw/dizzy
基于python的模糊框架:
1.可以发送到L2以及上层(TCP / UDP / SCTP)
2.能够处理奇长度分组字段(无需匹配字节边界,因此即使单个标志或7位长字3.也可以表示和模糊)
4.非常容易的协议定义语法
5.能够做多包状态的完全模糊,能够使用接收到的目标数据作为响应

Address Sanitizer:
https://github.com/Google/sanitizers
地址Sanitizer、线Sanitizer、记忆Sanitizer

Diffy:
https://github.com/twitter/diffy
使用Diffy查找您的服务中的潜在错误

Wfuzz:
https://github.com/xmendez/wfuzz
Web应用程序HTTP://www.edge-security.com/wfuzz.php

Go-fuzz:
https://github.com/Google/gofuzz
基于放弃的模糊测试

Sulley:
https://github.com/OpenRCE/sulley
Sulley是一个积极开发的模糊引擎和模糊测试框架,由多个可扩展组件组成。Sulley(IMHO)超过了此前公布的大所属模糊技术、商业和公共领域的能力。框架的目标是不仅是可以简化数据表示,而且也可以简化数据传输和仪表。Sulley是以 Monsters Inc.的生物来命名的,因为,他是模糊的。写在python内的。

Sulley_l2:
http://ernw.de/download/sulley_l2.tar.bz2
有些人可能记得2008年发布的sulley_l2,它是sulley模糊框架的修改版本,增强了第2层发送功能和一堆(L2)模糊脚本。所有的blinking, rebooting, mem-corrupting引起了我们的一些关注。从那以后,我们继续写和使用这些模糊脚本,所以它的洞集合增长了。

CERT Basic Fuzzing Framework (BFF)For linux, OSX
https://github.com/CERTCC-Vulnerability-Analysis/certfuzz
http://www.cert.org/vulnerability-analysis/tools/bff.cfm
cert基本模糊框架(BFF)是一个软件测试工具,它用于在linux和mac os x平台上运行的应用程序中寻找漏洞。BFF对消耗文件输入的软件执行突变性的模糊测试。(突变性模糊测试是采取形式良好的输入数据并以各种方式破坏它的行为,寻找导致崩溃的情况。)BFF自动收集导致了软件以独特方式使测试用例崩溃,以及利用崩溃来调试信息。BFF的目标是去最小化软件供应商和安全研究人员通过模糊测试有效地发现和分析发现的安全漏洞过程中所需要的努力。

CERT Failure Observation Engine (FOE)For windows
http://www.cert.org/vulnerability-analysis/tools/foe.cfmhttps://github.com/CERTCC-Vulnerability-Analysis/certfuzz
The cert Failure Observation Engine (FOE) 是一个软件测试工具,它被用于在Windows平台上运行的应用程序中发现漏洞。FOE在消耗文件输入的软件上执行突变模糊测试。(突变性模糊测试是采取形式良好的输入数据并以各种方式破坏它的行为,寻找导致崩溃的情况。)FOE自动收集导致了软件以独特方式使测试用例崩溃,以及利用崩溃来调试信息。FOE的目标是去最小化软件供应商和安全研究人员通过模糊测试有效地发现和分析发现的安全漏洞过程中所需要的努力。

DranzerFor ActiveX Controls.
https://github.com/CERTCC-Vulnerability-Analysis/dranzer
Dranzer是一个工具,使用户能够检查有效的技术,它用于模糊测试ActiveX控件

Radamsaa general purpose fuzzer
https://github.com/aoh/radamsa
Radamsa是一个用于鲁棒性测试的测试用例生成器,也称为fuzzer。它可以用来测试一个程序是否可以承受格式错误以及潜在的恶意输入。它通过制造文件来工作(有趣的不同于通常给定的文件),然后将修改的文件提供给Target程序,或者这样或通过一些脚本。radamsa的主要卖点(而不是其他的模糊器)是:它是非常容易在大多数机器上运行,而且很容易从命令行脚本,这已经被用来找到程序中的一系列安全问题,而且你可能现在正在使用。

zzufApplication fuzzer
https://github.com/samhocevar/zzuf
zzuf是一个透明的应用程序输入模糊器。 它的工作原理是截取文件操作并更改程序输入中的随机位。zzuf的行为是确定性的,使得它很容易再现错误。 有关如何使用zzuf的说明和示例,请参阅手册页和网站http://caca.zoy.org/wiki/zzuf

Backfuzz
https://github.com/localh0t/backfuzz
Backfuzz是一个用python写成的有着不同协议(FTP,HTTP,IMAP等)的模糊工具。因为一般的想法是这个脚本有几个预定义的功能,所以谁想要编写自己的插件(为另一个协议)就可以在一些行这样做。

KEMUfuzzer
https://github.com/jrmuizel/kemufuzzer
KEmuFuzzer是一个基于仿真或直接本地执行测试系统虚拟机的工具。 目前KEmuFuzzer支持:BHOCS,QEMU,VMware和virtualbox。

Pathgrind
https://github.com/codelion/pathgrind
Pathgrind使用基于路径的动态分析来fuzz linux / unix二进制。 它是基于valgrind被写在python内的。

Wadi-fuzzer
https://www.sensepost.com/blog/2015/wadi-fuzzer/ https://gitlab.sensepost.com/saif/DOM-Fuzzer
Wadi是基于web浏览器语法的模糊器。 这个语法用于描述浏览器应该如何处理Web内容,Wadi转向并使用语法来打破浏览器。
Wadi是一个Fuzzing模块,用于NodeFuzz fuzzing Harness并利用AddressSanitizer(ASan)在Linux和Mac OSX上进行测试。
万维网联盟(W3C)是一个国际组织,它开发开放标准以确保Web的长期增长。 W3C允许我们搜索语法并在我们的测试用例中使用。

LibFuzzer, Clang-format-fuzzer, clang-fuzzer
http://llvm.org/docs/LibFuzzer.html
http://llvm.org/viewvc/llvm-project/cfe/trunk/tools/clang-format/fuzzer/ClangFormatFuzzer.cpp?view=markup
http://llvm.org/viewvc/llvm-project/cfe/trunk/tools/clang-fuzzer/ClangFuzzer.cpp?view=markup
我们在LibFuzzer上实现了两个模糊器:clang-format-fuzzer和clang-fuzzer。Clang格式大多是一个词法分析器,所以给它随机字节格式是会完美运行的,但也伴随着超过20个错误。然而Clang不仅仅是一个词法分析器,给它随机字节时几乎没有划伤其表面,所以除了测试随机字节,我们还在令牌感知模式中模糊了Clang。两种模式中都发现了错误; 其中一些以前被AFL检测到,另一些则不是:我们使用AddressSanitizer运行这个模糊器,结果发现一些错误在没有它的情况下不容易被发现。

Perf-fuzzer
http://www.eece.maine.edu/~vweaver/projects/perf_events/validation/https://github.com/deater/perf_event_testshttp://web.eece.maine.edu/~vweaver/projects/perf_events/fuzzer/
用于Linux perf_event子系统的测试套件

HTTP/2 Fuzzer
https://github.com/c0nrad/http2fuzz
HTTP2模糊器内置于Golang。

QuickFuzz
http://quickfuzz.org/
QuickFuzz是一个语法模糊器,由QuickCheck,模板Haskell和Hackage的特定库生成许多复杂的文件格式,如Jpeg,Png,Svg,Xml,Zip,Tar和更多! QuickFuzz是开源的(GPL3),它可以使用其他错误检测工具,如zzuf,radamsa,honggfuzz和valgrind。

SymFuzz
https://github.com/maurer/symfuzz
http://ieeexplore.IEEE.org/xpls/abs_all.jsp?arnumber=7163057
摘要?我们提出了一个算法的设计,以最大化数量的bug为黑盒子突变性的模糊给定一个程序和种子的输入。主要的直观性的是利用给定程序 - 种子对的执行轨迹上的白盒符号进行分析,来检测输入的BIT位置之间的依赖性,然后使用这种依赖关系来为该程序种子对计算概率上最佳的突变比率。我们的结果是有希望的:我们发现使用相同的模糊时间,这比8个应用程序中的三个以前的模糊器的平均错误多38.6%。

OFuzz
https://github.com/sangkilc/ofuzz
OFuzz是一个用OCaml编写的模糊平台。 OFuzz目前专注于在* nix平台上运行的文件处理应用程序。 OFuzz的主要设计原则是灵活性:必须容易添加/替换模糊组件(崩溃分类模块,测试用例生成器等)或算法(突变算法,调度算法)。

Bed
http://www.snake-basket.de/
网络协议fuzzer。 BED是一个程序,旨在检查守护程序的潜在缓冲区溢出、格式字符串等。

Neural Fuzzer
https://cifasis.github.io/neural-fuzzer/
神经模糊测试工具是一种实验性模糊器,它被设计使用国家最先进的机器,从一组初始文件学习。 它分为两个阶段:训练和生成。

Pulsar
https://github.com/hgascon/pulsar
协议学习,模拟和状态模糊器
Pulsar是一个具有自动协议学习和模拟能力的网络模糊器。该工具允许通过机器学习技术来建模协议,例如聚类和隐马尔可夫模型。这些模型可以用于模拟Pulsar与真实客户端或服务器之间进行通信,这些消息,在一系列模糊原语的结合下,让测试一个未知协议错误的实施在更深的状态协议。

D-bus fuzzer:
https://github.com/matusmarhefka/dfuzzer
dfuzzer是D-Bus模糊器,是用于通过D-Bus进行通信的模糊测试过程的工具。它可以用于测试连接到会话总线和系统总线守护程序的进程。模糊器为客户端工作,它首先连接到总线守护进程,然后它遍历并模糊测试由D-Bus服务提供的所有方法。

Choronzon
https://census-labs.com/news/2016/07/20/choronzon-public-release/
Choronzon是一个进化型的模糊工具。它试图模仿进化过程,以保持产生更好的结果。 为了实现这一点,它具有评估系统的能力,用以分类哪些模糊文件是有趣的,哪些应该被丢弃。
此外,Choronzon是一个基于知识的模糊器。 它使用用户定义的信息来读取和写入目标文件格式的文件。要熟悉Choronzon的术语,您应该考虑每个文件由染色体表示。用户应该描述所考虑的文件格式的基本结构, 优选文件格式的高级概述,而不是描述它的每个细节和方面。那些用户定义的基本结构中的每一个都被认为是基因, 每个染色体包含一个基因树,并且它能够从中构建相应的文件。

Exploitable
这里写图片描述
‘exploitable’是一个GDB扩展,它会按严重性分类Linux应用程序错误。扩展检查已崩溃的Linux应用程序的状态,并输出攻击者利用底层软件错误获得系统控制有多困难的总结。扩展可以用于为软件开发人员确定bug的优先级,以便他们可以首先解决最严重的bug。
该扩展实现了一个名为“exploitable”的GDB命令。 该命令使用启发式来描述当前在GDB中调试的应用程序的状态的可利用性。 该命令旨在用于包含GDB Python API的Linux平台和GDB版本。 请注意,此时命令将无法在核心文件目标上正确运行。

Hodor
这里写图片描述

我们想设计一个通用的模糊器,可以用来配置使用已知的良好的输入和分隔符,以模糊特定的位置。在一个完全愚钝的模糊器和一些更聪明的东西之间,与实现适当的智能模糊器相比,表现着更少的努力。

BrundleFuzz
https://github.com/carlosgprado/BrundleFuzz
BrundleFuzz是一个用于Windows和Linux的分布式模糊器,使用动态二进制仪器。

Netzob
https://www.netzob.org/
用于通信协议的逆向工程、流量生成和模糊化的开源工具
P
assiveFuzzFrameworkOSX
该框架用于在内核模式下基于被动内联挂钩机制来模糊OSX内核漏洞。

syntribos
OpenStack安全组的Python API安全测试工具

honggfuzz
http://google.github.io/honggfuzz/
一个通用的,易于使用的有趣的分析选项的模糊器。 支持基于代码覆盖率的反馈驱动的模糊测试

dotdotpwn
http://dotdotpwn.blogspot.com/
目录遍历模糊工具

KernelFuzzer
跨平台内核Fuzzer框架。DEF CON 24视频:
https://www.youtube.com/watch?v=M8ThCIfVXow

PyJFuzz
PyJFuzz - Python JSON Fuzzer
PyJFuzz是一个小的、可扩展的和现成可用的框架,用于模糊JSON输入,如移动端点REST API,JSON实现,浏览器,cli可执行和更多。

RamFuzz
单个方法参数的模糊器。

EMFFuzzer
基于桃树模糊框架的增强的元文件模糊器

js-fuzz
一个基于javascript的AFL启发的遗传模糊测试器。

syzkaller
syzkaller是一个无监督的、覆盖引导的Linux系统调用模糊器。

2.模糊线束/框架使fuzzer提高:

FuzzFlow
Fuzzflow是来自cisco talos的一个分布式的模糊管理框架,它提供虚拟机管理,模糊作业配、可插拔变异引擎、前/后变形脚本、崩溃收集和可插拔崩溃分析。

fuzzinator
Fuzzinator是一个模糊测试框架,可以帮助你自动化任务,它通常需要在一个fuzz会话:
运行您最喜欢的测试生成器并将测试用例馈送到测试中的系统,
抓住和保存独特的问题,
减少失败的测试用例,
缓解错误跟踪器中的问题报告(例如,Bugzilla或GitHub),
如果需要,定期更新SUT
计划多个SUT和发电机,而不会使工作站超载。

Fuzzlabs
https://github.com/DCNWS/FuzzLabs
FuzzLabs在一个模块化的模糊框架中,用Python编写。 它使用了令人惊叹的Sulley模糊框架的修改版本作为核心引擎。 FuzzLabs仍在开发中。

Nodefuzz
https://github.com/attekett/NodeFuzz
对于Linux和Mac OSX。 NodeFuzz是一个用于网络浏览器和类似浏览器的应用程序的模糊器。 NodeFuzz背后有两个主要的想法:第一是创建一个简单、快速、不同浏览器的fuzz方法。 第二,有一个线束,可以轻松地扩展与新的测试用例发生器和客户端仪器,无需修改核心。

Grinder
https://github.com/stephenfewer/grinder
对于windows
Grinder是一个自动化浏览器的模糊化和大量崩溃管理的系统。

Kitty
https://github.com/Cisco-sas/kitty
Kitty是一个开源的模块化和可扩展的模糊框架,使用python编写,灵感来自OpenRCE的Sulley和Michael Eddington(现在是Deja vu Security的)Peach Fuzzer。

Peach
http://community.peachfuzzer.com/
https://github.com/MozillaSecurity/peach
Peach是一个SmartFuzzer,能够执行基于生成和基于突变的模糊测试。

3.此外,还有这些免费的但不是开源的fuzzer:

SDL MiniFuzz File Fuzzer
https://www.Microsoft.com/en-us/download/details.aspx?id=21769
对于Windows。 SDL MiniFuzz File Fuzzer是一个基本的文件模糊工具,旨在简化非安全开发人员对模糊测试的采用,这些非安全开发人员不熟悉文件模糊工具或从未在当前的软件开发过程中使用它们。

Rfuzz
http://rfuzz.rubyforge.org/index.html
RFuzz是一个Ruby库,可以使用快速HttpClient和wicked vil RandomGenerator轻松地从外部测试Web应用程序,它允许普通程序员每天使用先进的模糊技术。

Spike
http://www.immunitysec.com/downloads/SPIKE2.9.tgz
SPIKE是一个API框架,允许你编写模糊器。

Regex Fuzzer
http://go.microsoft.com/?linkid=9751929
DL Regex Fuzzer是一个验证工具,用于帮助测试正则表达式是否存在潜在的拒绝服务漏洞。它包含用指数时间执行的某些子句的正则表达式模式(例如,包含自身重复的重复的子句)可以被攻击者利用来引起拒绝服务(DoS)条件。SDL Regex Fuzzer与SDL过程模板和MSF-Agile + SDL过程模板集成,以帮助用户跟踪和消除其项目中的任何检测到的正则表达式漏洞。

4.博客,将帮助你fuzz更好
Yawml的开始到完成模糊与AFL(一个完整的fuzzjob由foxglovesecurity)
http://foxglovesecurity.com/2016/03/15/fuzzing-workflows-a-fuzz-job-from-start-to-finish/

Fuzz更聪明,更难 - 用afl引发模糊,来自bsidessf2016的引物
https://www.peerlyst.com/posts/bsidessf-2016-recap-of-fuzz-smarter-not-harder-an-afl-primer-claus-cramon

Fuzzing和afl是一种艺术
Fuzzing nginx 和 American Fuzzy Lop
您可以在此处的评论或此Google文档中发表建议:
https://docs.google.com/document/d/17pZxfs8hXBCnhfHoKfJ7JteGziNB2V_VshsVxmNRx6U/edit?usp=sharing

BSidesLisbon 2016主题演讲:智能模糊器革命
Windows内核模糊初学者 - Ben Nagy

5.其他Fuzzer博客:
循环使用编译器转换的模糊包版
谷歌推出了OSS-Fuzz(感谢Dinko Cherkezov) - 一个项目,旨在不断开发开源项目fuzz:
OSS-Fuzz现在正在测试中,并即将接受候选开源项目的建议。为了使项目被OSS-Fuzz接受,它需要有一个庞大的用户基础或针对于至关重要的全球IT基础设施,这是一个通用启发式方法,我们有意在这个早期阶段解释。查看更多详情和说明如何在这里申请。
一旦项目注册了OSS-Fuzz,它将自动接收到我们的跟踪器中,新报告的错误披露截止于90天后(见此处的详细信息)。 这符合行业的最佳实践,并通过更快地为用户提供补丁来提高最终用户的安全性和稳定性。
帮助我们确保这个程序真正服务于开源社区和依赖这个关键软件的互联网,贡献和留下您的反馈在GitHub。

这里写图片描述

6.商业模糊器

超越安全的暴风雨
http://www.beyondsecurity.com/bestorm_and_the_SDL.html
管理员编辑:查找更多真棒Peerlyst社区贡献的资源,资源目录在这里
这里写图片描述

7.关于浏览器的Fuzzing

Skyfire 一种用于Fuzzing的数据驱动的种子生成工具
https://www.inforsec.org/wp/?p=2678
https://www.ieee-security.org/TC/SP2017/papers/42.pdf

使用libFuzzer fuzz Chrome V8入门指南
http://www.4hou.com/info/news/6191.html


          Deep learning for numerical analysis explained      Cache   Translate Page      

Deep learning (DL) is a subset of neural networks, which have been around since the 1960’s. Computing resources and the need for a lot of data during training were the crippling factor for neural networks. But with the growing availability of computing resources such as multi-core machines, graphics processing units [...]

Deep learning for numerical analysis explained was published on SAS Users.


          Vintage Computing Festival Berlin widmet sich Geschichte der grafischen Benutzeroberflächen      Cache   Translate Page      
Vintage Computing Festival Berlin widmet sich Geschichte der grafischen Benutzeroberflächen

Am 13. und 14. Oktober findet in Berlin im Deutschen Technikmuseum das Vintage Computing Festival 2018 statt, eine Veranstaltung rund um historische Computer und Rechentechnik. Geboten werden Ausstellungen, Vorträge und Workshops. Ein Hauptthema ist in diesem Jahr die Geschichte der grafischen Benutzeroberflächen.

Redaktion 09. 10 2018 - 14:30
          BUREAU VERITAS UNVEILS PIONEERING MIXED REALITY TRAINING       Cache   Translate Page      
A pioneering new training aid using mixed reality and holographic computing technology has been introduced by global certification expert Bureau Veritas to enable trainees to experience inspecting large or difficult to access industrial equipment.
          Director of IT - Grand Teton Lodge Company, Wyoming - Vail Resorts - Moran, WY      Cache   Translate Page      
Primary focus is customer satisfaction, system reliability, and adherence to corporate computing standards including PCI and SOC compliance....
From Vail Resorts - Sat, 06 Oct 2018 14:04:57 GMT - View all Moran, WY jobs
          The Landscape of Optimal Card-based Protocols, by Alexander Koch      Cache   Translate Page      
In the area of card-based cryptography one devises small and easy to perform protocols for secure multiparty computation using a deck of physical playing cards with indistinguishable backs, which can be run if no trusted computer is available, or in classroom settings to illustrate privacy notions and secure computations. Initiated by the "Five-Card Trick" of den Boer (EUROCRYPT 1989) for computing the AND of two players' bits, and the work of Crépeau and Kilian (CRYPTO 1993) introducing committed format protocols which can be used as building blocks in larger computations, this is a field with a growing number of simple protocols. This paper devises two new AND protocols which are card-minimal w.r.t. specific requirements, and shows the card-minimality of the COPY protocol (necessary in arbitrary circuits, due to the physical nature of card-encoded bits) of Mizuki and Sone (FAW 2009) and the AND protocol of Abe et al. (APKC 2018). By this, we completely determine the landscape of card-minimal protocols with respect to runtime requirements (finite runtime or Las Vegas behavior with/without restarts) and practicality demands on the shuffling operations. Moreover, we systematize and extend techniques for proving lower bounds on the number of cards, which we believe is of independent interest.
          The Google Home Hub might be the best digital picture frame ever made      Cache   Translate Page      
TwitterFacebook

The Google Home Hub is aptly named.

It's certainly not the first product to lay claim to the term "hub" but it might be the first product to embody the word so fully. It's not centered around a single use case — like, say, the Facebook Portal is built around video chat — but instead brings together the functionalities of several different products: smart speaker, tablet, digital photo frame, and smart home controller.

SEE ALSO: Google's Pixel Slate is a Chrome OS tablet with a detachable keyboard cover

The Home Hub is technically in the category of "smart display," but that doesn't capture what it does any better than "smart speaker" describes an Amazon Echo. The Hub is more of an "ambient computing enabler," with some interesting extras that the display bestows. Read more...

More about Google, Smart Home, Google Assistant, Smart Speaker, and Google Home Hub

          Google drops out of Pentagon’s $10 billion cloud competition      Cache   Translate Page      
TwitterFacebook

Google is taking a pass at a potential $10 billion contract.

The tech giant has made the decision to sit out of the the Pentagon’s competition for a possible $10 billion cloud-computing project.

SEE ALSO: Google exposed personal data of almost 500,000 and didn't disclose it

The Pentagon’s Joint Enterprise Defense Infrastructure cloud, or JEDI, is a project looking to find a solution for huge transfers of data from the Defense Department to military officials in order to make faster military decisions wherever in the world these officials may be.

Google cited its AI principles, which were published back in June, as the reason for dropping out of the bidding process.  Read more...

More about Google, Military, Artificial Intelligence, Cloud Computing, and Pentagon
          The Core i9 Gaming Benchmarks Intel Commissioned Against AMD Are a Flat Lie      Cache   Translate Page      
Ryzen2-Feature

The company Intel apparently hired to write a whitepaper on the Core i9-9900K's gaming performance have blatantly misrepresented AMD's Ryzen 7 2700X to make their case. Not a good look.

The post The Core i9 Gaming Benchmarks Intel Commissioned Against AMD Are a Flat Lie appeared first on ExtremeTech.


          Google Pixel Slate vs. Apple iPad Pro      Cache   Translate Page      

The iPad Pro and the Google Pixel Slate are similar looking on the surface, but with the fresh release of the Google Pixel Slate considered, we're diving a bit deeper to compare the two devices.

The post Google Pixel Slate vs. Apple iPad Pro appeared first on Digital Trends.


          Google Pixel Slate vs. HP Chromebook x2      Cache   Translate Page      

Google has released its first detachable tablet in a few years, the attractive and well-built Pixel Slate. Does it have what it takes to combat our favorite Chrome OS 2-in-1, the HP Chromebook x2?

The post Google Pixel Slate vs. HP Chromebook x2 appeared first on Digital Trends.


          Google Drops Out of Pentagon's $10 Billion Cloud Competition      Cache   Translate Page      
Google has decided not to compete for the Pentagon’s cloud-computing contract valued at as much as $10 billion, saying the project may conflict with its corporate values.
          How is the Federal Space Embracing the Cloud?      Cache   Translate Page      
Recently, the embrace of cloud solutions in the Federal space has materially increased, as cloud computing is no longer something on the horizon or the wave of the future – it is the here and now.  Just two years ago, agencies were largely scratching their heads about if, when, and how they could comply with […]
          Senior Information Security Consultant - Network Computing Architects, Inc. - Bellevue, WA      Cache   Translate Page      
With the ability to interface and communicate at the executive level, i.e. CIO's, CTO's and Chief Architects....
From Network Computing Architects, Inc. - Mon, 11 Jun 2018 23:15:53 GMT - View all Bellevue, WA jobs
          Firmware Engineer - Myant - Etobicoke, ON      Cache   Translate Page      
Experience with the ARM Cortex M instruction sets. At Myant, we are creating the world’s first textile computing platform, integrating technology directly into...
From Myant - Wed, 26 Sep 2018 02:10:13 GMT - View all Etobicoke, ON jobs
          Salesforce Solution Architect - Silverline Jobs - Casper, WY      Cache   Translate Page      
Company Overview: Do you want to be part of a fast-paced environment, supporting the growth of cutting edge technology in cloud computing? Silverline...
From Silverline Jobs - Wed, 05 Sep 2018 06:21:23 GMT - View all Casper, WY jobs
          Intel anunță seria Basin Falls cu i9 9980XE la vârf      Cache   Translate Page      
Intel anunță seria Basin Falls cu i9 9980XE la vârf

Alături de procesoarele dedicate publicului larg, Intel a dezvăluit seara trecută și o nouă generație de procesoare dedicate segmentului High End Desktop Computing.

Citeste articolul pe site-ul ZONA


          Green Computing and Green Storage Techniques      Cache   Translate Page      

Green computing and green storage – these terms are getting quite popular with an increasing number of carbon footprints as we think of ways to prevent them. It is our duty to reduce the number of eco-footprints as quickly as possible. Do you know that a single email generates a lot of footprints? A short email generates about 4 grams of CO2 equivalent to the atmosphere. When you send an email with a large attachment, it creates 50 grams of CO2. Even a text message, plastic bags, paper bags, bottled water, cappuccino, and large TVs, all generate a good amount of carbon footprint. I bet you were totally unaware of these impacts!

This indicates that it is our prime responsibility to keep in check the number of carbon footprints getting generated. For this, data centers and other organizations are going on the greener side. They are opting for green computing and storage options now. 


          Network Development Engineer II - Amazon.com - Herndon, VA      Cache   Translate Page      
Job Description Do you like helping U.S. Intelligence Community agencies implement innovative cloud computing solutions and solve technical problems? Would...
From Amazon.com - Tue, 11 Sep 2018 19:23:37 GMT - View all Herndon, VA jobs
          Google is revolutionizing smartphone photos with computing, not lenses      Cache   Translate Page      

The new Google Pixel 3 phones are here, and the most intriguing features are cameras that leverage computational photography to deliver great photos. Can we say bye to crappy zoom and poor low-light images?

The post Google is revolutionizing smartphone photos with computing, not lenses appeared first on Digital Trends.


          Manager, End User Services & Operations - Brookfield Properties - Toronto, ON      Cache   Translate Page      
Oversees and coordinates project implementations such as new building acquisitions to ensure readiness of physical networks, computing and printing devices, and...
From Brookfield Properties - Sat, 08 Sep 2018 02:09:16 GMT - View all Toronto, ON jobs
          Cloud Computing Concept PowerPoint Infographics ID:0000102366      Cache   Translate Page      
Cloud Computing Concept PowerPoint Infographics
          Forum Post: InRoads SS2: Make manual edits to cross section quantities/areas and then update the report?      Cache   Translate Page      
I am comfortable cutting cross sections using InRoads SS2 and then computing the cut/fill volumes and the quantity of different materials that were created with the design surface. However, once these have been created, there are always some type of manual edits required for fine tuning the sections. Is there a way to manually manipulate the cross section graphics and then re-run the report? I use the "End Area Volumes" tab within the "Create Cross Sections" tool to create the report, and if I manipulate any of the shapes, after running the tool again, it reverts back to what was originally created. I know a better work flow would be to go back and revise the model within the Roadway Designer; however, that is not always possible due with multiple people working through manual edits to the cross sections. Thanks for your ideas/help -Justin
          Data breaches help raise cyber security budgets      Cache   Translate Page      
Companies spend more on securing cloud computing and cyber analytics
          'Sentinels of the sea' at risk from changing climate      Cache   Translate Page      
Climate change's effect on coastal ecosystems is very likely to increase mortality risks of adult oyster populations in the next 20 years. That is the finding of a new study led by the University of Nantes, the LEMAR (the Marine Environmental Science Laboratory) in Plouzané and the Cerfacs (European center for research and advanced training in scientific computing) in Toulouse (France).
          Manager, End User Services & Operations - Brookfield Properties - Toronto, ON      Cache   Translate Page      
Previous experience in managing Central Computing Facilities, maintenance of system including HVAC, Fire Detection, UPS, Liquid Detection, and Power...
From Brookfield Properties - Sat, 08 Sep 2018 02:09:16 GMT - View all Toronto, ON jobs
          Google Drops Out of Pentagon’s $10B Cloud Competition, Says Deal May Clash With Its AI Values      Cache   Translate Page      

CircleID CircleID: Alphabet Inc.’s Google has announced that it will not compete for the Pentagon’s cloud-computing contract with an estimated value of $10 billion; says the project may conflict with its corporate values on artificial intelligence. Aaron Gregg reporting in the Washington Post: "The contract, known as the Joint Enterprise Defense Infrastructure, or JEDI for short, calls for a massive cloud-computing infrastructure that can handle classified U.S. military data and enable new defense capabilities. Bids are due Oct. 12. In a statement to The Washington Post, Google said it is dropping its bid for ethical reasons and because it lacked certain government certifications."

According to Tech Workers Coalition, an advocate for giving employees a say in technology company decisions, Google’s decision to withdraw from the cloud competition was due to pressure from thousands of workers, not AI principles. Tweeted today: "Google had every intention of bidding for, and possibly winning, the JEDI contract. They spent considerable resources and hours of top executive time courting military officials to do exactly this. They only dropped out due to sustained employee pressure."
Follow CircleID on TwitterMore under: Cloud Computing

The post Google Drops Out of Pentagon’s $10B Cloud Competition, Says Deal May Clash With Its AI Values appeared first on iGoldRush Domain News and Resources.


          Manager, End User Services & Operations - Brookfield Properties - Toronto, ON      Cache   Translate Page      
Previous experience in managing Central Computing Facilities, maintenance of system including HVAC, Fire Detection, UPS, Liquid Detection, and Power...
From Brookfield Properties - Sat, 08 Sep 2018 02:09:16 GMT - View all Toronto, ON jobs
          Choosing Cloud Computing Service Provider Make Security A Priority      Cache   Translate Page      

i think majors’ve been full up with social networking, the market is obviously shared among chief players and all pickings have already been taken. the new eldorados they see in cloud services. individuals, mainly the owners of social media accounts, have been milked dry, i mean personal information, identities and so on; and the next goal is corporate data. real troves are there, so…
with all the same intentions and consequences both for its users and for its custodes. i mean… wellaway… you know


          Financial Reporting and Compliance Advisor - FORTIS BC - Vancouver, BC      Cache   Translate Page      
Assist with accounting for current and deferred income taxes. Implement and maintain internal control (SOX) related policies, such as End User Computing,...
From FORTIS BC - Tue, 03 Jul 2018 23:12:19 GMT - View all Vancouver, BC jobs
          Field Application Engineer (GPU) - Seattle - 56925 - Advanced Micro Devices, Inc. - Bellevue, WA      Cache   Translate Page      
Solutions Architects help AMD drive a new era of computing into the datacenter by engaging with key end users and independent software partners to demonstrate...
From Advanced Micro Devices, Inc. - Thu, 28 Jun 2018 07:32:28 GMT - View all Bellevue, WA jobs
           Grace - FemTech.dk (Education)      Cache   Translate Page      

Grace - FemTech.dk 1.0


Device: iOS Universal
Category: Education
Price: Free, Version: 1.0 (iTunes)

Description:

On 9 September 1947, computer scientist Grace Murray Hopper recorded the first computer bug in her log book, as she worked on the Harvard Mark II. The Grace app celebrates the 70th anniversary of this event with a tap game where you can debug an old electromechanical computer by tapping on the four different bugs.
The app was launched at Copenhagen Maker Faire 2017, where participants were able to control the number of bugs which appeared in the game by adding origami bugs to a large image of an electromechanical computer.
The Grace app has been developed as part of the research project FemTeck.dk, which aims to create opportunities for people with different experiences, skills, and perspectives to engage into shaping the future of digital technologies. The project is lead by Pernille Bjørn, professor at the Human-Centred Computing group at the Computer Science department at the University of Copenhagen.
During Copenhagen Maker 2017, FemTech.dk will celebrate the 70th anniversary of this “first actual case of bug being found” through a fun, inclusive, and educational installation.

Grace - FemTech.dk


          Senior Systems Engineer - AI Services - Amazon.com - Seattle, WA      Cache   Translate Page      
The Amazon Web Services team is innovating new ways of building massively scalable distributed systems and delivering the next generation of cloud computing...
From Amazon.com - Sun, 15 Jul 2018 20:48:54 GMT - View all Seattle, WA jobs
          Confronting climate change in the age of denial      Cache   Translate Page      
by Liza Gross This Editorial introduces a Collection of articles in which the authors explore the challenges and pitfalls of communicating the science of climate change in an atmosphere where evidence doesn’t matter. Tratto da: www.plos.org Note sul Copyright: Articles and accompanying materials published by PLOS on the PLOS Sites, unless otherwise indicated, are licensed … Continua la lettura di Confronting climate change in the age of denial
          (Escaping) the paradox of scientific storytelling      Cache   Translate Page      
by Michael F. Dahlstrom, Dietram A. Scheufele Compelling stories about science can motivate people to engage and respond to relevant problems facing society. While science plays a unique role in society, providing the best available evidence for policy choices, understanding the world, and informing citizens’ daily lives, it does not hold any intrinsic advantage in … Continua la lettura di (Escaping) the paradox of scientific storytelling
          Tracking arctic marine mammal resilience in an era of rapid ecosystem alteration      Cache   Translate Page      
by Sue E. Moore, Randall R. Reeves Global warming is significantly altering arctic marine ecosystems. Specifically, the precipitous loss of sea ice is creating a dichotomy between ice-dependent polar bears and pinnipeds that are losing habitat and some cetaceans that are gaining habitat. While final outcomes are hard to predict for the many and varied … Continua la lettura di Tracking arctic marine mammal resilience in an era of rapid ecosystem alteration
          Climate communication for biologists: When a picture can tell a thousand words      Cache   Translate Page      
by Stephan Lewandowsky, Lorraine Whitmarsh Pictures often tell a story better than the proverbial 1,000 words. However, in connection with climate change, many pictures can be highly misleading, for example, when a snowball is used to ridicule the notion of global warming or when a picture of a dead crop is supposed to alert people … Continua la lettura di Climate communication for biologists: When a picture can tell a thousand words
          Benefits of Green Computing and Green Storage Techniques       Cache   Translate Page      

Green computing or green storage – these terms are getting quite popular with an increasing number of carbon footprints and when we think of ways to prevent them. It is our duty to reduce the number of eco-footprints as quickly as possible and also to control the amount of them. Do you know that a single email generates a lot of footprints? A short email generates about 4 grams of CO2 equivalent to the atmosphere. When you send an email with a large attachment creates 50 grams of CO2. Even Read More..
          Google Pixel 3, Pixel 3 XL start at $799, rock two selfie cameras and bigger screens - CNET      Cache   Translate Page      

CNET

Google Pixel 3, Pixel 3 XL start at $799, rock two selfie cameras and bigger screens
CNET
No more leaks this time -- Google's finally officially unveiled the Pixel 3 and Pixel 3 XL. The company formally showed off its latest flagship smartphones after weeks of leaks, including a full unboxing video from Engadget. Google teased at all the ...
Google is revolutionizing smartphone photos with computing, not lensesDigital Trends
Google Pixel 3 Australian pricingZDNet
You Should Probably Pass On Google's Home Hub Smart DisplayAndroid Headlines
PCMag -TechCrunch -Droid Life -TIME
all 3,094 news articles »

          The Core i9 Gaming Benchmarks Intel Commissioned Against AMD Are a Flat Lie - ExtremeTech      Cache   Translate Page      

ExtremeTech

The Core i9 Gaming Benchmarks Intel Commissioned Against AMD Are a Flat Lie
ExtremeTech
Everyone in the enthusiast community knows that manufacturer-provided benchmarks must be taken with a grain of salt. One could write a book on the various ways that companies tend to shade the truth to paint their own products in a positive light. Some ...
Intel derailed its i9-9900K launch with 2 unforced errorsVentureBeat
Intel's 9th-gen Core i7-9700K abandons Hyper-Threading: What it could mean for performancePCWorld
What Intel's New Processor Line Means for Desktop BuyersPCMag
Tom's Hardware -Forbes -Threatpost -EE Times
all 336 news articles »

          Senior Information Security Consultant - Network Computing Architects, Inc. - Bellevue, WA      Cache   Translate Page      
With the ability to interface and communicate at the executive level, i.e. CIO's, CTO's and Chief Architects....
From Network Computing Architects, Inc. - Mon, 11 Jun 2018 23:15:53 GMT - View all Bellevue, WA jobs
          SLIIT secures the Bronze Medal in Brainstorm 2018      Cache   Translate Page      
AD-Mini won the Bronze Medal in Brainstorm 2018 held on 5th October 2018 at Wimalasurendra Auditorium, The Institution of Engineers Sri Lanka (IESL). AD-Mini is an application developed as a final year research project by a group of students following BSc Hons. in Information Technology (Specialization in Information Systems Engineering) in Faculty of Computing, Sri
          Software Engineer, Mobile Development & Research, Palo Alto      Cache   Translate Page      
CA-Palo Alto, Ford Motor Company is moving into a new phase of its 100+ year history, one in which software is at the heart of its future. The automobile is being redefined as a networked computing platform upon which an ever-evolving set of applications is being designed, allowing us to create exciting new consumer experiences. This position is located at Ford's Research and Innovation Center in Palo Alto, CA.
          AI and Computing Research Engineer      Cache   Translate Page      
CA-Palo Alto, Position Overview/Description: The automobile is being redefined as a networked computing platform upon which an ever-evolving set of applications are being designed, creating exciting new consumer services and experiences. Continuing our leadership in this realm, Ford Motor Company's winning aspiration is to become the world's most trusted mobility company, designing smart vehicles for a smart wo
          Research Scientist – Machine Learning Algorithms      Cache   Translate Page      
CA-Palo Alto, Job Summary: Ford Motor Company is moving into a new phase of its 100+ year history, one in which openness is at the heart of its future. The automobile is being redefined as a networked computing platform upon which an ever-evolving set of applications is being designed, allowing us to create exciting new consumer experiences. We are a research lab within Ford that is investigating computing plat
          Research Engineer – Robotics and AI      Cache   Translate Page      
CA-Palo Alto, Job Summary: Ford Motor Company is moving into a new phase of its 100+ year history, one in which openness is at the heart of its future. The automobile is being redefined as a networked computing platform upon which an ever-evolving set of applications is being designed, allowing us to create exciting new consumer experiences. We are a research lab within Ford that is investigating computing plat
          Stop and Ask: Why Does Google Need Hardware? - Washington Post      Cache   Translate Page      

Washington Post

Stop and Ask: Why Does Google Need Hardware?
Washington Post
So many internet and software companies make gadgets now. Amazon, Microsoft, Google and Facebook all make some type of internet-connected computing gear. Even Uber has started to engineer its own electric scooters. The one thing all these ...
Google's Home Hub is Missing a Camera. Here's Why That's a Smart IdeaTIME
Pixel Launch Event Live Updates: Google Pixel 3 and Pixel 3 XL Set to LaunchNDTV
Hey you know what the smart-home world really needs right now? Yup, Google screaming inThe Register
South China Morning Post -ZDNet -Digital Trends -PCMag
all 3,101 news articles »

          Bio-inspired computing: When are meeting minutes sent out? Who is on the distribution list?      Cache   Translate Page      
Save time, empower your teams and effectively upgrade your processes with access to this practical Bio-inspired computing Toolkit and guide. Address common challenges with best-practice templates, step-by-step work plans and maturity diagnostics for any Bio-inspired computing related project. Download the Toolkit and in Three Steps you will be guided from […]
          Google augments regional cloud team      Cache   Translate Page      
Google is expanding headcount at its local cloud team threefold to capitalise on growth in cloud computing in Southeast Asia, driven by artificial intelligence (AI) and digital transformation. Reported by Bangkok Post 18 minutes ago.
          Data breaches help raise cyber security budgets      Cache   Translate Page      
Companies spend more on securing cloud computing and cyber analytics Reported by FT.com 1 hour ago.
          Nine Good PC Habits You Should Have      Cache   Translate Page      
We all know about good habits – exercise, brushing your teeth, putting your dirty dishes in the sink. Here are nine good habits I’ve picked up in 35 years of working with computers. Some of them I learned the hard way. Good Habit #1: Back Up Daily When I wrote PCWorld’s Answer Line column, I got several emails a week from desperate people who had lost their data. When I asked if they had a backup, the usual response was “I was going to get around to that.” Back up to an external drive, even if you’re backing up to the cloud. The first rule of computing: Never have only one copy of anything. Second rule: Each copy should be on a different storage device. Arguably, this may no longer need to be a habit. With online backup tools such as Carbonite, you can set up your backup and forget about it. But a local backup adds additional safety. At the end of every workday, plug in an external hard drive, run a backup program (Windows’ own File History will do), then, when the backup is done, safely remove the external drive. Good Habit #2: Scan for Malware Weekly With … Read More »
          Google Pixel 3, Pixel 3 XL starts at $799, rock a notch and two selfie cameras - CNET      Cache   Translate Page      

CNET

Google Pixel 3, Pixel 3 XL starts at $799, rock a notch and two selfie cameras
CNET
No more leaks this time -- Google's finally officially unveiled the Pixel 3 and Pixel 3 XL. The company formally showed off its latest flagship smartphones after weeks of leaks, including a full unboxing video from Engadget. Google teased at all the ...
Stop and Ask: Why Does Google Need Hardware?Washington Post
Google is revolutionizing smartphone photos with computing, not lensesDigital Trends
Pixel 2 vs Pixel 3: Should you upgrade?TechCrunch
TIME -Forbes -PCWorld -Mashable
all 3,127 news articles »

          Igniting The Cloud: Microsoft Conference Looks At New Cloud, AI Solutions      Cache   Translate Page      

With earnings season around the corner, investors are likely to hear a lot about the far-reaching technology realms of cloud computing, artificial intelligence (AI), and the Internet of Things (IoT) as tech firms outline their results and plans.

read more


          R Consortium grant applications due October 31      Cache   Translate Page      

Since 2015, the R Consortium has funded projects of benefit to, and proposed by, the R community. Twice a year, the R Consortium Infrastructure Steering Committee reviews grant proposals and makes awards based on merit and funds available. (Those funds come, in turn, from the annual dues paid by R Consortium members.) If you'd like to propose a project of your own, the deadline for submission for the Fall 2018 Call for Proposals is October 31.

RConsortium_Horizontal_Pantone

Not sure what kind of project might be approved? In general, the R Consortium grants fund projects in these categories:

  • Creation of general infrastructure supporting R, like the R-hub project which provides build services for R package developers on every platform supported by R.
  • Development of new R packages, like DBI for R which provides a general interface between R and databases. 
  • Support for working groups to meet, discuss and plan new initiatives in the R community, like Certification for R developers.
  • R community programs, like R Ladies.

A good way to get a sense of suitable projects is by browsing the list of previously-funded R Consortium projects, or by taking a look at the regular project reviews in the R Consortium blog, like this update posted earlier today.

And if you're not sure how to put a proposal together, Steph Locke has created a boilerplate R Consortium proposal as an R Markdown document you can clone from Github, along with a detailed set of instructions on how to complete it for your project idea.

So, what ideas do you have to make the R ecosystem better? A new package? A new working group? A new community initiative? If you need financial support to make that idea a reality, consider applying for an R Consortium project grant. You can find all the details at the link below.

R Consortium blog: Fall 2018: ISC Call for Proposals


          Making HIPAA and HITRUST compliance easier      Cache   Translate Page      

Many healthcare organizations are starting to adopt artificial intelligence (AI) systems to gain deeper insight into operations, patient care, diagnostic imaging, cost savings and so on. However, it can sometimes be daunting to even know where to get started. Many times, you need a clear lighted path to start your journey and embrace AI and machine learning (ML) capabilities rapidly.

image

One method is using an Azure Healthcare AI blueprint. It’s a shortcut to using Microsoft Azure at low cost and without deep knowledge of cloud computing. Blueprints include resources such as example code, test data, security, and compliance support. The largest advantage of using a blueprint is explicit advice and clear instructions on keeping your solution in compliance. We’re trying to eliminate the mystery, so you don’t have to research it yourself.

Three core areas where the blueprint can help with compliance are cloud provider and client responsibilities, security threats, and regulatory compliance. These three areas can get overlooked at the beginning of any technology project, yet they are important parts of creating healthcare systems. Applying formal discipline to these areas is made easier by using the blueprint to create an AI/ML experiment installation.

Helpful artifacts

The blueprint includes a script to create an AI/ML system, complete with a sample experiment. It also includes several documents to help system implementers keep their installations secure and compliant. These include worksheets, whitepapers, and spreadsheets that will help you ensure system compliance with healthcare regulations and certifications. The artifacts are easily re-purposed for other healthcare-based systems implemented on Azure.

Clarifying responsibilities

When creating any system on a cloud platform, there are two possible owners for any part of the solution, the cloud provider and the customer. It is important to know who is responsible for specific actions, services, and other operational details. Without a clear understanding of this delineation, customers or vendors may find themselves in a difficult situation if an issue arises, like service outages or security breaches. Therefore, it is in everyone’s interest to be clear about the responsibilities of design and operations.

Preventing misunderstandings and setting clear expectations of responsibilities is the goal of the Shared Responsibilities for Cloud Computing document. If you are trying to meet HITRUST certification standards, the HITRUST Customer Responsibilities Matrix spreadsheet identifies exactly what Microsoft and the customer are respectively responsible for managing.

Planning for security threats

Before creating complex systems, it is always advisable to perform a threat assessment. It is a best practice to create a threat assessment model. It helps you to visualize the system and find the points of vulnerability in the proposed architecture. This leads to conversations about where the system may be improved and hardened against attacks.

Microsoft provides a Threat Model Tool enabling architects to identify and mitigate potential security issues early, when they are relatively easy and cost-effective to resolve. The blueprint includes a model to be used with the tool. This comprehensive threat model provides insights into the potential risks of the architecture and how they may be mitigated.

A standard approach to security threat analysis involves identifying the surface area of your system, creating a model of that surface area, identifying potential threats, mitigating them and validating each mitigation, updating the threat model as you proceed. The following diagram highlights the major phases this process.

The figure below shows four stages: diagram, identify, mitigate, and validate.

image

Figure 1: Security cycle

This process flow provides an iterative and collaborative approach to threat analysis that ultimately helps create a more robust and secure system architecture.

Regulatory compliance

Healthcare systems need to meet regulatory compliance standards. At installation, the blueprint complies with HIPAA and HITRUST requirements. Whitepapers are included to help you understand how to continue to meet these requirements. Let’s examine the whitepapers and other provided artifacts to see how they might help.

HITRUST certification

The Common Security Framework (CSF) from HITRUST is a security standard for healthcare systems. The HITRUST compliance review whitepaper was published to aid in ensuring the healthcare blueprint meets CSF regulations. The whitepaper states:

“This whitepaper constitutes a review of the Blueprint architecture and functionality with respect to HITRUST-certified customer environments, examining how specifically it can satisfy HITRUST CSF security requirements.”

The whitepaper helps organizations plan their cloud implementation and understand how to meet HITRUST CSF compliance.

HIPAA compliance built into the blueprint

Compliance with HIPAA standards is fundamental to any healthcare organization. The blueprint was created with HIPAA in mind, and includes a whitepaper covering the topic in detail.

The HIPAA compliance review whitepaper is similar to the HITRUST whitepaper in its intent, to help organizations reach regulatory compliance. This document guides readers through the architecture, a shared responsibility model and deployment considerations for your solution. Protected healthcare information (PHI), a fundamental practice in well-designed system architectures, is also included in the whitepaper.

Recommended next steps

Use the supporting collateral below to prepare for your installation of the blueprint. The artifacts demonstrate how responsibilities, compliance, and security are established and how you can maintain them going forward.

Prepare for installation and ongoing maintenance with the following documents.

Collaboration

What other artifacts or considerations do you think would be helpful when putting healthcare systems into production? Your comments and recommendations are welcome below. I regularly post on technology in healthcare topics. Reach out and connect with me on LinkedIn or Twitter.


          Dept Chair/Head - Industrial Engineering - Clemson University - Freeman, SD      Cache   Translate Page      
The Department of Industrial Engineering, in the College of Engineering, Computing and Applied Sciences at Clemson University, is seeking applicants for its...
From Clemson University - Thu, 04 Oct 2018 20:09:51 GMT - View all Freeman, SD jobs
          10/10/2018: BUSINESS & FINANCE: Intel management to hold strategic meeting in Israel      Cache   Translate Page      

The entire international management of Intel will meet with Prime Minister Benjamin Netanyahu this week. Netanyahu will give them a review of Israeli technological innovation spanning cyber, artificial intelligence (AI), and quantum computing, among...
          Craft Beer Account Manager/Outside Sales Rep - Avitus Group - Sheridan, WY      Cache   Translate Page      
Proficiency with Microsoft Office products, cloud based computing and databases, mobile applications and other emerging technologies affecting Black Tooth...
From Avitus Group - Thu, 27 Sep 2018 08:14:23 GMT - View all Sheridan, WY jobs
          Study opens route to flexible electronics made from exotic materials      Cache   Translate Page      
The vast majority of computing devices today are made from silicon, the second most abundant element
          Solutions Architect - Amazon Web Services - Amazon.com - Chicago, IL      Cache   Translate Page      
DevOps, Big Data, Machine Learning, Serverless computing etc. High level of comfort communicating effectively across internal and external organizations....
From Amazon.com - Fri, 13 Jul 2018 07:54:23 GMT - View all Chicago, IL jobs
          Solutions Architect - Amazon Web Services - Amazon.com - San Francisco, CA      Cache   Translate Page      
DevOps, Big Data, Machine Learning, Serverless computing etc. High level of comfort communicating effectively across internal and external organizations....
From Amazon.com - Sun, 02 Sep 2018 07:30:50 GMT - View all San Francisco, CA jobs
          Senior Reverse Engineer - Irdeto - Ottawa, ON      Cache   Translate Page      
Our Security Assurance team is an Ethical Hacking group within Irdeto bringing its considerable knowledge of the dark corners of computing to bear against...
From Irdeto - Sat, 23 Jun 2018 08:49:24 GMT - View all Ottawa, ON jobs
          Craft Beer Account Manager/Outside Sales Rep - Avitus Group - Sheridan, WY      Cache   Translate Page      
Proficiency with Microsoft Office products, cloud based computing and databases, mobile applications and other emerging technologies affecting Black Tooth...
From Avitus Group - Thu, 27 Sep 2018 08:14:23 GMT - View all Sheridan, WY jobs
           Microsoft's new cloud service streams Xbox One games to your phone       Cache   Translate Page      

Microsoft has announced Project xCloud, a game-streaming service that lets users play Xbox One games on ...#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000

Hot on the heels of Google's announcement last week of Project Stream, Microsoft has now revealed its own plans for a video game streaming service. Dubbed Project xCloud, the service would allow players to jump into an Xbox One game on basically any device – be it a TV, PC, or even a smartphone.

.. Continue Reading Microsoft's new cloud service streams Xbox One games to your phone

Category: Games

Tags:
          Senior Information Security Consultant - Network Computing Architects, Inc. - Bellevue, WA      Cache   Translate Page      
With the ability to interface and communicate at the executive level, i.e. CIO's, CTO's and Chief Architects....
From Network Computing Architects, Inc. - Mon, 11 Jun 2018 23:15:53 GMT - View all Bellevue, WA jobs
          The Core i9 Gaming Benchmarks Intel Commissioned Against AMD Are a Flat Lie - ExtremeTech      Cache   Translate Page      

ExtremeTech

The Core i9 Gaming Benchmarks Intel Commissioned Against AMD Are a Flat Lie
ExtremeTech
Everyone in the enthusiast community knows that manufacturer-provided benchmarks must be taken with a grain of salt. One could write a book on the various ways that companies tend to shade the truth to paint their own products in a positive light. Some ...
Intel derailed its i9-9900K launch with 2 unforced errorsVentureBeat
What Intel's New Processor Line Means for Desktop BuyersPCMag
Intel 9th-gen CPU reactions with Intel, Alienware, GamersNexus, Paul's Hardware, and BitwitPCWorld
Tom's Hardware -Forbes -The Verge -EE Times
all 336 news articles »

          Could we see the end of Google?       Cache   Translate Page      


October 8, 2018

 


According to futurist George Gilder the era of Google could be coming to an end. In his recent book “Life after Google”, Gilder explains why Silicon Valley is suffering a nervous breakdown and what to expect as the post-Google age dawns.

Is it worthwhile paying attention to what somebody like George Gilder says? Putting aside the fact that nobody can accurately predict the future on a consistent basis (as has been shown by Gilder’s track record), it is possible to make informed statements about the future based on sound logic. Here Gilder does base his assumptions on more than conjecture.

So where does Gilder come up with such an outlook regarding Google? As Peter Thiel pointed out, “Google’s algorithms assume the world’s future is nothing more than the next moment in a random process. George Gilder shows how deep this assumption goes, what motivates people to make it, and why it’s wrong: the future depends on human action.”

The argument is based on an analysis of big data. Right now, big data looks like it holds all the answers for any questions a person or company might have. William Terdoslavich wrote in InformationWeek, “At the heart of big data is the search for “insight — some correlation or finding that eludes the seeker until he or she adds another terabyte or 10 of data, just in case it is lurking there. At a certain point, the law of diminishing returns has to kick in. Adding another 100TB becomes redundant.”


Nassim Taleb pointed this out by the following analogy, “We humans do not predict when it’s safe to cross a road by adding more different data-points, like e.g. the color of the eyes of by-passing car-drivers, to our decision-making process, but by filtering the data and only assess what’s relevant to get across safely.”

In 1972, Gordon Bell formulated what is now known as Bell’s law of computer classes. It describes how types of computing systems (referred to as computer classes) form, evolve and may eventually die out. New classes of computers create new applications resulting in new markets and new industries. Gilder believes that Google can’t continue on the present path as we now need an entirely knew infrastructure.

Kurt Godel, the brilliant Austrian mathematitian exposed the limitations of mathematics (the incompleteness theorems). He proved that there can be no human construct, no human system of thought that does not rely on some reality outside of itself. It shows that human intelligence could not be recreated by a traditional computer.

Google was built on ads. All these arguments can be seen as presenting a case where Google’s system of aggregating huge amounts of data to create adverts will inevitably break down. There is also the concern that Google and Silicon Valley in general have put security on the back burner. The fear is that Google has been avoiding the challenge of security across the internet by giving away most of its products for free, and financing itself with an ingenious advertising strategy. This has become more apparent with the recent massive data breach at Google+.

But is it really possible for a company such as Google, which is so engrained in everybody’s daily life, to cease to exist? A good way to understand the present and future is to look at the past in order to gain some insight.

Comparing the 1955 Fortune 500 companies (here) to the 2017 Fortune 500 (here), there are only 60 companies that appear in both lists. In other words, fewer than 12% of the Fortune 500 companies included in 1955 were still on the list 62 years later in 2017, and 88% of the companies from 1955 have either gone bankrupt, merged with (or were acquired by) another firm, or they still exist but have fallen from the top Fortune 500 companies (ranked by total revenues). Many of the companies on the list in 1955 are unrecognizable, forgotten companies today (e.g., Armstrong Rubber, Cone Mills, Hines Lumber, Pacific Vegetable Oil, and Riegel Textile). One recent name that was driven into extinction by its own technology was Kodak. They came up with the first digital camera but did not capitalize on it.

It’s reasonable to assume that when the Fortune 500 list is released 60 years from now in 2077 (although it could happen much sooner), almost all of today’s Fortune 500 companies will no longer exist as currently configured, having been replaced by new companies in new, emerging industries.

In any case there was a time when Google didn’t exist and the world was inundated with search engines. Nobody was really crying out for somebody to build a new one. To imagine Google being replaced by another technology wave is by no means difficult. It is probably just a question of how fast it happens.


Author The Hutch Report 





          JEDI: Google withdraws from Pentagon’s $10 billion cloud competition      Cache   Translate Page      

Google CloudGoogle has dropped out of a competition to secure a Pentagon contract dubbed the Joint Enterprise Defense Infrastructure cloud (JEDI), saying that the project may conflict with its ethical principles. The cloud computing contract is thought to be worth as much as $10 billion, with AWS and Microsoft also in the running. The decision was announced […]

The post JEDI: Google withdraws from Pentagon’s $10 billion cloud competition appeared first on Internet of Business.


          Stop and Ask: Why Does Google Need Hardware? - Washington Post      Cache   Translate Page      

Washington Post

Stop and Ask: Why Does Google Need Hardware?
Washington Post
So many internet and software companies make gadgets now. Amazon, Microsoft, Google and Facebook all make some type of internet-connected computing gear. Even Uber has started to engineer its own electric scooters. The one thing all these ...
What Drives Tech Internet Giants To Hide Data Breaches Like The Google+ BreachForbes
Google's Home Hub is Missing a Camera. Here's Why That's a Smart IdeaTIME
Google takes on the iPad Pro and Surface Pro with the Pixel SlateMashable
Lifehacker -NDTV -Telegraph.co.uk -The Independent
all 3,177 news articles »

          Offer - Dell PowerEdge R820 Server Limited supply for Rental & Sale Kochi - INDIA      Cache   Translate Page      
Flexible, scalable I/O and storage options with PCI-e 3.0 technology allow you to tailor your network throughput to match your application needs. These hyper-scalable features make the DELL POWEREDGE R820 RACK SERVER a perfect fit for computing, memory-intensive applications and expanding virtual environments. Product Highlights Processor: Intel® Xeon® processor E5-4600 v4 Memory : Up 2400MT/s DDR4, RDIMM, LRDIMM Hard Disk: Up to 16 x 2.5” SATA/SAS SSD, SAS HDD Contact Rental India Name – Chackravarthy (8754542653) Name – Anushree (8971423090) Visit Us: https://shop.rental-india.com/product/dell-poweredge-r820-rack-server-available-on-rental-sale/ Mail Us: enquiry@rental-india.com Mandaveli, Chennai-28.
          $2,438.32 - 802.11 a/b/g/n,512/2G,CE7 OS, ST BATTERY,802.11 A/B/G/N      Cache   Translate Page      
#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000

Model #: WT41N0-N2S27ER
Item #: 9SIA38911H0335
Price: $2,438.32
Save: 16%
Sold by Neobits
Add To Cart


          ECEP has a new home at The University of Texas at Austin: First meeting this week at CSforAll      Cache   Translate Page      
I can’t tell you how exciting this press release is for me.  Rick Adrion, Renee Fall, Barbara Ericson, and I started the Expanding Computing Education Pathways Alliance (http://ecepalliance.org) in 2012 to provide states with support as they broadened participation in computing education.  Six years later, we had 16 states and Puerto Rico involved — but […]
          Comment on Financial Samurai 3Q2018 Investment Review And 4Q2018 Outlook by Frank      Cache   Translate Page      
I apologize for typo. I meant dividend yields of each REIT. I own small amounts of a variety of them, TWO, AGNC, NLY, EQUINIX, HCP, MRT and SBRA, ARI and STWD. Healthcare clients typically sign a long-term contract and the aging of population are tailwinds to those REITs. Many data centers have been/will be built due to demand of cloud computing. It is worthwhile taking a look. All are high dividend stocks so do not have much price appreciation. I will answer your 2nd question in another reply. Thanks
          Senior Software Development Engineer - Distributed Computing Services (Hex) - Amazon.com - Seattle, WA      Cache   Translate Page      
Knowledge and experience with machine learning technologies. We enable Amazon’s internal developers to improve time-to-market by allowing them to simply launch...
From Amazon.com - Thu, 26 Jul 2018 19:20:25 GMT - View all Seattle, WA jobs
          Harnessing silicon fabrication technology to build quantum optical circuits      Cache   Translate Page      
A new study by scientists from the University of Bristol brings us a significant step closer to unleashing the revolutionary potential of quantum computing by harnessing silicon fabrication technology to build complex on-chip quantum optical circuits. (Source: University of Bristol news)
          Payroll Coordinator - Western Sugar Cooperative - Lovell, WY      Cache   Translate Page      
Excellent computer competence (outlook, word, PowerPoint, excel, access). Ensure that computing, withholding, and deductions are done correctly....
From Indeed - Thu, 13 Sep 2018 16:39:23 GMT - View all Lovell, WY jobs
          Retailers Flex to Meet Expectations      Cache   Translate Page      
To address e-commerce and omni-channel challenges, many retailers are turning to automation, software and mobile computing solutions to find balance in their distribution channels.
          Director of IT - Grand Teton Lodge Company, Wyoming - Vail Resorts - Moran, WY      Cache   Translate Page      
Primary focus is customer satisfaction, system reliability, and adherence to corporate computing standards including PCI and SOC compliance....
From Vail Resorts - Sat, 06 Oct 2018 14:04:57 GMT - View all Moran, WY jobs
          WEARABLE COMPUTING MARKET 2018: COMPARISON BY REGION, COMPETITIVE TACTICS, PRODUCTION, REVENUE, PRICE AND GROSS MARGIN      Cache   Translate Page      
WEARABLE COMPUTING MARKET 2018: COMPARISON BY REGION, COMPETITIVE TACTICS, PRODUCTION, REVENUE, PRICE AND GROSS MARGIN This report studies the global market size of Wearable Computing in key regions like North America, Europe, Asia Pacific, Central & South America and Middle East & Africa, focuses on the consumption of Wearable Computing in these regions. This research report

          Cloud Computing Services Market 2023: Top Companies, Regional Growth Overview and Growth Factors Details by Regions, Types & Applications      Cache   Translate Page      
(EMAILWIRE.COM, October 11, 2018 ) Cloud Computing is the practice of sharing a network of remote servers which are hosted on the Internet to store, process, and manage data rather than on a local server or a personal computer. It specifically refers to a common storage space through which all the...
          Google drops $10B bid for Pentagon contract amid employee pushback      Cache   Translate Page      
Google will no longer compete for a multibillion dollar cloud computing contract with the Pentagon because the project may conflict with its corporate mission.
          * NEW * Clasa I, Matematică: Unitatea II - Fișă de evaluare cu descriptori de performanță      Cache   Translate Page      
Folosiți această fișă de evaluare sumativă, gândită pentru finalul Unității II la matematică, pentru a le permite elevilor să-și testeze cunoștințele referitoare la numerația în concentrul 0-31.
Tags in this resource:
  • SMARTbot-1---Robot-Buttons-Internet-PlanIt-Computing-E-Safety-SMARTbots-Y6-Lesson-Pack-5-KS2.png
  • jar-1.png
  • Mercury----Space-Universe-Solar-System-Planets-KS1.png


          Google augments regional cloud team      Cache   Translate Page      
Google is expanding headcount at its local cloud team threefold to capitalise on growth in cloud computing in Southeast Asia, driven by artificial intelligence (AI) and digital transformation.
          Lead IT Auditor &ndash Cloud Computing      Cache   Translate Page      
Req Number 16232BRPosition DescriptionWe are seeking a Lead IT Auditor with Cloud Computing experience to join the Information Systems Audits Division within Internal Auditing to be based in our corporate headquarters in Dhahran Saudi Arabia with expertise in auditing or deploying cloud-based solutionstechnologiesInternal auditing is an indep
          Mobile Computing Specialist - Planaxis | Groupaxis - Montréal, QC      Cache   Translate Page      
Optimization and handoff of work to Level 2 offshore team. Planxis is looking for System Operations specialist (Mobile Computing) for a one year contract in...
From Planaxis | Groupaxis - Thu, 04 Oct 2018 19:10:42 GMT - View all Montréal, QC jobs
          Huawei unveils chips to boost cloud computing at Shanghai conference      Cache   Translate Page      
China's Huawei, the world's largest telecom-equipment maker, unveiled two new artificial intelligence powered chips to boost its cloud computing business at the company's annual global partners' conference, Huawei Connect, on Wednesday.

          Huawei unveils chips to boost cloud computing at Shanghai conference      Cache   Translate Page      
(Reuters) - China's Huawei, the world's largest telecom-equipment maker, unveiled two new artificial intelligence powered chips to boost its cloud computing business at the company's annual global
          [Matične ploče, procesori i memorije] Re: intel napreduje ka 22nm      Cache   Translate Page      
Zlatni: Citat: "Mene u neku ruku brine to sto GPU pocinje da menja CPU u nekim taskovima. Bukvalno mi nekad deluje da ceo computing moze da se baci na GPU za neke stvari i to da se zavrsi mnogo, mnogo brze. A namena istih uopste nije to." Sto je to lose? Imas 600+ jezgara da vrsis operacije ; ) Nikola: Citat: "Nemam pojma za gejmere, ja kad sam se igrao sam to radio na konzoli, da ne bi razmisljao o drajverima, OS-u i svemu ostalom... ;) Ja PC gamere ne razumem. " Ja igram pona...
          13,156 Commodore 64 Programs Available in the Internet Archive Now      Cache   Translate Page      
Do you like vintage computing? Love it, but lack software?   The Internet Archive is the place to look for vintage software. Whether you bought a vintage box at a garage sale or are looking to use an emulator on your laptop, you can get to 8-bit graphic goodness quickly. For Commodore 64s, there are […]
          Remote Enterprise Account Executive      Cache   Translate Page      
A cloud computing solutions company has a current position open for a Remote Enterprise Account Executive. Candidates will be responsible for the following: Developing the relationship with key customers and prospects Driving strategic sales activity Achieving quota and creating satisfied customers Must meet the following requirements for consideration: Bachelor's Degree Required 10+ years of solution sales experience selling CRM, ERP, or similar business applications Ability to bring insights and value to a client Experience selling to the C-Suite, and across both IT and the business Background selling both an application and the deployment of a platform Other requirements as outlined in the job description
          Remote Enterprise Account Executive in Chicago      Cache   Translate Page      
A Quote-to-Cash cloud computing solutions needs applicants for an opening for a Remote Enterprise Account Executive in Chicago. Core Responsibilities Include: Developing and growing relationships with key customers and prospects Being the key contact for executive discovery sessions, strategizing solution offerings Forecasting sales activity and revenue achievement while creating satisfied customers Must meet the following requirements for consideration: 10+ years of solution sales experience selling CRM, ERP, or similar applications to large enterprise clients Experience selling to the C-Suite, and across both IT and the business Background selling both an application and the deployment of a platform Strong technical aptitude Account planning and execution skills Strong networking skills
           ASUS updates the ROG Strix GL12 with new 8-core Core i9-9900K CPU and NVIDIA RTX 2080 Ti GPU       Cache   Translate Page      
ASUS' new ROG Strix GL12CX gaming desktop is armed to the teeth with the latest and greatest in computing and gaming hardware.
          Cloud GIS Market 2018 Industry Growth, Key Players and Demand Forecast Report 2025      Cache   Translate Page      
(EMAILWIRE.COM, October 10, 2018 ) Cloud computing technology has transformed the way one works. Though geographical information system (GIS) has been a late adopter of the cloud technology, the many benefits are compelling organizations to transform their geospatial functions to the cloud. Cloud-based...
          Coding in Q# with John Azariah      Cache   Translate Page      
Start programming quantum today! While at NDC in Sydney, Carl and Richard talked with John Azariah about Q# and the Quantum Development Kit that he has helped create. The conversation starts out with a refresher on quantum computing in general, including exploring a number of the myths and fallacies - John brings up the really important problems that quantum can tackle, including (no kidding!) world hunger and climate change. John dives into what Q# is all about, being able to abstract away from the quantum hardware and various emulators so that you can explore quantum functions. You may not have the hardware today, but some day you will!

          Customer Service Agent **16/hr** SEASONAL **FLIGHT BENEFITS - QUICKFLIGHT INC - Jackson Hole, WY      Cache   Translate Page      
Preparing and issuing tickets, computing fares, issuing refunds. Customer Service responsibilities will include but are not limited to....
From QUICKFLIGHT INC - Sat, 29 Sep 2018 11:53:32 GMT - View all Jackson Hole, WY jobs
          Embedded systems course in bangalore      Cache   Translate Page      
Learnbay.in online is best embedded training institute in Bangalore providing embedded system courses & training by our top industry experts.If you have experience in other domains/technologies and want to start your career in embedded system,Learnbay is best embedded training institute in Bangalore.
An embedded system is a computer system with a dedicated function within a larger mechanical or electrical system, often with real-time computing constraints.
          The Core i9 Gaming Benchmarks Intel Commissioned Against AMD Are a Flat Lie      Cache   Translate Page      
Ryzen2-Feature

The company Intel apparently hired to write a whitepaper on the Core i9-9900K's gaming performance have blatantly misrepresented AMD's Ryzen 7 2700X to make their case. Not a good look.

The post The Core i9 Gaming Benchmarks Intel Commissioned Against AMD Are a Flat Lie appeared first on ExtremeTech.


          Senior Information Security Consultant - Network Computing Architects, Inc. - Bellevue, WA      Cache   Translate Page      
With the ability to interface and communicate at the executive level, i.e. CIO's, CTO's and Chief Architects....
From Network Computing Architects, Inc. - Mon, 11 Jun 2018 23:15:53 GMT - View all Bellevue, WA jobs
          macOS 10.14 Mojave Release Notes      Cache   Translate Page      
October 9, 2018
After weeks of testing, Information Systems & Computing (ISC) believes macOS 10.14 Mojave is safe for general use.
          Huawei unveils chips to boost cloud computing at Shanghai conference      Cache   Translate Page      
China's Huawei, the world's largest telecom-equipment maker, unveiled two new artificial intelligence powered chips to boost its cloud computing business at the company's annual global partners' conference, Huawei Connect, on Wednesday.

          Nine Good PC Habits You Should Have      Cache   Translate Page      
We all know about good habits – exercise, brushing your teeth, putting your dirty dishes in the sink. Here are nine good habits I’ve picked up in 35 years of working with computers. Some of them I learned the hard way. Good Habit #1: Back Up Daily When I wrote PCWorld’s Answer Line column, I got several emails a week from desperate people who had lost their data. When I asked if they had a backup, the usual response was “I was going to get around to that.” Back up to an external drive, even if you’re backing up to the cloud. The first rule of computing: Never have only one copy of anything. Second rule: Each copy should be on a different storage device. Arguably, this may no longer need to be a habit. With online backup tools such as Carbonite, you can set up your backup and forget about it. But a local backup adds additional safety. At the end of every workday, plug in an external hard drive, run a backup program (Windows’ own File History will do), then, when the backup is done, safely remove the external drive. Good Habit #2: Scan for Malware Weekly With … Read More »
          Offer - Dell PowerEdge R820 Server Limited supply for Rental & Sale Kochi - INDIA      Cache   Translate Page      
Flexible, scalable I/O and storage options with PCI-e 3.0 technology allow you to tailor your network throughput to match your application needs. These hyper-scalable features make the DELL POWEREDGE R820 RACK SERVER a perfect fit for computing, memory-intensive applications and expanding virtual environments. Product Highlights Processor: Intel® Xeon® processor E5-4600 v4 Memory : Up 2400MT/s DDR4, RDIMM, LRDIMM Hard Disk: Up to 16 x 2.5” SATA/SAS SSD, SAS HDD Contact Rental India Name – Chackravarthy (8754542653) Name – Anushree (8971423090) Visit Us: https://shop.rental-india.com/product/dell-poweredge-r820-rack-server-available-on-rental-sale/ Mail Us: enquiry@rental-india.com Mandaveli, Chennai-28.
          U.S. Patent No. 9,409,083: Spawning new timelines during game session replay      Cache   Translate Page      
U.S. Patent No. 9,409,083: Spawning new timelines during game session replay
Issued August 9, 2017, to Amazon Technologies, Inc.
Priority date: June 27, 2014
 


 
Summary:
Traditionally, to restart a multiplayer session requires that all the players begin anew. For co-op multiplayer games, restarting means starting from a point designated by the level designers. Restarting from a designated point can become frustrating when fighting a challenging boss. U.S. Patent No. 9,409,083 (the '083 Patent) describes an alternative method. Every gaming session is recorded by a game using the '083 Patent system. If the players were to die, the game would use the record to show the players a replay of their last session. The players can watch the replay and see the exact moment where things went wrong. Players can then decide to "step in" and start a new session from that point, creating a new timeline or universe that diverges from the original game session. The new (altered) gaming session will create a new record from which players can repeat the process.
 
Abstract:
A game system in which game sessions involving one or more players may be recorded and saved as game records. A previously recorded game session may be selected and replayed. However, in addition to providing a static replay of the game session, the game system may allow one or more players to step into and assume control of respective game characters at any point during the replay of the game session. When a player steps into and takes control of game a character during the playback, a new timeline is spawned from the original timeline with potentially different outcomes, and a new game record corresponding to the new timeline is generated and stored. 
 
Illustrative Claim:
1. A system, comprising; one or more computing devices configured to implement a game system configured to: store game records comprising previously played game sessions, each game session involving one or more game characters acting within a game universe along a game session timeline; receive selection input from one of one or more client devices, said selection input selecting one of the stored game records for playback; begin playback of the game session as recorded in the selected game record to at least one client device; receive game input from a game client instance on one of the one or more client devices, said game input causing an action by one of the one or more game characters within the game universe; and in response to said game input, spawn a new game session timeline from the game session timeline as recorded in the selected game record and generate a new game record for the new game session timeline.

Researched By: Andrew F. Thomas


          The Power of Edge Cloud Compute to Boost Your Bottom Line      Cache   Translate Page      
By Jeff Gowan If you’re at SDN NFV World Congress in The Hague this week, this is why you need to visit Wind River (booth C7). Understanding the role of edge cloud computing in the future of telecommunications is a...
          Комментарий к записи Чё почём: сколько стоит жить на Бали (Mobile Computing)      Cache   Translate Page      
<strong>Mobile Computing</strong> [...]always a large fan of linking to bloggers that I adore but do not get lots of link love from[...]
          How To Overcome BIOS Whitelist Limitations Regarding Laptop/Notebook/Tablet/Netbook Wireless And Cellular Adapters      Cache   Translate Page      
Due to government regulatory and cellular carrier considerations, portable computing devices are FCC approved only with certain model wireless adapters, cellular included. This is done by a BIOS...
          Curious Events Day Shortbread      Cache   Translate Page      
That proves it!
PC hardware and computing

Gigabyte Aorus P850W gold power supply review @ PC Perspective
Element Gaming 27" QHD 144-Hz 1-ms gaming monitor review @ bit-tech
Seagate Fast SSD 1TB review @ Guru3D
Gigabyte X399 Aorus Xtreme TR4 motherboard review @ HardOCP
MSI GeForce RTX 2080 Ti Duke 11G OC review @ Hexus
Acer Swift 3 laptop review: affordable and accelerated with Optane @ HotHardware
Cooler Master Masterwatt Lite 600W 230V review @ JonnyGuru
be quiet! Dark Rock Pro 4 review – it's a BEAST! @ KitGuru
HyperX Savage EXO SSD external portable drive review @ Legit Reviews

Read more...


          Future demand Report on EHealth Market worth 132.35 Billion USD by 2023: global Industry Analysis, Size, Share, Growth, Trends, and Forecast 2018 – 2023 by IBM, Apple, McKinsey & Co., Motion Computing Inc.,Epocrates Inc., Telecare Corp., Proteus Digital      Cache   Translate Page      
Future demand Report on EHealth Market worth 132.35 Billion USD by 2023: global Industry Analysis, Size, Share, Growth, Trends, and Forecast 2018 – 2023 by IBM, Apple, McKinsey & Co., Motion Computing Inc.,Epocrates Inc., Telecare Corp., Proteus Digital An effective and carefully thought out plan of action for any company starts from a good market research. A new market research report, titled “EHealth Market” has been encompassed to our depository. One of the foremost factors driving the expansion

          IBM ThinkPad Power Series 850      Cache   Translate Page      

So I learned something new today. Back in the early and mid-90s, IBM tried to build a PC-like platform and ecosystem around its PowerPC processor. They called it the PowerPC Reference Platform, or PReP, and with it, you could build what were effectively PC clones with PowerPC processors, ready to run a number of operating systems, including AIX, Windows NT, OS/2, and Apple's failed Taligent project. None of this is news to me.

What is news to me, however, is that aside from a number of desktop PReP machines, IBM also developed and sold a number of PReP laptops under the ThinkPad brand.

Sometime in 1994, IBM started working on a prototype mobile system named Woodfield and designated as type 6020. Very little is known about this system; it was never officially announced or sold. On June 19, 1995, IBM announced the ThinkPad 850 and 820 (announcement letters 195-178 and 195-179, respectively) with a planned availability date of July 24, 1995. The ThinkPad 820 designation was type 6040, code name Wiltwick; the 850 was type 6042, code name Woodfield Prime. The ThinkPads 820/850 were to be available with no software or with preloaded Windows NT 3.51 or AIX 4.1.3. OS/2 was to come at some unspecified later date, and Solaris 2.5.1 support was announced in February 1996. The ThinkPad 850 type 6042 came with 16 or 32 MB RAM, 540 or 810 MB hard disk, and 640×480 or 800×600 TFT display.

Definitely an interesting bit of computing history, and I'd love to get my hands on a working model - they pop up on eBay from time to time.


          Network Development Engineer II - Amazon.com - Herndon, VA      Cache   Translate Page      
Job Description Do you like helping U.S. Intelligence Community agencies implement innovative cloud computing solutions and solve technical problems? Would...
From Amazon.com - Tue, 11 Sep 2018 19:23:37 GMT - View all Herndon, VA jobs
          Field Application Engineer (GPU) - Seattle - 56925 - Advanced Micro Devices, Inc. - Bellevue, WA      Cache   Translate Page      
Solutions Architects help AMD drive a new era of computing into the datacenter by engaging with key end users and independent software partners to demonstrate...
From Advanced Micro Devices, Inc. - Thu, 28 Jun 2018 07:32:28 GMT - View all Bellevue, WA jobs
          Google Drops Out of Pentagon's $10 Billion Cloud Competition      Cache   Translate Page      
Alphabet Inc.’s Google has decided not to compete for the Pentagon’s cloud-computing con
          Credit & Collections Associate      Cache   Translate Page      
MA-Bedford, From test equipment to IT products, professional services and OEM/embedded computing, Continental Resources, Inc. (ConRes) provides high technology solutions and support to business, government and academia. Combining 50 years of high tech know-how and financial stability, ConRes is a low-risk option for organizations seeking to strengthen the ROI on their technology investments. We are currently
          Salesforce Solution Architect - Silverline Jobs - Casper, WY      Cache   Translate Page      
Company Overview: Do you want to be part of a fast-paced environment, supporting the growth of cutting edge technology in cloud computing? Silverline...
From Silverline Jobs - Wed, 05 Sep 2018 06:21:23 GMT - View all Casper, WY jobs
          Cloud Computing in Government Market Industry Global Size, Share, Trend and Forecast 2018-2023      Cache   Translate Page      
Global Cloud Computing in Government Market 2018-2023 Cloud computing is the use of computing resources where systems are connected by public or private networks to offer scalable infrastructure for applications and file storage. It offers a pool of resources that includes data storage, specified applications, and networks and computer processing power. Across regions, governments and […]
          Senior Director of AWS Alliances - Snowflake Computing - Alwal, Hyderabad, Telangana      Cache   Translate Page      
Develop and manage Snowflake's relationship with our Cloud Alliances (Microsoft, Amazon, Google, Tableau, Looker, MicroStrategy, Informatica, Talend and others...
From Snowflake Computing - Wed, 03 Oct 2018 22:11:40 GMT - View all Alwal, Hyderabad, Telangana jobs
          Director of Google Cloud Alliances - Snowflake Computing - Alwal, Hyderabad, Telangana      Cache   Translate Page      
Develop and manage Snowflake's relationship with our Cloud Alliances (Microsoft, Amazon, Google, Tableau, Looker, MicroStrategy, Informatica, Talend and others...
From Snowflake Computing - Wed, 03 Oct 2018 22:11:40 GMT - View all Alwal, Hyderabad, Telangana jobs
          Technical Account Manager - Snowflake Computing - Alwal, Hyderabad, Telangana      Cache   Translate Page      
Amazon AWS, Microsoft Azure, OpenStack). Snowflake’s mission is to enable every organization to be data-driven with instant elasticity, secure data sharing and...
From Snowflake Computing - Tue, 11 Sep 2018 22:11:33 GMT - View all Alwal, Hyderabad, Telangana jobs
          Sr. Solution Architect - Snowflake Computing - Alwal, Hyderabad, Telangana      Cache   Translate Page      
Amazon AWS, Microsoft Azure, OpenStack, etc.). Snowflake’s mission is to enable every organization to be data-driven with instant elasticity, secure data...
From Snowflake Computing - Tue, 11 Sep 2018 22:11:32 GMT - View all Alwal, Hyderabad, Telangana jobs
          Partner Solutions Architect - Snowflake Computing - Alwal, Hyderabad, Telangana      Cache   Translate Page      
Amazon AWS, Microsoft Azure, OpenStack, etc.). Snowflake’s mission is to enable every organization to be data-driven with instant elasticity, secure data...
From Snowflake Computing - Fri, 31 Aug 2018 04:11:36 GMT - View all Alwal, Hyderabad, Telangana jobs
          Senior Manager of Cloud Alliances - Snowflake Computing - Alwal, Hyderabad, Telangana      Cache   Translate Page      
Develop and manage Snowflake's relationship with our Cloud Alliances (Microsoft, Amazon, Google, Tableau, Looker, MicroStrategy, Informatica, Talend and others...
From Snowflake Computing - Thu, 23 Aug 2018 22:11:25 GMT - View all Alwal, Hyderabad, Telangana jobs
          Purchasing Student Assistant (LCCC Federal Workstudy Eligible Students Only) - Laramie County Community College - Cheyenne, WY      Cache   Translate Page      
Knowledge and ability with personal computing applications – specifically Microsoft Office Suite (e.g., Word, Excel, Outlook, and PowerPoint), Adobe products (e... $8.92 an hour
From Laramie County Community College - Tue, 09 Oct 2018 06:38:12 GMT - View all Cheyenne, WY jobs
          Adjunct Instructor, Fire Science, Hiring Pool - Laramie County Community College - Cheyenne, WY      Cache   Translate Page      
Proficient skill with use of personal computing applications – specifically Microsoft Office Suite (e.g., Word, Excel, Outlook, and PowerPoint), Adobe products...
From Laramie County Community College - Sat, 06 Oct 2018 06:38:12 GMT - View all Cheyenne, WY jobs
          Student Assistant, Life Enrichment (LCCC Federal Workstudy Eligible Students Only) - Laramie County Community College - Cheyenne, WY      Cache   Translate Page      
Knowledge and ability with personal computing applications – specifically Microsoft Office Suite (e.g., Word, Excel, Outlook, and PowerPoint), Adobe products (e... $8.92 an hour
From Laramie County Community College - Tue, 25 Sep 2018 18:37:30 GMT - View all Cheyenne, WY jobs
          Student Assistant, Wind Energy & Integrated Systems Technology (Work Study Eligible LCCC Students Only) - Laramie County Community College - Cheyenne, WY      Cache   Translate Page      
Knowledge and ability with personal computing applications – specifically Microsoft Office Suite (e.g., Word, Excel, Outlook, and PowerPoint), Adobe products (e... $8.92 an hour
From Laramie County Community College - Mon, 24 Sep 2018 18:37:28 GMT - View all Cheyenne, WY jobs
          Huawei unveils chips to boost cloud computing at Shanghai conference      Cache   Translate Page      
China's Huawei, the world's largest telecom-equipment maker, unveiled two new artificial intelligence powered chips to boost its cloud computing business at the company's annual global partners' conference, Huawei Connect, on Wednesday.

          Senior Software Development Engineer - Distributed Computing Services (Hex) - Amazon.com - Seattle, WA      Cache   Translate Page      
Knowledge and experience with machine learning technologies. We enable Amazon’s internal developers to improve time-to-market by allowing them to simply launch...
From Amazon.com - Thu, 26 Jul 2018 19:20:25 GMT - View all Seattle, WA jobs
          10/10/2018: News: Google out of race for Pentagon’s $10b deal      Cache   Translate Page      
Alphabet Inc.’s Google has decided not to compete for the Pentagon’s cloud-computing contract valued at as much as $10 billion (Dh36.73 billion), saying the project may conflict with its corporate values. The project, known as the Joint Enterprise...
          AWS SME/Architect      Cache   Translate Page      
TX-Plano, Plano, Texas Skills : • Looking For AWS SME/Architect • Other cloud knowledge including Cloud, Azure or VM ware Cloud will be an advantage. • Track record of implementing AWS services in a variety of distributed computing, enterprise environments Description : Location: Plano TX/ Marquette MI Job Title: AWS SME Duration: 06 to 12+ months (High possibilities of extension)
           Microsoft's new cloud service streams Xbox One games to your phone       Cache   Translate Page      

Microsoft has announced Project xCloud, a game-streaming service that lets users play Xbox One games on ...#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000

Hot on the heels of Google's announcement last week of Project Stream, Microsoft has now revealed its own plans for a video game streaming service. Dubbed Project xCloud, the service would allow players to jump into an Xbox One game on basically any device – be it a TV, PC, or even a smartphone.

.. Continue Reading Microsoft's new cloud service streams Xbox One games to your phone

Category: Games

Tags:
          Global Fog Computing Market By Technology Trends with Top Key Players: Cisco, IBM, Intel, Dell, ARM, ADLINK, AppFog, Cradlepoint, AT&T, Foghorn, Nebbiolo, GE Digital, Microsoft, VIMOC, Crosser Technologies, Fujitsu, Hitachi Data Systems, Nebbiolo Technolo      Cache   Translate Page      
Global Fog Computing Market By Technology Trends with Top Key Players: Cisco, IBM, Intel, Dell, ARM, ADLINK, AppFog, Cradlepoint, AT&T, Foghorn, Nebbiolo, GE Digital, Microsoft, VIMOC, Crosser Technologies, Fujitsu, Hitachi Data Systems, Nebbiolo Technolo Fog Computing Market growth is driven by increasing demand of cloud computing services across the globe. The distributed and parallel computing has significantly evolved over the past fifty years from mainframes to vector era to modern computing paradigm. Despite, the

          Brydge's G-Type keyboard will make the Pixel Slate more of a conventional laptop      Cache   Translate Page      

Alongside the Pixel 3 and Pixel 3 XL, the Pixel Slate was announced today. It's a big, expensive, 12-inch tablet with an optional first-party keyboard cover that turns it into a sort of half-measure laptop. For those seeking a more traditional computing experience (but not enough so to buy a traditional computer), Brydge has a product that may interest you: the G-Type keyboard.

 

The G-Type is a full-size backlit keyboard/track pad combo that snaps onto the bottom of the Slate.

Read More

Brydge's G-Type keyboard will make the Pixel Slate more of a conventional laptop was written by the awesome team at Android Police.


          Hello World #6      Cache   Translate Page      
Cover
Author: Varios
Year: 2018
Publisher: Autoedición
Pages: 100
Size: 22.27 Mbs (pdf)
Language: english

Hello World issue 6 brings together a collection of experts, who address the challenges of ethics, and how that affects and underpins the teaching of computer science. They share ideas, thoughts and experiences, and look at how to inspire students, whilst grounding them in an ethical ethos.
  • Bringing Minecraft – and a bicycle! – to the classroom
  • The Hitchhiker’s Guide to KS3 computing
  • Using Escape Rooms to improve problem-solving skills
  • What’s turning girls off computer science?



          Microsoft Azure      Cache   Translate Page      

businessexpertsgulf posted a photo:

Microsoft Azure

Get ahead in the business with all creativity and innovation at its peak. Get in touch with the leading experts in the computing world, Business Experts Gulf. We at Business Experts Gulf provide our customers with smart solutions in the world of the database, computing, analytics, networking, storage and much more. Microsoft Azure is one such cloud service with impressive storage size.
To get Microsoft Azure Solutions in Abu Dhabi or Microsoft Azure Solutions in Dubai, give us a call at +97144214909.


          Cognitive Computing Technology Market to see Stunning Growth with key players Google, IBM, Microsoft      Cache   Translate Page      
Cognitive Computing Technology Market to see Stunning Growth with key players Google, IBM, Microsoft HTF MI recently introduced Global Cognitive Computing Technology Market study with in-depth overview, describing about the Product / Industry Scope and elaborates market outlook and status to 2023. The market Study is segmented by key regions which is accelerating the

          Create a nice letterhead with logo and contact info      Cache   Translate Page      
I want a decent looking letterhead created using Microsoft Word 2016. 1) I want it to have margins set to "0.25 so that I can print it on my printer instead of needing a professional printer to print them. 2) I want it to include our phone/email contact information (available on the footer of the page linked below) Link to the website: http://www.enigmasupercomputing.com/temp/freelancer/8/website.html Link to the black logo: http://www.enigmasupercomputing.com/temp/freelancer/8/blacklogo.png Link to the white logo: http://www.enigmasupercomputing.com/temp/freelancer/8/whitelogo.png (Prize: 50)
          Solving Partial Differential Equation Applications with PDE2D      Cache   Translate Page      

 

Solve engineering and scientific partial differential equation applications using the PDE2D software developed by the author 

Solving Partial Differential Equation Applications with PDE2D derives and solves a range of ordinary and partial differential equation (PDE) applications. This book describes an easy-to-use, general purpose, and time-tested PDE solver developed by the author that can be applied to a wide variety of science and engineering problems



Read More...

          These Four Technologies Are Finally Ready To Bring Efficiency To The Oil Field      Cache   Translate Page      
Big data, artificial intelligence, cloud computing, and mobile technologies are finally here to help close the inefficiency gap in the oil and gas sector.
          How Linux Is Changing The Face Of End-User Computing      Cache   Translate Page      
Get ready for the EUC status quo to change.
          Google Refuses to Bid for $10 Billion Pentagon Cloud Computing Contract Citing 'AI Principles'      Cache   Translate Page      
Google will reportedly not be bidding on the JEDI contract, a massive Department of Defense cloud computing contract worth $10 billion, with the company citing its "A.I. Principles" for its refusal to bid.
          Full Time Staff Pharmacist - Prince Albert, Saskatchewan - Loblaw Companies Limited - Prince Albert, SK      Cache   Translate Page      
Bachelor of Science, Pharmacy and a Class A Pharmacists license a must. Strong personal computing skills, as well as knowledge of KROLL Pharmacy Computer system...
From Loblaw Companies Limited - Tue, 21 Aug 2018 22:11:17 GMT - View all Prince Albert, SK jobs
          Brydge's G-Type keyboard will make the Pixel Slate more of a conventional laptop      Cache   Translate Page      

Alongside the Pixel 3 and Pixel 3 XL, the Pixel Slate was announced today. It's a big, expensive, 12-inch tablet with an optional first-party keyboard cover that turns it into a sort of half-measure laptop. For those seeking a more traditional computing experience (but not enough so to buy a traditional computer), Brydge has a product that may interest you: the G-Type keyboard.

 

The G-Type is a full-size backlit keyboard/track pad combo that snaps onto the bottom of the Slate.

Read More

Brydge's G-Type keyboard will make the Pixel Slate more of a conventional laptop was written by the awesome team at Android Police.


          Digital Business Analyst (m/f) in Neu-Isenburg      Cache   Translate Page      
Jobangebot: **THE FUTURE IS YOURS. WE HAVE THE PERSPECTIVES.**Arrow Electronics, a Fortune 150 company with 2016 sales of $23.8 billion, is a global provider of products, services and solutions to industrial and commercial users of electronic components and enterprise computing solutions. Arrow serves as a supply channel partner for over 125,000 original equipment manufacturers, contract manufacturers and commercial customers through a global network of more than 466 locations serving over 90 countries with more than 18,700 employees worldwide. Arrow provides specialized services and expertise across the product lifecycle. Arrow does ... 0 Kommentare, 62 mal gelesen.
          Craft Beer Account Manager/Outside Sales Rep - Avitus Group - Sheridan, WY      Cache   Translate Page      
Proficiency with Microsoft Office products, cloud based computing and databases, mobile applications and other emerging technologies affecting Black Tooth...
From Avitus Group - Thu, 27 Sep 2018 08:14:23 GMT - View all Sheridan, WY jobs
          Editing the Internet’s Second Screen      Cache   Translate Page      

The great social media cleanup of the past two years hasn’t seemed to leave it much cleaner. As some of the most powerful companies in the world have struggled to ferret out viral false news, harassers, conspiracy theories, and foreign agents, Congress and the American public have begun to lose faith in internet platforms like Facebook, YouTube, Google, and Twitter. But one social website—the web’s fifth-largest site, by some metrics—has dodged the brunt of the ire: Wikipedia.

One might think Wikipedia would be a top target for those peddling conspiracy theories and counterfactual narratives. Yet somehow, the massive online encyclopedia has managed to retain its reputation for reliability, at least generally speaking. And that’s thanks to a sprawling online network of editors who work for free to pull fact from fiction in crafting the articles that provide the answers that float to the top of Google search queries.

Of course, Wikipedia has its problems. The most glaring may be that the editor community is overwhelmingly male, and likely white too. And that leads to erasures and omissions that reflect the worldview and concerns of the editor community. For instance, when Canadian physicist Donna Strickland won the Nobel Prize, it turned out Wikipedia didn’t have an entry about her. One had apparently been submitted prior to her winning the award, but the edit community apparently didn’t consider her sufficiently noteworthy to warrant an entry.

To talk more about how Wikipedia, a volunteer-run project, manages to be a sort of second screen for the entire internet, and to delve into some of the problems the community is facing, we spoke with the Wikimedia Foundation’s executive director, Katherine Maher, for Slate’s tech podcast If Then. An expert on technology policy across the globe, Maher discussed the role Wikipedia plays in the current debates about healthy online platforms and what the community is doing to diversify its contributors.

Read or listen to our conversation below, or get the show via Apple PodcastsOvercast, SpotifyStitcher, or Google Play.

April Glaser: Wikipedia’s the fifth-most-popular website on the internet, according to Alexa Ratings from earlier this year. And that popularity is in part due to the fact that the most popular website on the internet, Google, regularly directs people to Wikipedia at the top of its search pages. It’s a symbiotic relationship where people search Google for answers and Wikipedia is the answer that they get. More recently, YouTube and Google have begun linking to Wikipedia to provide info on topics that tend to attract false news and conspiratorial theories in their efforts to be a more reliable source of information. According to Wikipedia itself, there are over 5.7 million articles on the English version of the site thanks to nearly 35 million users, of whom fewer than 200,000 are considered active editors. That means about 200,000 people make at least one edit a month. There are 300 active Wikipedias in different languages across the world, 48 million articles written worldwide. And this whole project is made possible thanks to volunteers who write the entries and thanks to grants and donations from the readers and the editors who use the site. I want to start by discussing the phenomenon that is Wikipedia, and that it actually seems to be largely correct. Is that correct? Am I correct about that?

Katherine Maher: Yeah. There have been numerous different studies that have shown that Wikipedia is on average as correct as any traditional encyclopedia would be, in part simply because of the volume of articles that we have—that when you do have inaccuracies they tend to be very few and far between. But also they tend to get corrected really quickly, and so as you take a look across the sites, the majority of content is correct at any given time.

Glaser: So if I were to go on there and change the birthday of President Obama, that would get corrected really quickly?

You wouldn’t be able to change the birthday of President Obama because you probably do not have enough of an edit-contribution history to be able to touch an article that is as highly scrutinized as something like Obama. So anytime we have articles that are either of top interest to folks at any given time or are in the news in any given moment, our editors take them very seriously and will protect them to make sure they don’t go ahead and get vandalized. So it would be tough to change his birthday.

Glaser: Who is editing Wikipedia? It seems that everyone wants to use it, but not everyone wants to edit it. And my understanding is that something like 90 percent of the editors are male. I don’t know the racial background of editors, but I think it’s safe to say that most are probably white or come from some kind of white-collar background. So in addition to who’s editing Wikipedia, I’d like to know also the consequences of homogeneity in the edit community.

We don’t actually know much of the background of Wikipedia editors either. We have pretty strict privacy policies. In fact, you don’t need to give us really any information to edit Wikipedia. You don’t even need an account—you can just do it anonymously. And over the years, we’ve tried different ways of surveying and sampling editors to get a better sense. I think our best-case scenario is about 20 percent of the editors identify as female, but worst case would be closer to about 10. And then in terms of ethnic and racial makeup, obviously that really depends based on what Wikipedia we’re talking about. Our Indic-language Wikipedias are primarily going to be edited by people from probably South Asia. But it is true that we tend to assume that folks editing Wikipedia have what we think of as disposable time, and disposable time tends to correlate with higher socio-economic status. How does this play out for Wikipedia? It means that we tend to have biases that reflect the composition of our editors, and I will say that those biases also tend to reflect the broader world around us.

So we talk about ourselves as a mirror held up to the world. Wikipedia is a tertiary source that is based on secondary sources, and when we go to create articles on Wikipedia, we’re very reliant on what’s already been published and what exists in the world. And so if there is a dearth of secondary sources about female scientists or African novelists, it’s going to be very hard for us to then create articles that reflect those individuals on Wikipedia itself.

Glaser: When a new public figure comes on the scene, everyone jumps to visit Wikipedia, it becomes a second screen, and a bunch of editors also jump in to get their version of the truth up there. I wrote about this for Wired a couple years ago when Merrick Garland was nominated [for the Supreme Court]. The traffic of his page soared because nobody really knew who he was unless you’re in the court scene. And then behind the scenes, the editors fought over whether to call him a judicial moderate or a strong liberal. And with so many people coming to Wikipedia for information on Garland, these descriptions really matter. How do Wikipedia editors grapple with attempts to insert their own ideological leanings?

I think that this is one of those things where the more people who have an eye on the Wikipedia article, the more accurate and neutral it tends to be. Don’t take my word for it. There’s been lots of research on this subject. The more volume of traffic, the more likely it is that someone’s going to make an edit, the more editors who are involved in the conversation, the more compact and neutral and accurate the content is going to be, the more citations, the less verbose or adjectival a description is going to be. And so it’s likely in the case of Garland—and I’m not familiar with that particular article and how that moment in time affected its composition—but it’s likely in that case, or in the case of anybody who’s under the spotlight, that if they couldn’t decide on how to describe him, they would either say, “Some people describe as ‘citation, citation, citation.’ ‘Others describe as the opposite, citation, citation, citation.’ ” Or they would not make a determination about how that description actually plays out.

And so Wikipedians will tend to present information and ask you instead to draw your conclusions rather than draw their own inferences or conclusions on topics that are difficult to be neutral around.

Will Oremus: And a lot of that discussion happens on what’s called a talk page.

That’s right. It’s almost like the newsroom behind any Wikipedia article. One of the things we like to say is, “If you’re curious about what a talk page is, go to your hometown and look at the fights that people are having about the history of the town, the town hall, local celebrities, things like this.” Because it can give you the best and most immediate understanding of how talk pages actually work. There are places where Wikipedia editors take the conversation, not offline. It all happens in public. It’s just behind the curtain. Anyone can click on the talk tab and take a look at it. Anyone can contribute to that discussion, but it’s where these differences of opinion get hammered out while articles might be paused for editing, or while folks are having robust difficult conversations about how to frame or present something or whether something should be included in an article at all.

Oremus: You talked about how Wikipedia is better when there are more people involved in this editing process. That makes a lot of sense. How is the health of the Wikipedia editor community these days? In what direction is it trending? Is it getting livelier and healthier, or are the ranks thinning out? Is there a crisis of Wikipedia editorship? How’s it doing?

There is no crisis of Wikipedia editorship. Our editors are alive and well. No, I think that there was this interesting moment in time where people were very concerned about the trajectory of editorship, and it happened around, I want to say, 2010, where Wikipedia grew very rapidly in popularity between 2001 and 2010, and then what ended up happening was a lot of that original content was filled out, at least in some of the major languages, and we started to see a decline in casual editing. But what is happening is that our numbers have really stabilized to the point where we have about a quarter-million editors every single month, and about 80,000 of those come back month on month on month and make significant contributions to the site. So overall our editor health is really good. What we would love to see is an increased diversification of that, and we’d love to see some of the languages that are perhaps not as robust as they should be relative to the size of a million speakers and the like. We’d love to see some of that grow.

So for us, it’s about maintaining the health of our current editing community but then also thinking about how do we reach people for whom we’re not there yet in their language, in their geography, or representing their sense of identity.

Glaser: I imagine if you come from a community that is not well represented in the editor community that you may be prone to harassment or feel somewhat ostracized in these tightknit talk pages where a lot of difficult conversations happen. So I’m curious about harassment on Wikipedia. Have we seen coordinated attempts to insert ideological bias or to harass people to the point where they stop maintaining certain pages?

Yeah. Absolutely. These things happen, and happen in places that you wouldn’t necessarily expect. I think that the instances of extreme harassment—the kind that you see on some of the other social platforms—we see a lot less of that because Wikipedia has rules around civility that determine whether you can participate as an editor, and if you violate those rules you will get blocked and banned by our community members. I think the bigger issue for us tends to really focus on tonality, so we’ve done some interesting research around conversational failure, and it turns out that if you start a sentence in dialogue with another editor with the word please, it actually is a really high predictor that that conversation is going to fail. Because it tends to be followed by “Please stop doing that” or “Please don’t do something that you don’t know anything about,” and so please is actually not an indicator of a necessarily positive outcome.

So what we’re trying to understand is in a community and in an ecosystem where harassment and unfriendly spaces look very different than harassment on, say, the comment section of YouTube or in a Twitter channel. What can we do to facilitate more civil and respectful conversations when we can’t necessarily automate to be able to understand because of the use of bad words, for example. And so it’s really about how we create a culture of friendly interaction as opposed to certain instances of harassment, ’cause we just don’t have that problem in quite the same way, which is not to say it doesn’t exist. I do want to be really careful to acknowledge that we have had instances of people who’ve been harassed on Wikipedia. It tends to be somebody gets a bone between their teeth and really goes after an editor or a group of editors. The times that we’ve seen these things happen in a targeted way have tended to be around things that you would expect to be controversial. We were one of the sites to be enveloped in the whole Gamergate controversy, and we absolutely saw people really go head-to-head over what that particular discussion meant, and we had a number of Wikipedia editors on all sides of the conversation who found themselves sanctioned for the way that they participated in those conversations.

Glaser: I write a lot about harassment on social media, and obviously Wikipedia is a social place where people can interact. We do not hear as much about creating a culture where people will be less prone to harass each other. It’s more about moderation, so this is really interesting.

We don’t do moderation in the same way that other social platforms do. We don’t have armies of folks sitting offshore going through content posting trying to determine if it’s harassing language or if it violates our terms of service. Our community, because it is truly a community, engages in that conversation directly, and then they have modes and means of policies to refer conversations for review and sanction as appropriate. I think that harassment is a problem, but for us it is a relatively small problem relative to the challenge of how do you create a truly inclusive space for folks when we come from a certain culture, and we come from a certain demographic background. How do you open that up so that it becomes a place where more people feel welcome?

Oremus: That’s so interesting to hear you say you don’t have moderation. I understand what you mean: You mean that Wikipedia, or the Wikimedia Foundation, isn’t going in and moderating what the editors can say or what people can add to an article. But in another sense, the whole project of Wikipedia is a project of moderation, where people are moderating what each other can say and regulating each other’s speech in various ways. It reminds me, you talked about the social platforms, and it reminds me of the difficulties that the big social networks are having right now with misinformation, conspiracy theories, fake news, all that sort of thing. And they talk about, Well, we can’t be an arbiter of truth. Or maybe in Facebook’s case: We’re trying, but it’s really hard to be an arbiter of truth. Wikipedia is at its core an arbiter of truth—that’s what you guys do. So why do you think they’re having such a tough time with it, and would you have any advice for the people running those platforms?

I think one thing that’s really different from us is, from the beginning, it’s been a community-driven project. We don’t set editorial policies for Wikipedia. The community sets that, and the community has evolved over time with these editorial policies in order to assess information quality and also the standards that they want in their spaces, to tie it back to the conversation around friendly spaces and contribution. But specifically for content moderation there are a couple of really core policies that drive the way that Wikipedia articles are created, and I think the reason that they are effective is that they’re clear, there are only three of them, they’re fairly easy to understand, there are tons of examples for how they work, there are lots of different eyeballs that focus on insuring that those policies are upheld, and it all happens in the open. The polices around accuracy of information, it requires that we site back to what we call reliable sources. It means that people can’t just put out fringe theories based on what their interests are. They have to find citations and information. It has to be peer-reviewed, or published, or have some editorial scrutiny.

These are the policies that have created a sense of accuracy and accountability on Wikipedia, and accountability not just for the editors but accountability to the public who reads this content. And I think that’s just so completely different from the way these other platforms work. Another thing that I point to is we don’t have divergent forking narratives or feeds that you sign up for. When you come to a Wikipedia article, you’re looking at the exact same thing whether you’re sitting on the other side of the continent from me or if you’re sitting in the next office over. That doesn’t afford us the space to shift narratives based on what your interest is or what an algorithm suggests that you might like. We have to be open and publicly accountable for what is published no matter what your perspective or viewpoint actually is.

It’s funny you mentioned, or refer to, Wikipedia as an arbiter of truth. We actually don’t agree with that characterization. What we would say is that Wikipedia reflects knowledge as it exists at any given moment in time. That is, knowledge is constantly being constructed, and it’s constantly being deconstructed. And so edits are made to Wikipedia, content is removed from Wikipedia, knowledge changes dramatically over time, and what Wikipedia offers is just an aggregate understanding of what we know about a topic at any given moment based on what’s been published or what common consensus says. I always use the example of Copernicus or Galileo. However many hundreds of years ago, had they written an article, we’d have some really strong articles about how the sun revolves around the Earth. But we, as hopefully humanity, have learned a lot more about our solar system, and now we know that the Earth revolves around the sun. So knowledge is a living thing, but it’s not necessarily about trying to get to some understanding of truth. It’s more just about representation about what we can all agree on at any point in time.

Where I start to find this really powerful is less on things that are settled, like heliocentricity versus geocentricism, but more about how our history—and understanding of culture, and understanding of politics, and understanding of representation—Is constantly evolving. Wikipedia’s edited 350 times a minute, which essentially means that every minute there are 350 opportunities to challenge what it is that we know, and how it is that it’s been assembled, and who has contributed to that knowledge base, and whose voices are included, and how it is that we might change that over time. So I think of Wikipedia not as an arbiter of truth but really a living contestation for how knowledge is formed and created, which is why we always say, “Don’t trust Wikipedia. Read it with a critical eye. Check the citations. And if you see something, contribute to it.” Because the way that we form knowledge is by contributing to it together and building on what’s come before.

Glaser: It’s true that there are all of these ways to gain social clout and to gain social trust in the Wikipedia community, but sometimes people edit Wikipedia anonymously, or it’s their first time, and sometimes it’s funny. And it’s something that you guys call vandalism. And I want to ask about that, because I saw this meme going around a few years ago—I think it was an actual screenshot from Wikipedia, and it was edited to say that Charlie Sheen was half-man, half-cocaine. And it was changed quickly back, I’m sure, but I think this happens a lot, and I’m curious: How does Wikipedia contend with vandalism, and is there any particularly funny one that comes to mind?

Just the other day, somebody tweeted about the fact that there’s a Wikipedia article that’s a list of fictional states, and nestled in there was Wyoming, a fictional state made up for tourism revenue by Idaho. I thought that was funny. As soon as I retweeted it, it was gone. But I think that often we see these sorts of vandalism. I think that they are funny. I also know that they can be quite annoying for our Wikipedia editors. I like to think of them as ways of demonstrating that Wikipedia is a living project and as a reminder to folks that you can go ahead and get in there and edit. We actually have more Wikipedians than we’d like to admit who first started because of vandalism. They came in to mess with the site, and they realized, “Oh, that vandalism didn’t stay up for very long. I’m curious how that works,” and then get involved in that way. In general, there are different ways that vandalism works. I don’t think this will surprise anyone, but some of the highest volume of vandalism tends to happen in school hours, and it tends to be bad words.

But we have bots that scrub the site from end to end and remove instances of poop that shouldn’t belong in a sentence and the like. The other forms of vandalism tend to get reverted very quickly. I think Congress is notorious for vandalizing Wikipedia, in fact I think it’s blocked this week; you can’t edit with a congressional IP this week because people abuse their privileges. And we’ve seen that happen. Wikipedia editors tend to keep a very close eye on what we call our recent-changes feed, and there are folks who consider themselves just to be vandalism patrollers who are always looking for things that are a little suspicious. We give this a boost by having machine learning systems that are able to identify what is likely a good edit or a bad edit and help editors triage in order to keep pace with the 350 edits a minute. Because it’s a pretty huge volume of activity on the sites at any given time.

Glaser: With Wikipedia now serving as a fact-checker for YouTube’s most polarizing conspiracy-theory videos, is there a fear that people will see these videos about how climate change isn’t real and then click on the Wikipedia link and edit the article to incorporate the counterfactual information they just saw?

This was something that we were concerned about. Obviously any time a major platform turns the worst of the internet against our sites, we worry about what the implications are for our editing community. Our editing community actually took it all in stride. They said, “We’ve got means by which we monitor these pages. We know how to deal with vandalism. We’ve been doing this for 17 years. We’ll let you know when it’s a problem.” And we went back and said pretty much the same thing to YouTube. We said, “We’ll let you know when it’s a problem, and if it does become a problem we’d appreciate some support around this. But overall it seems as though it’s something that is working out.” Our mission overall is to get knowledge out there and to be the correct place for information—to have it be as accurate as possible. And if it is a tool in the arsenal of insuring a more accurate and fact-based internet, then I think we’re probably all for it.

Glaser: It’s fascinating how the community is able to morph and absorb more responsibility as more people start to use the internet and as more large platforms start to rely, and continue to rely, on Wikipedia as a source of information.

I think what I would say there is that because it works in this instance, it doesn’t mean that we’re going to be the catchall for all of the worst bits of the internet. In reality, anytime that there is an intermediary layer between people who are reading Wikipedia content and where the content itself is created, we see that as a risk. Part of the promise of Wikipedia is that anybody anywhere can go in and check where does the information come from, when was it added, what’s the edit history, what’s the discussion on the talk page, where does the citation go, and so whenever there’s an intermediary layer that sits between our readers and our contributors, we view that as a breakdown of the trust and the promise model that Wikipedia offers in terms of accountability and transparency, but we also view it as a risk factor to the sites as a whole because of how Wikipedia works when people stop by to read it. Wikipedia works when a reader’s like, “Oh, I think that information isn’t accurate. That probably needs an update,” or “That probably could use a different citation.”

And so the volume of traffic to our sites is actually the way in which Wikipedia stays up to date and makes sure that our content is constantly expanding, and so if that information is being siphoned off and presented in different ways and in different places, that actually does create a risk for us. So I think there’s a tension between how do we make sure information’s available in the most useful ways, such as the referral back with the YouTube videos, but also making sure that information is not taken completely out of context and presented in a way that ultimately chokes off the way that Wikipedia works.

Oremus: You actually just answered part of the question that I was going to ask, which is: Part of the future of computing right now on the internet seems to be this move toward voice assistance. Whether it’s on a smart speaker, like an Amazon Echo or Google Home, or it’s Siri on your phone, or talking to the Google Assistant on your phone, for a lot of those, when you ask a question—when you ask Siri or Alexa or Google a question—the answer you get will be content from Wikipedia. So that’s a way that people are gonna be using Wikipedia more and more, presumably, but maybe not even know that they are using Wikipedia. Certainly not visit the site and maybe run into a fundraising appeal or get involved in that way. Is that a big concern for you going forward, and are you hopeful that donations from those big platforms … I saw that Amazon recently gave $1 million to the Wikimedia Foundation maybe partly for that reason.

Does that have to become more of your business model now if these platforms are going to be siphoning off your information or siloing your information in that way?

I think I have many thoughts and responses to your question. One thing to note is that there’s the immediate value that these platforms get out of having Wikipedia as a resource from which they can pull answers and information to provide to their users. But the other part that most people aren’t as aware of is that Wikipedia is also this massive computational resource for many different platforms in terms of the way that they’re developing machine learning, the way that they’re training their A.I assistants, in the way that they treat natural language processing. And so we view ourselves as a resource that should be supported by industry as a whole—not just because we create a transactional value to them, because Amazon or Siri or whatever can answer our question, but because we’ve actually created a tremendous resource just in terms of data modeling and support that these companies can go out and train and do advanced computational science around. And there is nobody who is contributing back because of the value we’ve created in that space.

The reason that we think that should engender long-term support is because we are essentially the commons as a resource for the entire internet that entire business models have been created around. And if you don’t actually support that commons, it’s not going to exist at some point, and that’s going to be really problematic for a business model that depends on its existence, particularly as companies are pushing into new and different markets. It’s increasingly the case that they’re looking to sites like Wikipedia, which have content that’s available in those local languages as a baseline to assess the market maturity, and whether people are using the open web, and whether they’re creating content in those languages. So overall supporting Wikipedia so that we’re out there and accessible to more people and accessible to more users in more languages, and so that our content is diverse and reflective of the entire world and not just North America or the male experience, is ultimately a good thing, not just for us, and not just for our readers, but for the internet as a whole.

In terms of what that support looks like, I think that it’s not just about monetary support. We are very proud of the fact that 85 percent of our donations come from small-dollar donations from individual users. The average donation is $15, and the remaining 15 percent tends to be more traditional foundation donations. We don’t want to be entirely beholden to large corporations giving us money, but we do feel as though having some sort of sustainable model of support, whether it is engineering support, or in-kind support, or just thinking about what the product decisions actually mean in terms of their implications for how people can contribute to and access Wikipedia, that’s the conversation that we want to be having with these different platforms. At the end of the day, we create a tremendous amount of value in the world, and we want to make sure that value is being recognized and being supported and sustained, because it’s very easy to make a series of decisions that in aggregate could really damage that value, and I don’t think anybody intentionally wants to hurt Wikipedia.

Glaser: No, Wikipedia has a tremendous amount of value for so many different parties. Can you tell us about efforts to expand Wikipedia in other languages? Also, what’s the second-biggest language after English? And is Wikipedia available in China?

So there are a whole host of Wikipedias that are smaller languages. They tend to be secondary languages within countries, or indigenous languages, or noncolonial languages, and we at the Wikimedia Foundation actually place a great deal of emphasis on supporting communities that are doing work in these languages. We have grants that are available to community members who are organizing and doing events around outreach and growth of smaller-language projects. We call them our emerging community projects. And the whole idea is that we don’t make a decision based on winners and losers on language. The fact that Spanish and German and English and French are enormous doesn’t mean that that is sufficient to cover the entire world. We want people to be able to access content in Zulu and in whatever the indigenous languages and identities are that they’re seeking information.

We know that’s actually critical to the way that cultures continue to live, the way that identities continue to live. There’s a whole example of Welsh Wikipedia where the national government of Wales has a Wikipedian in residence who is just there to make sure that Welsh continues to be a living thriving Wikipedia language in large part because they know that having Wikipedia exist in Welsh is actually a marker as to whether other internet services will index Welsh as a living digital language. And of course we can all understand that if your language goes away or doesn’t exist in a digitized form, your identity starts to go away too. So we’re really supportive of this. We think this is part of our cultural diversity in recognizing that the sum of all knowledge requires all sorts of different understandings of knowledge, all sorts of linguistic bases for knowledge.

Glaser: Is Wikipedia available in China?

Wikipedia is not currently available in China or in Turkey. But of course Wikipedia does continue to be built by Chinese speakers. We have Chinese speakers who are outside of China, like Taiwan and Hong Kong of course, but then other Chinese speakers including folks from mainland China who edit Wikipedia from outside of the country as well as from inside the country using circumvention technologies. So Wikipedia in Chinese is not as large, and we would like to see the relative number of Chinese speakers, but we remain optimistic that it will continue to be built and will be there for when and if China ever decides to unblock us. We would love that.


          Salesforce Senior Engagement Manager, Director - Silverline Jobs - Casper, WY      Cache   Translate Page      
Silverline is a Salesforce Platinum Cloud Alliance Partner focused on delivering robust business solutions leveraging cloud-computing platforms....
From Silverline Jobs - Fri, 28 Sep 2018 06:19:27 GMT - View all Casper, WY jobs
          Salesforce Senior Engagement Manager, Director - Silverline Jobs - Cheyenne, WY      Cache   Translate Page      
Silverline is a Salesforce Platinum Cloud Alliance Partner focused on delivering robust business solutions leveraging cloud-computing platforms....
From Silverline Jobs - Fri, 28 Sep 2018 06:19:27 GMT - View all Cheyenne, WY jobs
          Blend real and virtual audio with the Sennheiser Ambeo AR One      Cache   Translate Page      
Time to bring real sounds into the realm of spatial computing.
          EBS Data developer      Cache   Translate Page      
CO-Denver, *Not able to use 3rd Party Agencies* EBS Data Developer Our client is seeking an EBS Data Developer to join their team in Denver, CO. The selected Candidate should be passionate about automation and consulting, cloud computing, and customer satisfaction. Candidates will need to possess deep development / programming expertise, consulting experience and excel at both written and verbal communicatio
          Dept Chair/Head - Industrial Engineering - Clemson University - Freeman, SD      Cache   Translate Page      
The Department of Industrial Engineering, in the College of Engineering, Computing and Applied Sciences at Clemson University, is seeking applicants for its...
From Clemson University - Thu, 04 Oct 2018 20:09:51 GMT - View all Freeman, SD jobs
          Offer - Quick Heal 1-833-284-3444 Technical Support Number-For Installation Problems - USA      Cache   Translate Page      
Antivirus programming is a program that is proposed to see and take out infections from PCs. These projects are smart to examine your PC's hard drive and separate documents that are mean. This creates shelter programming for buyers, distributed computing conditions, servers and little and medium undertakings. This Antivirus Pro Keeps your machine sheltered, secure, ensure by pernicious infection assault. With its lmproved Virus Scan Engine, Quick Heal AntiVirus Pro outputs your PC painstakingly without development it dormant. Contact on Quick Heal Technical Support Number Security Advisor The Safe shelter Advisor manage you about settings that would bonus be able to up the as a rule security of your Smartphone. We guarantee you that the majority of your subtle elements are secure at us while as long as online specialized keep up at the season of an answer of the issue in your framework. Streak Drive Protection Best antivirus mechanically filters outside storage room gadgets. Shields USB drives from autorun contamination. Track My Laptop Lost or stolen PCs can be a huge lawful obligation to your security. Snappy Heal Track My Laptop Service helps track the where abouts of your lost or stolen workstation. The repair is a social chart that accompanies each work area formation of Quick Heal at no extra expense. More data please Visit- - https://servicenumber.org/quickheal.html Contact Number 1-833-284-3444.
          Google bows out of Pentagon's $10 billion cloud-computing race - Washington Post      Cache   Translate Page      

Washington Post

Google bows out of Pentagon's $10 billion cloud-computing race
Washington Post
Google will not compete for a $10 billion opportunity to build the Defense Department's cloud-computing infrastructure, the company said Tuesday, saying the project could conflict with its corporate values regarding the use of artificial intelligence ...
Microsoft Upgrades Services To Meet Federal Compliance Standard Ahead Of JEDI BidCRN
Google drops out of Pentagon's $10 billion cloud competitionAdAge.com
Microsoft makes its pitch for the Pentagon cloud contract with expanded federal certificationsGeekWire
BGR -Law360 -Silicon Valley Business Journal -Google Blog
all 249 news articles »

          Was In-Memory-Computing und Tragflügel gemeinsam haben      Cache   Translate Page      

Nach dem diesjährigen SAS Global Forum in Denver bin ich weiter nach San Francisco gereist. Und wie viele Touristen bin ich auch zur Golden Gate Bridge gefahren und habe sie Fuß überquert. In der Mitte der Brücke, bemerkte ich einen Windsurfer in der Bucht von San Francisco, der sich der [...]

The post Was In-Memory-Computing und Tragflügel gemeinsam haben appeared first on Mehr Wissen.


          Comment on Did China use a tiny chip to infiltrate U.S. companies? by Harry Jones      Cache   Translate Page      
Something like that. That's why I don't hope to eliminate all risk. Not in this universe. But I do mitigate risk. The fewer computers my private data goes through, the better. No cloud computing for me. Data disabled on my phone, and Wifi off unless needed. No Facebook. No Google. No smart TV. No OnStar. No Internet of Damn Things. Oh, and I absolutely do not trust China. And of course I run Linux and browse through Tor. On a rather outdated computer. The risk I cannot eliminate, that I grudgingly accept. The risk I can eliminate, that I eliminate. I worked in OS and network software/firmware a while. I know how the sausage gets made, and I know just what sort of sociopaths and meatheads run those R&D companies.
          The Google Home Hub might be the best digital picture frame ever made      Cache   Translate Page      
TwitterFacebook

The Google Home Hub is aptly named.

It's certainly not the first product to lay claim to the term "hub" but it might be the first product to embody the word so fully. It's not centered around a single use case — like, say, the Facebook Portal is built around video chat — but instead brings together the functionalities of several different products: smart speaker, tablet, digital photo frame, and smart home controller.

SEE ALSO: Google's Pixel Slate is a Chrome OS tablet with a detachable keyboard cover

The Home Hub is technically in the category of "smart display," but that doesn't capture what it does any better than "smart speaker" describes an Amazon Echo. The Hub is more of an "ambient computing enabler," with some interesting extras that the display bestows. Read more...

More about Google, Smart Home, Google Assistant, Smart Speaker, and Google Home Hub
          Salesforce Solution Architect - Silverline Jobs - Casper, WY      Cache   Translate Page      
Company Overview: Do you want to be part of a fast-paced environment, supporting the growth of cutting edge technology in cloud computing? Silverline...
From Silverline Jobs - Wed, 05 Sep 2018 06:21:23 GMT - View all Casper, WY jobs
          Google augments regional cloud team      Cache   Translate Page      
Google is expanding headcount at its local cloud team threefold to capitalise on growth in cloud computing in Southeast Asia, driven by artificial intelligence (AI) and digital transformation.
          Comment on Bubble Hero 3D by Mobile Computing      Cache   Translate Page      
<strong>Mobile Computing</strong> [...]although sites we backlink to beneath are considerably not related to ours, we feel they are basically worth a go by, so have a look[...]
          UPDATE 2-Huawei to sell servers with own chips in cloud computing push      Cache   Translate Page      
*Servers using Huawei chipset to be available for Q2, 2019. SHANGHAI, Oct 10- China's Huawei, the world's largest telecom-equipment maker, on Wednesday said it will sell some servers powered by its own chips for the first time, doubling down on efforts to boost its cloud computing business. Huawei will not sell these chips to third parties, its rotating chairman, Eric...
          Offer - Best Python Certification Training Centers in Chennai @AllTechZ Solutions - INDIA      Cache   Translate Page      
AllTechZ Solutions (ATS) Pvt Ltd is the Best Python Certification Centers in Chennai. ATS’s Python Training is a software development environment that offers data analysis, visualization capabilities, high-performance numerical computation, and application development and technical computing tool used by over a million engineers and scientists worldwide. AllTechZ’s Python course would be particularly beneficial for individuals working in a team with other Python -based designers who are required to get “up to speed” quickly. ATS’s Python’s built-in graphing tools and GUI builder ensure that you customize your data and models to help you interpret your data more easily for quicker decision making. ATS’s Python training with real-time working professional which will help students and trainees to get trained in practical real-time scenarios along with theory? Python training will definitely help you to complete certification and clearing interviews. ATS’s Python training focuses on giving students basic to advanced level. AllTechZ’s team of trainers is Technical Architects and Project Leads working in MNC and will help in real time Python projects.
          Cognitive Computing Technology Market Technological Innovation by Leading Industry Players- Google, IBM, Microsoft Corporation, Expert System, SparkCognition, Cisco Systems, HPE, Palantir Technologies, Saffron Technology      Cache   Translate Page      
ReportsWeb newly added the Global Cognitive Computing Technology Market Report that gives meticulous investigation of current scenario of the Market size, share, demand, growth, trends, and forecast in the coming years. Global Cognitive Computing Technology Market Size Status and Forecast 2018-2025 Cognitive computing is executed through a computer-generated model mimicking the human process of thinking […]
          Comment on Little Nightmares is a creepy 3D side-scrolling game (review) by Office.com/myaccount      Cache   Translate Page      
Office.com/myaccount – The Microsoft Office allows you to create an account to manage all the Microsoft Products including the Office. You can create the Microsoft Account anytime using any computing device including PC, Tablet, and Smartphones. Moreover, you can make payments for your subscription and activate your Microsoft Products.
          Senior Director of AWS Alliances - Snowflake Computing - Alwal, Hyderabad, Telangana      Cache   Translate Page      
Develop and manage Snowflake's relationship with our Cloud Alliances (Microsoft, Amazon, Google, Tableau, Looker, MicroStrategy, Informatica, Talend and others...
From Snowflake Computing - Wed, 03 Oct 2018 22:11:40 GMT - View all Alwal, Hyderabad, Telangana jobs
          Director of Google Cloud Alliances - Snowflake Computing - Alwal, Hyderabad, Telangana      Cache   Translate Page      
Develop and manage Snowflake's relationship with our Cloud Alliances (Microsoft, Amazon, Google, Tableau, Looker, MicroStrategy, Informatica, Talend and others...
From Snowflake Computing - Wed, 03 Oct 2018 22:11:40 GMT - View all Alwal, Hyderabad, Telangana jobs
          Technical Account Manager - Snowflake Computing - Alwal, Hyderabad, Telangana      Cache   Translate Page      
Amazon AWS, Microsoft Azure, OpenStack). Snowflake’s mission is to enable every organization to be data-driven with instant elasticity, secure data sharing and...
From Snowflake Computing - Tue, 11 Sep 2018 22:11:33 GMT - View all Alwal, Hyderabad, Telangana jobs
          Sr. Solution Architect - Snowflake Computing - Alwal, Hyderabad, Telangana      Cache   Translate Page      
Amazon AWS, Microsoft Azure, OpenStack, etc.). Snowflake’s mission is to enable every organization to be data-driven with instant elasticity, secure data...
From Snowflake Computing - Tue, 11 Sep 2018 22:11:32 GMT - View all Alwal, Hyderabad, Telangana jobs
          Partner Solutions Architect - Snowflake Computing - Alwal, Hyderabad, Telangana      Cache   Translate Page      
Amazon AWS, Microsoft Azure, OpenStack, etc.). Snowflake’s mission is to enable every organization to be data-driven with instant elasticity, secure data...
From Snowflake Computing - Fri, 31 Aug 2018 04:11:36 GMT - View all Alwal, Hyderabad, Telangana jobs
          Senior Manager of Cloud Alliances - Snowflake Computing - Alwal, Hyderabad, Telangana      Cache   Translate Page      
Develop and manage Snowflake's relationship with our Cloud Alliances (Microsoft, Amazon, Google, Tableau, Looker, MicroStrategy, Informatica, Talend and others...
From Snowflake Computing - Thu, 23 Aug 2018 22:11:25 GMT - View all Alwal, Hyderabad, Telangana jobs
          Huawei Unveils AI Strategy and New Chips      Cache   Translate Page      
Huawei, the world's largest telecom-equipment maker, unveiled two new artificial intelligence powered chips to boost its cloud computing and machine-learning business at the company's annual global partners' conference, Huawei Connect, on Wednesday.
          Payroll Coordinator - Western Sugar Cooperative - Lovell, WY      Cache   Translate Page      
Excellent computer competence (outlook, word, PowerPoint, excel, access). Ensure that computing, withholding, and deductions are done correctly....
From Indeed - Thu, 13 Sep 2018 16:39:23 GMT - View all Lovell, WY jobs
          Payroll Coordinator - Western Sugar Cooperative - Lovell, WY      Cache   Translate Page      
Excellent computer competence (outlook, word, PowerPoint, excel, access). Ensure that computing, withholding, and deductions are done correctly....
From Indeed - Thu, 13 Sep 2018 16:39:23 GMT - View all Lovell, WY jobs
          Как мы сдавали экзамен Certified Kubernetes Administrator      Cache   Translate Page      
В прошлом году у организации CNCF (Cloud Native Computing Foundation), помогающей развиваться таким Open Source-проектам, как Kubernetes и Prometheus, появилась программа сертификации CKA (Certified Kubernetes Administrator). В начале этого лета мы решили в ней поучаствовать и получили первые сертификаты для своих сотрудников. О том, что это, зачем и как происходит, с удовольствием рассказываем всем любопытствующим […]
          Comment on How to Operationalize Machine Learning and Accelerate Business Value with Insight Platforms and In-Memory Computing by GigaSpaces AI and Machine Learning Event in Munich | GigaSpaces Blog      Cache   Translate Page      
[…] that can leverage AI and machine learning at scale, in real-time, will outperform their competitors, transforming the way they deliver […]
          Cloud Computing: Clevere Alternativen zu Azure, Amazon und Google      Cache   Translate Page      
Mit umfangreichen Service-Portfolios und günstigen Preisen dominieren Azure, AWS und Google den Public-Cloud-Markt. Doch die schiere Größe bringt Kunden nicht nur Vorteile. Dieser Artikel stellt einige interessante Cloud-Alternativen vor.
          Как мы сдавали экзамен Certified Kubernetes Administrator      Cache   Translate Page      


В прошлом году у организации CNCF (Cloud Native Computing Foundation), помогающей развиваться таким Open Source-проектам, как Kubernetes и Prometheus, появилась программа сертификации CKA (Certified Kubernetes Administrator). В начале этого лета мы решили в ней поучаствовать и получили первые сертификаты для своих сотрудников. О том, что это, зачем и как происходит, с удовольствием рассказываем всем любопытствующим читателям хабры. Читать дальше →
          Vectorworks Shines on Construction Computing Awards Shortlist      Cache   Translate Page      

Voting open to the public until November 2

(PRWeb October 10, 2018)

Read the full story at https://www.prweb.com/releases/vectorworks_shines_on_construction_computing_awards_shortlist/prweb15823372.htm


          WATCH OUT GREEN PIGS! ROVIO AND RESOLUTION GAMES LAUNCH ANGRY BIRDS FPS: FIRST PERSON SLINGSHOT ON MAGIC LEAP ONE      Cache   Translate Page      
WATCH OUT GREEN PIGS! ROVIO AND RESOLUTION GAMES LAUNCH ANGRY BIRDS FPS: FIRST PERSON SLINGSHOT ON MAGIC LEAP ONE The new mixed reality game is available for free today and delivers the most immersive Angry Birds experience yet with precision controls and incredible spatial gameplay STOCKHOLM, Sweden, and ESPOO, Finland – Oct. 9, 2018 – Angry Birds fans can now slingshot with unrivaled accuracy in Angry Birds FPS: First Person Slingshot, the new mixed reality (MR) game released today for Magic Leap One Creator Edition at the L.E.A.P Conference by Rovio Entertainment (ROVIO) and Resolution Games. Angry Birds FPS is the first gaming experience developed entirely by an independent developer for Magic Leap’s spatial computing platform. A first-person slingshot lets players see incredibly realistic animated characters and objects overlaid onto their actual environment, bringing Angry Birds to life like never before – right in users’ homes. Magic Leap One Creator Edition is a lightweight, wearable computer that enriches your experience in the real world with digital content. A trailer of the game is available here. Kati Levoranta, CEO at Rovio Entertainment, commented, “It’s great to offer Angry Birds fans a completely new and unforeseen way to play the beloved Angry Birds. Resolution Games has done an excellent job at developing the Angry Birds to Magic Leap One. We’re always looking for opportunities to expand to new technologies and platforms, and Angry Birds FPS is an exciting step forward into the future of gaming.” For the very first time, Angry Birds fans can explore and navigate their environments to select which object to hit and angle their shot precisely for maximum impact. Players can then assess the damage by simply walking up to and around the structure. As players take aim, either directly or by bouncing off actual objects in the room, they can try to inflict maximum damage to the Green Pigs with the least hits or from farthest away to earn more points and stars in each level. “Rovio has established an incredibly successful and beloved entertainment franchise with Angry Birds. By taking Angry Birds to Magic Leap’s spatial computing platform, we’re giving fans one of the most engaging, interactive and immersive experiences possible,” said Tommy Palm, CEO of Resolution Games. “It really is quite remarkable that in 2018 we’re able to use full spatial gameplay and light field technology to enjoy these classic game mechanics and characters in our own environments. Angry Birds FPS: First Person Slingshot demonstrates the true impact mixed reality technologies can have on the games industry.” “We are thrilled to bring the iconic Angry Birds franchise to Magic Leap’s spatial computing platform,” said Rio Caraeff, Chief Content Officer at Magic Leap. “Having recently launched Magic Leap One Creator Edition, we’re at an exciting moment in time when we get to see and experience what developers create for the platform. Working with Resolution Games, Rovio Entertainment has made a version of their iconic classic for Magic Leap One that showcases the potential of immersive, content-driven experiences and is also loads of fun.” Resolution Games is a games studio focused on visual computing. In their first three years, they have produced one of the most popular virtual reality (VR) titles of all time (Bait!), and their games are among the highest-rated on their respective platforms. Rovio Entertainment is best known for its global Angry Birds brand, born from the world-famous Angry Birds Classic game. Today, Rovio has a wide portfolio of Angry Birds games which, although primarily designed and marketed for adult players, are always appropriate for all audiences. Collectively to date, Rovio’s Angry Birds games have garnered a staggering four billion game downloads since 2009 alongside one of the strongest mobile game brand licensing programs in the world, making Angry Birds one of the most successful mobile gaming IPs in history. Angry Birds FPS: First Person Slingshot is available for free on Magic Leap One Creator Edition through www.magicleap.com. For more information, follow Rovio on Facebook and Twitter and Resolution Games on Facebook and Twitter. ### About Rovio Entertainment: Rovio Entertainment Corporation is a global entertainment company that creates, develops and publishes mobile games which have been downloaded over 4 billion times. The Company is best known for the global Angry Birds brand, which started as a popular mobile game in 2009, and has since evolved from games to various entertainment and consumer products in brand licensing. Today, the Company offers multiple mobile games, animations and has produced The Angry Birds Movie, which opened number one in theatres in 50 countries, the sequel of which is in production. Rovio is headquartered in Finland, and the Company’s shares are listed on the main list of the NASDAQ Helsinki stock exchange with the trading code ROVIO. (www.rovio.com) About Resolution Games: Resolution Games is a VR and AR games studio and publisher aimed at creating immersive experiences for all – from gamers to non-gamers alike. The studio continues to push the limits of the emerging visual computing space with titles ranking among the highest rated and most downloaded across every major VR and AR platform. Their games include Angry Birds FPS: First Person Slingshot, Bait!, Bait! Arctic Open, Wonderglade, Narrows and Solitaire Jester, with several more on the horizon. The studio is composed of game industry veterans, serial entrepreneurs and thought leaders with a proven track record of widely acclaimed success spanning across mass market and AAA games, free-to-play games, hardware and more. Resolution Games is privately held and based in Stockholm, Sweden. Follow the company at www.resolutiongames.com and on Twitter and Facebook.
          Craft Beer Account Manager/Outside Sales Rep - Avitus Group - Sheridan, WY      Cache   Translate Page      
Proficiency with Microsoft Office products, cloud based computing and databases, mobile applications and other emerging technologies affecting Black Tooth...
From Avitus Group - Thu, 27 Sep 2018 08:14:23 GMT - View all Sheridan, WY jobs
          "Premium Alu" Power Pack, 8000 mAh, Gold      Cache   Translate Page      
"Premium Alu" Power Pack, 8000 mAh, Gold

"Premium Alu" Power Pack, 8000 mAh, Gold

Certified high quality cells Ultra fast charging Smartphone charge Super slim aluminium design Is there anything we don’t use our smartphones for these days? Making calls, surfing the web, social media, listening to music, taking pictures – it takes its toll on the battery. And when you’re on the go and your battery has given its all, then without a mains socket, the fun is over. Unless, of course, you have a bundle of energy along like the Premium Alu power pack from Hama. ATTERY CAPACITY: 8000 MAH – WHAT DOES IT MEAN? 8000 mAh, meaning 8000 milliampere hours, is a measurement of the power pack’s battery capacity. This is enough to fully charge your smartphone three times, a ten-inch tablet 1.2 times, or a seven-inch tablet 1.7 times, though of course the exact figure depends on the device. WHY IS THE POWER PACK JUST RIGHT FOR ME? PREMIUM QUALITYThe use of certified cells guarantees the highest standards of quality and safety. Deep discharge protection and overload protection make the power pack proof against short-circuiting. STYLISH DESIGNA slim, sturdy case made of anodized aluminium in any of various colours makes the power pack a stylish accessory. GOOD PERFORMANCEA quick charging cycle of seven to eight hours means the power pack can be fully ready to go in no time. OPTIMISED CHARGINGOptimised charging means that the Power Pack recognises the connected terminal device and supplies it with the optimal current to minimise charging time. Simply connect your smartphone to the power pack using the cable and enjoy an energy boost on the go. INTEGRATED LED CAPACITY DISPLAYThe LED charge indicator makes easily apparent how much power you still have available. The LEDs indicate the remaining charge as follows: LED: 1-25% LED: 26-50% LED: 51-75% LED: 76-100% UNIVERSAL USEThe power pack is equipped with two outputs, meaning that you can charge up to two devices at the same time. You can connect any device (of any brand) equipped with a Micro-USB port.


          Cyberpunk 2077 - CD Projekt Red Establishes Partnership with Digital Scapes      Cache   Translate Page      

When Cyberpunk 2077 was making the rounds at conventions earlier this year, some of us wondered about the nebulous at that point multiplayer component of the game. And while we still don't have anything solid to report there, this open press release on CD Projekt's website announces their new partnership with Vancouver-based studio Digital Scapes that specializes in AAA multiplayer development. You do the math there.

Check it out:

CD PROJEKT RED, creators of The Witcher series of games, announce the establishing of a long-term strategic cooperation with Vancouver-based studio Digital Scapes. The partnership will focus on CD PROJEKT RED’s upcoming futuristic role-playing game — Cyberpunk 2077.

Founded by industry veterans hailing from BioWare, Radical Entertainment and Relic, Digital Scapes is an ambitious video game development studio specialising in AAA multiplayer console and PC game development, development tool creation, asset production, and cloud computing. Digital Scapes team members worked on blockbuster game series like Company of Heroes, Warhammer 40,000, Dying Light, Prototype, and more.

“Cyberpunk 2077 is our most ambitious project to date and we work hard every day to make it a creative and technological achievement. The Digital Scapes team brings aboard a lot of talent, experience and technical knowledge, and I’m very confident our long-term cooperation will add plenty to the game,” says Michał Nowakowski, SVP Business Development, CD PROJEKT RED.

“We are both excited and honoured to work with CD PROJEKT RED. Their incredibly creative and accomplished team of developers have been pushing narrative-driven, role-playing games to unprecedented levels. We look forward to helping them create the very best video games on the planet,” said Marcin Chady, Studio Head, Digital Scapes.

The Canadian partner studio will closely cooperate with CD PROJEKT RED on creating and optimizing technological solutions for use in the development of Cyberpunk 2077.

          Huawei Ascend 910 AI chip unveiled – the greatest computing density on a single chip      Cache   Translate Page      
Huawei has announced the launch of two new ranges of processors aimed at providing huge amounts of computing power, optimised for artificial intelligence workloads.
          $7.20 - Motorola 11-67218-04R Boot: Protective, G-9000, Black Rohs      Cache   Translate Page      
#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000

Model #: 11-67218-04R
Item #: 0N6-001A-00156
Price: $7.20
Save: 55%
Add To Cart


          Payroll Coordinator - Western Sugar Cooperative - Lovell, WY      Cache   Translate Page      
Excellent computer competence (outlook, word, PowerPoint, excel, access). Ensure that computing, withholding, and deductions are done correctly....
From Indeed - Thu, 13 Sep 2018 16:39:23 GMT - View all Lovell, WY jobs
          Как мы сдавали экзамен Certified Kubernetes Administrator      Cache   Translate Page      


В прошлом году у организации CNCF (Cloud Native Computing Foundation), помогающей развиваться таким Open Source-проектам, как Kubernetes и Prometheus, появилась программа сертификации CKA (Certified Kubernetes Administrator). В начале этого лета мы решили в ней поучаствовать и получили первые сертификаты для своих сотрудников. О том, что это, зачем и как происходит, с удовольствием рассказываем всем любопытствующим читателям хабры. Читать дальше →
          Payroll Coordinator - Western Sugar Cooperative - Lovell, WY      Cache   Translate Page      
Excellent computer competence (outlook, word, PowerPoint, excel, access). Ensure that computing, withholding, and deductions are done correctly....
From Indeed - Thu, 13 Sep 2018 16:39:23 GMT - View all Lovell, WY jobs
          Wed, 10 Oct 10:00am - Computer access/help      Cache   Translate Page      
Net Axs - based in the Citizens Advice Bureau, Thurso, our friendly staff are there to help you with your basic computing needs, whether signing on-line, accessing websites or simply using a computer. No need to book, just pop in!. ...
          Huawei to sell servers with own chips in cloud computing push      Cache   Translate Page      
China's Huawei, the world's largest telecom-equipment maker, on Wednesday said it will sell some servers powered by its own chips for the first time, doubling down on efforts to boost its cloud computing business. Reported by Reuters India 23 minutes ago.
          Huawei to sell servers with own chips in cloud computing push      Cache   Translate Page      
China's Huawei, the world's largest telecom-equipment maker, on Wednesday said it will sell some servers powered by its own chips for the first time, doubling down on efforts to boost its cloud computing business.
          UPDATE 2-Huawei to sell servers with own chips in cloud computing push      Cache   Translate Page      
* Also unveils a chipset for computing on smart devices (Updates to add picture)

          Huawei to sell servers with own chips in cloud computing push      Cache   Translate Page      
China's Huawei, the world's largest telecom-equipment maker, on Wednesday said it will sell some servers powered by its own chips for the first time, doubling down on efforts to boost its cloud computing business.

          Quantum Computing – Spooky Action at a Distance – Extra History – #4      Cache   Translate Page      
Extra Credits Published on 7 Oct 2018 What happens when we can’t link physical cause and effect between two actions? Well, quantum bits (or qubits) do this all the time. Let’s look into how quantum entanglement can be used in computing. Credit to Alisa Bishop for her art on this series: http://www.alisabishop.com/ A tremendous thank-you […]
          Salesforce Solution Architect - Silverline Jobs - Casper, WY      Cache   Translate Page      
Company Overview: Do you want to be part of a fast-paced environment, supporting the growth of cutting edge technology in cloud computing? Silverline...
From Silverline Jobs - Wed, 05 Sep 2018 06:21:23 GMT - View all Casper, WY jobs
          (USA-CA-San Diego) #95903 System Administrator and Project Coordinator      Cache   Translate Page      
#95903 System Administrator and Project Coordinator Filing Deadline: Tue 10/23/2018 Apply Now UCSD Layoff from Career Appointment: Apply by 10/11/18 for consideration with preference for rehire. All layoff applicants should contact their Employment Advisor. Special Selection Applicants: Apply by 10/23/18. Eligible Special Selection clients should contact their Disability Counselor for assistance. DESCRIPTION The UCSD School of Medicine is involved in development of several bioinformatic resources for network analysis that are widely used by the biological research community. The best known is Cytoscape (http://www.cytoscape.org), a collaborative open-source software project. Cytoscape is a leading workstation-based platform for visualizing and processing complex networks. It is widely used with approximately 17,000 downloads per month. NDEx, the Network Data Exchange (http://ndexbio.org), is another major project, a public web resource for sharing, storing, accessing, and publishing biological knowledge as computable networks. The System Administrator and Project Coordinator (SAPC) will manage, maintain and extend the computing infrastructure, both hardware and software, and they will support the users of that infrastructure. The System Administrator and Project Coordinator (SAPC) will work with the software development team to deploy and administrate cloud hosted websites and services, including usage analysis and reporting. Finally, the SAPC will coordinate the software release process for the web and desktop products of the software development team, including the management of issue tracking and user bug reporting. Lab infrastructure system administration: The SAPC will administrate scientific computing infrastructure that includes the secure compute clusters, a VM cluster, a GPU server, lab workstations and compute servers, and multiple storage servers. Most of the systems are housed at the San Diego Supercomputing Center (SDSC). Administration will include maintenance of the rack-mounted systems at SDSC, diagnosing hardware problems, replacing components and installing new systems. The SAPC will work with stakeholders to design hardware and software solutions as the infrastructure evolves to meet new demands. They will manage the purchasing process and interface with vendors for warranty support. They will monitor alerts and performance metrics and will plan and manage data and image backup. They will manage the user authentication system, gateway computers, the firewall, VPN, samba server, IP allocation and Hostmaint. They will control the configuration of all systems, using tools such as Puppet. The SAPC will also maintain the documentation for the systems, including hardware configuration. Lab user support: The SAPC will install and maintain user workstations and other computers onsite. They will control the software configuration of these systems, including the installation of commonly used packages. They will diagnose problems and install and replace hardware. They will assist lab members in the configuration of personal machines for interfacing to the lab infrastructure. They will maintain and extend user documentation for lab computing. They will assist in the IT issues encountered when installing or maintaining scientific instruments in the wet lab, including interfacing with vendors for support and managing regular backups of attached computers. The SAPC will manage user accounts and commercial software used in the lab. They will monitor the usage of the lab computing infrastructure and assist users in using those systems, answering questions, fielding bug reports and otherwise responding to requests. Cloud website and service system administration: The SAPC will administrate websites and web services hosted on cloud providers including AWS and Google. They will track usage of these systems, using both standard tools and custom logging and reporting systems. They will prepare periodic reports of usage, working with the software development team to plan and implement appropriate metrics. They will perform backups, respond to outages, and work with the software development team to make the deployed systems robust and secure. Coordination of software release process and issue tracking: The SAPC will work with the software development team to maintain and administrate internal issue tracking systems and end-user bug and issue reporting systems. They will manage aspects of the software release process, including maintaining schedules, organizing and tracking testing, and performing final deployment to the web. MINIMUM QUALIFICATIONS + Bachelor's degree in Computer Science or Computer Engineering or equivalent combination of education and experience + Two (2) or more years of system/database administration experience. + General knowledge of several areas of IT. + Demonstrated ability to install software and troubleshoot and repair moderately complex problems with computing devices, peripherals and software. Understanding of system performance monitoring and actions that can be taken to improve or correct performance. Basic knowledge of incident response procedures. Demonstrated ability to follow software specifications Including windows and OS/X operating systems. + Demonstrated experience with database administration. Including SQL databases such as MySQL, Postgres + Demonstrated knowledge of computer security tools, best practices and policies. Demonstrated skills applying security controls to computer software and hardware. Examples: user authentication systems, gateway computers, firewalls, VPNs + Demonstrated testing and test planning skills. + Ability to write technical documentation in a clear and concise manner. + Demonstrated understanding of how system management actions affect users and dependent / related functions. + Interpersonal skills sufficient to work with both technical and non-technical personnel at various levels in the organization. Ability to elicit and communicate technical and non-technical information in a clear and concise manner. + Self-motivated and works independently and as part of a team. Demonstrates problem-solving skills. Able to learn effectively and meet deadlines. + Experience with UNIX systems administration, including installation, backups, upgrades and maintenance. Also including experience administrating clusters + Experience using GitHub or other version control software in multi-user projects, especially for periodically released software. + Experience maintaining medium scale cluster hardware, small numbers of rack-mounted systems. Including diagnosis of hardware problems, replacing components and installation of new hardware. + Experience deploying and maintaining basic websites and/or web services via apache or other webservers or hosted on cloud providers such as AWS and Google. + Experience in supporting end users in both software and / or hardware issues. + Experience using issue tracking systems such as Jira, Redmine, Asana PREFERRED QUALIFICATIONS + Experience in purchasing of hardware and software, interfacing with vendors, managing warranties and vendor support. + Experience with VM clusters (including software such as VMWare) and GPU servers + Experience working with stakeholders to design hardware and software solutions in computing infrastructure + Experience working with large RAID systems or other redundant or high performance cluster storage hardware and software. + Experience working with GPFS, and other cluster storage software. + Experience with remote monitoring software like Ganglia, Nagios, etc. + Experience with Puppet or other administration automation software + Experienced in webserver configuration, Docker deployment, scalable clusters, Solr or Lucene search engine databases. + Experience with logging and usage tracking systems for webservers, websites, including the analysis of usage and the preparation of relevant reports. + Knowledge of bioinformatics software packages and applications + Experience managing or participating in software releases. + Knowledge of business processes and procedures. Knowledge of the design, development and application of technology and systems to meet business needs. + Knowledge relating to the design and development of software. Basic knowledge of secure software development. + Knowledge of data management systems, practices and standards. SPECIAL CONDITIONS + Employment is subject to a criminal background check. Apply Now UC San Diego Health is the only academic health system in the San Diego region, providing leading-edge care in patient care, biomedical research, education, and community service. Our facilities include two university hospitals, a National Cancer Institute-designated Comprehensive Cancer Center, Shiley Eye Institute, Sulpizio Cardiovascular Center, and several outpatient clinics. UC San Diego Medical Center in Hillcrest is a designated Level I Trauma Center and has the only Burn Center in the county. We invite you to join our dynamic team! Applications/Resumes are accepted for current job openings only. For full consideration on any job, applications must be received prior to the initial closing date. If a job has an extended deadline, applications/resumes will be considered during the extension period; however, a job may be filled before the extended date is reached. UC San Diego Health is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, age, protected veteran status, gender identity or sexual orientation. For the complete University of California nondiscrimination and affirmative action policy see: http://www-hr.ucsd.edu/saa/nondiscr.html UC San Diego is a smoke and tobacco free environment. Please visit smokefree.ucsd.edu for more information. Payroll Title: INFO SYS ANL 2 Department: MEDICINE/Genetics Salary Range Commensurate with Experience Worksite: La Jolla Appointment Type: Career Appointment Percent: 100% Union: Uncovered Total Openings: 1 Work Schedule: Days, 8 hrs/day, Mon-Fri As a federally-funded institution, UC San Diego Health maintains a marijuana and drug free campus. New employees are subject to drug screening.
          (USA-CA-San Diego) #96099 Administrative Assistant      Cache   Translate Page      
#96099 Administrative Assistant Filing Deadline: Tue 10/23/2018 Apply Now UCSD Layoff from Career Appointment: Apply by 10/12/18 for consideration with preference for rehire. All layoff applicants should contact their Employment Advisor. Eligible Disability Counseling and Consulting services (DCC) or Special Selection clients should contact their Vocational Rehabilitation Counselor for assistance. UC San Diego career employees who have passed their trial period will have priority consideration for this position. Recruiters will begin to refer qualified internal applicants after the first 7 days of the job posting. Qualified external applicants may be referred to the hiring department, if a qualified pool of internal candidates is not identified and upon the request of the hiring manager. DESCRIPTION University Centers Executive Assistant provides full range of administrative functions in support of the Director, Associate Director, the University Centers Advisory Board (UCAB) and overall University Centers Department. In addition to executive support, incumbent is responsible for travel coordination, building key control (Price Center), and lease administration support. Acts as primary contact for customers of the University Centers and maintains effective working relationships with campus departments. This support requires the ability to identify, analyze, and resolve problems independently, including the ability to determine which departments must be involved, communicate problems clearly, and coordinate the efforts of the departments involved. Experience working in a fast-pace environment and the ability to respond to the demands of such an environment in a composed, flexible and professional manner is required. Must possess computing, writing, and analytical skills to be able to perform a variety of special projects as needed by the Director, Associate Director and Lease Administrator. The University Centers is a heavy-use facility visited daily by 20,000+ people. It includes 300,000 square feet of meeting/event, office, and dining/retail space. The meeting/event space is in great demand for major events and is used by many campus departments, including the Chancellor's Office and UCSD Special Events. More than 5,000 meetings/events occur annually. The facility also houses over 75 campus departments, student organizations, and retailers. With its heavy use, many tenants, and many services and facilities, the University Centers is a complex operation that functions in a fast-pace environment. Successful operation of the University Centers requires a significant level of interaction among its 12 units and many campus departments. These departments range from Campus Police and Real Estate Development to Environment, Health and Safety and Facilities, Design, and Construction. + Must be able to occasionally work overtime. QUALIFICATIONS + Demonstrated experience maintaining computerized calendar, scheduling meetings, making travel arrangements, and providing executive-level administrative assistance. + Ability to conduct research and analyze various documents with objective of obtaining data, as well as historical information to compile reports or on-going projects. + Ability to analyze and compile data, electronically generate and manipulate graphics; including charts, graphs, and images for graphical presentations. + Ability to develop and maintain records management systems, electronic and hard copy. + Demonstrated experience in maintaining building key inventory and control systems. + Must possess advanced proficiency in use of computer applications such as: Word, Excel, Entourage (email), Outlook (calendaring), SharePoint, Internet and databases. + High level of professionalism in providing administrative assistance for a department that includes many units and works with a number of campus departments in a fast-pace environment. + Ability to identify, analyze and resolve problems independently, including skills and abilities to determine the units and departments that must be involved and to coordinate their efforts. + Must possess thorough knowledge of correct English, grammar, spelling and punctuation to be able to represent the director and/or associate director and the university to a variety of constituencies. + Superior interpersonal skills including courtesy, professionalism and cooperative attitude. experience in communicating effectively in person, on telephone, and in writing to a diverse population. + Must be able to show judgment in an office that is frequently confronted with emergencies, many interruptions, and changing needs, and then use that judgment in determining the essence of potential problems so as to develop information quickly which can be used by the director and/or associate director. + Must be able to establish and maintain good working relationships with people and organizations, both within and without the university community. + Ability to hire, train and supervise student employees. + Must be able to maintain confidentiality of information and materials. SPECIAL CONDITIONS + Job offer is contingent upon a satisfactory clearance based on background check results. Apply Now The University of California is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, age, protected veteran status, gender identity or sexual orientation. For the complete University of California nondiscrimination and affirmative action policy see: http://www-hr.ucsd.edu/saa/nondiscr.html UC San Diego is a smoke and tobacco free environment. Please visit smokefree.ucsd.edu for more information. Payroll Title: BLANK AST 3 Department: VCSA UNIVERSITY CENTERS Hiring Salary Range $40,700 - $54,350 /year Worksite: Campus Appointment Type: Career Appointment Percent: 100% Union: CX Contract Total Openings: 1 Work Schedule: Days, 8 hrs/day, Monday - Friday
          (USA-CA-San Diego) #96162 HPC Research, Training and Outreach Specialist      Cache   Translate Page      
#96162 HPC Research, Training and Outreach Specialist Filing Deadline: Tue 10/16/2018 Apply Now This is a one year Contract position with the possibility of extension and/or Career conversion. DESCRIPTION The incumbent will apply skills as a seasoned, experienced IT research professional. S/he will use computational, computer science, data science, and CI software research and development principles, with relevant domain science knowledge where applicable, along with professional programming concepts for medium-sized projects or portions of larger projects. Additionally, the incumbent will develop and optimize a variety of computational, data science, and CI research tools and component, perform research on current and future HPC, data, and CI technologies, hardware and software projects, and work on algorithm development, optimization, programming, performance analysis and / or benchmarking assignments of moderate scope where the tasks involve knowledge of either domain / computer science research requirements and / or CI design / implementation requirements. The HPC Research, Training and Outreach Specialist applies skills as a seasoned professional. Uses computational science, computer science, data science, and Cyberinfrastructure (CI) software research and development principles with relevant domain science knowledge (where applicable) to create educational materials for a variety of HPC users. Participates in the delivery of these materials through in-person training, webinars and asynchronous means (web pages, videos, etc.). Develops and adapts materials as necessary for different groups of users, including: graduate students, postdocs, faculty, industry partners, staff from government and non-profits who require HPC resources for their research; professors and instructors who integrate HPC topics into their courses. Updates materials regularly as new HPC technologies and programming languages emerge; K-12 teachers in STEM fields, who plan to introduce technology into their classrooms and curricula. Serves as liaison for the SDSC-managed Triton Shared Compute Cluster (TSCC) to academic departments at UCSD, and works with SDSC and campus communications staff in the development of outreach materials and reports that document and convey the impact and value of HPC in accelerating the research and discovery at UCSD. For more information, please visit www.sdsc.edu. QUALIFICATIONS + Intermediate knowledge of HPC / data science / CI. Understanding of general parallel computing principles and languages, libraries or language extensions for shared memory and distributed memory parallel computing. + Thorough experience working in a complex computing / data / CI environment encompassing all or some of the following: HPC, data science infrastructure and tools / software, and diverse domain science application base. + Experience in presenting HPC training in a variety of venues, such as tutorials, workshops, summer institutes and formal classes. + Experience in developing robust HPC instructional materials that can be used for live or asynchronous training. + Thorough knowledge of multiple, languages commonly used in scientific computing, including Fortran, C/C++, Python, R, bash, MPI, and OpenMP. SPECIAL CONDITIONS + Job offer is contingent upon satisfactory clearance based on Background Check results. Apply Now The University of California is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, age, protected veteran status, gender identity or sexual orientation. For the complete University of California nondiscrimination and affirmative action policy see: http://www-hr.ucsd.edu/saa/nondiscr.html UC San Diego is a smoke and tobacco free environment. Please visit smokefree.ucsd.edu for more information. Payroll Title: CMPTL AND DATA SCI RSCH SPEC 3 Department: San Diego Supercomputer Center Hiring Salary Range $63,400 - $103,100 / Year Worksite: Campus Appointment Type: Contract Appointment Percent: 100% Union: Uncovered Total Openings: 1 Work Schedule: Days, 8 hrs/day, Mon-Fri
          (USA-SC-Charleston) Supervisory Information Technology Specialist      Cache   Translate Page      
* Videos * Duties Help ## Duties ### Summary This position is located in the Internal Systems and Messaging Branch (ISM), Global Systems Operations Directorate (GS), Bureau of the Comptroller and Global Financial Services (CGFS). The ISM branch is responsible for management and support of the CGFS internal systems infrastructure, including all local hardware, software, networks, desktops, and related systems and services that enable and enhance the accomplishment of the CGFS mission. Learn more about this agency ### Responsibilities * Establishes guidelines and performance expectations for staff, which are clearly communicated through the formal employee performance management system. * Resolves informal complaints and grievances develops work improvement plans, recommending personnel actions as necessary. * Plans, documents, and implements congressional and executive level policy changes that impact computing resource requirements. * Coordinates infrastructure activities associated with the installation of new or modified applications systems. * Ensures that operational problems are promptly diagnosed and corrected and troubleshoots the most critical and complex problems. ### Travel Required Occasional travel - Some travel may be required less than 20% of the time. ##### Supervisory status Yes ##### Promotion Potential 14 * #### Job family (Series) 2210 Information Technology Management * Requirements Help ## Requirements ### Conditions of Employment * Must be able to obtain and maintain a Top Secret security clearance. * Incumbent will be subject to random drug testing. * Statement of Employment & Financial Interest required prior to appointment. * U.S. Citizenship is required. * New supervisors must successfully complete a 1 year probationary period. ### Qualifications Applicants must meet all the required qualification requirements, including education, and any selective placement factors described below by the closing date of this announcement. If you are qualifying based on education OR if there are mandatory education requirements listed below, you MUST submit a copy of your college transcript with your application. There is no substitute of education for specialized experience for the GS-14 position. **NOTE:** Applicants must meet time-in-grade and time after competitive appointment requirements, by the closing date of this announcement. **Time-In-Grade Requirements:** Federal applicants must have served 52 weeks at the next lower grade to satisfy time-in-grade restrictions, per 5CFR 300, Subpart F. **Applicants applying for the GS-14 grade level must meet the following requirements:** **Have IT-related experience demonstrating EACH of the four competencies AND specialized experience listed below:** 1. ** Attention to Detail**-Leads the delivery of a broad range of infrastructure management services in support of bureau's programs and activities. Reviews activity reports to identify potential problems and issues and initiates appropriate action. 2. ** Customer Service** -Implements customer support policies and procedures that ensure customers receive timely and appropriate responses to requests for assistance. Ensures the availability of online and offline reference sources. Oversees development and maintenance of a problem resolution database to support customer support activities. 3. **Oral Communication** - Provides informal feedback and periodically evaluates employee performance. Resolves informal complaints and grievances develops work improvement plans, recommending personnel actions as necessary. 4. ** Problem Solving** - Must exercise initiative, resourcefulness, and judgment interpreting, applying, and adapting policies and guidelines to the solution of Bureau automation problems, identifying new technology that may be useful for the Bureau. Have at least 1 full year of specialized experience equivalent to the GS-13 level in the Federal service which provided you with the particular knowledge, skills and abilities to perform the duties of the position. ** Qualifying specialized experience must demonstrate the following:** * Experience evaluating employee performance, developing work improvement plans. * Experience resolving informal complaints and grievances. * Experience developing and implementing congressional and executive level policy changes that impact computing resource requirements. * Experience advising management on major financial system applications software deployment and operations. **NOTE:** In order to qualify for this position, your experience MUST be IT related; the experience may be demonstrated by paid or unpaid experience and/or completion of specific, intensive training (for example, IT certification), as appropriate. There is no substitute of education for specialized experience for the GS-14 position. **In addition, applicant's experience must also demonstrate that the candidate possesses the following qualities:** 1. Ability to assign, review, and supervise the work of others. 2. Objectivity and fairness in judging people on their ability, and situations on the facts and circumstances. 3. Ability to adjust to change, work pressures, or difficult situations without undue stress. 4. Willingness to consider new ideas or divergent points of view. 5. Capacity to "see the job through." ### Education See the qualifications section of this vacancy announcement for education requirements, if applicable. ### Additional information For reasonable accommodation at the U.S. Department of State, please contact the Office of Accessibility and Accommodations at (202) 663-3474 or ReasonableAccommodations@state.gov. Read more ### How You Will Be Evaluated You will be evaluated for this job based on how well you meet the qualifications above. Your qualifications will be evaluated on the following knowledge, skills, abilities (KSAs) and other characteristics that are relevant to the duties of this position and must be fully supported by information in your resume: 1. Ability to perform personnel supervisory duties (e.g., selection, performance appraisals) 2. Skill in participating in labor relations contract negotiations. 3. Skill in managing and resolving conflicts, grievances, confrontations, 4. Ability to operate and/or manage an IT Helpdesk. 5. Knowledge of performing troubleshooting. 6 Knowledge of information technology specialty areas. Your resume serves as the basis for qualification determinations and must highlight your most relevant and significant work experience and education (if applicable) as it relates to this job opportunity. Experience refers to paid and unpaid experience, including volunteer work done through National Service programs (e.g., Peace Corps, AmeriCorps) and other organizations (e.g., professional; philanthropic; religious; spiritual; community, student, social). Your resume must include the dates of all qualifying experience (from month/year to month/year) and the number of hours worked/volunteered per week. For assistance with creating a resume, please click here. Qualified candidates are assigned a score between 70 and 100. Agency Career Transition Assistance Program (CTAP) or Interagency Career Transition Assistance Program (ICTAP) candidates must be rated "Well Qualified" for the position and earn a score of at least 85 (when applicants are rated in a range of 70 to 100) to receive consideration for special priority. If, after reviewing your resume and self-assessment questionnaire responses and a determination is made that you have inflated your qualifications and/or experience, a score will be manually determined that reflects your documented experience. This may result in a lower score, which may also eliminate you from consideration for this position. Applicants must meet all the qualification requirements and submit any required supporting documentation by the closing date of this job opportunity. Applicants found to be among the top qualified candidates will be referred to the hiring official for further consideration and possible interview. **To preview questions please click here.** Read more ### Background checks and security clearance ##### Security clearance Top Secret ##### Drug test required No * Required Documents Help ## Required Documents All required documents listed below, that are applicable to you, must be submitted to our automated system "Gateway to State" by 11:59 p.m. Eastern Time (ET) on the closing date of this announcement. 1. Resume - your resume or any other written format you choose should contain the required information as specified in the “How You Will Be Evaluated” section. Insufficient information will result in an ineligible rating. 2. A completed online job specific self-assessment questionnaire through the Department’s automated system “Gateway to State”. 3. Transcripts - if applicable, see the Qualifications section of the announcement. If selected, an official/sealed college transcript(s) will be required to verify education prior to employment. 4. If you are qualifying based on other criteria listed under the Qualification Section of this announcement, you must submit the required supporting documentation (certificates, certifications, etc.) with your application by the closing date. 5. Current eligible DOS employees (per 3 FAM 2315) including non-competitive applicants must submit a SF-50 (Notification of Personnel Action) that shows the effective date, position title, series, grade, salary, tenure, position occupied, full promotion potential, AND submit a copy of your most recent completed annual performance appraisal that includes the final rating. If a performance appraisal does not exist, is incomplete or unavailable, a Form DS-1812 (Applicant Appraisal) or equivalent form from another agency signed by the current supervisor is acceptable. Mid-year progress reviews will not be accepted. 6. CTAP eligibles must submit a copy of the appropriate documentation with their application. See link below: CTAP Considerations #### If you are relying on your education to meet qualification requirements: Education must be accredited by an accrediting institution recognized by the U.S. Department of Education in order for it to be credited towards qualifications. Therefore, provide only the attendance and/or degrees from schools accredited by accrediting institutions recognized by the U.S. Department of Education. Failure to provide all of the required information as stated in this vacancy announcement may result in an ineligible rating or may affect the overall rating. * Benefits Help ## Benefits A career with the U.S. Government provides employees with a comprehensive benefits package. As a federal employee, you and your family will have access to a range of benefits that are designed to make your federal career very rewarding. Learn more about federal benefits. Review our benefits Eligibility for benefits depends on the type of position you hold and whether your position is full-time, part-time, or intermittent. Contact the hiring agency for more information on the specific benefits offered. * How to Apply Help ## How to Apply **Prepare your application in USAJOBS** To start your application, click Apply and we’ll walk you through the process where you’ll attach a resume and any required documents. During the application process you can review, edit, delete, and update your information. We’ll automatically save your progress as you go, so you won’t lose any changes. Please carefully read all the instructions before you apply. You have until 11:59 p.m. Eastern Time (ET) on the closing date of this announcement to complete the application process. **STEP 1:** Select the "Apply On-line" button and follow the instructions to register or sign into USAJOBS. **STEP 2:** Submit a detailed resume or any other written format you choose documenting your job-related qualifications, experience, and education (if applicable). Cover letter is optional. If you submit a cover letter, you must also submit a resume. Please see the How You Will Be Evaluated section for specific information that should be outlined in your resume. **STEP 3:** Answer the job-specific self-assessment questions on-line through the U.S. Department of State’s Gateway to State automated application system. The questions will be used to evaluate your qualifications and experience for this position. **STEP 4:** Submit all required documentation applicable to you, as listed in the Required Documents section of this announcement, to the Department’s Gateway to State automated application system prior to the closing date of this announcement. For instructions on how to view the status of your supporting documentation, please click here. **Technical assistance with your on-line application is available through the Help Desk at mgshelp@monster.com or by calling (866) 656-6830 or (703) 269-4944 between the hours of 7:00 a.m. and 7:00 p.m. ET** **ALTERNATE APPLICATION PROCEDURES** **NOTE:** If applying online poses an extreme hardship, you may request alternate application procedures to submit your application package by fax. Contact the Human Resources office listed on the announcement between the business hours of 8:15 a.m. and 5:00 p.m. ET at least 2 working days prior to the closing date of this announcement. The application package for alternate application procedures must be submitted and received in the Human Resources office no later than 11:59 p.m. ET on the closing date of this announcement. Paper applications and information sent by mail WILL NOT BE ACCEPTED. Read more ### Agency contact information ### Idia Cotton-Ferrell ##### Phone 843-746-1202 ##### Fax 000-000-0000 ##### Email CottonFerrellI@state.gov ##### Address U.S. Department of State 1999 Dyess Ave. (Charleston Reg. Ctr.) Charleston, South Carolina 29405 United States Learn more about this agency ### Next steps After all application packages have been received, we will review your resume to ensure you meet the basic qualification requirements. After we review and evaluate all applications, the most highly qualified candidates will be referred to the hiring manager for further consideration for possible interviews in approximately two weeks after the announcement closes. After a tentative job offer, we will conduct a suitability review and/or security background investigation, which generally takes an average of at least two to six months. You will be notified up to four times during the hiring process: 1. Upon receipt of your application. 2. Upon minimum qualification determinations. 3. After the certificate is issued. 4. After final selection is made. **For instructions on how to view the status of your application, please click here**. Multiple positions may be filled from this announcement. Read more * Fair & Transparent ## Fair & Transparent The Federal hiring process is setup to be fair and transparent. Please read the following guidance. ### Equal Employment Opportunity Policy The United States Government does not discriminate in employment on the basis of race, color, religion, sex (including pregnancy and gender identity), national origin, political affiliation, sexual orientation, marital status, disability, genetic information, age, membership in an employee organization, retaliation, parental status, military service, or other non-merit factor. * Equal Employment Opportunity (EEO) for federal employees & job applicants Read more ### Reasonable Accommodation Policy Federal agencies must provide reasonable accommodation to applicants with disabilities where appropriate. Applicants requiring reasonable accommodation for any part of the application process should follow the instructions in the job opportunity announcement. For any part of the remaining hiring process, applicants should contact the hiring agency directly. Determinations on requests for reasonable accommodation will be made on a case-by-case basis. A reasonable accommodation is any change to a job, the work environment, or the way things are usually done that enables an individual with a disability to apply for a job, perform job duties or receive equal access to job benefits. Under the Rehabilitation Act of 1973, federal agencies must provide reasonable accommodations when: * An applicant with a disability needs an accommodation to have an equal opportunity to apply for a job. * An employee with a disability needs an accommodation to perform the essential job duties or to gain access to the workplace. * An employee with a disability needs an accommodation to receive equal access to benefits, such as details, training, and office-sponsored events. You can request a reasonable accommodation at any time during the application or hiring process or while on the job. Requests are considered on a case-by-case basis. Learn more about disability employment and reasonable accommodations or how to contact an agency. Read more #### Legal and regulatory guidance * Financial suitability * Social security number request * Privacy Act * Signature and false statements * Selective Service * New employee probationary period This job originated on www.usajobs.gov. For the full announcement and to apply, visit www.usajobs.gov/GetJob/ViewDetails/512974800. Only resumes submitted according to the instructions on the job announcement listed at www.usajobs.gov will be considered. *Open & closing dates:* 10/05/2018 to 10/19/2018 *Service:* Competitive *Pay scale & grade:* GS 14 *Salary:* $103,106 to $134,038 per year *Appointment type:* Permanent *Work schedule:* Full-Time
          (USA-CA-Oakland) Help Desk Technician (Business Technical Support Analyst 2)      Cache   Translate Page      
Help Desk Technician (Business Technical Support Analyst 2) Category: Professional Facility: UCSF Benioff Children's Hospital Oakland Department: CHO Hospital Information Systems Schedule: Full Time Shift: Day Shift Hours: 40 hours/week, Mon-Fri FTE: 1.00000 Job Details: High School/GED 3 to 5 Years of Experience Required Position Summary:Under general supervision of IT Technical Support management, the Help Desk Technician provides hands-on support for service desk telephone, ticket, and e-mail user support requests and field service support/maintenance of end user devices within the hospital, clinic and administrative areas, including computing and communications of devices deployed throughout UCSF Benioff Children's Hospital Oakland. This position interacts with physicians, nurses, and a broad array of others including administrative personnel, other IT groups, external departments, vendors, and consultants requiring both sound technical and outstanding customer service skills (highly professional, courteous, and patient disposition.) The Help Desk Technician ensures for the timely completion of appropriate proactive maintenance activities and reactive incident resolution processes necessary to maintain the end user IT device environment. This includes corrective action in the resolution of incidents, change management, and escalation/notification processes as appropriate. Service Desk has a broad scope of responsibility for providing first and second level support triage, coordination of external support agencies, and coordination of IT staff as it relates to providing user support, handling a high volume of calls in a professional manner. Field Services has a broad scope of responsibility for on-site support of end user computing devices (computers, peripherals, handheld devices, etc.), support for voice / telephone devices and videoconferencing systems at end user locations, wiring closet maintenance and provisioning of voice and data services based on design and allocation data from IT Engineering, moves/adds/changes of end user devices for both voice and data based on design and allocation data from IT Engineering. Position Requirements:Minimum Education: High school, GED or equivalent required. Minimum Experience: 3-5 years of related work experience required. 2 – 3 years experience in healthcare strongly desired. Certification Required: Certification on A+, MCSC, MCSE, ITIL Foundations preferred.Knowledge, Skills, and Abilities: Ability to stay current with new technologies and maintain desire and ability to learn these technologies. Excellent customer service and interpersonal skills. Excellent attendance and punctuality. Must demonstrate the ability to assess a situation, define the problem, develop an approach and work with other teams as necessary in executing on that approach. Need to demonstrate past instances of working in this manner successfully. Expertise in end user devices including Windows desktop/laptops and operating systems and familiar with handheld devices such as iPhones, iPad, and Android devices, and video conferencing end points. Physical Requirements:Sit: Up to 8 hours/dayStand/Walk: Up to 6 hoursBend/Stoop: Up to 6 hoursReach: Up to 6 hoursRep Use of UE/Grasp: Up to 8 hrsLift/Push/Pull: 25 lbs, over 25 lbs with assistance or equipmentThis job requires the ability to hear alarms clients and/or instruction. The ability to see accurately from 20 inches to 20-ft. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential function of this position. UCSF Benioff Children's Hospital Oakland is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, or protected veteran status. UCSF Benioff Children's Hospital Oakland seeks candidates whose skills, and personal and professional experience, have prepared them to contribute to our commitment to diversity and excellence, and the communities we serve.
          (Tested) 3DMark Night Raid Direct3D 12 Benchmark      Cache   Translate Page      
A new benchmark has been added in the latest version 2.6.6174 of 3DMark. This new benchmark, called Night Raid, is a Direct3D 12 benchmark for laptops, notebooks, tablets and other mobile computing devices with integrated graphics. DirectX 12 benchmarking for mobile computing 3DMark Night Raid is a DirectX 12 benchmark for laptops, notebooks, tablets and other mobile computing devices with integrated graphics. You can also … Continue reading (Tested) 3DMark Night Raid Direct3D 12 Benchmark »
          Huawei to sell servers with own chips in cloud computing push      Cache   Translate Page      
China's Huawei, the world's largest telecom-equipment maker, on Wednesday said it will sell some servers powered by its own chips for the first time, doubling down on efforts to boost its cloud computing business. Reported by Reuters India 23 minutes ago.
          Mobile Computing Specialist - Planaxis | Groupaxis - Montréal, QC      Cache   Translate Page      
Optimization and handoff of work to Level 2 offshore team. Planxis is looking for System Operations specialist (Mobile Computing) for a one year contract in...
From Planaxis | Groupaxis - Thu, 04 Oct 2018 19:10:42 GMT - View all Montréal, QC jobs
          (USA-DC-Washington) Student and Communications Assistant      Cache   Translate Page      
Located in a historic neighborhood in the nation's capital, Georgetown offers rigorous academic programs, a global perspective, exciting ways to take advantage of Washington, D.C., and a commitment to social justice. Our community is a tight knit group of remarkable individuals interested in intellectual inquiry and making a difference in the world. Requirements Student and Communications Assistant - Center for Transnational Legal Studies The incumbent’s position provides clerical, administrative, computing, and technical support to the Administrative Director and plays a supportive role for all functions in the Center for Transnational Legal Studies. The position provides frontline support to the Center's student body. The secondary responsibility of this position includes maintaining and updating the Center's Social Media presence (Facebook and Twitter) and the Monthly Newsletter. The incumbent also supports the Administrative Director in monitoring and editing the website. The Student and Communication Assistant is crucial to the operations of the Center. The incumbent must be precise and personable in all dealings with our constituencies. The Administrative Director and the Center students and staff as a whole are negatively affected if the person in this position cannot perform his or her duties with accuracy, resourcefulness and courtesy.Duties include but are not limited to: + Answers student and faculty inquiries; organizing and maintaining data files; preparing routine reports, correspondence and special reports as requested; receiving and screening telephone calls, email, and other electronic communication to the Center; participating in meetings as requested; assisting in coordination of projects and special events. + Plays a crucial role in supporting the Center students, faculty and staff with administrative functions. + Maintains current working knowledge of and an active participation in activities and issues undertaken by the Center for Transnational Legal Studies. + Functions as an assistant to the Administrative Director in his/her duties as an administrative liaison among Center faculty both in London and in other law schools around the world. + Assists with events sponsored directly by the Center as well as special events associated with government agencies and outside organizations. Duties include assisting with catering, event set-up, event databases, distribution of material/information for the event, facility and audio-visual requirements and making the appropriate arrangements. + Other duties as assigned by the Administrative Director. Requirements + Bachelor's degree or equivalent and progressively responsible experience in executive office management, preferably in a higher education or customer service setting + Computer-literate, with advanced skill s in Word, e-mail software, and PC- based database management programs, such as Microsoft Access and Excel, all in a Windows environment. In addition, the candidate must be able to work with a Mac computer and laptop + Advanced usage and understanding of Social Media (Facebook, Twitter, Instagram) are required and experience in e-newsletters and/ or web editing are an advantage + Excellent organizational skills. Candidate must also possess exceptional verbal and written communication skills, and must be able to work with diverse constituencies, including faculty, administrators, students, and other staff. Candidate must be self-motivated and self- directed, and capable of handling multiple tasks simultaneously. + Maintain the highest levels of professionalism and office decorum, while retaining the interpersonal skills necessary to successfully relate to other members of the Georgetown Law community. Attention to detail, good listening skills, and an ability to establish priorities are critical to success in this posit ion + Capable of maintaining the confidentiality of sensitive information. + Because of the cyclical nature of the Center's academic schedule, this employee may be called upon to work extended hours (including some weekend time) several times each semester. A positive attitude and a willingness to devote as much time is required to do the job right is a necessary attribute at the Center. Current Georgetown Employees: If you currently work at Georgetown University, please exit this website and login to GMS (gms.georgetown.edu) using your Net ID and password. Then select the Career worklet on your GMS Home dashboard to view Jobs at Georgetown. Submission Guidelines: Please note that in order to be considered an applicant for any position at Georgetown University you must submit a cover letter and resume for each position of interest for which you believe you are qualified. These documents are not kept on file for future positions. Need Assistance: If you are a qualified individual with a disability and need a reasonable accommodation for any part of the application and hiring process, please click here for more information, or contact the Office of Institutional Diversity, Equity, and Affirmative Action (IDEAA) at 202-687-4798 or ideaa@georgetown.edu. Need some assistance with the application process? Please call 202-687-2500. For more information about the suite of benefits, professional development and community involvement opportunities that make up Georgetown's commitment to its employees, please visit the Georgetown Works website. EEO Statement: Georgetown University is an Equal Opportunity/Affirmative Action Employer fully dedicated to achieving a diverse faculty and staff. All qualified applicants are encouraged to apply and will receive consideration for employment without regard to race, color, religion, national origin, age, sex (including pregnancy, gender identity and expression, and sexual orientation), disability status, protected veteran status, or any other characteristic protected by law. Georgetown University is one of the world’s leading academic and research institutions, offering a unique educational experience that prepares the next generation of global citizens to lead and make a difference in the world. We are a vibrant community of exceptional students, faculty, alumni and professionals dedicated to real-world applications of our research, scholarship, faith and service. Established in 1789, Georgetown is the nation’s oldest Catholic and Jesuit University. Drawing upon the 450-year-old legacy of Jesuit education, we provide students with a world-class learning experience focused on educating the whole person through exposure to different faiths, cultures and beliefs. Students are challenged to engage in the world and become men and women in the service of others, especially the most vulnerable and disadvantaged members of the community. These values are at the core of Georgetown’s identity, binding members of the community across diverse backgrounds.
          (USA-CA-San Francisco) Senior Technical Program Manager - AV Compute      Cache   Translate Page      
Senior Technical Program Manager - AV Compute at Cruise Automation San Francisco, CA We're the driverless car company. We believe in improving people’s lives by making transportation safer, more accessible, and more convenient. We’re building the world’s most advanced software to fuel the driverless cars that safely connect people to the places, things, and experiences they care about. We seek and embrace diversity in all of its forms. We continuously push ourselves to think differently and take ownership wherever it's needed. This is a place for dreamers and doers to succeed. If you share our passion for achieving what some say is impossible, join us. Day-to-day responsibilities include: + Work with key stakeholders in Product/Program Management and executive teams to define hardware strategy and requirements + Lead cross-functional development on new technology from design through delivery + Work with teams to deliver prototype, validation, manufacturing and support plans in sync with launch timelines + Communicate regularly with senior management on status, risks and change control + Keep cross-functional teams informed and aligned on team progress & needs + Work with and build relationships internally and with GM, 3rd parties and external manufacturers + Help manage and drive complex, fast-evolving hardware programs, both in-house and by third-party vendor partners + Create and organize all relevant documentation Sample Projects: + Automotive networking + High performance computing + Sensor interface + Thermal and mechanical You should apply for this role if you have the following qualifications: + BS, MS, or PhD in engineering, science, or related field + 6+ years of industry experience + Ability to understand complex technical systems + Ability to adapt and operate under ambiguity + Strong technical and nontechnical communication skills + Ability to identify and act on opportunities to improve processes and increase efficiency + Able to confidently bring order and organization to any team Bonus points! + Experience in the automotive industry + Proficiency with statistical analysis on large datasets + Experience with ROS/Python/C/C++ + Experience with computer/sensing hardware and testing Perks of being a Cruiser: While doing meaningful work is the best perk of all, we also offer the following programs and benefits to support the extraordinary humans who serve as the backbone in making our robot cars go: + The opportunity to solve difficult problems that have immediate and valuable real-world applications + Competitive salary and benefits including 401k Cruise matching program to help you meet your long-term financial goals + Medical / dental / vision, AD+D and Life + Paid parental leave so you can spend time with the newest addition(s) to your family’s fleet + Health and Wellness reimbursement + Annual Learning and Development stipend + Flexible vacation and 10 paid company holidays + State of the art equipment for your work station + Healthy lunch, snacks, dinner Take a glimpse through the lens of a Cruiser on our LinkedIn Page GM Cruise LLC provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability, sexual orientation, gender identity or expression, veteran status, or genetics. In addition to federal law requirements, GM Cruise LLC complies with applicable state and local laws governing nondiscrimination in employment in every location in which the company has facilities. This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation and training. Pursuant to applicable laws including the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records. Privacy Statement
          (USA-CA-San Francisco) Senior Hardware Engineer - Manufacturing      Cache   Translate Page      
Senior Hardware Engineer - Manufacturing at Cruise Automation San Francisco, CA We're the driverless car company. We believe in improving people’s lives by making transportation safer, more accessible, and more convenient. We’re building the world’s most advanced software to fuel the driverless cars that safely connect people to the places, things, and experiences they care about. We seek and embrace diversity in all of its forms. We continuously push ourselves to think differently and take ownership wherever it's needed. This is a place for dreamers and doers to succeed. If you share our passion for achieving what some say is impossible, join us. Day-to-day responsibilities include: + Work with key stakeholders in engineering and Product/Program Management teams to define manufacturing strategy and requirements + Lead manufacturing plan on new hardware from design through delivery + Work with teams to deliver prototype, validation, manufacturing and support plans in sync with launch timelines + Communicate regularly with senior management on status, risks and change control + Work with and build relationships internally and with GM, 3rd parties and external manufacturers + Help manage and drive complex, fast-evolving manufacturing programs, both in-house and by contract manufacturers + Create and organize all relevant documentation Sample Projects: + Automotive networking + High performance computing + Sensor interface + Thermal and mechanical You should apply for this role if you have the following qualifications: + BS, MS, or PhD in engineering, science, or related field + 5+ years of industry experience + Ability to understand complex technical systems + Ability to adapt and operate under ambiguity + Strong technical and nontechnical communication skills + Ability to identify and act on opportunities to improve processes and increase efficiency + Able to confidently bring order and organization to any team Bonus points! + Experience in the automotive industry + Proficiency with statistical analysis on large datasets + Experience with ROS/Python/C/C++ + Experience with computer/sensing hardware and testing Perks of being a Cruiser: While doing meaningful work is the best perk of all, we also offer the following programs and benefits to support the extraordinary humans who serve as the backbone in making our robot cars go: + The opportunity to solve difficult problems that have immediate and valuable real-world applications + Competitive salary and benefits including 401k Cruise matching program to help you meet your long-term financial goals + Medical / dental / vision, AD+D and Life + Paid parental leave so you can spend time with the newest addition(s) to your family’s fleet + Health and Wellness reimbursement + Annual Learning and Development stipend + Flexible vacation and 10 paid company holidays + State of the art equipment for your work station + Healthy lunch, snacks, dinner Take a glimpse through the lens of a Cruiser on our LinkedIn Page GM Cruise LLC provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability, sexual orientation, gender identity or expression, veteran status, or genetics. In addition to federal law requirements, GM Cruise LLC complies with applicable state and local laws governing nondiscrimination in employment in every location in which the company has facilities. This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation and training. Pursuant to applicable laws including the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records. Privacy Statement
          Improving resource elasticity in cloud computing thanks to model-free control. (arXiv:1810.03702v1 [cs.DC])      Cache   Translate Page      

Authors: Maria Bekcheva, Michel Fliess, Cédric Join, Alireza Moradi, Hugues Mounier

In cloud computing management, the dynamic adaptation of computing resource allocations under time-varying workload is an active domain of investigation. Several control strategies were already proposed. Here the model-free control setting and the corresponding "intelligent" controllers, which are most successful in many concrete engineering situations, are employed for the "horizontal elasticity." When compared to the commercial "Auto-Scaling" algorithms, our easily implementable approach, behaves better even with sharp workload fluctuations. This is confirmed by experiments on Amazon Web Services (AWS).


          China's Huawei Seeks to Chip Away at Silicon Valley's AI Supremacy - Wall Street Journal      Cache   Translate Page      

Wall Street Journal

China's Huawei Seeks to Chip Away at Silicon Valley's AI Supremacy
Wall Street Journal
SHANGHAI—Huawei Technologies Co. unveiled two new computing chips aimed at powering artificial-intelligence applications, marking the Chinese telecommunications giant's first major push into high-end technology dominated by U.S. chip giants.
Huawei unveils chips at Shanghai conferenceThe Express Tribune

all 25 news articles »

          Find the dimension that counts: Fast dimension estimation and Krylov PCA. (arXiv:1810.03733v1 [cs.NA])      Cache   Translate Page      

Authors: Shashanka Ubaru, Abd-Krim Seghouane, Yousef Saad

High dimensional data and systems with many degrees of freedom are often characterized by covariance matrices. In this paper, we consider the problem of simultaneously estimating the dimension of the principal (dominant) subspace of these covariance matrices and obtaining an approximation to the subspace. This problem arises in the popular principal component analysis (PCA), and in many applications of machine learning, data analysis, signal and image processing, and others. We first present a novel method for estimating the dimension of the principal subspace. We then show how this method can be coupled with a Krylov subspace method to simultaneously estimate the dimension and obtain an approximation to the subspace. The dimension estimation is achieved at no additional cost. The proposed method operates on a model selection framework, where the novel selection criterion is derived based on random matrix perturbation theory ideas. We present theoretical analyses which (a) show that the proposed method achieves strong consistency (i.e., yields optimal solution as the number of data-points $n\rightarrow \infty$), and (b) analyze conditions for exact dimension estimation in the finite $n$ case. Using recent results, we show that our algorithm also yields near optimal PCA. The proposed method avoids forming the sample covariance matrix (associated with the data) explicitly and computing the complete eigen-decomposition. Therefore, the method is inexpensive, which is particularly advantageous in modern data applications where the covariance matrices can be very large. Numerical experiments illustrate the performance of the proposed method in various applications.


          (USA-CA-Livermore) Livermore Computing Accounts Specialist      Cache   Translate Page      
Livermore Computing Accounts Specialist Location: Livermore, CA Category: Technicians/IT Organization: Computation Posting Requirement: External w/ US Citizenship Job ID: 104342 Job Code: Computer Support Technologist (525.2) / Sr Comp Support Technologist (525.3) Date Posted: October 09 2018 Share this Job Apply Now Apply For This Job Science and Technology on a Mission! For more than 60 years, the Lawrence Livermore National Laboratory (LLNL) has applied science and technology to make the world a safer place. We have an opening for a Livermore Computing (LC) Accounts Specialist to provide general tier 1 technical support for approximately 3,500 users of the LC supercomputing systems. You will be responsible for providing support by phone, in person or through email to answer and resolve requests for all LC account services provided by the LC Hotline. This position is in the Customer Service Group within the Livermore Computing Division of the Computation Directorate. This position will be filled at either the 525.2 or 525.3 level depending on your qualifications. Additional job responsibilities (outlined below) will be assigned if you are selected at the higher level. Essential Duties - Support the administration of LC user accounts, OTP tokens, banks, UNIX groups, and shared directories, while ensuring users are equipped to efficiently and effectively use computers. - Provide excellent customer service and support a diverse user community to answer and resolve customer calls and requests, document all service calls and solutions, and research and troubleshoot LC account issues. - Provide general technical support to solve technical problems of moderate complexity within the LC user community in support of all of the account services - Document and maintain LC Accounts Specialists’ email templates, processes, and procedures. - Maintain appropriate technology, computer security, and safety training. - Process account and UNIX group creations and deletions via the LC Identity Management tool. - Perform other duties as assigned. In Addition at the 525.3 Level - Provide advanced technical assistance to the LC user community by answering calls, emails, and self service requests from users. - Collaborate on implementation of improvements to existing procedures and tools. - Develop scripts to automate LC Accounts Specialists’ support processes. Qualifications - Associate’s degree in a Computer or Engineering related field or the equivalent combination of education, technical training and related experience. - Experience working with customers, addressing issues, and managing customer requests on the phone, via email and/or in person. - General working knowledge of the Linux, Windows and Macintosh Operating systems. - Experience resolving moderately complex problems with a focus on details to ensure follow-through to assure problems are resolved. - Experience writing technical solutions and commercial knowledgebase articles. - Ability to develop and follow detailed policies and procedures. - Experience and knowledge of the skills needed for a customer support role to include a focus on listening, rapport-building, good written and verbal communication skills with the ability to communicate with individuals with all levels of technical and non-technical skill sets. Display a friendly and approachable nature and the ability to show courtesy and patience under stress. - Ability to work with other members of the LC division, LC Computer Coordinators and PI’s. In Addition at the 525.3 Level - Ability to evaluate existing operational procedures and develop and implement process improvement changes to improve LC Hotline operations. - Strong analytical and troubleshooting skills, attention to detail, consistent resolution of problems. - Advanced written and verbal communication skills with the ability to communicate with individuals with all levels of technical and non-technical skill sets. Desired Qualifications - Advanced knowledge of the Linux operating system, Microsoft Office Suite and Service Now incident management system - Experience working at a service desk. - Experience using mysql or similar database. Pre-Employment Drug Test: External applicant(s) selected for this position will be required to pass a post-offer, pre-employment drug test. Security Clearance: This position requires a Department of Energy (DOE) Q-level clearance. If you are selected, we will initiate a Federal background investigation to determine if you meet eligibility requirements for access to classified information or matter. In addition, all L or Q cleared employees are subject to random drug testing. Q-level clearance requires U.S. citizenship. If you hold multiple citizenships (U.S. and another country), you may be required to renounce your non-U.S. citizenship before a DOE L or Q clearance will be processed/granted. Note: This is a Career Indefinite position. Lab employees and external candidates may be considered for this position. About Us Lawrence Livermore National Laboratory (LLNL), located in the San Francisco Bay Area (East Bay), is a premier applied science laboratory that is part of the National Nuclear Security Administration (NNSA) within the Department of Energy (DOE). LLNL's mission is strengthening national security by developing and applying cutting-edge science, technology, and engineering that respond with vision, quality, integrity, and technical excellence to scientific issues of national importance. The Laboratory has a current annual budget of about $1.8 billion, employing approximately 6,500 employees. LLNL is an affirmative action/ equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, marital status, national origin, ancestry, sex, sexual orientation, gender identity, disability, medical condition, protected veteran status, age, citizenship, or any other characteristic protected by law.
          On the Relationship between Energy Complexity and Other Boolean Function Measures. (arXiv:1810.03811v1 [cs.CC])      Cache   Translate Page      

Authors: Xiaoming Sun, Yuan Sun, Kewen Wu, Zhiyu Xia

In this work we investigate into energy complexity, a Boolean function measure related to circuit complexity. Given a circuit $\mathcal{C}$ over the standard basis $\{\vee_2,\wedge_2,\neg\}$, the energy complexity of $\mathcal{C}$, denoted by $\mathrm{EC}(\mathcal{C})$, is the maximum number of its activated inner gates over all inputs. The energy complexity of a Boolean function $f$, denoted by $\mathrm{EC}(f)$, is the minimum of $\mathrm{EC}(\mathcal{C})$ over all circuits $\mathcal{C}$ computing $f$. This concept has attracted lots of attention in literature. Recently, Denish, Otiv, and Sarma [COCOON'18] gave $\mathrm{EC}(f)$ an upper bound in terms of the decision tree complexity, $\mathrm{EC}(f)=O(\mathrm{D}(f)^3)$. They also showed that $\mathrm{EC}(f)\leq 3n-1$, where $n$ is the input size. Recall that the minimum size of circuit to compute $f$ could be as large as $2^n/n$. We improve their upper bounds by showing that $\mathrm{EC}(f)\leq\min\{\frac12\mathrm{D}(f)^2+O(\mathrm{D}(f)),n+2\mathrm{D}(f)-2\}$. For the lower bound, Denish, Otiv, and Sarma defined positive sensitivity, a complexity measure denoted by $\mathrm{psens}(f)$, and showed that $\mathrm{EC}(f)\ge\frac{1}{3}\mathrm{psens}(f)$. They asked whether $\mathrm{EC}(f)$ can also be lower bounded by a polynomial of $\mathrm{D}(f)$. In this paper we affirm it by proving $\mathrm{EC}(f)=\Omega(\sqrt{\mathrm{D}(f)})$. For non-degenerated functions with input size $n$, we give another lower bound $\mathrm{EC}(f)=\Omega(\log{n})$. All these three lower bounds are incomparable to each other. Besides, we also examine the energy complexity of $\mathtt{OR}$ functions and $\mathtt{ADDRESS}$ functions, which implies the tightness of our two lower bounds respectively. In addition, the former one answers another open question asking for a non-trivial lower bounds for the energy complexity of $\mathtt{OR}$ functions.


          Feynman Integrals and Intersection Theory. (arXiv:1810.03818v1 [hep-th])      Cache   Translate Page      

Authors: Pierpaolo Mastrolia, Sebastian Mizera

We introduce the tools of intersection theory to the study of Feynman integrals, which allows for a new way of projecting integrals onto a basis. In order to illustrate this technique, we consider Baikov representation of maximal cuts in arbitrary space-time dimension. We introduce a minimal basis of differential forms with logarithmic singularities on the boundaries of the corresponding integration cycles. We give an algorithm for computing a basis decomposition of an arbitrary maximal cut using the so-called intersection numbers and describe two alternative ways of computing them. Furthermore, we show how to obtain Pfaffian systems of differential equations for the basis integrals using the same technique. All the steps are illustrated on the example of a two-loop non-planar triangle diagram with a massive loop.


          Curious Events Day Shortbread      Cache   Translate Page      
That proves it!
PC hardware and computing

Gigabyte Aorus P850W gold power supply review @ PC Perspective
Element Gaming 27" QHD 144-Hz 1-ms gaming monitor review @ bit-tech
Seagate Fast SSD 1TB review @ Guru3D
Gigabyte X399 Aorus Xtreme TR4 motherboard review @ HardOCP
MSI GeForce RTX 2080 Ti Duke 11G OC review @ Hexus
Acer Swift 3 laptop review: affordable and accelerated with Optane @ HotHardware
Cooler Master Masterwatt Lite 600W 230V review @ JonnyGuru
be quiet! Dark Rock Pro 4 review – it's a BEAST! @ KitGuru
HyperX Savage EXO SSD external portable drive review @ Legit Reviews

Read more...


          Salesforce Solution Architect - Silverline Jobs - Casper, WY      Cache   Translate Page      
Company Overview: Do you want to be part of a fast-paced environment, supporting the growth of cutting edge technology in cloud computing? Silverline...
From Silverline Jobs - Wed, 05 Sep 2018 06:21:23 GMT - View all Casper, WY jobs
          Algorithmic construction of representations of finite solvable groups. (arXiv:1810.04015v1 [math.RT])      Cache   Translate Page      

Authors: Soham Swadhin Pradhan

The dominant theme of this thesis is the construction of matrix representations of finite solvable groups using a suitable system of generators. For a finite solvable group $G$ of order $N = p_{1}p_{2}\dots p_{n}$, where $p_{i}$'s are primes, there always exists a subnormal series: $\langle {e} \rangle = G_{o} < G_{1} < \dots < G_{n} = G$ such that $G_{i}/G_{i-1}$ is isomorphic to a cyclic group of order $p_{i}$, $i = 1,2,\dots,n$. Associated with this series, there exists a system of generators consisting $n$ elements $x_{1}, x_{2}, \dots, x_{n}$ (say), such that $G_{i} = \langle x_{1}, x_{2}, \dots, x_{i} \rangle$, $i = 1,2,\dots,n$, which is called a "long system of generators". In terms of this system of generators and conjugacy class sum of $x_{i}$ in $G_{i}$, $i = 1,2, \dots, n$, we present an algorithm for constructing the irreducible matrix representations of $G$ over $\mathbb{C}$ within the group algebra $\mathbb{C}[G]$. This algorithmic construction needs the knowledge of primitive central idempotents, a well defined set of primitive (not necessarily central) idempotents and the "diagonal subalgebra" of $\mathbb{C}[G]$. In terms of this system of generators, we give simple expressions for the primitive central idempotents, a well defined system of primitive (not necessarily central) idempotents and a convenient set of generators of the "diagonal subalgebra" of $\mathbb{C}[G]$.

For a finite abelian group, we present an algorithm for constructing the inequivalent irreducible matrix representations over a field of characteristic $0$ or prime to the order of the group and a systematic way of computing the primitive central idempotents of the group algebra. Besides that, we give simple expressions of the primitive central idempotents of the rational group algebra of a finite abelian group using a "long presentation" and it's Wedderburn decomposition.


          A linear algorithm for computing Polynomial Dynamical System. (arXiv:1810.04069v1 [q-bio.MN])      Cache   Translate Page      

Authors: Ines Abdeljaoued-Tej, Alia BenKahla, Ghassen Haddad, Annick Valibouze

Computation biology helps to understand all processes in organisms from interaction of molecules to complex functions of whole organs. Therefore, there is a need for mathematical methods and models that deliver logical explanations in a reasonable time. For the last few years there has been a growing interest in biological theory connected to finite fields: the algebraic modeling tools used up to now are based on Gr\"obner bases or Boolean group. Let $n$ variables representing gene products, changing over the time on $p$ values. A Polynomial dynamical system (PDS) is a function which has several components, each one is a polynom with $n$ variables and coefficient in the finite field $Z/pZ$ that model the evolution of gene products. We propose herein a method using algebraic separators, which are special polynomials abundantly studied in effective Galois theory. This approach avoids heavy calculations and provides a first Polynomial model in linear time.


          Primal-Dual Reduced Basis Methods for Convex Minimization Variational Problems: Robust True Solution A Posteriori Error Certification and Adaptive Greedy Algorithms. (arXiv:1810.04073v1 [math.NA])      Cache   Translate Page      

Authors: Shun Zhang

The a posteriori error estimate and greedy algorithms play central roles in reduced basis method (RBM). A classic RBM uses residual error estimator. The error is estimated in some parameter independent genetic norm and an estimation of the stability constant is also needed. This type of error estimate is not robust with respect to the parameter-dependent energy norm, and it measures only the difference between the RB solution and an unrealistic "truth" finite element solution. The choice of the RB error tolerance is often heuristic and will cause under or over-computing. The finite element solutions for RB snapshots are often computed on a non-optimal mesh, or only computed on a mesh which is good for some parameters in the RB parameter set but not for others.

With the parametric reaction-diffusion and diffusion equations as examples, for a class of parametric convex minimization variational problems, we develop primal-dual reduced basis methods (PD-RBM) with robust true error certifications and adaptive greedy algorithms to overcome the shortcomings of the classic a posteriori error estimator and greedy algorithms in RBM.

For convex minimization variational problems, the duality gap between the primal and dual functionals is a perfect a posteriori error estimator. This primal dual error estimator is robust with respect to the parameters of the problem, and it can be used for both the mesh refinements of finite element methods and the true RB error certification.

We develop three versions of adaptive greedy algorithms to balance the finite element error, the exact reduced basis error, and the adaptive mesh refinements. Extensive numerical tests are performed to test the PD-RBM for three greedy algorithms.


          Coded Computation over Heterogeneous Clusters. (arXiv:1701.05973v4 [cs.DC] UPDATED)      Cache   Translate Page      

Authors: Amirhossein Reisizadeh, Saurav Prakash, Ramtin Pedarsani, Amir Salman Avestimehr

In large-scale distributed computing clusters, such as Amazon EC2, there are several types of "system noise" that can result in major degradation of performance: bottlenecks due to limited communication bandwidth, latency due to straggler nodes, etc. On the other hand, these systems enjoy abundance of redundancy - a vast number of computing nodes and large storage capacity. There have been recent results that demonstrate the impact of coding for efficient utilization of computation and storage redundancy to alleviate the effect of stragglers and communication bottlenecks in homogeneous clusters. In this paper, we focus on general heterogeneous distributed computing clusters consisting of a variety of computing machines with different capabilities. We propose a coding framework for speeding up distributed computing in heterogeneous clusters by trading redundancy for reducing the latency of computation. In particular, we propose Heterogeneous Coded Matrix Multiplication (HCMM) algorithm for performing distributed matrix multiplication over heterogeneous clusters that is provably asymptotically optimal for a broad class of processing time distributions. Moreover, we show that HCMM is unboundedly faster than any uncoded scheme. To demonstrate practicality of HCMM, we carry out experiments over Amazon EC2 clusters where HCMM is found to be up to $61\%$, $46\%$ and $36\%$ respectively faster than three benchmark load allocation schemes - Uniform Uncoded, Load-balanced Uncoded, and Uniform Coded. Additionally, we provide a generalization to the problem of optimal load allocation in heterogeneous settings, where we take into account the monetary costs associated with the clusters. We argue that HCMM is asymptotically optimal for budget-constrained scenarios as well, and we develop a heuristic algorithm for (HCMM) load allocation for budget-limited computation tasks.


          Joint Computation and Communication Cooperation for Energy-Efficient Mobile Edge Computing. (arXiv:1805.05906v2 [cs.IT] UPDATED)      Cache   Translate Page      

Authors: Xiaowen Cao, Feng Wang, Jie Xu, Rui Zhang, Shuguang Cui

This paper proposes a novel user cooperation approach in both computation and communication for mobile edge computing (MEC) systems to improve the energy efficiency for latency-constrained computation. We consider a basic three-node MEC system consisting of a user node, a helper node, and an access point (AP) node attached with an MEC server, in which the user has latency-constrained and computation-intensive tasks to be executed. We consider two different computation offloading models, namely the partial and binary offloading, respectively. Under this setup, we focus on a particular finite time block and develop an efficient four-slot transmission protocol to enable the joint computation and communication cooperation. Besides the local task computing over the whole block, the user can offload some computation tasks to the helper in the first slot, and the helper cooperatively computes these tasks in the remaining time; while in the second and third slots, the helper works as a cooperative relay to help the user offload some other tasks to the AP for remote execution in the fourth slot. For both cases with partial and binary offloading, we jointly optimize the computation and communication resources allocation at both the user and the helper (i.e., the time and transmit power allocations for offloading, and the CPU frequencies for computing), so as to minimize their total energy consumption while satisfying the user's computation latency constraint. Although the two problems are non-convex in general, we propose efficient algorithms to solve them optimally. Numerical results show that the proposed joint computation and communication cooperation approach significantly improves the computation capacity and energy efficiency at the user and helper nodes, as compared to other benchmark schemes without such a joint design.


          Huawei to sell servers with own chips in cloud computing push      Cache   Translate Page      
China's Huawei [HWT.UL], the world's largest telecom-equipment maker, on Wednesday said it will sell some servers powered by its own chips for the first time, doubling down on efforts to boost its cloud computing business.

          Parsing Metadata with R – A Package Story      Cache   Translate Page      
Every R package has its story. Some packages are written by experts, some by novices. Some are developed quickly, others were long in the making. This is the story of jstor, a package which I developed during my time as a student of sociology, working in a research project on the scientific elite within sociology. Writing the package has taught me many things (more on that later) and it is deeply gratifying to see, that others find the package useful. Before taking a look at the package’s inception however, I want to give you some basic information. JSTOR is a large archive for scientific texts, mainly known for their coverage of journal articles, although they recently added book chapters and other sources as well. They make all of their content available for researchers with their service Data for Research. With this data you can do text mining, citation analysis, and everything else you could come up with, using metadata and data about the content of the articles. The package I wrote, jstor, provides functions to import the metadata, and it has a few helper functions for common cleaning tasks. Everything you need to know about how to use it is on the package website. You will find three vignettes, with a general introduction, examples on how to import many files at once, and a few examples of known quirks of JSTORs data. There is also a lengthy case study that shows how to combine metadata and information on the articles’ content. If you still need more information, you can also watch my presentation at this year’s useR! in Brisbane or dive into the slides. But for now, let us turn back the clock to follow along my journey of developing the package. Hacking Away Back in March 2017, I was starting out as a MA-student of sociology in a research project concerned with the scientific elite within sociology and economics. The project had many goals but writing an R package was not one of them. At the start, I was presented with a dataset which was huge, at least for my terms: around 30GB of data, half of which was text, the other half 500,000 .xml-files. The dataset was incredible in its depth: we had all articles from JSTOR which belonged to the topics “sociology” and “economics”. To repeat: all articles that JSTOR has on those topics for all years JSTOR has data on. My task was to somehow make this data accessible for our research. Since we are sociologists and no computer experts, and my knowledge of R was mainly self-taught, my approach was quite ad-hoc: “Let’s see, how we can extract relevant information for one file, and then maybe we can lapply over the whole set of files.” That is what the tidyverse philosophy and purrr tell you to do: solve it for one case using a function and apply this function to the whole set of files, cases, nested rows, or whatever. Long story short, you can do it like that, and I surely did it like that. But if I could start over and write a new version of the package, I would probably do a few things differently, one of which I discuss near the end of the post. How (not) to import .xml-files So, I had to start somewhere, and that was obviously importing the data into R. After searching and trying different packages, I settled on xml2::read_xml(). But then what. I had done a few pet projects with web-scraping but had no knowledge of XPATH-expressions and how to access certain parts of the document directly. After some stumbling around, I had found xml2::as_list() and was very happy: I could turn this unpleasant creature of XML into a pretty list, which I was accustomed to. My happiness is obvious when looking at the relevant commit message and the corresponding changes. After turning the XML into a list, I would use something like listviewer::jsonedit() to inspect the elements, and extract what I needed. The approach was cumbersome, and the code was not pretty, since the original documents are deeply nested, and the structure was not always the same. But it worked, and I was happy with it, for the time being. My functions looked something like this: extract_contributors % map(extract_name) %__% bind_rows() %__% rename(given_names = `given-names`) %__% mutate(author_number = 1:n()) } } find_meta % map(as_list) %__% map(find_meta) As can be expected when parsing deeply nested lists which do not always have the same structure, this quickly escalated into more and more complex and sometimes quite ridiculous functions: extract_name % flatten() %__% flatten() %__% flatten() %__% .[!(names(.) %in% c("x", "addr-line"))] %__% as_data_frame() } But, as I said, I was solving problems with the tools I already knew, so I was happy. Benchmarking my code At some point though, I started benchmarking my solutions. I experimented with mclapply and it doubled the speed of execution on my machine, but it was still very slow: Parsing the content after importing and transforming it into a list took 7.2 seconds for 3,000 files. For 200,000 files of sociological articles this would amount to 8 hours. And importing and converting to a list took a lot of time too. Although I didn’t think at that time, that I would need to import the files more than once or at most twice (which I had to do later to update results after we got new versions with better data), I decided that this was too slow, and I looked for better options. The first idea which I had was simply to scale computing power: I had a faster machine at home and planned to read the data into R at work, save it as .rds, and then process it at home on the faster machine (for some reason I didn’t want to carry the original data home). Apparently, this is not as easy as it sounds. If you parse a file with xml2::read_xml() you don’t get the content of the file, but only an object that points to the file, and you can then extract content with xml_child() and other functions. But you cannot use readr::write_rds to save the file, instead you need xml2::xml_serialize() and xml2::xml_unserialize() and they require an open connection, and so on. I can tell you that, since Jim Hester kindly responded to my question on StackOverflow. He had a further hint: […] I would seriously consider using XPATH expressions to extract the desired data, even if you have to rewrite code. […] Xpath extracting just the elements you are interested in is going to run much faster than converting the entire data to a list first then manipulating that. ~Jim Hester And this is what I did. Just for the fun of it, I benchmarked two versions: my function before re-writing to using XPATH expressions, and the function today. The current version is a lot safer and handles many edge-cases, but it is still around 5 times faster. Furthermore, the processing time depends less on how complex the original file is, and more on how much information is being read. With the new version of the function, around 30% of the time is spent on reading the file from disk, while the remaining 70% deal with parsing the content. In contrast, the old version spent around 85% of the time on parsing the file. microbenchmark::microbenchmark( convert = jst_example("sample_with_references.xml") %__% read_xml() %__% as_list(), old = jst_example("sample_with_references.xml") %__% read_xml() %__% as_list() %__% find_meta(), new = jst_get_article(jst_example("sample_with_references.xml")) ) ## Unit: milliseconds ## expr min lq mean median uq max neval ## convert 35.621488 39.274647 44.29424 43.530006 46.64541 114.12766 100 ## old 42.038368 46.596185 51.49769 49.711072 52.43276 134.12999 100 ## new 8.675674 9.054154 10.33858 9.365577 10.16726 23.88457 100 I uploaded the old code to a gist: old_functions.R. If you want to run the benchmark on your own, execute the following snippet first: # load current functions library(jstor) # load old function devtools::source_gist( "https://gist.github.com/tklebel/11d2664ac2bc754ddc367369eec1a660", filename = "old_functions.R" ) library(tidyverse) library(xml2) Doing It Properly Working with XPATH-expressions Rewriting my functions was not that much of a hassle, in the end. I had turned my functions into a package early on and had already included many test cases with testthat to make sure everything works as expected. This helped a lot for re-structuring the code, since I already knew what my output should look like, and I only had to change the intermediate steps. The work on re-writing progressed quickly. The first step was to simply extract the identifier for the journal within which the article was published: find_meta % xml_text() } I quickly added new parts, although it didn’t feel all too easy: I basically had to learn how to navigate within the document via XPATH. Another thing I took up during this re-write was regularly benchmarking my functions. Since I lacked the technical expertise to know up front which approach would be faster, I benchmarked possibilities to figure it out. The following benchmark compares three versions of extracting the text from the node named volume. Especially the first two seemed very similar to me and it was not at all obvious, which one would be faster. test_file % xml2::read_xml() fun1 % as.character() } fun2 % xml_text() } fun3 % xml_child("article-meta") %__% xml_child("volume") %__% xml_text() } # `bench::mark` checks if results are consistent, which is usually a good thing # to do bench::mark(fun1(), fun2(), fun3(), min_time = 2) # A tibble: 3 x 14 expression min mean median max `itr/sec` mem_alloc n_gc n_itr total_time 1 fun1() 254µs 332µs 286µs 53.4ms 3011. 12.7KB 15 5757 1.91s 2 fun2() 230µs 295µs 262µs 48.6ms 3393. 10.2KB 14 6518 1.92s 3 fun3() 663µs 838µs 764µs 54.7ms 1193. 35.2KB 16 2254 1.89s # ... with 4 more variables: result , memory , time , gc Although the unit is microseconds here, the difference between fun2 and fun3 is quite substantial, if you want to do it 500,000 times: 4.2 minutes1) . If you have to extract multiple elements from a file (which I was doing), then this quickly adds up. What is the reason for this big difference? I’d guess that fun2 is fastest since it only calls two functions, and not four, and because xml_text() probably converts the content directly to character in C++, which is faster than calling as.character afterwards. Still, I am not a computer scientist, so I am not entirely sure about that. Using profvis to find bottlenecks After rewriting and expanding the functionality, I was still not happy, however, since the code was slower than I thought it should be. At this point, I dug deeper again, using the package profvis to find bottlenecks. Oddly enough, I had introduced a bottleneck right at the beginning: I was using data_frame (which is equivalent to tibble()) to create the object my function would return. Unfortunately, tibble (and data.frame as well) are quite complex functions. They do type checking and other things, and if you do this repeatedly, it quickly adds up. You can see the difference yourself: microbenchmark::microbenchmark( tibble = tibble::tibble(a = rnorm(10), b = letters[1:10]), new_tibble = tibble::new_tibble(list(a = rnorm(10), b = letters[1:10])) ) ## Unit: microseconds ## expr min lq mean median uq max neval ## tibble 332.902 479.7430 624.1354 621.7795 716.437 1944.658 100 ## new_tibble 76.833 106.5485 155.4881 151.2890 172.570 974.428 100 The difference is not huge (~4 minutes for 500,000 documents2), but my actual layout was a lot more complex, since it was using nested structures in a weird way: # dummy data authors
          Senior Analyst (Research Computing) - University of Saskatchewan - Saskatoon, SK      Cache   Translate Page      
Frequent foot travel around campus to research labs will be required. The salary range, based on 1.0 FTE, is CAD $79,448.00 - 132,331.00 per annum (Information... $79,448 - $132,331 a year
From University of Saskatchewan - Thu, 04 Oct 2018 00:19:00 GMT - View all Saskatoon, SK jobs
          Full Stack Software Engineer      Cache   Translate Page      
MN-Minneapolis, If you are a Full Stack Software Engineer with experience, please read on! -We’re the largest cloud technology company HQ’d in Minnesota. -You won’t just “develop code”, but you’ll solve complex distributed computing problems -We’re an agile shop leveraging some of the most advanced AWS practices. -We have a leadership team that cares about your growth What You Will Be Doing -Work on UIs that are
          Senior Analyst (Research Computing) - University of Saskatchewan - Saskatoon, SK      Cache   Translate Page      
Frequent foot travel around campus to research labs will be required. The salary range, based on 1.0 FTE, is CAD $79,448.00 - 132,331.00 per annum (Information... $79,448 - $132,331 a year
From University of Saskatchewan - Thu, 04 Oct 2018 00:19:00 GMT - View all Saskatoon, SK jobs
          Google bows out of Pentagon's $10 billion cloud-computing race - Washington Post      Cache   Translate Page      

Washington Post

Google bows out of Pentagon's $10 billion cloud-computing race
Washington Post
Google will not compete for a $10 billion opportunity to build the Defense Department's cloud-computing infrastructure, the company said Tuesday, saying the project could conflict with its corporate values regarding the use of artificial intelligence ...
Microsoft Upgrades Services To Meet Federal Compliance Standard Ahead Of JEDI BidCRN
Google drops out of Pentagon's $10 billion cloud competitionAdAge.com
Microsoft makes its pitch for the Pentagon cloud contract with expanded federal certificationsGeekWire
BGR -Federal Times -Google Blog -Reuters
all 248 news articles »

          Logiciel 3dmark à 6.99€ et Bundle 3DMark + PCMark 10 + VRMark à 14.22€ sur PC (Dématérialisé)      Cache   Translate Page      
6,99€ - Steam
Pour ceux que ça pourrait intéresser...

Je cherchais un logiciel de stress test mais ce n'est pas que ça

Fin du deal : 15 octobre 2018

À PROPOS DE CE LOGICIEL
3DMark includes everything you need to benchmark your hardware. With its wide range of benchmarks, you can test everything from tablets and notebooks to the latest 4K gaming PCs. It's the most powerful and flexible 3DMark we've ever created.

3DMark is for gamers, overclockers and system builders who want to get the most out of their hardware. When you buy 3DMark on Steam you unlock all tests, settings, and features.Better benchmarking with 3DMarkThe right test every time
We've made it easy to find the right test for your PC. 3DMark automatically scans your hardware and recommends the best benchmark for your system.

Choose your tests
3DMark grows bigger every year with new tests. When you buy 3DMark from Steam, you can choose to install only the tests you need.

Hardware monitoring
Detailed charts show you how the CPU and GPU temperatures, clock speeds, and the frame rate changed during your benchmark run.

Custom settings
Explore your PC's performance limits with custom benchmark settings. You can change the rendering resolution and quality across a range of settings.Benchmark TestsTime Spy - DirectX 12 benchmarks for Windows 10 PCs
With its pure DirectX 12 engine, built from the ground up to support new API features like asynchronous compute, explicit multi-adapter, and multi-threading, Time Spy is the ideal benchmark for testing the DirectX 12 performance of modern gaming PCs. Time Spy Extreme, the world’s first 4K DirectX 12 benchmark test, is perfect for benchmarking the latest high-end graphics cards and new processors with 8 or more cores.

Night Raid - DirectX 12 test for integrated graphics
Night Raid is a DirectX 12 benchmark for testing and comparing PCs with integrated graphics and Always Connected PCs powered by Windows 10 on ARM. This is an ideal test for laptops, notebooks, tablets and other mobile computing devices.

Fire Strike - For high-performance gaming PCs
Fire Strike is a showcase DirectX 11 benchmark designed for high-performance gaming PCs. Use Fire Strike to test dedicated gaming PCs, Fire Strike Extreme for high-end systems with multiple GPUs (Crossfire/SLI), or see if your PC is ready for 4K gaming with Fire Strike Ultra.

Sky Diver - For gaming laptops and mid-range PCs
Sky Diver is a DirectX 11 benchmark that is ideal for testing mainstream graphics cards, mobile GPUs, integrated graphics and other systems that cannot achieve double-digit frame rates in the more demanding Fire Strike test.

Cloud Gate - For notebooks and home PCs
Use Cloud Gate to test the performance of older notebooks and home PCs with DirectX 10 compatible hardware.

Ice Storm - For basic tablets and smartphones
Use Ice Storm, Ice Storm Extreme, and Ice Storm Unlimited to compare smartphones and tablets across platforms.Feature TestsAPI Overhead feature test - Compare the latest graphics APIs
The 3DMark API Overhead feature test is the world's first independent test for comparing the performance of DirectX 12, DirectX 11 and Vulkan. See how many draw calls your PC can handle with each API before the frame rate drops below 30 fps.Stress TestsCheck the stability of your system
Stress testing is a good way to check the reliability and stability of your system after buying or building a new PC, upgrading your graphics card, or overclocking your GPU. Stress testing can also identify faulty hardware or the need for better cooling.Main features
  • Easy to use, no technical know-how needed.
  • Works with all types of PC, from desktops to tablets.
  • Includes all benchmarks, stress tests, and feature tests.
  • Explore your PC's performance with custom runs.
  • In-depth hardware monitoring graphs.
  • Automatically save your results offline.
Demo features
  • Test your PC with Time Spy, Night Raid, Fire Strike, Sky Diver, Cloud Gate, and Ice Storm.
  • Other benchmarks, features, and settings are locked.

          Software Engineer, Mobile Development & Research, Palo Alto      Cache   Translate Page      
CA-Palo Alto, Ford Motor Company is moving into a new phase of its 100+ year history, one in which software is at the heart of its future. The automobile is being redefined as a networked computing platform upon which an ever-evolving set of applications is being designed, allowing us to create exciting new consumer experiences. This position is located at Ford's Research and Innovation Center in Palo Alto, CA.
          Machine Learning / Artificial Intelligence Scientist Site Lead      Cache   Translate Page      
CA-Palo Alto, Ford Global Data Insight and Analytics (GDI&A) is looking for a data scientist with an emphasis on Machine Learning and scalable computing. You will have the opportunity to work with some of the brightest global subject matter experts that are transforming the automobile industry. We are seeking an experienced Machine Learning scientist to assist in all phases of project work, including problem fo
          Senior Systems Engineer - AI Services - Amazon.com - Seattle, WA      Cache   Translate Page      
The Amazon Web Services team is innovating new ways of building massively scalable distributed systems and delivering the next generation of cloud computing...
From Amazon.com - Sun, 15 Jul 2018 20:48:54 GMT - View all Seattle, WA jobs
          Block me, Amadeus: Falco to perform in CNCF sandbox      Cache   Translate Page      

Sysdig's container runtime security project gets solid foundation

Falco, Sysdig's open source project for monitoring container runtimes, is slated to join the Cloud Native Computing Foundation on Wednesday, becoming the first runtime security tool to be added to the Cloud Native Sandbox project, a home for early stage projects.…


          Distributed computing and resource managementOctober ATLAS Week      Cache   Translate Page      
none
          Implementation of the ATLAS trigger within the ATLAS Multi-Threaded Software Framework AthenaMT      Cache   Translate Page      
Implementation of the ATLAS trigger within the ATLAS Multi-Threaded Software Framework AthenaMT We present an implementation of the ATLAS High Level Trigger (HLT) that provides parallel execution of trigger algorithms within the ATLAS multi-threaded software framework, AthenaMT. This development will enable the HLT to meet future challenges from the evolution of computing hardware and upgrades of the Large Hadron Collider (LHC) and ATLAS Detector. During the LHC data-taking period starting in 2021, luminosity will reach up to three times the original design value. In the following data-taking period (2026) upgrades to the ATLAS trigger architecture will increase the HLT input rate by a factor of 4-10, while the luminosity will increase by a further factor of 2-3. AthenaMT provides a uniform interface for offline and trigger algorithms, facilitating the use of offline code in the HLT. Trigger-specific optimisations provided by the framework include early event rejection and reconstruction within restricted geometrical regions. We report on the current status, including experience of migrating trigger selections to this new framework and present the next steps towards a full implementation of the redesigned ATLAS trigger.
          Technical Project Manager - Cloud, Agile, Analytics      Cache   Translate Page      
TX-Austin, If you are a Technical Project Manager with experience, please read on! Located in North Austin, TX (in between downtown and Round Rock, TX) we are a global end-to-end computing solutions company empowering people to do more all around the world! What's In It for You We offer an amazing compensation package including (but not limited to): - A competitive base salary (DOE) - Full benefits (Medical,
          Hama "Premium Alu" Power Pack, 8000 mAh, Gold      Cache   Translate Page      
Hama

Hama "Premium Alu" Power Pack, 8000 mAh, Gold

Certified high quality cells Ultra fast charging Smartphone charge Super slim aluminium design Is there anything we don’t use our smartphones for these days? Making calls, surfing the web, social media, listening to music, taking pictures – it takes its toll on the battery. And when you’re on the go and your battery has given its all, then without a mains socket, the fun is over. Unless, of course, you have a bundle of energy along like the Premium Alu power pack from Hama. ATTERY CAPACITY: 8000 MAH – WHAT DOES IT MEAN? 8000 mAh, meaning 8000 milliampere hours, is a measurement of the power pack’s battery capacity. This is enough to fully charge your smartphone three times, a ten-inch tablet 1.2 times, or a seven-inch tablet 1.7 times, though of course the exact figure depends on the device. WHY IS THE POWER PACK JUST RIGHT FOR ME? PREMIUM QUALITYThe use of certified cells guarantees the highest standards of quality and safety. Deep discharge protection and overload protection make the power pack proof against short-circuiting. STYLISH DESIGNA slim, sturdy case made of anodized aluminium in any of various colours makes the power pack a stylish accessory. GOOD PERFORMANCEA quick charging cycle of seven to eight hours means the power pack can be fully ready to go in no time. OPTIMISED CHARGINGOptimised charging means that the Power Pack recognises the connected terminal device and supplies it with the optimal current to minimise charging time. Simply connect your smartphone to the power pack using the cable and enjoy an energy boost on the go. INTEGRATED LED CAPACITY DISPLAYThe LED charge indicator makes easily apparent how much power you still have available. The LEDs indicate the remaining charge as follows: LED: 1-25% LED: 26-50% LED: 51-75% LED: 76-100% UNIVERSAL USEThe power pack is equipped with two outputs, meaning that you can charge up to two devices at the same time. You can connect any device (of any brand) equipped with a Micro-USB port.


          Nvidia aims to woo business analysts with new software      Cache   Translate Page      
Graphics chipmaker Nvidia Corp is trying to grab a bigger slice of the business computing market from dominant rival Intel Corp with a new set of software tools released on Wednesday.

          Huawei unveils new AI chips amid Chinese technology ambitions      Cache   Translate Page      
China's Huawei Technologies Co Ltd [HWT.UL], the world's largest telecom-equipment maker, unveiled an AI chip on Wednesday that will power its servers, in a push to boost its nascent cloud-computing business.

          Payroll Coordinator - Western Sugar Cooperative - Lovell, WY      Cache   Translate Page      
Excellent computer competence (outlook, word, PowerPoint, excel, access). Ensure that computing, withholding, and deductions are done correctly....
From Indeed - Thu, 13 Sep 2018 16:39:23 GMT - View all Lovell, WY jobs
          (USA-AL-Huntsville) Software Engineer (MSIC)      Cache   Translate Page      
Software Engineer (MSIC) Tracking Code 3204-987 Job Description Founded in 1980, COLSA Corporation’s team of engineers, analysts and professionals across the US provide government and commercial customers with the latest and most sophisticated engineering, programmatic, and information technology services. Centered at the core of its values, COLSA knows its people are its most valuable resource. In addition to receiving a competitive compensation package, our employees enjoy offerings such as flexible work schedules, paid time off, benefits that begin on the date of hire, recognition programs, tuition and certification assistance, and immediate vesting in our matching 401(k) plan. Our WE CARE Wellness program provides support and initiatives to empower employees and their families to live healthy, balanced lives and our Association of COLSA Employees (ACE) provides a fun way for employees and their families to come together in times of both celebration and need. We invite you to connect your talents with opportunity, and be a part of our “Family of Professionals,” in supporting cutting-edge initiatives! General SummaryDesigns, develops, troubleshoots and analyzes software programs for computer based systems.Principal Duties and Responsibilities (*Essential functions) * Investigate and use new technologies to revitalize existing data systems.* Designs and develops software programs ** Analyzes user''s software program needs and assists in troubleshooting ** Design and develops software using basic compilers, assemblers, utility programs and operating systems ** May provide input for documentation of new or existing programs * Assist in monitoring data system behavior and web application(s) performance/function, including server configuration. * Design and develop software using basic compilers, assemblers, utility programs and operating systems. * Integrate and test software components and tools. * Develop new utility tools and existing tool enhancements as identified. * Use expertise in XML data handling and processing and also relational database usage. * Interact with data customers, helping to ensure the locating and retrieving of data is successful. * Interact with government agencies as required to facilitate data contributions into data system. Required Experience Required Qualifications * Bachelor's degree in computer science, information systems, engineering, business, or other related field or equivalent experience. * Two years applicable software design engineering experience * Working knowledge of current operating systems and programming languages * Active Top Secret clearance with immediate eligibility for DIA-SCI access. * Ability to pass a Counter Intelligence (CI) Polygraph within 60 days of hire. * Ability to obtain and maintain Security + CE within 6 months of hire. Preferred Qualifications * Experience with XML, Perl, PHP, JavaScript, XML, XSLT, Java, MySQL (relational databases) * Experience working in a classified computing environment * Active CompTIA Security+ CE * Currently active TS/SCI * Current Counter Intelligence (CI) Polygraph Applicant selected will be subject to a government security investigation and must meet eligibility requirements for access to classified information. COLSA Corporation is an Equal Opportunity Employer, Minorities/Females/Veterans/Disabled. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, or national origin. Job Location Huntsville, Alabama, United States Position Type Full-Time/Regular
          H Google αποσύρεται από διαγωνισμό του Πενταγώνου για συμβόλαιο 10 δισ. ευρώ      Cache   Translate Page      

H Google αποφάσισε να μη συμμετέχει σε διαγωνισμό για συμβόλαιο cloud-computing, ύψους 10 δισ. δολαρίων, υποστηρίζοντας πως το συγκεκριμένο πρόγραμμα ενδεχομένως να έρθει σε αντίθεση με τις εταιρικές της αρχές και αξίες.

Όπως αναφέρεται σε δημοσίευμα του Bloomberg, το πρόγραμμα αυτό, γνωστό ως Joint Enterprise Defense Infrastructure cloud (JEDI, χάριν συντομίας, με εμφανή την παραπομπή στους ιππότες Τζεντάι του «Πολέμου των Άστρων»), περιλαμβάνει την αποστολή πολύ μεγάλων όγκων δεδομένων του αμερικανικού υπουργείου Άμυνας σε σύστημα cloud το οποίο διαχειρίζεται ιδιωτική εταιρεία. Οι ενδιαφερόμενες εταιρείες έχουν περιθώριο υποβολής προτάσεων για το συμβόλαιο, διαρκείας μέχρι και 10 ετών, ως τις 12 Οκτωβρίου.

Η ανακοίνωση της Google έγινε τη Δευτέρα, μερικούς μήνες αφού η εταιρεία αποφάσισε να μην ανανεώσει τη συμμετοχή της σε πρόγραμμα τεχνητής νοημοσύνης του Πενταγώνου, κατόπιν έντονων αντιδράσεων εργαζομένων της, οι οποίοι ήταν αντίθετοι στη συνεργασία με τις ένοπλες δυνάμεις. Ακολούθως, η εταιρεία κοινοποίησε ένα σετ αρχών, σκοπός του οποίου ήταν να ορίζει με τι είδους προγράμματα τεχνητής νοημοσύνης θα ασχολείται.

«Δεν υποβάλλουμε πρόταση για το συμβόλαιο JEDI επειδή πρώτον, δεν μπορεί να διασφαλιστεί ότι θα είναι σύμφωνο με τις Αρχές Τεχνητής Νοημοσύνης μας (AI Principles) ανέφερε εκπρόσωπος της Google σε σχετική ανακοίνωση. «Και δεύτερον, διαπιστώσαμε ότι υπάρχουν μέρη του συμβολαίου που είναι εκτός πλαισίου των παρουσών κυβερνητικών πιστοποιήσεών μας».

Ο εκπρόσωπος πρόσθεσε ότι η Google «εργάζεται για να υποστηρίξει την αμερικανική κυβέρνηση με το cloud μας με πολλούς τρόπους».


          (USA-MD-Columbia) Information Assurance Lead      Cache   Translate Page      
Job Description Summary: CACI's National & Cyber Solutions business group is looking for a knowledgeable, team-oriented Information Assurance Lead who will apply their skills and experience to support a multi-year DoD customer contract. Duties and Responsibilities: This position supports an important national security focused customer providing information assurance engineering and administration services to ensure secure, reliable, and uninterrupted availability of this organization’s IT systems and network. The successful candidate will be responsible for leading information assurance tasks that include: + Ensuring that the architecture and design of information systems are functional and secure. + Assessing threats to environment and providing input on adequacy of security designs/architectures. + Designing and developing IA or IA enabled products, interface specifications, and approaches to secure the environment as necessary. + Participating in risk assessment during the Assessment and Authorization process. + Ensuring completeness of work and adherence to software development and configuration management plans, requirements specifications, and quality standards. + Participating in team and client meetings to promote effective project communications – code reviews, user demonstrations, etc. + Supporting test events and working closely with development team to resolve issues as required. + Responsible for overall IT security for project-related solutions. + Responsible for system Assessment and Authorization to create and maintain security-related artifacts for existing and new solutions – SSP, SCTM, CONOPS, and relevant appendices development/maintenance, etc. + Knowledge and ability to perform requirements analysis and system/network security design + Develop and maintain POA&M for all accepted risks upon completion of system A&A. + Skill in developing, analyzing, and evaluating information technology and IT security programs to meet requirements and improve the information technology and IT security program for the installation as well as skill in communicating information technology and IT security requirements, multi-service, and multi-national organizations. + Manage, monitor, and review security audit and intrusion detection system logs for attacks and anomalies + Develop security test procedures for project-related solutions + Periodic vulnerability assessments of system/sub-system components + IA Policy/procedure development, implementation and enforcement + Collaborate with Software Engineering Team on aspects of solution design and development; participates in all internal and client reviews. + Conduct response to security incidents. + Coordinate with government accreditors for all matters related to system security – scheduling, testing, documentation, etc. + Application of the Risk Management Framework for National Security Systems + Develop and execute security control assessments of new and existing information systems + Support security staff in performing security compliance inspections to include cybersecurity reviews of existing security authorization packages and continuous monitoring plans Required Qualifications: + Typically requires ­­bachelor’s degree or equivalent and 3 years of related experience + Ideally 2 plus years in information assurance or information security accrediting information, developing policy, or management of information assurance programs. + Working knowledge of DoD information assurance policies, directives, and instructions. + DoD Directive 8570.1 IASAE, IAM and/or IAT Level 3 + Active TS/SCI clearance. Desired Qualifications: + Bachelors in Computer Science or similar area of study, Masters preferred + 3+ years of experience designing, developing, configuring, and implementing multiple systems from multiple vendors in classified government environments. + Good understanding of established and emerging network technologies + Experience designing, implementing, troubleshooting and administering VDI solutions. + Experience interacting with senior-level government executives + Expertise in private cloud implementation and administration. + Design and management experience with complex PL3 and PL4 information systems + Demonstrated ability to understand and translate business issues into technical requirements and design specifications + Current computing environment certification (e.g. MCSA Windows Server 2012, CCNA/CCNP, VCA/VCP, CCA-V/CCP-V) What We Can Offer You: - We’ve been named a Best Place to Work by the Washington Post. - Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. - We offer competitive benefits and learning and development opportunities. - We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities. - For over 55 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success. Job Location US-Columbia-MD-BALTIMORE CACI employs a diverse range of talent to create an environment that fuels innovation and fosters continuous improvement and success. At CACI, you will have the opportunity to make an immediate impact by providing information solutions and services in support of national security missions and government transformation for Intelligence, Defense, and Federal Civilian customers. CACI is proud to provide dynamic careers for employees worldwide. CACI is an Equal Opportunity Employer - Females/Minorities/Protected Veterans/Individuals with Disabilities.
          VanDyke SecureCRT and SecureFX 8.5.1 Build 1764 + Portable      Cache   Translate Page      

VanDyke SecureCRT and SecureFX 8.5.1 Build 1764 + Portable
VanDyke SecureCRT and SecureFX 8.5.1 Build 1764 + Portable | 69/64.8 Mb

SecureCRT client provides rock-solid terminal emulation for computing professionals, raising productivity with advanced session management and a host of ways to save time and streamline repetitive tasks. SecureCRT provides secure remote access, file transfer, and data tunneling for everyone in your organization.


          Huawei unveils chips at Shanghai conference - The Express Tribune      Cache   Translate Page      

The Express Tribune

Huawei unveils chips at Shanghai conference
The Express Tribune
China's Huawei, the world's largest telecom-equipment maker, unveiled two new artificial intelligence powered chips to boost its cloud computing business at the company's annual global partners' conference, Huawei Connect, on Wednesday. The exorbitant ...

and more »

          Senior Analyst (Research Computing) - University of Saskatchewan - Saskatoon, SK      Cache   Translate Page      
Salary Information: The salary range, based on 1.0 FTE, is CAD $79,448.00 - 132,331.00 per annum (Information Technology/Phase 3). The starting salary will be... $79,448 - $132,331 a year
From University of Saskatchewan - Thu, 04 Oct 2018 00:19:00 GMT - View all Saskatoon, SK jobs
          The Matrix movie (1999)      Cache   Translate Page      
A convincing prophet meets The Saviour - offers cookies...

(NOTE: Many spoilers below.) 

I have just rewatched The Matrix movie (1999) and I thought it was even better second time around. I had a memory that there was a flaw in that the martial arts scenes were over-extended - but (with the exception of the gunfight rescue of Morpheus) this is not really the case: there is something being told us with almost all of the phases of the various battles.

My impression this time around is that The Matrix is a really outstanding 5 Star movie; in which nothing goes for nothing - and where there is a very satisfying quality to the whole thing. I found it genuinely wise - in those parts where wisdom was aimed-at. The acting (and direction) of the principal actors is outstanding.

I was more aware of the spiritual dimension of the piece, too; there is an Old Testament like prominence given to prophecy (and the importance of prophets - ie. The Oracle). For Christians, there are several strong symbolic aspects (not necessarily deliberate - the authors aren't Christian), if we want to notice them: Morpheus as John the Baptist; Neo as Saviour who dies and is resurrected; Trinity (more loosely) as Mary Magdalene etc. But these I noticed afterwards, on reflection, rather than during. The end is not perfect - more than a touch of the inexplicit 'walking into the sunset' about it - but good enough to make the movie 'work'.

I think one of the aspects that helped me enjoy The Matrix more the second time, was that I set-aside the central nonsensical plot implausibility, which was apparently externally imposed on the film makers; of having the Matrix consist of human 'batteries' - their bodies providing energy to the Machines. Instead; I mentally-substituted the original conception that the machines were exploiting human minds and their computing power, and that an interconnected human neural network constituted most of the Matrix.

Having started watching the second Matrix movie; the sudden gap in quality and aspiration is very obvious. It's not that the sequels are bad - as movies they are fine - but that they are utterly different and at a much lower level of ambition (and therefore attainment). They also create the plot swerve and raggedness that makes it turn-out that Agent Smith is actually The One; whereas in the first movie it is unambiguously Neo - and this swerve destroys some of the coherent, satisfying, underlying, symbolism of the The Matrix.

Aside; I always regard it as a pity when a totalitarian dystopia is established by a 'fascistic' war and imposed by violence; whereas in this real world the analogous society is being incrementally and bureaucratically-implemented without significant resistance by the global ruling class; with the active support and cooperation of the linked bureaucracies and mass media. The real-world Matrix is actually-existing socialism; meanwhile the real-world rebels are characterised as Right Wing Reactionaries and enemies of individual 'freedom' (especially extra-marital-transgressive sexual freedoms).

Of course, such a truthful movie could never emanate from Hollywood, nor - specifically - from the makers of The Matrix. We have to make such adjustments ourselves, by our personal interpretative work.


          Nvidia aims to woo business analysts with new software      Cache   Translate Page      
REUTERS: Graphics chipmaker Nvidia Corp is trying to grab a bigger slice of the business computing market from dominant rival Intel Corp with a new set of software tools released on Wednesday (Oct 10). With new software it calls RAPIDS, Nvidia is hoping to move beyond the fast-growing but ...
          Huawei unveils two A.I. chips for cloud computing      Cache   Translate Page      
CNBC's Arjun Kharpal reports on Huawei's push into the semiconductors space.
          Interesting Stuff - Week 40      Cache   Translate Page      

Throughout the week, I read a lot of blog-posts, articles, and so forth, that has to do with things that interest me:

data science data in general distributed computing SQL Server transactions (both db as well as non db) and other “stuff”

This blog-post is the “roundup” of the things that have been most interesting to me, for the week just ending.

.NET Update on .NET Core 3.0 and .NET Framework 4.8 . A blog post from the .NET engineering team, where they talk about the future of the .NET Framework and .NET Core. I wonder if this post was prompted by speculations recently about the future of the .NET Framework, where there were questions whether the .NET Framework 4.8 would be the last version, and all development would be concentrated on .NET Core. Azure Enabling real-time data warehousing with Azure SQL Data Warehouse . This post is an announcement how Striim now fully supports SQL Data Warehouse as a target for Striim for Azure. Striim is a system which enables continuous non-intrusive performant ingestion of enterprise data from a variety of sources in real time. Streaming Is Event Streaming the New Big Thing for Finance? . An excellent blog post by Ben Stopford where he discusses the use of event streaming in the financial sector. Troubleshooting KSQL Part 2: What’s Happening Under the Covers? . The second post by Robin Moffat about debugging of KSQL. In this post - Robin, as the title says, goes under the covers to figure out what happens with KSQL queries. 6 things to consider when defining your Apache Flink cluster size . This post discusses how to plan and calculate a Flink cluster size. In other words; how to define the number of resources you need to run a specific Flink job. MS Ignite Syllabuck: Ignite 2018 Conference . A great list of MS Ignite sessions that Buck Woody found interesting! Now I know what to do in my spare time! Data Science Customized regression model for Airbnb dynamic pricing . This post by Adrian is about a white-paper which details the methods that Airbnb use to suggest prices to listing hosts. Cleaning and Preparing Data in python . A post which lists Python methods and functions that helps to clean and prepare data. The Microsoft Infer.NET machine learning framework goes open source . A blog post from Microsoft Research, in which they announce the open-sourcing of Infer.NET . Is anyone else but me somewhat confused about the various data science frameworks that Microsoft has? How to build a Simple Recommender System in Python . A blog post which discusses what a recommender system is and how you can use Python to build one. What Is Niels Doing (WIND)

That is a good question! As you know, I wrote two blog posts about SQL Server 2019:

What is New in SQL Server 2019 Public Preview SQL Server 2019 for linux in Docker on windows

My plan was to relatively quickly follow up those two posts with a third post how to run SQL Server Machine Learning Services on SQL Server 2019 on Linux , and do it inside a Docker container. After having spent some time trying to get it to work, (with no luck), I gave up and contacted a couple of persons in MS asking for help. The response was that, right now in SQL Server 2019 on Linux CTP 2.0 , you cannot do it - bummer! The functionality will be in a future release.

I am now reworking the post I had started on to cover SQL Server Machine Learning Services in an Ubuntu based SQL Server 2019 on Linux . I should be able to publish something within a week or two.

I am also working on the third post in the Install R Packages in SQL Server ML Services series (still). Right now I have no idea when I can publish it - Sorry!

~ Finally

That’s all for this week. I hope you enjoy what I did put together. If you have ideas for what to cover, please comment on this post or ping me.

Blog Feed: To automatically receive more posts like this, please subscribe to my RSS/Atom feed

in your feed reader!


          New Future Scope of Low Power Wide Area Network – Global Market Will Grow at CAGR of +50% by 2025 : Top Companies Like - Semtech Corporation Loriot, Nwave Technologies, S      Cache   Translate Page      

Major Key Players in this report are: Semtech Corporation Loriot, Nwave Technologies, Sigfox, Waviot, Actility, and Ingenu Link Labs Weightless SIG Senet

New York, NY -- (SBWIRE) -- 10/10/2018 -- This market research analysis identifies the increased penetration of mobile-computing devices as one of the primary growth factors for this market. The recent years have witnessed a significant increase in the usage of mobile computing devices for various purposes such as accessing social networking apps, reading news, surfing the web, and checking e-mails. Moreover, the increased adoption of the Internet of Things (IoT) also leads to the rise in adoption of mobile computing devices, since IoT devices are controlled using mobile applications installed in mobile computing devices.

Research N Reports declares the addition of a new report on the global market which is titled as Low Power Wide Area Network. It is an analysis and portrayal of the market report globally. It gives a clear image of the market and a thoughtful knowledge about its segments. The various sections is examined and is the key part of the market.

Get sample copy of this report at: https://www.researchnreports.com/request_sample.php?id=151496

Major Key Players in this report are: Semtech Corporation Loriot, Nwave Technologies, Sigfox, Waviot, Actility, and Ingenu Link Labs Weightless SIG Senet

Low Power Wide Area Network Market is the best way to win the finest business selections. Numerous organizations are starting to know about the implication and outcome of the market in each part of their business. Many more are willing to spend more currency just to get the exact and precise demographics of their market. The massive rate of the customers select products and services from an organization that has a strong and accurate marketing research. The products and services that have high rankings are in addition that are boosted in large numbers.
The organization's vibrant and remarkable procedures will secure the newest and fresh updates on the organization's scheme and besides this data and reports of the desired products and services in the market. The methodology of Low Power Wide Area Network market is that the information gathering will confirm a crisp and inventive method of market analysis to help its customers to ascend the enhancement of their business. The broad collection of research services will ensure a match with each organization as a business need.

Get discount at: https://www.researchnreports.com/ask_for_discount.php?id=151496

Different factors have been fathomed to give it a comprehensive perception of the market. The cost analysis of the Low Power Wide Area Network market has been achieved while keeping in view the manufacturing expenses, labor cost, and raw materials and their market concentration rate, suppliers, and price trend. Buyers of the report will equally be obtainable to an inspection on market arranging with components like target customer, brand strategy, and value methodology.
The report shields the development activities in the Low Power Wide Area Network market which includes the status of marketing channels available, and an analysis of the regional export and import. The report ends with an inference for the global market as it was in Low Power Wide Area Network. This will benefit the report's users, that evaluates their position in the market as well as create effective strategies in the near future.

For Enquiry OR Any Query? Ask to our Expert @https://www.researchnreports.com/enquiry_before_buying.php?id=151496

Table of Contents

Global Low Power Wide Area Network Market Research Report 2018

Chapter 1 Global Low Power Wide Area Network Market Overview
Chapter 2 Global Economic Impact on Industry
Chapter 3 Global Low Power Wide Area Network Market Competition by Manufacturers
Chapter 4 Global Production, Revenue (Value) by Region
Chapter 5 Global Supply (Production), Consumption, Export, Import by Regions
Chapter 6 Global Production, Revenue (Value), Price Trend by Type
Chapter 7 Global Market Analysis by Application
Chapter 8 Manufacturing Cost Analysis
Chapter 9 Industrial Chain, Sourcing Strategy and Downstream Buyers
Chapter 10 Marketing Strategy Analysis, Distributors/Traders
Chapter 11 Market Effect Factors Analysis

For more information on this press release visit: http://www.sbwire.com/press-releases/low-power-wide-area-network/market-share-intelligence/release-1061733.htm

Media Relations Contact

Sunny Denis
Email: Click to Email Sunny Denis
Web: http://www.researchnreports.com/

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000


           Nvidia aims to woo business analysts with new software       Cache   Translate Page      
By Stephen NellisOct 10 (Reuters) - Graphics chipmaker Nvidia Corp is trying to grab a bigger slice of the business computing market from dominant rival...
          Huawei unveils new AI chips amid Chinese technology ambitions      Cache   Translate Page      
China's Huawei Technologies Co Ltd [HWT.UL], the world's largest telecom-equipment maker, unveiled an AI chip on Wednesday that will power its servers, in a push to boost its nascent cloud-computing business.

          Nvidia aims to woo business analysts with new software      Cache   Translate Page      
Graphics chipmaker Nvidia Corp is trying to grab a bigger slice of the business computing market from dominant rival Intel Corp with a new set of software tools released on Wednesday.

          Technology Time      Cache   Translate Page      
When: Tuesday, October 16, 2018 - 1:30 PM - 3:00 PM
Where: Long Branch

Need help using Internet, email, downloading audio and e-books, using apps, your tablets or smart phones? Learn more about basic computing, using smart phones and other technologies. Come with your e-book readers, computer, tablet, or smart phone and any technology questions every Tuesday 1:30pm to 2:30pm for one to one help. Tech time meets in the Digital Media Lab.
          The Hackett Group Names HP & Shell As 2018 Digital Award Winners; Companies On The Cutting Edge Of Smart Automation, Robotic Process Automation, Cognitive Computing And Analytics      Cache   Translate Page      

Click to view a price quote on HCKT.

Click to research the Diversified Services industry.

          1ος Πανελλήνιος Διαγωνισμός Εκπαιδευτικής Ρομποτικής και Physical Computing Ανοιχτών Τεχνολογιώ - [Gargalianoionline.gr]      Cache   Translate Page      
Image

ΜΕ ΙΔΙΑΙΤΕΡΟ ενδιαφέρον μαθητές και εκπαιδευτικοί και στη Μεσσηνία, περιμένουν τον 1ο Πανελλήνιο Διαγωνισμό Εκπαιδευτικής Ρομποτικής και Physical Computing Ανοιχτών Τεχνολογιών, στον οποίο μπορούν να λάβουν μέρος δηλώνοντας συμμετοχή στον διαδικτυακό τόπο robotics.ellak.gr. Ο διαγωνισμός έχει ως...


          I Tried to Replace My Laptop with My Phone and a $20 Bluetooth Keyboard      Cache   Translate Page      
As my aging MacBook circles the drain, I wonder: have I overestimated my computing needs?
          Mobile Computing Specialist - Planaxis | Groupaxis - Montréal, QC      Cache   Translate Page      
Optimization and handoff of work to Level 2 offshore team. Planxis is looking for System Operations specialist (Mobile Computing) for a one year contract in...
From Planaxis | Groupaxis - Thu, 04 Oct 2018 19:10:42 GMT - View all Montréal, QC jobs
          PM's STIAC sets directions for scientific innovation in India      Cache   Translate Page      

[India], Oct 10 (NewsVoir): The Prime Ministers' Science, Technology and Innovation Advisory Council (STIAC) in its first meeting held on Tuesday set some clear objectives and directions for a number of key projects.

The panel will meet regularly to ensure adequate stimulus for technology innovation and entrepreneurship.

The panel was formulated by Prime Minister Narendra Modi to advice on science and technology innovation. It is currently headed by Dr. K Vijay Raghavan, Principal Scientific Adviser to the Government of India.

Other members of the council include Former ISRO chief A. S. Kiran Kumar; Professor Ajay Sood, Indian Institute of Science, Bengaluru; Professor Subhash Kak, Oklahoma State University; Professor Manjul Bharghava, noted mathematician from Princeton University; Major General Madhuri Kanitkar, the first woman dean from Pune's Armed Forces Medical College, and industrialist Baba Kalyani. Secretaries of around 10 central ministries, including science and technology, energy and education were special invitees to the panel.

The day-long meeting included presentations on a range of topics, followed by discussions and directions for action. The formation and terms of reference for the council are a consequence of the fact that while the quality of the scientific efforts in the country are good, as a whole, the country is unable to move forward in terms of scientific and technological innovation.

To address this, the Prime Minister personally took several steps on assuming office. Post meeting a group of key scientists, a number of policy directions were pushed by the Prime-Minister's Office's for action by the relevant ministries.

Over the past two years, the Group of Secretaries in Science and Technology have both formulated and initiated implementation of major steps to improve technological innovation in the country. In April this year, the Prime Minister appointed a new Principal Scientific Adviser followed by the constitution of the Prime Minister's STIAC. These concrete steps have resulted in the country's science and technology eco-system coming together towards a cohesive direction.

"There is now a stated direction and efficiency in the system due to the increased government, industry and philanthropy investment along with quality leadership. India's scientific enterprise can be made strong, collaborative, daring, purposeful and effective. India's Science and Technology sector must become a shining example to the world, and will have a strong positive impact on our society and economy," said K Vijay Raghavan, Principal Scientific Adviser to the Government of India.

In the meeting, various key projects and their direction were discussed including - Accelerating Growth for New India innovation (AGNIi), Deep Ocean Mission, Teaching S&T in Indian languages, Artificial Intelligence (AI) and Quantum Computing, Bioscience Mission for Precision Health and Optimal Well-being, Waste to Energy, Research, Development and Innovation towards making India a leader in Electric Vehicles, Indian Biodiversity: characterisation, preservation and sustainable use.

All discussions and conclusions are being translated into clear action-points and will not be open-ended. The STIAC is scheduled to meet regularly and ensure that there is adequate stimulus to implement all the programs within a one-to-three year time period. (NewsVoir)


          Google bails on US defense project, cites ethical concerns      Cache   Translate Page      
Department of Defense

Google is pulling out of the JEDI cloud computing contract bid in the US. Is this another example of ethical activism coming into play?

The post Google bails on US defense project, cites ethical concerns appeared first on diginomica.


          Distributed computing and resource managementOctober ATLAS Week      Cache   Translate Page      
none
          Implementation of the ATLAS trigger within the ATLAS Multi-Threaded Software Framework AthenaMT      Cache   Translate Page      
Implementation of the ATLAS trigger within the ATLAS Multi-Threaded Software Framework AthenaMT We present an implementation of the ATLAS High Level Trigger (HLT) that provides parallel execution of trigger algorithms within the ATLAS multi-threaded software framework, AthenaMT. This development will enable the HLT to meet future challenges from the evolution of computing hardware and upgrades of the Large Hadron Collider (LHC) and ATLAS Detector. During the LHC data-taking period starting in 2021, luminosity will reach up to three times the original design value. In the following data-taking period (2026) upgrades to the ATLAS trigger architecture will increase the HLT input rate by a factor of 4-10, while the luminosity will increase by a further factor of 2-3. AthenaMT provides a uniform interface for offline and trigger algorithms, facilitating the use of offline code in the HLT. Trigger-specific optimisations provided by the framework include early event rejection and reconstruction within restricted geometrical regions. We report on the current status, including experience of migrating trigger selections to this new framework and present the next steps towards a full implementation of the redesigned ATLAS trigger.
          Senior Information Security Consultant - Network Computing Architects, Inc. - Bellevue, WA      Cache   Translate Page      
With the ability to interface and communicate at the executive level, i.e. CIO's, CTO's and Chief Architects....
From Network Computing Architects, Inc. - Wed, 10 Oct 2018 05:21:36 GMT - View all Bellevue, WA jobs
          Payroll Coordinator - Western Sugar Cooperative - Lovell, WY      Cache   Translate Page      
Excellent computer competence (outlook, word, PowerPoint, excel, access). Ensure that computing, withholding, and deductions are done correctly....
From Indeed - Thu, 13 Sep 2018 16:39:23 GMT - View all Lovell, WY jobs
          Craft Beer Account Manager/Outside Sales Rep - Avitus Group - Sheridan, WY      Cache   Translate Page      
Proficiency with Microsoft Office products, cloud based computing and databases, mobile applications and other emerging technologies affecting Black Tooth...
From Avitus Group - Thu, 27 Sep 2018 08:14:23 GMT - View all Sheridan, WY jobs
          UPDATE 2-Huawei unveils new AI chips amid Chinese technology ambitions      Cache   Translate Page      

* Also unveils a chipset for computing on smart devices (Adds details from conference, background)

The post UPDATE 2-Huawei unveils new AI chips amid Chinese technology ambitions appeared first on RocketNews | Top News Stories From Around the Globe.


          Nvidia aims to woo business analysts with new software      Cache   Translate Page      

Graphics chipmaker Nvidia Corp is trying to grab a bigger slice of the business computing market from dominant rival Intel Corp with a new set of software tools released on Wednesday.

The post Nvidia aims to woo business analysts with new software appeared first on RocketNews | Top News Stories From Around the Globe.


          Technical Architect (Salesforce experience required) Casper - Silverline Jobs - Casper, WY      Cache   Translate Page      
Company Overview: Do you want to be part of a fast paced environment, supporting the growth of cutting edge technology in cloud computing? Silverline...
From Silverline Jobs - Sat, 23 Jun 2018 06:15:28 GMT - View all Casper, WY jobs
          Technical Architect (Salesforce experience required) Cheyenne - Silverline Jobs - Cheyenne, WY      Cache   Translate Page      
Company Overview: Do you want to be part of a fast paced environment, supporting the growth of cutting edge technology in cloud computing? Silverline...
From Silverline Jobs - Sun, 29 Jul 2018 06:18:46 GMT - View all Cheyenne, WY jobs
          THE NQT PARTNERSHIP: Computer Science NQT (September 2019)      Cache   Translate Page      
£29,664: THE NQT PARTNERSHIP: We are looking for an exceptional Computing NQT to join a brilliant Secondary School based within the London Borough of Ealing. Ealing, London (Greater)
          CLOUD & Managed Services Specialist - intelliNet - Richmond, BC      Cache   Translate Page      
IntelliNet is a Canadian National company providing CLOUD Computing Services from its' Data Centre, Network Computing Managed IT Services and Enterprise On-Site...
From T-Net BC - Fri, 05 Oct 2018 19:00:04 GMT - View all Richmond, BC jobs
          China's Huawei Seeks to Chip Away at Silicon Valley's AI Supremacy      Cache   Translate Page      
Huawei unveiled two new computing chips aimed at powering artificial-intelligence applications, marking the Chinese telecommunications giant’s first major push into high-end technology dominated by U.S. chip giants.
          Senior Information Security Consultant - Network Computing Architects, Inc. - Bellevue, WA      Cache   Translate Page      
With the ability to interface and communicate at the executive level, i.e. CIO's, CTO's and Chief Architects....
From Network Computing Architects, Inc. - Wed, 10 Oct 2018 05:21:36 GMT - View all Bellevue, WA jobs
          Mobile Computing Specialist - Planaxis | Groupaxis - Montréal, QC      Cache   Translate Page      
Optimization and handoff of work to Level 2 offshore team. Planxis is looking for System Operations specialist (Mobile Computing) for a one year contract in...
From Planaxis | Groupaxis - Thu, 04 Oct 2018 19:10:42 GMT - View all Montréal, QC jobs
          Computing Sales Consultant - Boulder, CO      Cache   Translate Page      
**MEMBERS ONLY**SIGN UP NOW*** The **MEMBERS ONLY**SIGN UP NOW*** Core Computing Sales Consultant engages customers using selling skills, to complete the sale, drive profitable growth and achieve their individual goals while showing and inspiring customers to see whats possible with technology. The **MEMBERS ONLY**SIGN UP NOW*** Core Computing Sales Consultant maintains knowledge of technology products and..
          Jetzt anmelden: Wie Unternehmen von High Performance Computing in der Cloud profitieren können      Cache   Translate Page      
Haben Sie komplexe und/oder rechenintensive Probleme in Ihrem Arbeitsalltag zu bewältigen? Wollen Sie schneller Erkenntnisse aus Ihrer Forschung bzw. Entwicklung gewinnen? Ist Ihnen die Anschaffung eines Hochleistungsrechners zu teuer und zu aufwändig Mehr…...(read more)
          From Aspirations to Careers      Cache   Translate Page      
This post was written by Jennifer Manning, AspireIT Partnerships Program Director The National Center for Women & Information Technology’s Aspirations in Computing (AiC) program is designed to support young women in computing by providing recognition, encouragement, and opportunities to jobs, scholarships, and connections to the tech community. NCWIT Aspirations has… Continue reading
          At what point should your start-up adopt a hybrid cloud solution?      Cache   Translate Page      
Cloud computing can help start-ups cut costs and remain flexible in those crucial early days – but as you grow it makes sense to bring more ‘in-house. Here’s why…

In Business information centre


          Kernel Patch Protection aka "PatchGuard"      Cache   Translate Page      

Originally posted on: http://maxblogson.net/archive/2006/10/30/95540.aspx

If anyone has been following this technology closely, there have been a lot of complaints by some of the security vendors regarding PatchGuard. I first heard about this technology at TechEd 2006 in a lot of the Vista sessions.

The recent controversy caused me to do a little more research in to this technology and the issues surrounding it.

The official name for this technology is called Kernel Patch Protection (KPP) and it's purpose is to increase the security and stability of the Windows kernel. KPP was first supported in Windows Server 2003 SP1, Windows XP, and Windows XP Professional Edition. The important thing to understand about this support is that it is for x64 architectures only.

KPP is a direct outgrowth of both customer complaints regarding the security and stability of the Windows kernel and Microsoft's Trustworthy Computing initiative, announced in early 2002.

In order to understand the controversy surrounding KPP, it is important to understand what KPP actually is and what aspects of the Windows operating system it deals with.

What is the Kernel?

The kernel is the "heart" of the operating system and is one of the first pieces of code to load when the operating system starts. Everything in Windows (and almost any operating system, for that matter) runs on a layer that sits on top of the kernel. This makes the kernel the primary factor in the performance, reliability and security of the entire operating system.

Since all other programs and many portions of the operating system itself depend on the kernel, any problems in the kernel can make those programs crash or behave in unexpected ways. The "Blue Screen of Death" (BSoD) in Windows is the result of an error in the kernel or a kernel mode driver that is so severe that the system can't recover.

What is Kernel Patching?

According to Microsoft's KPP FAQ, kernel patching (also known as kernel "hooking") is

the practice of using internal system calls and other unsupported mechanisms to modify or replace code or critical structures in the kernel of the Microsoft Windows operating system with unknown code or data. "Unknown code or data" is any code or data that is not provided by Microsoft as part of the Windows kernel.

What exactly, does that mean? The most common scenario is for programs to patch the kernel by changing a function pointer in the system service table (SST). The SST is an array of function pointers to in-memory system services. For example, if the function pointer to the NtCreateProcess method is changed, anytime the service dispatch invokes NtCreateProcess, it is actually running the third-party code instead of the kernel code. While the third-party code might be attempting to provide a valid extension to the kernel functionality, it could also be malicious.

Even though almost all of the Windows kernels have allowed kernel patching, it has always been an officially unsupported activity.

Kernel patching breaks the integrity of the Windows kernel and can introduce problems in three critical areas:

  • Reliability
    Since patching replaces kernel code with third-party code, this code can be untested. There is no way for the kernel to assess the quality of intent of this new code. Beyond that, kernel code is very complex, so bugs of any sort can have a significant impact on system stability.
  • Performance
    The overall performance of the operating system is largely determined by the performance of the kernel. Poorly designed third-party code can cause significant performance issues and can make performance unpredictable.
  • Security
    Since patching replaces known kernel code with potentially unknown third-party code, the intent of that third-party code is also unknown. This becomes a potential attack surface for malicious code.

Why Kernel Patch Protection?

As I mentioned earlier, the primary purpose of KPP is to protect the integrity of the kernel and improve the reliability, performance, and security of the Windows operating systems. This is becoming increasingly more important with the prevalence of malicious software that is implementing "root kits". A root kit is a specific type of malicious software (although it is usually included as a part of another, larger, piece of software) that uses a variety of techniques to gain access to a computer. Increasingly, root kits are becoming more sophisticated and are attacking the kernel itself. If the rootkit can gain access to the kernel, it can actually hide itself from the file system and even from any anti-malware tools. Root kits are typically used by malicious software, however, they have also been used by large legitimate businesses, including Sony.

While KPP is a good first step at preventing such attacks, it is not a "magic bullet". It does eliminate one way to attack the system...patching kernel images to manipulate kernel functionality. KPP takes the approach that there is no reliable way for the operating system to distinguish between "known good" and "known bad" components, so it prevents anything from patching the kernel. The only official way to disable KPP is by attaching a kernel debugger to the system.

KPP monitors certain key resources used by the kernel to determine if they have been modified. If the operating system detects that one of these resources has been modified it generates a "bug check", which is essentially a BSoD, and shuts down the system. Currently the following actions trigger this behavior:

  • Modifying system service tables.
  • Modifying the interpret descriptor table (IDT).
  • Modifying the global descriptor table (GDT).
  • Using kernel stacks that are not allocated by the kernel.
  • Patching any part of the kernel. This is currently detected only on AMD64-based systems.

Why x64?

At this point, you may begin to wonder why Microsoft chose to implement this on x64 based systems only. Microsoft is again responding to customer complaints in this decision. Implementing KPP will almost certainly impact comparability of many legitimate software, primarily security software such as anti-virus and anti-malware tools, which were built using unsupported kernel patching techniques. This would cause a huge impact on the consumer and also on Microsoft's partners. Since x64-based machines still make up the smaller install base (although they are gaining ground rapidly) and the majority of x64-based software has been rewritten to take advantage of the newer architecture, the impact is considered to be substantially smaller.

So...why the controversy?

Since KPP prevents an application or driver from modifying the kernel, it will, effectively, prevent that application or driver from running. KPP in Vista x64 requires any application drivers be digitally signed, although there are some non-intuitive ways to turn that off. (Turning off signed drivers does prevent certain other aspects of Windows from operating, such as being able to view DRM protected media.) However, all that really means is anyone with a legitimately created company and about $500 per year to spend can get the required digital signature from VeriSign. Unfortunately, even it is a reputable company, it still doesn't provide any guarantees as to the reliability, performance, and security of the kernel.

In order for software (or drivers) to work properly on an operating system that implements KPP, the software must use Microsoft-documented interfaces. If what you are trying to do doesn't have such an interface, then you cannot safely use that functionality. This is what has lead to the controversy. The security vendors are saying that the interfaces they require are not publicly documented by Microsoft (or not yet at any rate) but that Microsoft's own security offerings (Windows OneCare, Windows Defender, and Windows Firewall) are able to work properly and use undocumented interfaces. The security vendors want to "level the playing field".

There are many arguments on both sides of the issue, but it seems that many of them are not thought out completely. Symantec and McAfee have argued that the legitimate security vendors be granted exceptions to KPP using some sort of signing process. (See the TechWeb article.) However, this is fraught with potential problems. As I mentioned earlier, there is currently no reliable way to verify that code is actually from a "known good" source. The closest we can come to that is by digital signing, however, a piece of malicious code can simply include enough pieces from a legitimate "known good" source and hook into the exception.

So lets say, for arguments sake, that Microsoft does relent and is able to come up with some sort of exception mechanism that minimizes (or even removes) the chance of abuse. What happens next? Windows Vista, in particular, already includes an array of new features to provide security vendors ways to work within the KPP guidelines.

The Windows Filtering Platform (WFP) is one such example. WFP enables software to perform network related activities, such as packet inspection and other firewall type activities. In addition to WFP, Vista implements an entirely new TCP stack. This new stack has some fundamentally different behavior than the existing TCP stack on Windows. We also have network cards that implement hardware based stacks to perform what is called "chimney offload", which effectively bypasses large portions of the software based TCP stack. Hooking the network related kernel functions (as a lot of software based firewalls currently do), will miss all of the traffic on a chimney offload based network card. However, hooking in to WFP will catch that traffic.

Should Microsoft stop making technological innovations in the Windows kernel simply because there are a handful of partners and other ISVs that are complaining? The important thing to realize is that KPP is not new in Windows Vista. It has been around since Windows XP 64-bit edition was released. Why is it now that the security vendors are realizing that their products don't work properly on the x64-based operating systems? The main point Microsoft is trying to get across is that most of the functionality required doesn't have to be done in the kernel. Microsoft has been working for the last few years trying to assist their security partners in making their solutions compatible. If there is an interface that isn't documented, or functionality that a vendor believes can only be accomplished by patching the kernel, they can contact their Microsoft representative or email msra@microsoft.com for help finding a documented alternative. According to the KPP FAQ, "if no documented alternative exists...the functionality will not be supported on the relevant Windows operating system version(s) that include patch protection support."

I think the larger controversy is the fact that there are now documented ways to break KPP. This is where Microsoft and it's security partners and other security ISVs should be spending their time and energy. If we are going to have a reliable and secure kernel, we need to focus on locking down the kernel so that no one is able to breach it, including the hackers. This is an almost endless process, as the attackers generally have almost infinite amounts of time to bring their "products" to market and don't really have an quality issues to worry about. Even with the recent introduction by Intel and AMD of hardware based virtualation technology (which essentially creates a virtual mini-core processor that can run a specially created operating system), there is still a long way to go.

What's next?

While it is important to understand the goals of KPP and the potential avenues of attack against it, the most important thing for the security community to focus on is in making sure that the Windows kernel stays safe. The best way to do this is to keep shrinking the attack surface until it is almost non-existent. There will always be an attack surface, however, the smaller that surface becomes the easier it is to protect. Imagine guarding a vault. If there is only one way in and out, and that entrance is only 2-feet wide it is much more easily guarded than a vault that has 2 entrances, each of which are 30-feet wide.

However, as malware technology advances it is important for the security technology that tries to protect against it to advance as well. In fact, the security technology really needs to be ahead of the malware if it is to be successful. PatchGuard has already been hacked, some of the proposed Microsoft APIs for KPP won't be available until sometime in 2008, and the security vendors do have legitimate reasons for needing to access certain portions of the kernel.

Host Intrusion Prevention Systems (HIPS), for instance, uses kernel access to prevent certain types of attacks, such has buffer overflow attacks or process injection attacks, by watching for system functions being called from memory locations where they shouldn't be called. The Code Red Worm would not have been detected if only file-based protection systems were in use.

The bottom line is that the malware vendors are unpredictable and not bound by any legal, moral, or ethical constraints. They are also not bound by customer reviews, deadlines, and code quality. The security vendors and Microsoft need to work together to ensure that the attack surface for the kernel and Windows itself is small and stays small. They can do this by:

  • Establishing a more reliable way to authenticate security vendors and their products that will prevent "spoofing" by the malware vendors.
  • Minimizing the attack surface of the Windows Kernel.
  • Establishing documented APIs to interact with the kernel to perform security related functions, such as firewall activities.
  • Enforcing driver signatures...in other words, don't allow this mechanism to be turned off. At least don't allow it to be turned off for certain security critical drivers.
  • Enforcing security software digital signatures. If you want your security tool to run, it must be signed. Again, don't allow this mechanism to be turned off.
  • Establishing a more secure way for the security products to hook in to the kernel.
  • Restricting products to patching only specific areas of the kernel. Currently, it is possible to patch almost any portion of the kernel.
  • Enforcing Windows certification testing for any security products.

          BitLocker™ - The dirty details      Cache   Translate Page      

Originally posted on: http://maxblogson.net/archive/2006/07/04/84045.aspx

One of the new security features coming in Windows Vista and Longhorn is the new BitLocker™ Drive Encryption technology. BitLocker™ is designed to help prevent information loss, whether it is by theft or accidental. Information loss is costly to business on several levels, and the U.S. Department of Justice estimates that intellectual property theft cost enterprises $250 billion in 2004.

BitLocker™ Drive Encryption gives you improved data protection on your notebooks, desktops, and servers by providing a transparent user experience that requires little to no interaction on a protected system. BitLocker also prevents the use of another operating system or hacking tool to break file and system protections by preventing the offline viewing of user data and OS files through enhanced data protection and boot validation using TPM v1.2.

For those of you who may not know, TPM stands for Trusted Platform Module. So what's that? TPM is a piece of hardware that is part of the motherboard that:

  • Performs cryptographic functions
    • RSA, SHA-1, RNG
    • Meets encryption export requirements
  • Can create, store, and manage keys
    • Provides a unique Endorsement Key (EK)
    • Provides a unique Storage Root Key (SRK)
  • Performs digital signature operations
  • Holds platform measurements (hashes)
  • Anchors a chain of trust for keys and credentials
  • Protects itself against attacks

So now that you know what a TPM is, why should you use one? A TPM is a hardware implementation of a Root-of-Trust, which can be certified to be tamper resistant. When combined with software, it can protect root secrets better than software alone. A TPM can ensure that keys and secrets are only available for use when the environment is appropriate.

The important thing to know about BitLocker is that it will only encrypt the Windows partition. You also won't be able to dual-boot another operating system on the same partition, different partitions are fine. Any attempts to modify the protected Windows partition will render it unbootable.

To completely protect all of the data on the computer, you will need to use a combination of BitLocker on the Windows partition and Encrypted File System (EFS) on the other partitions. When properly configured, EFS is computationally infeasible to crack.

Even with all of the new security that is provided by BitLocker, it can't stop everything. Some of the areas that BitLocker is helpless to defend against are:

  • Hardware debuggers
  • Online attacks—BitLocker is concerned only with the system’s startup process
  • Post logon attacks
  • Sabotage by administrators
  • Poor security maintenance
  • BIOS reflashing
    • Protection against this can be enabled if you wish

Additional Resources


          Scale Computing Partners With KSG to Expand Into Japan      Cache   Translate Page      

As a leader in delivering IT solutions, KSG will be reselling Scale Computing’s innovative HC3 solution throughout Japan

(PRWeb October 10, 2018)

Read the full story at https://www.prweb.com/releases/scale_computing_partners_with_ksg_to_expand_into_japan/prweb15828213.htm


          [Cloud Computing Services] Re: Launch EC2 from CLI, ali da startuje skriptu koja je na S3      Cache   Translate Page      
Da skontao sam na kraju da treba da bude na mašini gde izvršavam tu komandu. I da, jbg, morao bih tako, prvo da dovučem skriptu, pa okinem komandu, pa obrišem skriptu. mislio sam da bi bilo lakše. Pretpostavljao sam da može direktno sa S3, a fajl da nije public, ali ne može :) hvala
          [Cloud Computing Services] Re: Launch EC2 from CLI, ali da startuje skriptu koja je na S3      Cache   Translate Page      
Izvini, procitao sam temu od pocetka sada. Tvoje pitanje o tome gde treba biti [tt]file:///[/tt] odgovor je: na masini koja izvrzava [tt]aws[/tt] komandu. Na masini koja izvrsava [tt]aws ec2 run-instances[/tt] napravi bash skriptu koja ce prvo dovuci file sa s3 i zatim izvrsiti komandu koju zelis posto ce se koristiti IAM za auth. Otprilike: [code] aws s3 cp s3://mybucket/script.txt ./script.txt aws ec2 run-instances --image-id ami-0233214e13e500f77 --count 1 --instance-type t2.micro --i...
          Barcelona lo ha conseguido: ya es el lugar de referencia de startups de tecnología en el sur de Europa      Cache   Translate Page      

Barcelona lo ha conseguido: ya es el lugar de referencia de startups de tecnología en el sur de Europa#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000

Barcelona es la cuarta ciudad del mundo preferida para ir a trabajar, según una encuesta realizada a más de 350.000 trabajadores en 200 países. Es uno de los factores que han conseguido que, entre 2016 y 2018, 24 multinacionales tecnológicas hayan abierto centros tecnológicos en la ciudad.

Trabajar en una gran empresa es muy atractivo para ingenieros, científicos y técnicos. Suelen ofrecer un buen sueldo, una posición estable e infraestructura para desarrollar proyectos interesantes.

Pero también atraen a una serie de mentes inquietas y pasionales que, con el tiempo, dejan estos trabajos tan atractivos para montar una startup. La antítesis de la multinacional.

Podríamos definir una startup como una empresa de reciente creación, muy tecnológica, y sobre todo innovadora tanto en I+D como en modelos de negocio. Intentan crear algo nuevo, o bien vender el mismo producto de una manera nueva e ingeniosa.

Estos emprendedores, según el folklore, son jóvenes iluminados cuyas oficinas tienen recreativas y mesas de ping-pong. En la realidad, suelen ser equipos hacinados en un coworking o desde sus casas, trabajando largas horas y fines de semana por un sueldo inferior al de mercado.

Y una promesa: cambiar el mundo.

Todo empezó en los 90

A día de hoy, apostar por la creación de empresas tecnológicas parece algo evidente, casi un oxímoron. Pero en plena resaca post-olímpica, fue una decisión valiente de un grupo de visionarios: reconvertir una zona de naves industriales y fábricas abandonadas en un hub de ingeniería.

A finales de los 90 la tecnología en Barcelona era un campo abonado pero aún sin frutos. El sector competía frontalmente por un espacio premium —tanto físico como humano— contra el mayor motor económico de la zona: el turismo. Un motor que mientras escribo estas líneas genera amargos debates políticos y sociales en la ciudad, pero al que sigue siendo difícil renunciar.

En el sur de Europa habrá muchas capitales con playa, pero sólo una hizo una apuesta estratégica por la economía del conocimiento apoyada por una regeneración urbana. Se trata, claro, de Barcelona.

Quizá sea ya el momento de reconocer a todos los partícipes el éxito tecnológico que se está consiguiendo en la ciudad. Pero empecemos por el principio.

El Plan 22@

barcelona#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000

Tengo la gran suerte de trabajar y conocer de primera mano el llamado 22@ (pronunciado veintidós arroba), un distrito de Barcelona con un nombre que rebosaba modernidad en 2006 pero que a día de hoy, seamos sinceros, ya suena algo anticuado.

Este proyecto urbano pretendía, en esencia, continuar las transformaciones de la Barcelona Olímpica y renovar una de las zonas más descuidadas: los barrios costeros de la Marina y el Poble Nou, llenos de pisos en mal estado, barracas, y naves industriales en desuso.

Desde el Ayuntamiento se propuso darle un enfoque diferente: ¿y si en vez de construir más bloques de pisos, hacemos una zona friendly para empresas? Citando la web oficial:

El proyecto 22@Barcelona [...] favorece las sinergias entre las universidades, [...] los centros tecnológicos, los centros de investigación y la actividad productiva en general y mejora la eficiencia del conjunto, ya que garantiza la disponibilidad de una amplia oferta de capital humano altamente calificado y favorece, a su vez, la colaboración de sus equipos de investigación con las empresas.

Además, fuera por conservación del patrimonio, o por ahorrar, se contrastó este espíritu noventero-moderno del concepto "Arroba" con la realidad arquitectónica. En vez de demoler las antiguas fábricas y construir edificios nuevos, se restauraron las fachadas de aquellas más emblemáticas y se convirtieron en espacios diáfanos de oficinas.

Diez años después, en una de estas fachadas dice así: "Amazon".

Hemos pasado de ser de pueblo a albergar la sede europea de la segunda empresa más importante del mundo.

De otros edificios emblemáticos como la sugerente Torre Agbar, pronto colgará otro cartel: "Facebook" —a través de una subcontrata—. "Mediamarkt". "Lidl". "Oracle". Incluso "N26", el moderno banco alemán que viene a pescar en este río revuelto por motivos políticos.

En total, son ya unas decenas de nombres asociados a la alta tecnología, desde los que reconocen nuestras madres hasta otros, menos populares pero quizá más productivos para el ecosistema: "Dynatrace". "Satellogic". "Moodle". "Chartboost".

¿Por qué motivo el capital extranjero está empezando a invertir fuertemente Barcelona? Tendríamos que empezar por la palabra mágica o buzzword de los CEOs modernos: el "talento".

La búsqueda de talento se ha convertido en el principal objetivo de las empresas que desean tener éxito. Junta a unas cuantas personas listas y motivadas, dicen, y ellas solas se organizarán para llegar al éxito.

Un inversor de la ciudad nos da una clave. "Barcelona crece más que Madrid en rondas, ránkings y número de empresas creadas. Hay más gente de fuera montando cosas aquí, lo que atrae inversores extranjeros, y se acelera el círculo virtuoso. Es un proceso natural. Fundadores que quieren ayudar como les han ayudado a ellos."

Las Universidades

Barcelona Universidad Politecnica De Cataluna Upc Campus Norte Biblioteca Rector Gabriel Ferrate Brgf 7#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000

Pese a que las universidades españolas nunca alcanzan siquiera el "Top 100" en los ránkings internacionales, los licenciados españoles están muy bien valorados por las empresas. Salen bien preparados de unas carreras largas y duras, trabajan bien, y aceptan cobrar unos sueldos... españoles.

No son pocas las empresas que cierran tratos con clientes internacionales por la relación calidad-precio de sus productos o servicios. Para ellos somos muy baratos, a la vez que más eficientes y más cercanos culturalmente que en otros países de Europa del Este o África. Esto ha hecho que muchas multinacionales decidan dar el paso y abrir finalmente una sucursal en España y contratar un equipo totalmente local.

A diferencia de otros trabajos externalizados en un contexto de globalización mundial, se trata de tareas de alta calificación, como ingeniería, biología, física; en general, proyectos muy vinculados a I+D.

Un universitario español cobra entre la mitad y un tercio del sueldo de su equivalente en Silicon Valley, realizando un trabajo de más calidad y sin tantos aspavientos. Aquí no somos rockstars, somos currantes

En 2005, la gente que acababa la carrera se iba a una consultora tecnológica a hacer un cursillo de Java para luego sufrir jornadas maratonianas dentro de una cadena de subcontrataciones y acabar desarrollando una intranet con código reusado. Hoy día entran en una startup o una tecnológica y cambian el mundo. Todo este capital humano, que siempre había existido pero no encontraba una oferta laboral motivadora, por fin tiene a su disposición proyectos emocionantes.

Un universitario español cobra entre la mitad y un tercio del sueldo de su equivalente en Silicon Valley, realizando un trabajo de más calidad y sin tantos aspavientos. Aquí no somos rockstars, somos currantes.

Los parques y centros de investigación

La Universidad no se limita a educar. De hecho, en los mejores países del mundo su principal papel es investigar y desarrollar. En España hemos tardado en darnos cuenta, pero estamos rectificando rápidamente.

Allí por 2004, el centro de IBM en San Fernando de Henares fabricó el Marenostrum, entonces el supercomputador más rápido de Europa y cuarto del mundo.

Meses después se instaló en Barcelona, en una capilla reacondicionada de la Politécnica. Esta máquina se gestiona a través de un consorcio participado en un 51% por el Gobierno de España.

Algunos se preguntarán, ¿por qué no se instaló en Madrid?

Fue IBM, quien proveía la tecnología, el principal padrino de la ciudad condal. El germen del actual Barcelona Supercomputing Center-Centro Nacional de Supercomputación fue un grupo de investigación de la UPC especializado en supercomputación, llamado CESCA. Una infraestructura pequeña pero vital, que quizá fue la clave para la decisión de IBM.

Ignasi Belda, fundador de Intelligent Pharma y anteriormente director del Parc Científic de Barcelona, nos explica cómo funcionan. "Los Parques científicos son una infraestructura que ayuda al desarrollo de un ecosistema emprendedor sostenible, rico, y avanzado desde el punto de vista tecnológico".

"Los centros de investigación son diferentes. Desde hace 20 años se ha aplicado en Cataluña una política de excelencia científica que ha resultado en unos Institutos punteros a nivel mundial, como por ejemplo el ICFO (Institut de Ciències Fotòniques), IRB (Institut de Recerca en Biomedicina) o el CRG (Centre de Regulació Genòmica). Gracias a este sistema de centros de investigación universitarios, Cataluña está batiendo todos los indicadores a nivel europeo, por ejemplo, nombre de ERC por cápita (becas millonarias del European Research Council)".

Belda#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000 Ignasi Belda, fundador de Intelligent Pharma y anteriormente director del Parc Científic de Barcelona

Belda acaba diferenciando la excelencia científica del mundo empresarial. "[La inversión en estos centros] se ha hecho a costa de la transferencia tecnológica y, por tanto, la emprendeduría. Por ejemplo, el ICFO no llega al 2% de ingresos en transferencia, lo cual es inusual a nivel internacional. Por ello pienso que son necesarias políticas decididas y valientes por parte de la Generalitat de Cataluña para lograr un impacto significativo en el ecosistema emprendedor".

Y es que el ambiente motivador de estos centros, unido a las tristemente pésimas perspectivas laborales en la investigación pública, ha acabado siendo una fábrica de startuperos, pero no de spin-off. Esta falta de apoyo para monetizar las invenciones es, irónicamente, una pobre apuesta económica. ¿Cuánta riqueza habría en el formato MP3 si se hubiera inventado en un centro español en vez del Fraunhofer alemán?

Muchos de los que empezaron —empezamos— nuestra carrera laboral como investigadores hemos acabado montando pequeñas empresas de I+D, intentando replicar ese espíritu científico, curioso, académico, que se incuba en los centros y parques tecnológicos. Salvando las distancias, una línea en el currículum con una posición en el BSC o el CRG son nuestros MIT o Cambridge patrios.

Instituciones públicas

barcelona#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000 Charlas de formación organizadas por Barcelona Activa

Es poco habitual alabar el papel de las instituciones públicas en el mundo empresarial. Pero en nuestro caso tenemos que dar las gracias a varias instituciones públicas que han trabajado muy eficientemente para abrir Barcelona y sus empresas al mercado internacional.

ACCIÓ es la agencia catalana para aumentar la competitividad empresarial. Son los que se encargan de facilitar las exportaciones, así como atraer empresas extranjeras a la ciudad.

Ya hemos visto más arriba el éxito con el que han conseguido interesar a las principales tecnológicas mundiales. Y por lo que respecta a exportaciones, las cifras son excelentes. Las exportaciones catalanas son el 25% del global del Estado, más del doble que Andalucía (11,2%) y Madrid (11%). Este 2017 crecieron un 8,7%.

Sea por la coyuntura política, la cercanía a Europa, o por el apoyo de ACCIÓ y también del ICEX, la provincia de Barcelona lidera las exportaciones con 54 mil millones de Euros, por delante de Madrid con 30 mil millones.

En el otro lado de la balanza, para aquellos emprendedores locales, desde el Ayuntamiento se ha impulsado Barcelona Activa, una organización de fomento del empleo, ya sea autónomo o por cuenta ajena. Aglutina una serie de servicios que van desde el acompañamiento para abrir una empresa en el Notario hasta cursos de negociación o finanzas, talleres para mejorar tu currículum o cursos de Excel.

Sea por la coyuntura política, la cercanía a Europa, o por el apoyo de ACCIÓ y también del ICEX, la provincia de Barcelona lidera las exportaciones con 54 mil millones de Euros, por delante de Madrid con 30 mil millones.

No importa si quieres abrir una peluquería o una empresa de biomedicina, en Barcelona Activa disponen de servicios para todas las necesidades, de manera gratuita. Para todo aquél que no puede permitirse un MBA, ya sea por tiempo o dinero, esta alternativa gratuita es excelente y muy completa.

Guifré Belloso, técnico de creación de empresas en Barcelona Activa, nos describe el funcionamiento. "Por una parte, (las agencias locales) gestionan el cambio tecnológico incentivando la creación de empresas y el empleo, y por otra, ayudan a las personas en paro a resituarse como emprendedores o autoempleo".

Img 4019#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000 Guifré Belloso, técnico de creación de empresas en Barcelona Activa

Barcelona Activa también actúa como agente local para facilitar el acceso a la financiación estatal, gestionando ayudas como ENISA, CDTI, e incluso las europeas. Belloso nos comenta que una de sus funciones es "poner incentivos donde el mercado no llega". "Si no existieran ENISA o instrumentos similares, probablemente los viveros no estarían llenos ni habría tanto flujo de startups. Muchas empresas no llegan a break even (punto de equilibrio), pero creo que el balance global es positivo".

José Pedro Tarango, asesor de empresas en Barcelona Activa, nos explica la relación entre la iniciativa pública y la privada. «El papel de las entidades públicas es orientar, formar, disponer de los recursos necesarios para emprendedores. Barcelona Activa fue pionera en ofrecer espacios de incubación para la instalación física de las empresas o en promover foros de inversión especializados en el sector salud o cleantech, por ejemplo. Iniciativas cuyo testigo ya ha sido recogido por la iniciativa privada cerrándose perfectamente el círculo".

Belloso y Tarango acaban sus contribuciones compartiendo la misma idea. "Las inversiones de hoy son las empresas de mañana y los puestos de trabajo de pasado mañana".

La pieza clave: el capital privado

Nuestro puzzle va tomando forma: espacio común, educación de calidad, investigación pública, proyectos pioneros y apoyo institucional.

Con estas piezas muchos emprendedores locales han podido construir un equipo bien engrasado desarrollando un producto o servicio puntero. Y esta conjunción de equipo+producto es en sí mismo un producto que se puede vender. Y las multinacionales lo compran.

Estas adquisiciones —exits en inglés— ayudan, por una parte, a que las mejores empresas internacionales monten sus equipos en Barcelona. En vez de empezar de cero, compran una empresa local establecida, y dedican este equipo a desarrollar su producto, o una versión del mismo integrada con el producto principal de la multinacional. Y, según su punto de vista, a precio de ganga.

Además, algunos emprendedores han logrado ser millonarios gracias a la venta de su empresa. No millonarios como para retirarse, pero sí como para poder vivir de rentas, o al menos con más holgura. Y cuando uno tiene dinero lo que no puede permitirse es dejarlo inmovilizado en el banco.

Así que lo invierte en un producto de rentabilidad. El producto que compra es aquél que mejor conoce: participaciones en otras startups.

Sin esta recirculación de capital en el ecosistema no hay startups.

Los business angels

Cuando un emprendedor tiene una idea, de lo primero que se da cuenta es de que necesita dinero para ejecutarla. Muy pocas empresas pueden funcionar más de unos pocos meses sin equipo y sin ingresos. Este emprendedor va a un banco a pedir un crédito, y descubre quizá por primera vez el concepto avalar. Pocos minutos después vuelve a su casa pensando de dónde va a sacar el dinero.

A veces es posible convencer a familiares o amigos para que presten dinero, pero tiene su riesgo. Las cenas de navidad ya son complicadas como para añadir discusiones de dinero con tíos y primos.

¿Y si hubiera gente que te "prestara" dinero de manera profesional sin pedir un aval? Pues esta gente existe, se llaman Business Angels, y si son buenos, se ganan esta denominación a pulso.

Un Business Angel es, habitualmente, un emprendedor que ha vendido su empresa y tiene dinero que desea reinvertir a cambio de una participación en la misma. Estos ángeles, si saben lo que les conviene, harán lo posible para que el negocio vaya bien y por tanto obtener un retorno en su inversión. Y qué mejor que ayudar al emprendedor a resolver los mismos problemas que él tuvo anteriormente.

David Baratech1#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000 David Baratech, fundador de Ulabox

David Baratech, fundador de Ulabox y Business Angel, habla sobre la diferencia con un inversor profesional. "Durante años vas aprendiendo con tu propio proyecto. Adquieres es una visión analítica sobre cómo exprimir tus activos, sean habilidades adquiridas o bien la capacidad de invertir que tengas. Al final te haces preguntas muy similares a las que se pueda hacer un fondo [de inversión], sólo que si el equipo, el product-market-fit y (adecuación al mercado) el mercado cumplen unos mínimos, el proceso de due diligence (auditoría interna) es mucho más casero. Indulgente incluso".

Un Business Angel es, habitualmente, un emprendedor que ha vendido su empresa y tiene dinero que desea reinvertir a cambio de una participación en la misma. Estos ángeles, si saben lo que les conviene, harán lo posible para que el negocio vaya bien y por tanto obtener un retorno en su inversión
Mammoth Hunters#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000 Oriol Roda (derecha), CEO y cofundador de Mammouth Hunters

Oriol Roda, fundador de Mammoth Hunters y pequeño inversor, los define así: "La expresión "smart money" no es simplemente una palabra bonita sino una realidad que puede marcar la diferencia entre el éxito o el fracaso de una startup. Sólo una persona que ha pasado por el proceso de crear su propia empresa tiene la empatía y la experiencia necesaria para acompañar de forma adecuada a otro emprendedor".

Es la combinación perfecta. Un profesor que paga por enseñar al emprendedor, y éste le devuelve el dinero, multiplicado, si tiene éxito. Cuanto mejor le enseña, más probabilidades hay de que los dos salgan ganando.

Un Business Angel es una potencial fábrica de futuros Business Angels. De cada empresa exitosa saldrán una decena de futuros inversores, con preparación y dinero para reinvertir en el ecosistema.

Las generaciones de emprendedores

En Silicon Valley este ciclo emprendedor-inversos es lo habitual. Tanto que el valle debe su nombre a todas las empresas de microchips de silicio surgidas de la escisión de Fairchild Semiconductors, incluyendo Intel. De Odeo nació Twitter. Y gracias a una herramienta interna usada en el desarrollo un videojuego que jamás vio la luz tenemos a Slack.

No es casual que la primera empresa seguramente no os suene y la segunda sí. Como en Star Wars, el aprendiz acaba superando al maestro.

En España, la generación actual de Business Angels surgió de los éxitos anteriores a la crisis de las puntocom. Somos hijos de Olé, Dinamic, Arrakis, eDreams, Lleida.net, Hispavista.

Las actuales startups españolas son empresas tecnológicas de tercera generación, o cuarta si incluimos la edad de oro del software español. En Silicon Valley empezaron en los años 50. Cada nueva generación se produce en aproximadamente 10 años, así que haced cuentas de la ventaja que nos llevan.

Según Roda, aún queda mucho camino por recorrer. "Barcelona aún está lejos de tener el volumen de fundadores que hayan tenido éxito y que empiecen a actuar como mentores de nuevas startups. Hasta que no llegue ese momento nuestra ciudad continuará siendo un hub de segundo orden a nivel global".

Aquí sí hay playa

Istock 625007278#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000

En España hay dos grandes hubs empresariales en sus dos ciudades principales. Madrid tiene el Gobierno, el IBEX, y un largo historial de relaciones con las multinacionales. No en vano, Google y Microsoft abrieron su primera oficina en la Capital. Si Barcelona está de moda es porque rompe toda lógica empresarial tradicional.

Ambas ciudades son muy similares. Comparten estado y legislación. La cultura es parecida. Barcelona tiene playa pero, por otra parte, en el sur de Europa hay muchas playas.

Nos encontramos lo que en Filosofía denominan condición necesaria pero no suficiente.

Y es que el clima y el entorno social son importantes. Por ello, a igualdad de muchos otros factores —especialmente la calidad de universidades y universitarios en el Estado—, tanto los guiris como sus empresas vienen a Barcelona.

¿Es frívolo mencionar el clima como fuente de riqueza? Quizá. Pero más frívolo es que el museo más exitoso de la ciudad sea el del Barça, donde el 84% de los visitantes son turistas. Cada vez que el club mete un gol, un inversor se plantea invertir en empresas de Barcelona.

El MWC es otro claro ejemplo de apuesta internacional por la capital catalana. ¿Sabéis cual fue la principal queja de los organizadores este 2018? ¿El clima político? ¿Las huelgas de transporte? No. El mal tiempo.

Los seres humanos somos así.

Y es que la capital catalana es una ciudad moderna, o mejor, modernilla. Enamora, a su manera, igual que enamoran París o Nueva York. Es cosmopolita y tradicional, abierta y misteriosa; del Barça y la Sagrada Família, corbata y rastas, business in the front, party in the back. Los Juegos Olímpicos no sólo cambiaron las fachadas, lo cambiaron todo.

Es la marca Barcelona.

Un éxito sólo posible mediante la unión de varias pequeñas piezas, insignificantes de manera individual, pero potentes cuando están todas presentes.

Así se cierra el círculo

Un estudiante acaba la carrera en una universidad que le ha ofrecido una buena formación. Pasa un tiempo haciendo carrera en un centro de investigación o una empresa tecnológica hasta que le pica el gusanillo y decide montar su proyecto.

Entonces recibe apoyo de Barcelona Activa quien le gestiona una ayuda de ENISA, y con suerte recibe financiación de Business Angels. Contrata a un equipo de ingenieros potentes y algún licenciado en empresariales, gente que conoció en la carrera, o extranjeros con experiencia que han venido buscando un proyecto interesante en un ambiente de bermudas y chanclas.

Nuestro amigo desarrolla un producto puntero y se establece en un espacio de incubación. Pasa el tiempo, y gracias al apoyo de instituciones como ICEX y ACCIÓ consigue empezar a vender en el extranjero. Una de estas empresas ve potencial en el producto o servicio, pero sobre todo en el talento que ha reunido, y decide instalarse en Barcelona. Abre una oficina en el 22@, o bien compra la startup. El ciclo se cierra.

Gracias a la experiencia adquirida y, con un poco de suerte, algo de dinero de la venta de su empresa, nuestro amigo cierra el ciclo. Empieza a participar en el ecosistema como Business Angel, reinvirtiendo el dinero y su experiencia en nuevos emprendedores.

El Dream Team

A los que vivís o trabajáis en Barcelona, parad un momento. Lo digo en serio. Levantad la vista de la pantalla y tomad consciencia del momento dulce que vive la ciudad.

El contexto que estamos disfrutando en términos de innovación e inversión es comparable a ver jugar a Messi. Pasa cada muchas generaciones y es irrepetible. Lo podréis explicar a vuestros nietos: "Yo lo viví".

Este artículo intenta ser un homenaje a todos los anónimos que llevan luchado durante varias décadas para que Barcelona pueda ser un Silicon Valley Mediterráneo. A nuestra manera, claro.

Lo habéis conseguido. Felicidades, y muchas gracias.

Fotos | iStock, Victoriano Javier Tornel, Barcelona Activa, Zarateman

También te recomendamos

Atención bancos tradicionales: estas alternativas fintech están captando 7000 clientes al día en Europa

Lavadora con función vapor: qué es y cómo debe utilizarse

Wavegarden, la empresa vasca de olas artificiales pasa a formar parte del "unicornio" del coworking WeWork

-
La noticia Barcelona lo ha conseguido: ya es el lugar de referencia de startups de tecnología en el sur de Europa fue publicada originalmente en Xataka por Carlos Fenollosa .


          The Wall Street Journal: New chips from China’s Huawei challenge Silicon Valley’s AI supremacy      Cache   Translate Page      
Huawei Technologies Co. unveiled two new computing chips aimed at powering artificial-intelligence applications, marking the Chinese telecommunications giant’s first major push into high-end technology dominated by U.S. chip giants.

          Director of IT - Grand Teton Lodge Company, Wyoming - Vail Resorts - Moran, WY      Cache   Translate Page      
Primary focus is customer satisfaction, system reliability, and adherence to corporate computing standards including PCI and SOC compliance....
From Vail Resorts - Sat, 06 Oct 2018 14:04:57 GMT - View all Moran, WY jobs
          Windows 10 October 2018 Update: Microsoft releases fix for data deletion bug - ZDNet      Cache   Translate Page      

ZDNet

Windows 10 October 2018 Update: Microsoft releases fix for data deletion bug
ZDNet
After taking the unprecedented step of halting the rollout of the latest Windows feature update only days after its public release, Microsoft announced today that it has isolated the cause of the bug and is rolling out a fix to members of the Windows ...
What the heck is it with Windows updates?Computerworld
Windows Insiders get fix for October 2018 Update data delete bugDigital Trends
Microsoft Seeds New Windows 10 October 2018 Update With Fix For Data Deletion BugHot Hardware
TechTarget -Thurrott.com (blog) -Windows Central -PCWorld
all 226 news articles »

          Google concedes $10bn Pentagon Jedi data contract amid ethical concerns      Cache   Translate Page      

Google has withdrawn its bid for a lucrative $10bn Pentagon cloud computing contract amid concern that the defence contract would contravene its own principles limiting military applications of artificial intelligence.

Thousands of staff had already protested about working on a separate Department of Defense contract and against this backdrop has opted not to proceed further with the Joint Enterprise Defense Infrastructure cloud (Jedi).

The prized contract amounted to a decade of work and could have helped propel Google forward in the cloud computing sector, making up for lost ground with the likes of Amazon and Microsoft which have become market leaders in selling off-site computing to businesses and public agencies.

A Google spokeswoman said: “While we are working to support the US government with our cloud in many areas, we are not bidding on the Jedi contract because first, we couldn't be assured that it would align with our AI principles, and second, we determined that there were portions of the contract that were out of scope with our current government certifications."

Bids were due to be submitted on Friday with Amazon Web Services now the clear favourite to win.

Earlier this week Google called time on its struggling Google+ social network following a data scandal.


          Google Drops Out of Pentagon’s $10B Cloud Competition, Says Deal May Clash With Its AI Values      Cache   Translate Page      

CircleID CircleID: Alphabet Inc.’s Google has announced that it will not compete for the Pentagon’s cloud-computing contract with an estimated value of $10 billion; says the project may conflict with its corporate values on artificial intelligence. Aaron Gregg reporting in the Washington Post: "The contract, known as the Joint Enterprise Defense Infrastructure, or JEDI for short, calls for a massive cloud-computing infrastructure that can handle classified U.S. military data and enable new defense capabilities. Bids are due Oct. 12. In a statement to The Washington Post, Google said it is dropping its bid for ethical reasons and because it lacked certain government certifications."

According to Tech Workers Coalition, an advocate for giving employees a say in technology company decisions, Google’s decision to withdraw from the cloud competition was due to pressure from thousands of workers, not AI principles. Tweeted today: "Google had every intention of bidding for, and possibly winning, the JEDI contract. They spent considerable resources and hours of top executive time courting military officials to do exactly this. They only dropped out due to sustained employee pressure."
Follow CircleID on TwitterMore under: Cloud Computing

The post Google Drops Out of Pentagon’s $10B Cloud Competition, Says Deal May Clash With Its AI Values appeared first on iGoldRush Domain News and Resources.


          Craft Beer Account Manager/Outside Sales Rep - Avitus Group - Sheridan, WY      Cache   Translate Page      
Proficiency with Microsoft Office products, cloud based computing and databases, mobile applications and other emerging technologies affecting Black Tooth...
From Avitus Group - Thu, 27 Sep 2018 08:14:23 GMT - View all Sheridan, WY jobs
          Firenze Vintage Bit 2018      Cache   Translate Page      

FVB2018Giunge alla decima edizione la manifestazione di retrocomputing Firenze Vintage Bit, che si svolgerà domenica 25 Novembre a Lastra a Signa, a pochi chilometri da Firenze.
L'edizione 2018 approfondirà le realizzazioni di questi ultimi 10 anni. Emulatori, schede per il Retrogaming, console virtuali hanno cambiato il modo di fare retrocomputing ed avvicinato nuove schiere di utenti a questo hobby.
La nutrita esposizione di retrocomputer conterà quest'anno su un ospite speciale, la replica dell’AGC, il computer che andò sulla Luna.
Durante la manifestazione si terranno le conferenze "10 anni di Firenze Vintage Bit" e “Il computer che volo’ sulla Luna”.
Sede della manifestazione sarà anche quest'anno l'antico "Spedale di Sant'Antonio" di Lastra a Signa (FI).
Per maggiori informazioni visitare il sito ufficiale della manifestazione. 


          Low-Code / No-Code Professional Services Firm VeilSun Welcomes Ty...      Cache   Translate Page      

VeilSun, a growing cloud computing professional services firm specializing in low-code / no-code development and the Quick Base platform today welcomed Ty Shewmake as their Chief Technology Officer.

(PRWeb October 10, 2018)

Read the full story at https://www.prweb.com/releases/low_code_no_code_professional_services_firm_veilsun_welcomes_ty_shewmake_as_cto/prweb15786634.htm


          4 Discounted Dell Computers Perfect for Your Business      Cache   Translate Page      

Need to purchase some new computers for your business? Dell has you covered. Right now, Dell is offering some great clearance sale business PCs so you can upgrade for a low price.

If you’re not sure where to start, we’ve highlighted some of the top deals below. All of these include a subscription to McAfee Small Business Security to keep your business safe and secure.

1. Inspiron 15 5000 (9800P)
4 Discounted Dell Computers Perfect for Your Business

Here’s an all-around great laptop that packs a lot of power for the price. You get a 15.6-inch touch screen that’s full HD (1920×1080), plus 16GB of RAM.

It’s powered by AMD devices for both the processor and graphics, with a seventh-generation quad core AMD FX 9800P for the former and a 4GB Radeon R7 M445 graphics card.

It still includes an optical drive for installing software via disc, plus windows 10 Pro. Top this deal off with 24 months of McAfee Small Business Security included.

2. Inspiron Desktop
4 Discounted Dell Computers Perfect for Your Business

Need a desktop that can do it all? This is the one for you. It includes an Intel Core i7-7700 processor and 16GB of DDR4 RAM. For graphics intensive tasks, you can rely on the Nvidia GTX 1050 with 2GB of video RAM.

With dual storage consisting of a 128GB SSD and a 1TB HDD, you can enjoy both speed and an abundance of space. And with a McAfee Small Business Security 12 month subscription and Windows 10 Pro, you’ll be all set to integrate this into your company.

3. Inspiron 17 5000
4 Discounted Dell Computers Perfect for Your Business

This laptop is a beast. It’s got the Intel i7-8550U processor for powering through intense tasks, plus a big 2TB hard drive for plenty of storage. The 17.3-inch screen means you can see everything clearly without needing an external monitor.

Like the other laptop, it includes a DVD drive. You’ll also find a USB-C port for modern devices. Windows 10 Pro and 12 months of McAfee’s Small Business Security make this an even more attractive package.

4. Inspiron 15 500 (9700P)
4 Discounted Dell Computers Perfect for Your Business

On a budget and only interested in the lowest price? Here’s your best option. This is the same overall laptop as the first one we listed, but includes a few less powerful components to bring the price down.

You’ll find an AMD A12-9700P processor here instead of the AMD FX 9800P on the more powerful model. Both are quad-core CPUs, however. This model also features 8GB of RAM instead of 16GB.

This computer’s screen lacks touch capability but is still 1080p. You’ll also have AMD’s integrated graphics instead of a dedicated graphics card, which is suitable for most users.

If you don’t need the extra power, this is an excellent budget option, as you still get 12 months of McAfee Small Business Security.

Jump on These Deals Now

One of these Dell Small Business Specials likely fits a computing need you have at your business just right. If so, don’t wait on it this sale won’t last forever. Make sure you lock in your purchase soon!

Image Credit: SIphotography/ DepositPhotos


          (USA-OH-Cincinnati) Service Desk Analyst III - Second Shift      Cache   Translate Page      
**Service Desk Analyst III \- Second Shift** **Cincinnati, OH** **Job Purpose** This position is responsible for customer service and technical support for all business products supported out of the operations center\. Analyst III will be responsible for the triage of incidents that are escalated to them in order to remediate events going forward\. In addition to speaking directly to internal and external customers about a wide variety of requests, this role also will be engaged in project based activities for onboarding new customers\. Responsibilities will include providing the necessary support in order to meet customer's expectations and to address customer's issues and/or requests in a manner that meets or exceeds agreed upon Service Level Agreements \(SLAs\) within operations\. **Essential Functions** Serve as escalation for internal/external customer for incidents, requests and inquiries for all Business Products \(35%\) Log, document and triage ticket activity until resolution is complete and ticket is closed with customer \(25%\) Collaborate with others on provisioning and project based work activities for new customers \(25%\) Create knowledge base entries for solutions that may be repeatable so that others can leverage against future incidents/requests \(10%\) Make outbound calls to internal/external customers as part of the Incident Management lifecycle \(5%\) Other duties as assigned **Education** High School diploma required ITIL Foundations Certification preferred Vocational/Technical/Business School \(6\-8 Months specialized training\) preferred CCNA preferred Net\+, CCENT preferred **Experience/Background** Two or more years of experience in a Service Desk or technical support environment **Special Knowledge/Skills** Excellent written and oral communication skills Excellent customer service and conflict resolution skills Solid understanding of Information Technology and computing systems Solid networking fundamentals Familiar with Microsoft applications such as Windows operating system, Office applications, Outlook, and SharePoint Familiar with ServiceNow Incident Management System Demonstrated a desire for self\-directed education regarding IP, Networking and VOIP technologies Ability to help others while meeting individual performance goals Ability to work remotely Project management awareness and skills **Miscellaneous** Shift work is required, as this is a 24 hour operations; this includes working weekends, holidays and during natural disasters/adverse weather conditions **Disability Accommodations** Cincinnati Bell and Cincinnati Bell Technology Solutions is an Equal Employment Opportunity / Affirmative Action employer and we provide reasonable accommodations for qualifying individuals with disabilities and disabled veterans in our job application and interview procedures\. If you would like to request an ADA accommodation for any part of the application and/or interview process, please contact our HR Compliance Department at\(513\) 841\-6310or send an email to recruiting@cinbell\.com\. If you should have any difficulty, you may use our alternative methods to express your interest in employment\. A wonderful career awaits you\! We are an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status, or any other characteristic protected by law\.
          (USA-NY-New York) Senior Data Scientist, Economic Graph Analytics      Cache   Translate Page      
Senior Data Scientist, Economic Graph Analytics LinkedIn’s vision is to create economic opportunity for every member of the global workforce. The Economic Graph team mission is to reach that vision by bringing to life data and pilot projects that help leaders address the challenges of the modern workforce and help members outside of LinkedIn’s core navigate their education and employment challenges. The Analytics team is looking for a talented and driven data scientist to join our team to support projects partnering with governments, NGOs, and think tanks. Our projects have ranged from understanding talent migration to computing the relative supply and demand of skills on a local, national, and international level. We are looking for an individual to join our team with a focus on developing internal tools and external products to scale our work more broadly. This role will work closely with various cross-functional teams such as product, engineering, and research to develop these solutions, and requires an adaptable analytics professional that is both passionate about making an impact through rigorous analyses and who also exhibits strong technical acumen. Responsibilities Analyze large datasets to investigate key regional trends, behaviors and metrics Take customized one-off analyses and scale them to represent millions of members Build scalable reports, dashboards, models and tools to help our policy team communicate the value of LinkedIn to external stakeholders Consult and communicate with LinkedIn’s policy team and external policy leaders to showcase Economic Graph insights Assist with developing strategy and managing operational metrics for various initiatives Coordinate cross-functionally with engineering, communications, marketing, product and sales to drive business objectives Develop methods and tooling to improve operational efficiencies for our analytical work, including decreasing time to market and automating repeated work Engage with internal technology partners to prototype and launch products that make our analytical insights more broadly available for consumers Evangelize technical tooling and educate team on best practices for tools and products Required Qualifications: Bachelor’s degree in a quantitative or social sciences field of study such as Computer Science, Engineering, Statistics, Economics, or Public Policy Experience using R, Python, or other programming languages for data manipulation, analysis, machine learning, or application development Experience using SQL to analyze datasets with databases such as Teradata, Hive, and PrestoDB 3+ years of research and/or analytics experience within a relevant industry or organization (Ex. tech, social media, finance, retail, research institutes). Preferred Qualifications: Masters or PhD degree in a quantitative or social sciences field of study Background and experience in statistics, predictive modeling, and machine learning Experience working in the internet industry, on social impact, public policy or consulting Experience with applied social science research or familiarity with publicly-available government data sets such as those provided by the BLS, Census Bureau, and the Department of Labor Experience with Hadoop (Hive, Pig, or MapReduce) Familiarity with data visualization and/or BI tools (Ex. Tableau, PowerBI) Experience in ETL tools and processes Experience using scripting languages such as Unix shell, Python, and PHP Experience working with product or engineering teams to develop and launch products, or experience developing software applications Strong oral and written communication skills. Strong ability to communicate findings clearly to both technical and non-technical audiences. Ability to interact internally and externally to drive business and technical discussions
          Cloud Computing: Cloud-Migration – diese Tools helfen beim Umstieg      Cache   Translate Page      
Softwarewerkzeuge für die Cloud-Migration helfen Unternehmen, ihre Projekte effizient und sicher abzuwickeln. Doch die Auswahl ist keine leichte Übung. Zahlreiche Softwarehäuser haben das Geschäftsfeld für sich entdeckt und machen den Markt unübersichtlich.
          (USA-OH-Streetsboro) Technology Sales Supervisor      Cache   Translate Page      
**Description** **Position Summary:** The Tech Sales Supervisor is responsible for selling technology products and services to Staples’ customers. This individual also acts as the team lead within the department – driving computing sales, training and coaching team members on selling techniques, and inspiring other team members through positive attitude and behaviors. The Tech Sales Supervisor must have excellent communication skills including listening and gaining a thorough understanding of customers’ needs in order to offer them the best solution. **General Purpose:** Drive profitable sales growth through selling technology products and services by creating and maintaining an inspired Selling Culture in Technology. Lead the department by coaching and developing the Tech Sales Team. **Role Qualifications:** Shows ability to lead and coach a team to strengthen and support our associates and customers Teaches and reinforces consultative selling behaviors that result in Managers and Associates delivering exceptional sales & service results Experience working on presenting solutions through creating an open and friendly customer centric environment that provides a total solution to all customers Demonstrates ability to coach and lead a team committed to operational excellence to drive profitable year over year sales and margin Has a clear understanding of merchandising and retail operations Champion of Staples values; Own it, Say it like it is, Be Caring, keep it simple, and Work together Able to work a flexible schedule Adheres to all company policy and procedures **Position Responsibilities:** **Leadership:** Serves as a leader within the retail organization with direct accountability to the Tech Selling floor. Provides coaching and feedback to all tech sales associates. Takes personal accountability for the tech sales team.. Drive profitable sales and service. High integrity and ethical behavior as a keyholder for the store. **People:** Involved in the selection, recruitment and performance assessments of Tech Sales associates. **Selling:** Champions technology and computing selling programs; Exhibits Inspired Selling behaviors in all interactions and communications with customers, associates and management. Coaches team of associates to do the same; Serves as a Selling and Service role model for whole store. Achieve all sales & service goals and drives DPT through presenting solutions. Respond and resolve customer requests and concerns. **Essential Skills & Experience:** **Results Orientation:** Demonstrates strong drive to deliver meaningful results through selling technology products and services. Sets high standards of performance for self & others. **Build Relationships:** Excellent ability to assess customers’ needs and offer them a full technology solution that meets or exceeds their expectations. Relates to co-workers and managers in an open and friendly manner and enjoys working in a team environment. **Engage & Inspire:** Leads the Tech Sales team to achieve goals and drives the overall sales of the department (Products and Services) through projecting a positive image, and exhibiting inspired or advanced level of selling behaviors. Coaches’ junior associates to improve skills. **Managing Execution:** Ability to be organized and plan work to ensure that work is completed on time and to high standards. Follows all company & departmental operational standards, processes and procedures. **Communication:** Strong written and verbal skills. Able to accurately assess customers’ technical knowledge and communicate information in a way the customer can understand. Able to remain calm during tense or stressful situations. **Analysis** **:** Actively listen and ask customers questions to collect sufficient information to understand problems/ issues. Ability to analyze problems & issues from different points of view. **Adaptability:** Able to adapt to shifting or competing priorities; flexible "can do" attitude. **Leveraging Diversity:** Works cooperatively with people who have different backgrounds, knowledge, styles, talents, perspectives, values and beliefs. **Qualifications** **Basic Qualifications:** 1 year previous experience selling technology products or services Previous experience leading teams and/or supervising others Ability to work a flexible schedule **Preferred Skills & Experience:** Demonstrated ability to sell technology products and services; genuine interest in technology products Experience using financial metrics to track sales progress & increase sales Ability to peer coach and act as a team lead within the Tech Sales department Excellent customer service skills Three to five years of key holder experience within a retail environment Staples is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, protected veteran status, disability, or any other basis protected by federal, state, or local law. _Staples is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, age, sex, sexual orientation, gender identity, national origin, protected veteran status, disability, or any other basis protected by federal, state, or local law._
          (USA-OH-Columbus) Technology Sales Supervisor      Cache   Translate Page      
**Description** **Position Summary:** The Tech Sales Supervisor is responsible for selling technology products and services to Staples’ customers. This individual also acts as the team lead within the department – driving computing sales, training and coaching team members on selling techniques, and inspiring other team members through positive attitude and behaviors. The Tech Sales Supervisor must have excellent communication skills including listening and gaining a thorough understanding of customers’ needs in order to offer them the best solution. **General Purpose:** Drive profitable sales growth through selling technology products and services by creating and maintaining an inspired Selling Culture in Technology. Lead the department by coaching and developing the Tech Sales Team. **Role Qualifications:** Shows ability to lead and coach a team to strengthen and support our associates and customers Teaches and reinforces consultative selling behaviors that result in Managers and Associates delivering exceptional sales & service results Experience working on presenting solutions through creating an open and friendly customer centric environment that provides a total solution to all customers Demonstrates ability to coach and lead a team committed to operational excellence to drive profitable year over year sales and margin Has a clear understanding of merchandising and retail operations Champion of Staples values; Own it, Say it like it is, Be Caring, keep it simple, and Work together Able to work a flexible schedule Adheres to all company policy and procedures **Position Responsibilities:** **Leadership:** Serves as a leader within the retail organization with direct accountability to the Tech Selling floor. Provides coaching and feedback to all tech sales associates. Takes personal accountability for the tech sales team.. Drive profitable sales and service. High integrity and ethical behavior as a keyholder for the store. **People:** Involved in the selection, recruitment and performance assessments of Tech Sales associates. **Selling:** Champions technology and computing selling programs; Exhibits Inspired Selling behaviors in all interactions and communications with customers, associates and management. Coaches team of associates to do the same; Serves as a Selling and Service role model for whole store. Achieve all sales & service goals and drives DPT through presenting solutions. Respond and resolve customer requests and concerns. **Essential Skills & Experience:** **Results Orientation:** Demonstrates strong drive to deliver meaningful results through selling technology products and services. Sets high standards of performance for self & others. **Build Relationships:** Excellent ability to assess customers’ needs and offer them a full technology solution that meets or exceeds their expectations. Relates to co-workers and managers in an open and friendly manner and enjoys working in a team environment. **Engage & Inspire:** Leads the Tech Sales team to achieve goals and drives the overall sales of the department (Products and Services) through projecting a positive image, and exhibiting inspired or advanced level of selling behaviors. Coaches’ junior associates to improve skills. **Managing Execution:** Ability to be organized and plan work to ensure that work is completed on time and to high standards. Follows all company & departmental operational standards, processes and procedures. **Communication:** Strong written and verbal skills. Able to accurately assess customers’ technical knowledge and communicate information in a way the customer can understand. Able to remain calm during tense or stressful situations. **Analysis** **:** Actively listen and ask customers questions to collect sufficient information to understand problems/ issues. Ability to analyze problems & issues from different points of view. **Adaptability:** Able to adapt to shifting or competing priorities; flexible "can do" attitude. **Leveraging Diversity:** Works cooperatively with people who have different backgrounds, knowledge, styles, talents, perspectives, values and beliefs. **Qualifications** **Basic Qualifications:** 1 year previous experience selling technology products or services Previous experience leading teams and/or supervising others Ability to work a flexible schedule **Preferred Skills & Experience:** Demonstrated ability to sell technology products and services; genuine interest in technology products Experience using financial metrics to track sales progress & increase sales Ability to peer coach and act as a team lead within the Tech Sales department Excellent customer service skills Three to five years of key holder experience within a retail environment Staples is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, protected veteran status, disability, or any other basis protected by federal, state, or local law. _Staples is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, age, sex, sexual orientation, gender identity, national origin, protected veteran status, disability, or any other basis protected by federal, state, or local law._
          socloudy.com      Cache   Translate Page      

So Cloudy: A catchy name that depicts grey skies but great brilliance.

socloudy.com
Keywords: 
so, very, much, cloudy, clouds, computing, airy, breezy, fluffy, skies, weather, dreamy

          (USA-NY-Bridgehampton) Technology Sales Supervisor      Cache   Translate Page      
**Description** **Position Summary:** The Tech Sales Supervisor is responsible for selling technology products and services to Staples’ customers. This individual also acts as the team lead within the department – driving computing sales, training and coaching team members on selling techniques, and inspiring other team members through positive attitude and behaviors. The Tech Sales Supervisor must have excellent communication skills including listening and gaining a thorough understanding of customers’ needs in order to offer them the best solution. **General Purpose:** Drive profitable sales growth through selling technology products and services by creating and maintaining an inspired Selling Culture in Technology. Lead the department by coaching and developing the Tech Sales Team. **Role Qualifications:** Shows ability to lead and coach a team to strengthen and support our associates and customers Teaches and reinforces consultative selling behaviors that result in Managers and Associates delivering exceptional sales & service results Experience working on presenting solutions through creating an open and friendly customer centric environment that provides a total solution to all customers Demonstrates ability to coach and lead a team committed to operational excellence to drive profitable year over year sales and margin Has a clear understanding of merchandising and retail operations Champion of Staples values; Own it, Say it like it is, Be Caring, keep it simple, and Work together Able to work a flexible schedule Adheres to all company policy and procedures **Position Responsibilities:** **Leadership:** Serves as a leader within the retail organization with direct accountability to the Tech Selling floor. Provides coaching and feedback to all tech sales associates. Takes personal accountability for the tech sales team.. Drive profitable sales and service. High integrity and ethical behavior as a keyholder for the store. **People:** Involved in the selection, recruitment and performance assessments of Tech Sales associates. **Selling:** Champions technology and computing selling programs; Exhibits Inspired Selling behaviors in all interactions and communications with customers, associates and management. Coaches team of associates to do the same; Serves as a Selling and Service role model for whole store. Achieve all sales & service goals and drives DPT through presenting solutions. Respond and resolve customer requests and concerns. **Essential Skills & Experience:** **Results Orientation:** Demonstrates strong drive to deliver meaningful results through selling technology products and services. Sets high standards of performance for self & others. **Build Relationships:** Excellent ability to assess customers’ needs and offer them a full technology solution that meets or exceeds their expectations. Relates to co-workers and managers in an open and friendly manner and enjoys working in a team environment. **Engage & Inspire:** Leads the Tech Sales team to achieve goals and drives the overall sales of the department (Products and Services) through projecting a positive image, and exhibiting inspired or advanced level of selling behaviors. Coaches’ junior associates to improve skills. **Managing Execution:** Ability to be organized and plan work to ensure that work is completed on time and to high standards. Follows all company & departmental operational standards, processes and procedures. **Communication:** Strong written and verbal skills. Able to accurately assess customers’ technical knowledge and communicate information in a way the customer can understand. Able to remain calm during tense or stressful situations. **Analysis** **:** Actively listen and ask customers questions to collect sufficient information to understand problems/ issues. Ability to analyze problems & issues from different points of view. **Adaptability:** Able to adapt to shifting or competing priorities; flexible "can do" attitude. **Leveraging Diversity:** Works cooperatively with people who have different backgrounds, knowledge, styles, talents, perspectives, values and beliefs. **Qualifications** **Basic Qualifications:** 1 year previous experience selling technology products or services Previous experience leading teams and/or supervising others Ability to work a flexible schedule **Preferred Skills & Experience:** Demonstrated ability to sell technology products and services; genuine interest in technology products Experience using financial metrics to track sales progress & increase sales Ability to peer coach and act as a team lead within the Tech Sales department Excellent customer service skills Three to five years of key holder experience within a retail environment Staples is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, protected veteran status, disability, or any other basis protected by federal, state, or local law. _Staples is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, age, sex, sexual orientation, gender identity, national origin, protected veteran status, disability, or any other basis protected by federal, state, or local law._
          (USA-PA-Glen Mills) Technology Sales Supervisor      Cache   Translate Page      
**Description** **Position Summary:** The Tech Sales Supervisor is responsible for selling technology products and services to Staples’ customers. This individual also acts as the team lead within the department – driving computing sales, training and coaching team members on selling techniques, and inspiring other team members through positive attitude and behaviors. The Tech Sales Supervisor must have excellent communication skills including listening and gaining a thorough understanding of customers’ needs in order to offer them the best solution. **General Purpose:** Drive profitable sales growth through selling technology products and services by creating and maintaining an inspired Selling Culture in Technology. Lead the department by coaching and developing the Tech Sales Team. **Role Qualifications:** Shows ability to lead and coach a team to strengthen and support our associates and customers Teaches and reinforces consultative selling behaviors that result in Managers and Associates delivering exceptional sales & service results Experience working on presenting solutions through creating an open and friendly customer centric environment that provides a total solution to all customers Demonstrates ability to coach and lead a team committed to operational excellence to drive profitable year over year sales and margin Has a clear understanding of merchandising and retail operations Champion of Staples values; Own it, Say it like it is, Be Caring, keep it simple, and Work together Able to work a flexible schedule Adheres to all company policy and procedures **Position Responsibilities:** **Leadership:** Serves as a leader within the retail organization with direct accountability to the Tech Selling floor. Provides coaching and feedback to all tech sales associates. Takes personal accountability for the tech sales team.. Drive profitable sales and service. High integrity and ethical behavior as a keyholder for the store. **People:** Involved in the selection, recruitment and performance assessments of Tech Sales associates. **Selling:** Champions technology and computing selling programs; Exhibits Inspired Selling behaviors in all interactions and communications with customers, associates and management. Coaches team of associates to do the same; Serves as a Selling and Service role model for whole store. Achieve all sales & service goals and drives DPT through presenting solutions. Respond and resolve customer requests and concerns. **Essential Skills & Experience:** **Results Orientation:** Demonstrates strong drive to deliver meaningful results through selling technology products and services. Sets high standards of performance for self & others. **Build Relationships:** Excellent ability to assess customers’ needs and offer them a full technology solution that meets or exceeds their expectations. Relates to co-workers and managers in an open and friendly manner and enjoys working in a team environment. **Engage & Inspire:** Leads the Tech Sales team to achieve goals and drives the overall sales of the department (Products and Services) through projecting a positive image, and exhibiting inspired or advanced level of selling behaviors. Coaches’ junior associates to improve skills. **Managing Execution:** Ability to be organized and plan work to ensure that work is completed on time and to high standards. Follows all company & departmental operational standards, processes and procedures. **Communication:** Strong written and verbal skills. Able to accurately assess customers’ technical knowledge and communicate information in a way the customer can understand. Able to remain calm during tense or stressful situations. **Analysis** **:** Actively listen and ask customers questions to collect sufficient information to understand problems/ issues. Ability to analyze problems & issues from different points of view. **Adaptability:** Able to adapt to shifting or competing priorities; flexible "can do" attitude. **Leveraging Diversity:** Works cooperatively with people who have different backgrounds, knowledge, styles, talents, perspectives, values and beliefs. **Qualifications** **Basic Qualifications:** 1 year previous experience selling technology products or services Previous experience leading teams and/or supervising others Ability to work a flexible schedule **Preferred Skills & Experience:** Demonstrated ability to sell technology products and services; genuine interest in technology products Experience using financial metrics to track sales progress & increase sales Ability to peer coach and act as a team lead within the Tech Sales department Excellent customer service skills Three to five years of key holder experience within a retail environment Staples is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, protected veteran status, disability, or any other basis protected by federal, state, or local law. _Staples is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, age, sex, sexual orientation, gender identity, national origin, protected veteran status, disability, or any other basis protected by federal, state, or local law._
          (USA-ME-North Windham) Technology Sales Supervisor      Cache   Translate Page      
**Description** **Position Summary:** The Tech Sales Supervisor is responsible for selling technology products and services to Staples’ customers. This individual also acts as the team lead within the department – driving computing sales, training and coaching team members on selling techniques, and inspiring other team members through positive attitude and behaviors. The Tech Sales Supervisor must have excellent communication skills including listening and gaining a thorough understanding of customers’ needs in order to offer them the best solution. **General Purpose:** Drive profitable sales growth through selling technology products and services by creating and maintaining an inspired Selling Culture in Technology. Lead the department by coaching and developing the Tech Sales Team. **Role Qualifications:** Shows ability to lead and coach a team to strengthen and support our associates and customers Teaches and reinforces consultative selling behaviors that result in Managers and Associates delivering exceptional sales & service results Experience working on presenting solutions through creating an open and friendly customer centric environment that provides a total solution to all customers Demonstrates ability to coach and lead a team committed to operational excellence to drive profitable year over year sales and margin Has a clear understanding of merchandising and retail operations Champion of Staples values; Own it, Say it like it is, Be Caring, keep it simple, and Work together Able to work a flexible schedule Adheres to all company policy and procedures **Position Responsibilities:** **Leadership:** Serves as a leader within the retail organization with direct accountability to the Tech Selling floor. Provides coaching and feedback to all tech sales associates. Takes personal accountability for the tech sales team.. Drive profitable sales and service. High integrity and ethical behavior as a keyholder for the store. **People:** Involved in the selection, recruitment and performance assessments of Tech Sales associates. **Selling:** Champions technology and computing selling programs; Exhibits Inspired Selling behaviors in all interactions and communications with customers, associates and management. Coaches team of associates to do the same; Serves as a Selling and Service role model for whole store. Achieve all sales & service goals and drives DPT through presenting solutions. Respond and resolve customer requests and concerns. **Essential Skills & Experience:** **Results Orientation:** Demonstrates strong drive to deliver meaningful results through selling technology products and services. Sets high standards of performance for self & others. **Build Relationships:** Excellent ability to assess customers’ needs and offer them a full technology solution that meets or exceeds their expectations. Relates to co-workers and managers in an open and friendly manner and enjoys working in a team environment. **Engage & Inspire:** Leads the Tech Sales team to achieve goals and drives the overall sales of the department (Products and Services) through projecting a positive image, and exhibiting inspired or advanced level of selling behaviors. Coaches’ junior associates to improve skills. **Managing Execution:** Ability to be organized and plan work to ensure that work is completed on time and to high standards. Follows all company & departmental operational standards, processes and procedures. **Communication:** Strong written and verbal skills. Able to accurately assess customers’ technical knowledge and communicate information in a way the customer can understand. Able to remain calm during tense or stressful situations. **Analysis** **:** Actively listen and ask customers questions to collect sufficient information to understand problems/ issues. Ability to analyze problems & issues from different points of view. **Adaptability:** Able to adapt to shifting or competing priorities; flexible "can do" attitude. **Leveraging Diversity:** Works cooperatively with people who have different backgrounds, knowledge, styles, talents, perspectives, values and beliefs. **Qualifications** **Basic Qualifications:** 1 year previous experience selling technology products or services Previous experience leading teams and/or supervising others Ability to work a flexible schedule **Preferred Skills & Experience:** Demonstrated ability to sell technology products and services; genuine interest in technology products Experience using financial metrics to track sales progress & increase sales Ability to peer coach and act as a team lead within the Tech Sales department Excellent customer service skills Three to five years of key holder experience within a retail environment Staples is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, protected veteran status, disability, or any other basis protected by federal, state, or local law. _Staples is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, age, sex, sexual orientation, gender identity, national origin, protected veteran status, disability, or any other basis protected by federal, state, or local law._
          (USA-VA-Williamsburg) Technology Sales Supervisor      Cache   Translate Page