Next Page: 10000

          Whats new on arXiv      Cache   Translate Page      
ADEPOS: Anomaly Detection based Power Saving for Predictive Maintenance using Edge Computing In industry 4.0, predictive maintenance(PM) is one of …

Continue reading


          Why Companies on Analog Networks are Missing Out on the Benefits of Cloud Computing and IIoT      Cache   Translate Page      

The post Why Companies on Analog Networks are Missing Out on the Benefits of Cloud Computing and IIoT first appeared on the ISA Interchange blog site.


          Comment on Two discussion points inspired by Stephen Wolfram by Mr Ed      Cache   Translate Page      
Snorri <blockquote>But you (Mr Ed) seem to realize that, judging by your last paragraph; so i can only assume that what you mean is, we humans do not need to use brute force: we have better ways to prune the search tree. My objection would be: maybe we do use brute force, but it happens at a subconscious level; we are simply unaware of it.</blockquote> I am no expert on computing, I know almost nothing about it. I was a County-level chess player in my youth. As I understand it, certain chess puzzles bamboozle what are very powerful chess engines (iirc the one in the video is <a href="https://www.chessprogramming.org/Stockfish" rel="nofollow">Stockfish</a>. In the video, Stockfish found the solution are being extensively led towards the solution. The 'problem' for chess engines AIUI is that they work on the basis of evaluations of positions that gives a 'won' position a certain value much greater than neutral but not at infinity (i.e. won), so that they can end up 'groping around in the dark' chasing apparent dead ends and sorting their own valuations, rather than seeing a 'won' position except when it comes to a foreseeable forced mate. I imagine that work is going on to get them to match more closely human intuition (or rather, the intuition of, say, an IM-level chess player) to enable them to sort the wheat from the chaff and prune the true, but again, simulating intelligence rather than replicating it.
          Bitfury Secures $80M in Private Funding Round      Cache   Translate Page      
Bitfury funding round

Cryptocurrency mining firm Bitfury Group has closed a Series C, $80 million funding round led by EU-based Korelya Capital. The round also included crypto merchant bank Galaxy Digital, Lian and Jabre Group, Dentsu Inc., Armat Group and others.

Bitfury is a diversified blockchain company known for its expertise in developing high-performance computing technologies, processing capabilities and advanced blockchain-based solutions for companies and governments, including the development of a blockchain-based land registry in Ukraine.

The funding round will be used by the company to enrich its software and hardware development, as well as explore other technologies that are emerging alongside the blockchain.

“This private placement enables Bitfury to expand our existing areas of focus, including securing the Bitcoin Blockchain, as well as hardware and software development – and broaden our financial strategic options. It also enables us to concentrate on adjacents such as high-performance computing, including emerging technologies like artificial intelligence (AI),” CCO John Mercurio told Bitcoin Magazine.

Valery Vavilov, CEO and co-founder of Bitfury, said the success of the round was a reflection of the company's achievements and its ability to meet the needs of “adjacent market segments in high-performance computing.”

In correspondence with Bitcoin Magazine, Vavilov stated:

“We are very pleased with our successful private placement, which enables us to expand our work designing ground-breaking blockchain solutions to governments, businesses, and institutions around the world. Strong support from the investor community also allows us to concentrate on adjacent businesses such as high-performance computing, including emerging technologies like artificial intelligence.

Bitfury made headlines last week when word broke out that the company may be considering going public. When Bitcoin Magazine asked if this private funding changes the prospect of an IPO, Mercurio responded with the following:

“Bitfury is continuously evaluating financing options to support its development strategy, and the IPO is one alternative. But no decision has been made and ultimately it will depend on a number of factors, including the capital markets environment.”

At a time when cryptocurrency miners are being criticized for the energy consumption required to secure public blockchains with high security requirements, Bitfury has made a commitment to using renewable energy. It has also created standard processes for reducing the consumption of energy in its data centers by using immersion cooling technology.

In September 2018, Bitfury announced a bitcoin mining chip called the "Clarke" ASIC chip, which it claims offers the “strongest performance among bitcoin mining chips and is unparalleled in efficiency," via a Medium post. The company also has plans to integrate Clarke into its range of existing mining products and on its mining farms across the world.

In addition to the Clarke chips, the company also launched its latest computing servers dubbed the Bitfury Tardis. Both the chip and the server will be included in the company's product offering, the Bitfury BlockBox, per reports on its release.

Founded in 2011 and recognized as the largest, non-Chinese company that provides hardware for bitcoin mining, Bitfury is also known for pioneering the hybrid algorithm Flare on the Lightning Network, which ensures that payment routes can be found as quickly as possible.



This article originally appeared on Bitcoin Magazine.


          Pulumi: SaaS multicloud app deployment service      Cache   Translate Page      
Pulumi seeks to “Program the Cloud”. They provide infrastructure for serverless containers. For an intro overview of Pulumi see: From GeekWire: It didn’t take long for the ex-Microsoft engineers behind Pulumi to prove their software development platform for multicloud computing was worthy of additional investment. Pulumi launched its SaaS multicloud app deployment service which could help businesses […]
          Beyond Univariate, Single-Sample Data with MCHT      Cache   Translate Page      

(This article was first published on R Curtis Miller's Personal Website , and kindly contributed toR-bloggers)

Introduction

I’ve spent the past few weeks writing about MCHT , my new package for Monte Carlo and bootstrap hypothesis testing. After discussing how to use MCHT safely , I discussed how to use it for maximized Monte Carlo (MMC) testing , then bootstrap testing . One may think I’ve said all I want to say about the package, but in truth, I’ve only barely passed the halfway point!

Today I’m demonstrating how general MCHT is, allowing one to use it for multiple samples and on non-univariate data. I’ll be doing so with two examples: a permutation test and the

test for significance of a regression model.

Permutation Test The idea of the permutation test dates back to Fisher (see [1]) and it forms the basis of computational testing for difference in mean. Let’s suppose that we have two samples with respective means and

, respectively. Suppose we wish to test

against


Beyond Univariate, Single-Sample Data with MCHT

using samples

and

, respectively.

If the null hypothesis is true and we also make the stronger assumption that the two samples were drawn from distributions that could differ only in their means, then the labelling of the two samples is artificial, and if it were removed the two samples would be indistinguishable. Relabelling the data and artificially calling one sample the

sample and the other the

sample would produce highly similar statistics to the one we actually observed. This observation suggests the following procedure:

Generate new datasets by randomly assigning labels to the combined sample of and . Compute copies of the test statistic on each of the new samples; suppose that the test statistic used is the difference in means, . Compute the test statistic on the actual sample and compare to the simulated statistics. If the actual statistic is relatively large compared to the simulated statistics, then reject the null hypothesis in favor of the alternative; otherwise, don’t reject.

In practice step 3 is done by computing a

-value representing the proportion of simulated statistics larger than the one actually computed.

Permutation Tests Using MCHT

The permutation test is effectively a bootstrap test, so it is supported by MCHT , though one may wonder how that’s the case when the parameters test_stat , stat_gen , and rand_gen only accept one parameter, x , representing the dataset (as opposed to, say, t.test() , which has an x and an optional y parameter). But MCHTest() makes very few assumptions about what object x actually is; if your object is either a vector or tabular, then the MCHTest object should not have a problem with it (it’s even possible a loosely structured list would be fine, but I have not tested this; tabular formats should cover most use cases).

In this case, putting our data in long-form format makes doing a permutation test fairly simple. One column will contain the group an observation belongs to while the other contains observation values. The test_stat function will split the data according to group, compute group-wise means, and finally compute the test statistic. rand_gen generates new dataset by permuting the labels in the data frame. stat_gen merely serves as the glue between the two.

The result is the following test.

library(MCHT) library(doParallel) registerDoParallel(detectCores()) ts <- function(x) { grp_means <- aggregate(value ~ group, data = x, FUN = mean) grp_means$value[1] - grp_means$value[2] } rg <- function(x) { x$group <- sample(x$group) x } sg <- function(x) { test_stat(x) } permute.test <- MCHTest(ts, sg, rg, seed = 123, N = 1000, localize_functions = TRUE) df <- data.frame("value" = c(rnorm(5, 2, 1), rnorm(10, 0, 1)), "group" = rep(c("x", "y"), times = c(5, 10))) permute.test(df) ## ## Monte Carlo Test ## ## data: df ## S = 1.3985, p-value = 0.036 Linear Regression F Test

Suppose for each observation in our dataset there is an outcome of interest,

, and there are variables that could together help predict the value of if they are known. Consider then the following linear regression model (with

):

The first question someone should asked when considering a regression model is whether it’s worth anything at all. An alternative approach to predicting

is simply to predict its mean value. That is, the model

is much simpler and should be preferred to the more complicated model listed above if it’s just as good at explaining the behavior of

for all . Notice the second model is simply the first model with all the coefficients

identically equal to zero.

The

-test (described in more detail here

) can help us decide between these two competing models. Under the null hypothesis, the second model is the true model.

The alternative says that at least one of the regressors is helpful in predicting

.

We can use the

statistic to decide between the two models:

and

are the residual sum of squares of models 1 and

2, respectively.

This test is called the

-test because usually the F-distribution is used to compute -values (as this is the distributiont the

statistic should follow when certain conditions hold, at least asymptotically if not exactly). What then would a bootstrap-based procedure look like?

If the null hypothesis is true then the best model for the data is this:

is the sample mean of and

is the residual. This suggests the following procedure:

Shuffle over all rows of the input dataset, with replacement, to generate new datasets. Compute statistics for each of the generated datasets. Compare the statistic of the actual dataset to the generated datasets’ statistics. F Test Using MCHT

Let’s perform the

test on a subset of the iris dataset. We will see if there is a relationship between the sepal length and sepal width among iris setosa

flowers. Below is an initial split and visualization:

library(dplyr) setosa <- iris %>% filter(Species == "setosa") %>% select(Sepal.Length, Sepal.Width) plot(Sepal.Width ~ Sepal.Length, data = setosa)
Beyond Univariate, Single-Sample Data with MCHT

There is an obvious relationship between the variables. Thus we should expect the test to reject the null hypothesis. That is what we would conclude if we were to run the conventional

test:

res <- lm(Sepal.Width ~ Sepal.Length, data = setosa) summary(res) ## ## Call: ## lm(formula = Sepal.Width ~ Sepal.Length, data = setosa) ## ## Residuals: ## Min 1Q Median 3Q Max ## -0.72394 -0.18273 -0.00306 0.15738 0.51709 ## ## Coefficients: ## Estimate Std. Error t value Pr(>|t|) ## (Intercept) -0.5694 0.5217 -1.091 0.281 ## Sepal.Length 0.7985 0.1040 7.681 6.71e-10 *** ## --- ## Signif. codes: 0 '***' 0.001 '**' 0.01 '*' 0.05 '.' 0.1 ' ' 1 ## ## Residual standard error: 0.2565 on 48 degrees of freedom ## Multiple R-squared: 0.5514, Adjusted R-squared: 0.542 ## F-statistic: 58.99 on 1 and 48 DF, p-value: 6.71e-10

Let’s now implement the procedure I described with MCHTest() .

ts <- function(x) { res <- lm(Sepal.Width ~ Sepal.Length, data = x) summary(res)$fstatistic[[1]] # Only way I know to automatically compute the # statistic } # rand_gen's function can use both x and n, and n will be the number of rows of # the dataset rg <- function(x, n) { x$Sepal.Width <- sample(x$Sepal.Width, replace = TRUE, size = n) x } b.f.test.1 <- MCHTest(ts, ts, rg, seed = 123, N = 1000) b.f.test.1(setosa) ## ## Monte Carlo Test ## ## data: setosa ## S = 58.994, p-value < 2.2e-16

Excellent! It reached the correct conclusion.

Conclusion

One may naturally ask whether we can write functions a bit more general than what I’ve shown here at least in the regression context. For example, one may want parameters specifying a formula so that the regression model isn’t hard-coded into the test. In short, the answer is yes; MCHTest objects try to pass as many parameters to the input functions as they can.

Here is the revised example that works for basically any formula:

ts <- function(x, formula) { res <- lm(formula = formula, data = x) summary(res)$fstatistic[[1]] } rg <- function(x, n, formula) { dep_var <- all.vars(formula)[1] # Get the name of the dependent variable x[[dep_var]] <- sample(x[[dep_var]], replace = TRUE, size = n) x } b.f.test.2 <- MCHTest(ts, ts, rg, seed = 123, N = 1000) b.f.test.2(setosa, formula = Sepal.Width ~ Sepal.Length) ## ## Monte Carlo Test ## ## data: setosa ## S = 58.994, p-value < 2.2e-16

This shows that you can have a lot of control over how MCHTest objects handle their inputs, giving you considerable flexibility.

Next post: time series and MCHT

References R. A. Fisher, The design of experiments (1935)

Packt Publishing published a book for me entitled Hands-On Data Analysis with NumPy and Pandas , a book based on my video course Unpacking NumPy and Pandas . This book covers the basics of setting up a python environment for data analysis with Anaconda, using Jupyter notebooks, and using NumPy and pandas. If you are starting out using Python for data analysis or know someone who is, please consider buying my book or at least spreading the word about it. You can buy the book directly or purchase a subscription to Mapt and read it there.

If you like my blog and would like to support it, spread the word (if not get a copy yourself)!

Related

To leave a comment for the author, please follow the link and comment on their blog: R Curtis Miller's Personal Website .

R-bloggers.com offers daily e-mail updates about R news andtutorials on topics such as:Data science, Big Data, R jobs , visualization (ggplot2, Boxplots , maps ,animation), programming (RStudio, Sweave , LaTeX , SQL , Eclipse , git , hadoop ,Web Scraping) statistics (regression, PCA , time series , trading

) and more...

If you got this far, why not subscribe for updates from the site? Choose your flavor: e-mail , twitter , RSS , or facebook ...


          Hands on Apache Beam, building data pipelines in Python      Cache   Translate Page      

Hands on Apache Beam, building data pipelines in Python

Apache Beam is an open-source SDK which allows you to build multiple data pipelines from batch or stream based integrations and run it in a direct or distributed way. You can add various transformations in each pipeline. But the real power of Beam comes from the fact that it is not based on a specific compute engine and therefore is platform independant. You declare which “runner” you want to use to compute your transformation. It is using your local computing resource by default, but you can specify a Spark engine for example or Cloud Dataflow…

In this article, I will create a pipeline ingesting a csv file, computing the mean of the Open and Close columns fo a historical S&P500 dataset. The goal here is not to give an extensive tutorial on Beam features, but rather to give you an overall idea of what you can do with it and if it is worth for you going deeper in building custom pipelines with Beam. Though I only write about batch processing, streaming pipelines are a powerful feature of Beam!

Beam’s SDK can be used in various languages, Java, python… however in this article I will focus on Python.


Hands on Apache Beam, building data pipelines in Python
Installation

At the date of this article Apache Beam (2.8.1) is only compatible with Python 2.7, however a Python 3 version should be available soon. If you have python-snappy installed, Beam may crash. This issue is known and will be fixed in Beam 2.9.

pip install apache-beam Creating a basic pipeline ingesting CSV Data

For this example we will use a csv containing historical values of the S&P 500. The data looks like that:

Date,Open,High,Low,Close,Volume 03 01 00,1469.25,1478,1438.359985,1455.219971,931800000 04 01 00,1455.219971,1455.219971,1397.430054,1399.420044,1009000000 Basic pipeline

To create a pipeline, we need to instantiate the pipeline object, eventually pass some options, and declaring the steps/transforms of the pipeline.

import apache_beam as beam from apache_beam.options.pipeline_options import PipelineOptions options = PipelineOptions() p = beam.Pipeline(options=options)

From the beam documentation:

Use the pipeline options to configure different aspects of your pipeline, such as the pipeline runner that will execute your pipeline and any runner-specific configuration required by the chosen runner. Your pipeline options will potentially include information such as your project ID or a location for storing files.

The PipelineOptions() method above is a command line parser that will read any standard option passed the following way:

--<option>=<value> Custom options

You can also build your custom options. In this example I set an input and an output folder for my pipeline:

<strong>class</strong> <strong>MyOptions</strong>(PipelineOptions): @classmethod
def _add_argparse_args(cls, parser):
parser.add_argument('--input',
help='Input for the pipeline',
default='./data/')
parser.add_argument('--output',
help='Output for the pipeline',
default='./output/') Transforms principles

In Beam, data is represented as a PCollection object. So to start ingesting data, we need to read from the csv and store this as a PCollection to which we can then apply transformations. The Read operation is considered as a transform and follows the syntax of all transformations:

[Output PCollection] <strong>=</strong> [Input PCollection] <strong>|</strong> [Transform]

These tranforms can then be chained like this:

[Final Output PCollection] = ([Initial Input PCollection] | [First Transform]
| [Second Transform]
| [Third Transform])

The pipe is the equivalent of an apply method.

The input and output PCollections, as well as each intermediate PCollection are to be considered as individual data containers. This allows to apply multiple transformations to the same PCollection as the initial PCollection is immutable. For example:

[Output PCollection 1] = [Input PCollection] | [Transform 1]
[Output PCollection 2] = [Input PCollection] | [Transform 2] Reading input data and writing outputdata

So let’s start by using one of the readers provided to read our csv, not forgetting to skip the header row:

csv_lines = (p | ReadFromText(input_filename, skip_header_lines=1) | ...

At the other end of our pipeline we want to output a text file. So let’s use the standard writer:

... <strong>|</strong> beam<strong>.</strong>io<strong>.</strong>WriteToText(output_filename) Transforms

Now we want to apply some transformations to our PCollection created with the Reader function. Transforms are applied to each element of the PCollection individually.

Depending on the worker that you chose, your transforms can be distributed. Instances of your transformation are then executed on each node.

The user code running on each worker generates the output elements that are ultimately added to the final output PCollection that the transform produces.

Beam has core methods (ParDo, Combine) that allows to apply a custom transform, but also has pre written transforms called composite transforms . In our example we will use the ParDo transform to apply our own functions.

We have read our csv into a PCollection , so let’s split it so we can access the Date and Close items:

… beam.ParDo(Split()) …

And define our split function so we only retain the Date and Close and return it as a dictionnary:

class Split(beam.DoFn): def process(self, element): Date,Open,High,Low,Close,Volume = element.split(“,”) return [{ ‘Open’: float(Open), ‘Close’: float(Close), }]

Now that we have the data we need, we can use one of the standard combiners to calculate the mean over the entire PCollection.

The first thing to do is to represent the data as a tuple so we can group by a key and then feed CombineValues with what it expects. To do that we use a custom function “CollectOpen()” which returns a list of tuples containing (1, <open_value>).

class CollectOpen(beam.DoFn): def process(self, element): # Returns a list of tuples containing Date and Open value result = [(1, element[‘Open’])] return result

The first parameter of the tuple is fixed since we want to calculate the mean over the whole dataset, but you can make it dynamic to perform the next transform only on a sub-set defined by that key.

The GroupByKey function allows to create a PCollection of all
           Preservers of pairs of bivectors with bounded distance       Cache   Translate Page      
Lim, M.H. and Joshua Tan, J.H. (2008) Preservers of pairs of bivectors with bounded distance. In: International Conference on Combinatorial Mathematics and Combinatorial Computing, 15-19 Dec 2008, Auckland, New Zealand. (Submitted)
          $17.80 - Motorola KT-119150-03R MC55 / MC65 Stylus 3 Pack      Cache   Translate Page      
#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000

Model #: KT-119150-03R
Item #: 0N6-001A-000E3
Price: $17.80
Save: 41%
Add To Cart


          The Global Network Firewall Market, Forecast to 2022      Cache   Translate Page      

NEW YORK, Nov. 6, 2018 /PRNewswire/ -- Emerging Business Practices Demands New Technologies The enterprise network is evolving rapidly with new technologies and business practices such as cloud computing, Software Defined Wide Area Network (SD-WAN), Internet of Things (IoT), and remote...


          AMD Climbs After Saying Amazon Will Use Its Cloud Server Chips      Cache   Translate Page      
AMD said Amazon Web Services is a new customer for its server chips • AMD shares gained as much as 8.8 percent on the announcement, Bloomberg News reported • AWS is now offering three of its most popular products based on AMD’s Epyc server chips • The AMD chips allow for a 10 percent saving in computing costs, an AWS VP of computing said
          Remote Lead Kernel Engineer      Cache   Translate Page      
A cloud computing company is filling a position for a Remote Lead Kernel Engineer. Individual must be able to fulfill the following responsibilities: Acting as the hands on technical leader for the kernel engineering team Developing and deploying changes and new features to the kernel Working with security to evaluate and mitigate new kernel level threats Required Skills: Experience developing for the Linux kernel, either professionally or strong open source contributions Familiarity with the Linux kernel including but not limited to the network stack, filesystems, scheduler, etc Ability to work with stakeholders within engineering, security, and product Willingness to learn and tenacity (we have tracked down CPU bugs!) Strong proficiency in C and comfort with x86 architecture An eye for correctness and performance, in that order
          Senior Scala Developer - Cloud Computing      Cache   Translate Page      
IL-Chicago, OUR PROJECT Immediate opportunity to join our team with a worldwide leader in location-based services to build a location-data platform that will support cutting-edge mapping software and autonomous driving technology. This is a long-term contract position in downtown Chicago with competitive rates and opportunities for contract extensions. You can expect very competitive pay as our median compens
          How To Kill Your Tech Industry      Cache   Translate Page      
by Marie Hicks In World War II, Britain invented the electronic computer. By the 1970s, its computing industry had collapsed—thanks to a labor shortage produced by sexism.
          Meet the AMD Radeon Instinct MI60 and MI50 accelerators      Cache   Translate Page      

If you haven't been watching AMD's launch of the 7nm Vega based MI60 and MI50 then you can catch up right here.

unnamed.png

You won't be gaming with these beasts, but for those working on deep learning, HPC, cloud computing or rendering apps you might want to take a deeper look.  The new PCIe 4.0 cards use HBM2 ECC memory and Infinity Fabric interconnects, offering up to 1 TB/s of memory bandwidth. 

The MI60 features 32GB of HBM2 with 64 Compute Units containing 4096 Stream Processors which translates into 59 TOPS INT8, up to 29.5 TFLOPS FP16, 14.7 TFLOPS FP32 and 7.4 TFLOPS FP64.  AMD claims is currently the fastest double precision  PCIe card on the market, with the 16GB Tesla V100 offering 7 TFLOPS of FP64 performance.

unnameved.jpg

The MI50 is a little less powerful though with 16GB of HBM2, 53.6 TFLOPS of INT8, up to 26.8 TFLOPS FP16, 13.4 TFLOPS FP32 and 6.7 TFLOPS FP64 it is no slouch.

1.png

With two Infinity Fabric links per GPU, they can deliver up to 200 GB/s of peer-to-peer bandwidth and you can configure up to four GPUs in a hive ring configuration, made of two hives in eight GPU servers with the help of the new ROCm 2.0 software. 

Expect to see AMD in more HPC servers starting at the beginning of the new year, when they start shipping.

 

read more


          Platform as a Service (PaaS) Market: Know about Influencing Factors by Focusing on Top Companies      Cache   Translate Page      
(EMAILWIRE.COM, November 07, 2018 ) A segment of cloud computing, platform as a service (PaaS) provides a virtual platform for users to develop and run applications and software over the internet, eradicating the need of physical infrastructure and extra amount to be spent on purchase of underlying...
          Tractica Report: Enterprise High-Performance Computing      Cache   Translate Page      
A recent Tractica report examined the market trends and technology issues surrounding high-performance computing and provided revenue forecasts for compute and storage, software and services from 2017 through 2025. This executive summary lays out the highlights from that report.
          AMD Climbs After Saying Amazon Will Use Its Cloud Server Chips      Cache   Translate Page      
AMD said Amazon Web Services is a new customer for its server chips • AMD shares gained as much as 8.8 percent on the announcement, Bloomberg News reported • AWS is now offering three of its most popular products based on AMD’s Epyc server chips • The AMD chips allow for a 10 percent saving in computing costs, an AWS VP of computing said
          Offer - Cheapest Price Dell PowerEdge R730xd Server Rental and sale Coimbatore - INDIA      Cache   Translate Page      
Dell R730 is equipped with seven PCIe Gen3 expansion slots and a dedicated slot for a RAID controller to help boost IO flexibility. As a result, Dell indicates that their rack server is well suited as a compute node for IT as a service (XaaS) providers or for high-performance computing and medical-imaging solutions. Product Highlights Form Factor: 2U Rack Server Processor : Dual Intel Xeon E5-2609 v3 1.9 Ghz RAM: 16 GB DDR-4 ECC Ram HDD: 4 TB 7.5K RPM SAS HDD Dual Port Enterprise Hard Drive Others Raid Controller : PERC H730 1GB CACHE Contact Rental India Name – Chackravarthy (8754542653) Name – Anushree (8971423090) Visit Us: https://shop.rental-india.com/product/dell-poweredge-r730xd-rack-server-available-on-rental-sale/ Mail Us: enquiry@rental-india.com Mandaveli, Chennai-28.
          ‘How do neural nets learn?’ A step by step explanation using the H2O Deep Learning algorithm.      Cache   Translate Page      
In my last blogpost about Random Forests I introduced the codecentric.ai Bootcamp. The next part I published was about Neural Networks and Deep Learning. Every video of our bootcamp will have example code and tasks to promote hands-on learning. While the practical parts of the bootcamp will be using Python, below you will find the English R version of this Neural Nets Practical Example, where I explain how neural nets learn and how the concepts and techniques translate to training neural nets in R with the H2O Deep Learning function. You can find the video on YouTube but as, as before, it is only available in German. Same goes for the slides, which are also currently German only. See the end of this article for the embedded video and slides. Neural Nets and Deep Learning Just like Random Forests, neural nets are a method for machine learning and can be used for supervised, unsupervised and reinforcement learning. The idea behind neural nets has already been developed back in the 1940s as a way to mimic how our human brain learns. That’s way neural nets in machine learning are also called ANNs (Artificial Neural Networks). When we say Deep Learning, we talk about big and complex neural nets, which are able to solve complex tasks, like image or language understanding. Deep Learning has gained traction and success particularly with the recent developments in GPUs and TPUs (Tensor Processing Units), the increase in computing power and data in general, as well as the development of easy-to-use frameworks, like Keras and TensorFlow. We find Deep Learning in our everyday lives, e.g. in voice recognition, computer vision, recommender systems, reinforcement learning and many more. The easiest type of ANN has only node (also called neuron) and is called perceptron. Incoming data flows into this neuron, where a result is calculated, e.g. by summing up all incoming data. Each of the incoming data points is multiplied with a weight; weights can basically be any number and are used to modify the results that are calculated by a neuron: if we change the weight, the result will change also. Optionally, we can add a so called bias to the data points to modify the results even further. But how do neural nets learn? Below, I will show with an example that uses common techniques and principles. Libraries First, we will load all the packages we need: tidyverse for data wrangling and plotting readr for reading in a csv h2o for Deep Learning (h2o.init initializes the cluster) library(tidyverse) library(readr) library(h2o) h2o.init(nthreads = -1) ## Connection successful! ## ## R is connected to the H2O cluster: ## H2O cluster uptime: 3 hours 46 minutes ## H2O cluster timezone: Europe/Berlin ## H2O data parsing timezone: UTC ## H2O cluster version: 3.20.0.8 ## H2O cluster version age: 1 month and 16 days ## H2O cluster name: H2O_started_from_R_shiringlander_jpa775 ## H2O cluster total nodes: 1 ## H2O cluster total memory: 3.16 GB ## H2O cluster total cores: 8 ## H2O cluster allowed cores: 8 ## H2O cluster healthy: TRUE ## H2O Connection ip: localhost ## H2O Connection port: 54321 ## H2O Connection proxy: NA ## H2O Internal Security: FALSE ## H2O API Extensions: XGBoost, Algos, AutoML, Core V3, Core V4 ## R Version: R version 3.5.1 (2018-07-02) Data The dataset used in this example is a customer churn dataset from Kaggle. Each row represents a customer, each column contains customer’s attributes We will load the data from a csv file: telco_data % select_if(is.numeric) %__% gather() %__% ggplot(aes(x = value)) + facet_wrap(~ key, scales = "free", ncol = 4) + geom_density() ## Warning: Removed 11 rows containing non-finite values (stat_density). … and barcharts for categorical variables. telco_data %__% select_if(is.character) %__% select(-customerID) %__% gather() %__% ggplot(aes(x = value)) + facet_wrap(~ key, scales = "free", ncol = 3) + geom_bar() Before we can work with h2o, we need to convert our data into an h2o frame object. Note, that I am also converting character columns to categorical columns, otherwise h2o will ignore them. Moreover, we will need our response variable to be in categorical format in order to perform classification on this data. hf % mutate_if(is.character, as.factor) %__% as.h2o Next, I’ll create a vector of the feature names I want to use for modeling (I am leaving out the customer ID because it doesn’t add useful information about customer churn). hf_X
          Wootware Black Friday 2018 Ads, Deals & Special Sale #BlackFriday      Cache   Translate Page      

Wootware 2018 Ads, Deals & Special Sale #– Big savings on computing and other tech products


Click here SEE List of All stores Black Friday 2018 deals in South Africa


Wootware Black Friday Sale Information

2018 Black Friday Wootware Updates: 

Expect us to post the Wootware Black Friday 2018 advert sometime around November 15 or even day before Black Friday. In the meantime, check out information of Wootware current standard specials.

 Black Friday Sale Start Date:

Like last year, the sale will start on 23 November 2018. Obvious Wootware Thanksgiving updates will happen a week before like another outlet.  To get an alert about Wootware Black Friday deals to follow The Edge Search website and our Social media pages.  

Black Friday Sale Format:

As Wootware did last year, many of Wootware Thanksgiving and Black Friday sales will also be available on their website or Social media. This is a tremendous benefit by Wootware will make it easier for Back Friday shopping and more family time. 

Black Friday Special Promotions:

Wootware Black Friday specials will be advertised on their website or social media pages, as soon as Wootware updated their promotion The Edge search will update you 

Where To find Wootware Black Friday deals?

Follow Website The Edge Search and Social pages to get Wootware updates.

Wootware 2018 Black Friday best deals available

Computer Components

  • Graphics Cards
  • Processors / CPUs
  • Memory / RAM
  • Motherboards
  • Power Supplies / PSUs
  • Cases / Chassis

Storage Devices

  • Solid State Drives / SSDs
  • Internal Hard Drives
  • External Hard Drives
  • CD/DVD/Blu-Ray Burners & Media
  • Flash Memory / USB & Card Readers
  • Hard Drive Enclosures
  • Hard Drive Docks

Peripherals

  • Monitors / Screens
  • Keyboards, Mice & Controllers
  • Headsets, Speakers & Mics
  • Projectors
  • Soundcards
  • Printers, Scanners & Fax
  • Ink & Toner
  • Networking
  • Modems
  • Routers
  • Adapters
  • Switches
  • Wireless Networks
  • Network Attached Storage

Computer Accessories

  • Water / Liquid Cooling
  • Fans & CPU Coolers
  • UPS / Power Protection
  • Cables

Other

  • Software
  • Webcams
  • Cameras
  • Gaming Chairs

          Intel dévoile ses CPU Xeon Cascade Lake-AP pour systèmes 2S (48 cœurs / 96 threads, 12 canaux de mémoire par socket) et Xeon E-2100 pour systèmes 1S      Cache   Translate Page      
Intel dévoile ses CPU Xeon Cascade Lake-AP pour systèmes 2S (48 coeurs / 96 threads
Et 12 canaux de mémoire par socket) et Xeon E-2100 pour systèmes 1S

Intel a récemment détaillé un peu plus ses processeurs Xeon de la génération Cascade Lake-SP qui devraient inaugurer l'ère des protections intégrées contre les vulnérabilités Meltdown et Spectre, quelques jours seulement avant le coup d'envoi officiel de la conférence annuelle Supercomputing 2018 qui est prévu pour la semaine prochaine.

La firme Santa...
          SQUARE Team Studies Light-Activated Materials for Building Multifunctional Qubits      Cache   Translate Page      
One approach to quantum technology is based on materials whose quantum properties can be accessed and controlled optically. In an initiative called the Scalable Rare Earth Ion Quantum Computing Nodes ... - Source: www.photonics.com
          Berkeley Lab to Build Advanced Quantum Computing Testbed      Cache   Translate Page      
The U.S. Department of Energy’s Lawrence Berkeley National Laboratory will receive $30 million over five years to build and operate an Advanced Quantum Testbed (AQT). Researchers will use the te ... - Source: www.photonics.com
          Scientists Demonstrate Topologically Protected Biphoton States Needed for Quantum Logic Gates      Cache   Translate Page      
An optical circuit based on the principles of topology could provide protection for propagation of biphoton states, which will be needed for quantum computing. Researchers at the University of Sydney ... - Source: www.photonics.com
          Future tech and AI: It’s buzzword crazy!      Cache   Translate Page      
It’s buzzword crazy in the industrial world – AI, IoT, cloud, quantum computing, big data, Industry 4.0…to name just a few. Underpinning this whirlwind of innovation there are industry associations, conferences, thought leaders and...
          L'immeuble du futur : une première mondiale au Grand Parc      Cache   Translate Page      
C'est dans la quartier du Grand Parc que devrait être inaugurée en fin d'année, la future Maison du Département de Gironde. Un édifice qui accueillera également les quarante-neuf logements sociaux de la Résidence Florestine de Gironde Habitat. Conçu grâce à une innovation technologique mise au point par la société Qarnot Computing, il offre notamment une solution de chauffage gratuit et écologique pour les logements et bureaux qu'il abritera. Une première mondiale dans laquelle le Département de la Gironde s'est fortement investi en raison tant des économies d'énergies générées que de l'aspect social du projet. Un chantier dont la première pierre a été posée en juillet 2017 et qui a reçu hier, la visite du Président de Département.
          VMware to Acquire Heptio for Enterprise Kubernetes Expertise      Cache   Translate Page      

Augmenting its own growing practice in cloud native computing, VMware is in the process of acquiring Heptio, an enterprise-focused consulting firm founded by two of the initial developers of the open source Kubernetes container orchestration system. VMware announced the pending purchase at the company’s VMworld 2018 Europe conference Wednesday. Terms of the deal were not disclosed. VMware […]

The post VMware to Acquire Heptio for Enterprise Kubernetes Expertise appeared first on The New Stack.


          AMD outlines its future: 7nm GPUs with PCIe 4, Zen 2, Zen 3, Zen 4 - Ars Technica      Cache   Translate Page      

Ars Technica

AMD outlines its future: 7nm GPUs with PCIe 4, Zen 2, Zen 3, Zen 4
Ars Technica
AMD today charted out its plans for the next few years of product development, with an array of new CPUs and GPUs in the development pipeline. On the GPU front are two new datacenter-oriented GPUs: the Radeon Instinct MI60 and MI50. Based on the ...
AMD Announces Radeon Instinct MI60 & MI50 Accelerators: Powered By 7nm VegaAnandTech
AMD unveils Radeon Instinct MI60 and MI50 accelerators for AI and HPCZDNet
AMD Claims First 7nm GPUs With Radeon Instinct MI60, MI50Tom's Hardware
Wccftech -ExtremeTech -Nasdaq -AMD
all 24 news articles »

          The Kubernetes Book: Bang up to date!      Cache   Translate Page      
I’ve just updated The Kubernetes Book to the latest versions of Kubernetes and the latest trends in cloud computing. Every page, and every example has been updated so you get the best value for your money! The book is short and straight to the point. At 130 pages, you can be up-to-speed with the fundamentals… Read More »
          Solutions Architect/Senior Developer      Cache   Translate Page      
Job Description Solutions Architect/Senior Developer to work on bespoke customer specific development projects based on market leading technologies within a busy custom solutions development team. Building key relationships with SI Practice, Professional Services and Sales teams internally, as well as our valued customers externally. Main Responsibilities Undertake development projects requiring the use of market leading technologies: HTML, Javascript, various leading frameworks, ASP.NET, C#, Styling Languages, Developer tools Undertake the installation, configuration and development requirements of web development projects dependant on demand and skills Effective and regular communication with clients and management Work on client sites, Advanced offices and home Gathering requirements and writing proposals User and system documentation Project management Qualifications • Bachelor Degree in Computing or related subject or relevant commercial experience • IT qualifications (advantageous) • Strong communication skills, written and spoken • Well-presented and good interpersonal skills Experience Essential • Web development - HTML, HTML5, Javascript, AJAX, CSS etc. • At least 5 years .NET/C# development inc Visual Studio • Microsoft SQL Server and related market leading technologies • Relevant experience in a similar role Preferred • Microsoft Sharepoint • SQL Server - SSIS, SSRS Relevant • Mobile development - Xamarin, OSX, iOS, Android, Mobile Frameworks Phonegap, JQuery Mobile • IDEs - Eclipse, XCode • Databases - Oracle, MySQL, PostgreSQL • Application Servers - JBOSS, Tomcat, IIS • XML – XML schema, XQuery, XSLT, XPath • Build - SVN, CVS, Mercurial, ANT, GitHub, Competencies • ‘Can-do’ pro-active attitude • Attention to detail – focus on quality • Able to analyse business requirements effectively • Creativity and Innovation in designing solutions • Teamwork – able to work effectively as part of a team or independently • Coaching – self-development. Willing and able to learn new skills • Drive for Achievement – keen to progress • Initiative - project ownership • Resilience • Customer Service Orientation Join the Team Some of our Key Benefits are: Excellent benefits from day one: 25 days holidays + opportunity to buy or sell up to 5 days contributory pension life insurance income protection insurance childcare voucher salary sacrifice cycle to work schem, employee assistance programme Special focus on training and development with the opportunity to excel your career from our internal Talent Development Team Be part of an organisation that has recently been ranked by Deloitte in the Top 50 fastest growing Tech Companies Advanced are an equal opportunity employer, committed to removing bias from the hiring process. We hire for potential and develop at pace. If successful, you can expect to take an online assessment, meet the HR team and attend a final interview. Click apply now, and a member of our in-house talent acquisition team will be in touch!
          Offer - Cheapest Price Dell PowerEdge R730xd Server Rental and sale Coimbatore - INDIA      Cache   Translate Page      
Dell R730 is equipped with seven PCIe Gen3 expansion slots and a dedicated slot for a RAID controller to help boost IO flexibility. As a result, Dell indicates that their rack server is well suited as a compute node for IT as a service (XaaS) providers or for high-performance computing and medical-imaging solutions. Product Highlights Form Factor: 2U Rack Server Processor : Dual Intel Xeon E5-2609 v3 1.9 Ghz RAM: 16 GB DDR-4 ECC Ram HDD: 4 TB 7.5K RPM SAS HDD Dual Port Enterprise Hard Drive Others Raid Controller : PERC H730 1GB CACHE Contact Rental India Name – Chackravarthy (8754542653) Name – Anushree (8971423090) Visit Us: https://shop.rental-india.com/product/dell-poweredge-r730xd-rack-server-available-on-rental-sale/ Mail Us: enquiry@rental-india.com Mandaveli, Chennai-28.
          Office and computing machinery, equipment and supplies      Cache   Translate Page      
none
          How CRM Mobile App Can Enhance Customer Satisfaction      Cache   Translate Page      
How CRM Mobile App Can Enhance Customer Satisfaction

As Mobile technology is increasingly growing, businesses are learning that the best way to maintain a constructive relationship with customers is by providing CRM accessibility while on the go. You will most likely have a Mobile App for Customer Relationship Management, if your organization has a sales department. CRM sets the customer at the center and helps you improve your position by working more customer-focused and allow you to meet your customer’s needs in a better way. As the workforce increasing day by day and employees spending more time away from their workplace, a superior mobile app is essential to ensure those worthy interactions with customers are not left out without any attention.

With the rise of mobile computing, smart devices, businesses are discovering that anything which can be done using a computer in the office can also be achieved just as easily while on the go. CRM Mobile App is and will continue to be a rising focus for the CRM arena and one of the great benefits it provides is that it allows businesses to organize themselves more effectively. Previously, many Sugar mobile applications have had limited functionality. As we trail ahead, mobile platforms are becoming more powerful. In addition, users will be able to better organize and tailor their mobile experience to get the data they want and convert that data into actionable events to deal customer needs in real-time.
Benefits of Mobile CRM:

- Improved Sales Opportunities
- Increased Productivity
- More Engaged Sales Teams
- Deepened Customer Expectations
- Reduced Conversion Times
- Improved Knowledge Base

CRM has already transformed the world of business. And as customers see the improved and better service and reduced conversion times that come as a result of CRM on their phone, as information becomes more precise and concrete; and as employee productivity & engagement improve, the sales organizations are seeing a definite increase in the opportunities.

There’s no reason why your business should have to be revolved around a stable, office-based computer system. With the availability of CRM system on your Smartphone’s or tablets, you can act faster and shorten your sales cycle. It allows businesses to access and manage customer’s information throughout the company in an effort to better serve their business clients. The end result is that SuiteCRM Mobile app is turning around the face of business, often in ways that you may not have imagined.

View Source: How CRM Mobile App Can Enhance Customer Satisfaction


          CV-Library: Computing Graduate Teaching Assistant - Colchester      Cache   Translate Page      
£60 - £65/day £60-£65 per day: CV-Library: Computing Graduate Teaching Assistant - Colchester Is it important to you to utilise your degree whilst inspiring the younger generations? If Colchester
          Shortening the rare-earth supply chain via recycling      Cache   Translate Page      
Kanazawa, Japan (SPX) Nov 05, 2018
Modern life is closely intertwined with a set of 17 elements at the foot of the periodic table. Known as rare earths (REs), many of these metals are highly magnetic, and find use in computing, green power and other technologies. However, because of rising prices, legal issues and the difficulty of mining, safeguarding their supply is a major scientific and political challenge. Several REs,
          Could edge computing be the next big thing?      Cache   Translate Page      
none
          Sales Manager - Miami - Underground Printing - Miami, FL      Cache   Translate Page      
Working independently handling customers and phone calls. PC Proficient with experience with MS Office Suite, GMail and Google documents, cloud computing sites,...
From Underground Printing - Sat, 20 Oct 2018 00:34:30 GMT - View all Miami, FL jobs
          Saxophone Day Shortbread      Cache   Translate Page      
I knew there'd be an image of someone playing one under a bridge.
PC hardware and computing

Steelseries Rival 650 Wireless and Rival 710 Gaming mouse review @ PC Perspective
be quiet! Silent Base 601 case review @ Gamers Nexus
Asus ROG Strix B450-I Gaming motherboard review @ HardOCP
Deepcool Fryzen Threadripper cooler review @ Hexus
Corsair SF600 Platinum review @ JonnyGuru
Das Keyboard 5Q review @ TechPowerUp
Intel Xeon E Six-Core review: E-2186G, E-2176G, E-2146G, and E-2136 tested @ AnandTech
The best entry level gaming CPU: Athlon 200GE vs. Pentium G5400 vs. Ryzen 3 2200G @ TechSpot
Games, culture, and VR

Read more...


          Supercomputers a 'step change' for NZ science      Cache   Translate Page      
Supercomputers a 'step change' for NZ science#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000 A new super-computing facility opened today will enable scientists to better understand everything from earthquakes to climate change.Niwa's new High Performance Computing Facility comprises three new interconnected supercomputers... Reported by New Zealand Herald 8 minutes ago.
          Dept Chair/Head - Industrial Engineering - Clemson University - Freeman, SD      Cache   Translate Page      
The Department of Industrial Engineering, in the College of Engineering, Computing and Applied Sciences at Clemson University, is seeking applicants for its...
From Clemson University - Thu, 04 Oct 2018 20:09:51 GMT - View all Freeman, SD jobs
          End User Computing Engineer I      Cache   Translate Page      
TX-Grapevine, DescriptionAn End User Computing Support Engineer I is an entry level IT specialist of the IT Support Stack who uses their technical knowledge and experience to primarily provide hardware and software support and services to local and remote team members. They will be expected to utilize system management tools and ITIL Service Delivery processes to deliver first class service and support via tele
          Update: Vectorworks Nomad (Productivity)      Cache   Translate Page      

Vectorworks Nomad 6.4.1


Device: iOS Universal
Category: Productivity
Price: Free, Version: 6.2 -> 6.4.1 (iTunes)

Description:

The Vectorworks Nomad app allows you to access your Vectorworks documents wherever you are—whenever you need them—with your mobile device. It gives you more freedom not only to share files, but also to make design decisions from any location. Changes you make to Vectorworks files are automatically synchronized to your private cloud library, allowing you to browse and share your latest designs from any web-enabled device.

Vectorworks Cloud Services saves time by freeing up local computing power. Use cloud technology to automate and decouple resource-heavy workflows, shifting calculations needed to generate sections, elevations, renderings, and BIM data to the cloud.

Whether you're in a meeting, on the job site, or on vacation, the Vectorworks Nomad app allows you to view, mark up, share, and synchronize your Vectorworks files across your devices and with your colleagues—all from the convenience of your iPhone or iPad.

• View and navigate 3D renderings of Vectorworks files in the cloud library, with optional 3D backgrounds
• View 3D models of Vectorworks files in a real-world setting, using augmented reality (AR) technology (requires an AR-compatible device)
• View rendered panoramic images of Vectorworks files
• Extend your cloud library through integration with Dropbox
• Share files with clients or collaborators
• Mark up PDF files with Text, Freehand, Oval, Rectangle, and Line tools and save the marked up files to the cloud library

The Vectorworks Nomad app is a part of Vectorworks Cloud Services, and is available to anyone who registers for a free account, as well as all Vectorworks Service Select members.

Vectorworks Service Select members have access to the following additional features:
• Increased storage capacity
• Manual or scheduled Sheet layer to PDF cloud processing
• Cloud Publish in Vectorworks
• Ability to measure objects in the PDF drawings generated on the cloud.

Operating Prerequisites:
• Vectorworks files uploaded to your Vectorworks Cloud Services storage, or to Dropbox or Google Drive

What's New

Bug fixes and stability enhancements

Vectorworks Nomad


          Network Development Engineer II - Amazon.com - Herndon, VA      Cache   Translate Page      
Job Description Do you like helping U.S. Intelligence Community agencies implement innovative cloud computing solutions and solve technical problems? Would...
From Amazon.com - Tue, 11 Sep 2018 19:23:37 GMT - View all Herndon, VA jobs
          [TobagoJack] Per imperatives => solutions Danger = opportunity The sort of equations some fi...      Cache   Translate Page      
Per imperatives => solutions
Danger = opportunity
The sort of equations some find challenging to take on board or even to understand, due to arms and legs mentality and beans counting

... let us see if brave-new-world protocol goes right, and if so, exports ala free-trades

Am wondering if Africans should say “no” to bot-doctors as part of turning head away from hospitals and railroads :0)

Am also wondering whether the bots would be practicing wholistic eastern medicine or specific-toxic western healing, and

What happens when bots prescribe in accordance w/ traditional Napalese healing but skip licensing fee.

Also, would such medicine improve UK healthcare system

brinknews.com

China’s Doctor Shortage Can Be Solved by AI
Andy HoNovember 6, 2018

A surgeon performs an operation at a clinic in the southwest Chinese city of Chongqing. AI might be able to solve China's doctor shortage problem.

Photo: Peter Parks/AFP/Getty Images

If there is one country that has invested heavily in health care reform over the last few years, it is China. But as its population grows older, with already 300 million people suffering from chronic diseases, it seems almost impossible to keep up with the soaring demand for health care. According to the latest data from the Organisation for Economic Co-operation and Development, China has 1.8 practicing doctors per 1,000 citizens, compared to 2.6 for the U.S. and 4.3 for Sweden. Can artificial intelligence relieve China’s overworked doctors of some of their burdens?

China’s Ailing Health Care SystemThe hard-working medical professionals who keep China’s ailing health care system running could certainly use a helping hand. Overcrowding is the order of the day in the country’s urban hospitals, with a typical outpatient department in Beijing seeing about 10,000 people every day. The problem is exacerbated by the scarcity of medical facilities in rural areas, which causes people to flock to hospitals in nearby cities.

As the Future Health Index 2018 by Philips shows, the relatively low number of skilled health care professionals in relation to the size of the population is one of the main reasons why access to care in China lags behind most of the other fifteen countries surveyed.

Demographic projections give further reason for concern. The demand for care will only continue to grow as China is aging more rapidly than almost any country in the world. The United Nations estimates that by 2040, the country’s population over 65 will reach about 303 million, which is almost equal to the current total population of the U.S.

However, there is also reason for optimism.

In its commitment to offer accessible and affordable care for all, the Chinese government is spearheading the development of health care technologies. And perhaps the most promising is AI.



The Rise of AIAI can help make sense of large amounts of data, fueled by computing power that has risen dramatically over the last few years. That’s why China offers particularly fertile ground for AI development: With its 1.4 billion population, the country sits on massive troves of data.

Recognizing the country’s AI potential, the government has set out an ambitious plan to turn China into the world’s leading AI innovation center. Health care is one of the industries that are set to benefit from multibillion-dollar investments in startups, academic research, and moonshot projects. This is not merely a vision, but a reality already in the making. According to Yiou Intelligence, a Beijing-based consultancy firm, some 131 Chinese companies are currently working on applying AI in health care.



A Smart Personal Assistant for PhysiciansSpeeding up the screening of medical images is just one of the ways in which AI could relieve China’s overburdened health care system.

As one Chinese radiologist said in an interview with The New York Times: “We have to deal with a vast amount of medical images every day. So we welcome technology if it can relieve the pressure while boosting efficiency and accuracy.”

We should take these needs to heart and focus on developing intelligent applications that ease the workload for physicians while improving outcomes for patients. Crucially, the goal should not be to replace physicians, but to augment their impact in their daily work, strengthening their role in the delivery of efficient and high-quality care.

For some, AI conjures up images of autonomous robots replacing human workers. But I believe that in health care, AI is best thought of as a smart personal assistant for physicians that adapts to their needs and ways of working—“adaptive intelligence,” as we call it at Philips. Viewed through that lens, AI will make health care more—not less—human.

Today, AI is already helping physicians with the analysis of medical images. As AI becomes increasingly sophisticated and is integrated with medical knowledge, it could support ever more precise diagnoses and personalized treatment plans. But in the short term, arguably the greatest gains are to be made in solving operational bottlenecks in hospitals—for example, by helping physicians get a quick overview of all clinically relevant information on a patient.

Patient data are usually stored in many disparate systems and formats. At Zhongshan Hospital in Shanghai, it can take a physician up to 20 days to manually extract all relevant information from 200 unstructured medical reports into one structured format.

By combining AI methods like natural language processing and machine learning with clinical knowledge, it is possible to collate all clinically relevant information in one dashboard. Physicians could spend less time capturing information from unstructured reports and less time sitting in front of a screen to get a complete picture of the patient.

Improving Care Close to People’s HomesAI could also enable patients with chronic conditions to become more informed about their health and to stay connected with professional caregivers.

According to the Future Health Index 2018, adoption of telehealth in China is currently much lower than the 16-country average, but the Chinese population is open to the use of technologies that can supplement the care they currently receive.

For example, home health monitoring technology powered by AI could help the frail and elderly stay connected with professional caregivers to ensure they receive timely care when needed. People with diabetes or hypertension could benefit from similar technology that allows them to track their condition via clinically validated sensors and devices.

Such initiatives would fit perfectly with the Chinese government’s ambition to improve care at the grassroots level to counter congestion in city hospitals. More widespread adoption of AI technologies should go hand in hand with investments in primary care facilities and Internet connectivity in rural areas—making health care more equally accessible and affordable and allowing people to enjoy a better quality of life close to their communities.

Looking further ahead, AI could also become pivotal in addressing lifestyle-related diseases such as obesity—a major health concern that affects about one in eight people in China. Imagine people with high risk of obesity getting bespoke lifestyle tips via their smartphone. On a population level, data analyses could inform public interventions targeted at specific age groups or geographic areas. As the Chinese government has outlined in its plans for a “Healthy China 2030,” the focus of the health care system will increasingly shift from treatment to prevention.

A Call for CollaborationHow to accelerate this journey toward more efficient, accessible and preventative care?

First, building a more robust data ecosystem should be top priority. The quality of AI is only as good as the quality of the data fed into it. China’s health care system would benefit from shared data standards, interoperability of systems, and improved data exchange protected by top-notch security measures. The establishment of three national digital databases with health information by 2020 is an important step in this direction.

Second, data-driven approaches such as AI will only have the desired impact when combined with proven medical expertise. AI is only part of any solution; it is never a solution by itself. A deep understanding of the clinical context is indispensable. Any form of AI-assisted care must be centered on the physician and the patient, taking their needs as a starting point and building on the wealth of human knowledge that is already available.

Third, AI-enabled tools must be rigorously tested against the highest regulatory standards. In health care, where lives are at stake, we need to deploy new technologies wisely and carefully. Only with proper clinical validation can we ensure responsible, safe and effective use of AI. Physicians as well as patients also require education on a tool’s strengths and limitations.

Fourth, collaboration between academia, startups, and established companies is of paramount importance. The challenges in China’s health care system are simply too big for any player to address it alone. In this light, it is encouraging that the Chinese government has recently founded a collaborative platform to promote the exchange of ideas and kick-start new projects in intelligent medicine.

Finally, to ensure we are creating a future-ready health care system in China, we must address the shortage of talent at the intersection of medicine and data science. We should nurture and invest in developing people who combine medical know-how with a firm understanding of AI and other technologies. Ultimately, the sustainability of China’s health care system may lie in their hands.

This piece first appeared on the World Economic Forum Agenda.

          3D Artist - OVA - Québec City, QC      Cache   Translate Page      
Substance Designer, Substance Painter, Photoshop, etc .; As Canadian leaders in the international immersive and spatial computing space, OVA and StellarX...
From Indeed - Tue, 16 Oct 2018 16:18:33 GMT - View all Québec City, QC jobs
          Are You Ready for the Factory of the Future?      Cache   Translate Page      

There’s a lot of data tied up in medical device manufacturing processes—but it’s been challenging to capture and process this information from historically independent and disjointed machines and processes, say experts. In addition, skilled operators with a deep understanding of such processes have often served as the keepers of the knowledge.

Connecting those processes and machines so that they can communicate with each other and then collecting and analyzing the data from those processes could yield several benefits. Such connected, highly automated environments—often called smart factories, smart or advanced manufacturing, or Industry 4.0—offer opportunities for process improvements, improved quality, reduced costs, faster fulfillment, and more, said experts at The Medtech Conference by AdvaMed. Speakers explored how medical device manufacturing could be transformed through smart manufacturing in the panel discussion, “International Perspectives on Industry 4.0 and the Medtech Factory of the Future.” Moderated by Seamus Carroll, vice president, medical technologies division, IDA Ireland, the panel included Vivian Farrell, CEO of Modular Automation; Dan Grant, CEO of MTP Connect, based in Australia; Colm Hynes, director of engineering, science, and technology, joint reconstruction, DePuy Synthes, Johnson & Johnson; and Toby Sainsbury, technologist, industrial technologies group, IDA Ireland.

“Once you begin to connect devices, you gain the ability to predict what will happen,” Hynes told the audience. “You can continuously learn as time goes on. You can find patterns and see how the process behaves. You can reduce the cost of quality, and asset utilization goes up.”

It is possible to “connect all the different elements from order entry to component delivery,” added Hynes.

Smart factories “leverage the latest automation technologies to optimize the manufacturing process," Farrell later told MD+DI. "This often results in industrial robots interacting with people to get the task done."

Modular Automation has worked closely with J&J to implement such an approach. “It is very much a partnership—our team working hand in hand with Colin’s team. We’ve shared information and learned from each other, all raising the bar to identify better solutions,” said Farrell. “We allow the flow of data from machines to a central location to be analyzed and identify trends. The goal is to make medical devices faster and safer and more aligned with patient needs, and we all manage risks as we go forward.”

“There’s more productivity in how you produce products and get to patients,” added Hynes. “We build in batches, and [Industry 4.0] allows us to be a single-batch production and reduce inventory.” Such an approach allows manufacturers to produce personalized, patient-specific products, he added. “Speed, agility, etc. are achieved by adoption of information to create improved landscape in manufacturing.”

There’s a “need to arrive at solutions quickly,” added Farrell. She offered the example of high-speed contact lens manufacturing. “To double the output with half the footprint, you can’t achieve that with old thinking. You need to identify new ways to work. [It involves] machines and people working together to deliver products quicker and safer, while reducing waste and improving overall quality.”

 

Above: A mechanical design department manager leads a team meeting to discuss a concept for a bespoke automation solution. Image courtesy of Modular Automation.

 

Sainsbury told the audience that companies can “derisk in research and development innovation centers in a collaborative environment.” IDA Ireland works to support such exploration while remaining technology agnostic, he said.

Grant said that Australia recognized the importance of Industry 4.0 in 2016 and set up a task force. “We recognized the need to ensure appropriate standards,” he said. “We developed test labs at universities and research labs with links to industry.”

Companies need to evolve, too. “We as an organization have been fortunate enough to create an operations technology group to develop and test and learn. It is important to have the processes and structure to be able to do so,” said Hynes. “Otherwise, it is difficult in a regulated environment. You need the appropriate control system and software that can be validated and managed.”

Companies are also facing the challenge of adding new technologies in a regulated environment, such as augmented or virtual reality, said Farrell. She advises adopting technologies in “bite-sized chunks in a way that is proven safe and mitigates the risk.”

Another key challenge of this evolving manufacturing environment is “developing the workforce of the future,” said Farrell, namely the “makeup of teams and skills needed for the future.”

Sainsbury said the educational system in Ireland is responding. “Universities are offering programs in AI, cybersecurity, autonomous vehicles, and cloud computing,” he said. “As a state we have created funding, fellowships, feasibility studies, and full R&D programs.”

He added that he’s seeing “convergence of biopharma and medical with software, IT, and cybersecurity. Skills around data analytics, but data is one thing. We need security to protect the flow in and out of the data.” Cybersecurity is important for the industry as medtech becomes more mobile and consumerized, he added.

When asked what skills are being sought, Hynes said that “requirements have moved from data scientists” and more toward skills that center around getting the data and “transforming it for decision making.” He said that companies are looking for “curious, determined, adventurous people. . . . We need to allow people to test and learn and fail fast. The industry needs to be conservative from a production and manufacturing perspective but also be adventurous in a separate entity to be able to source an idea, develop a proof of concept, test it, and dump it or keep it. Such a ‘safe environment’ generates huge value. Creating that structure is the biggest step forward.”

Grant added that “STEM is shifting to STEAM so we have the arts in there, for commercialization skills and entrepreneurial skills.”

Seamus asked the panel whether robotics would have an effect on jobs.

“There is a big concern about job loss, but there will be job creation,” Grant said. He offered the example of autonomous dump trucks moving ore in mines. “Dump truck drivers lost jobs, but jobs were created in a call center.”

Grant acknowledged that “less skilled workers will struggle to retrain and redeploy themselves. But the jobs of the future don’t even exist today. Universities need to be more thoughtful in creating programs that support the jobs of the future.”

Carroll summed up the discussion this way: “Industry 4.0 is happening rapidly and is not just a fad—it is a real event. There are tremendous implications for companies and for the skills that people will need to have. In countries like Ireland, for example, there is a lot of practical and financial support, and they’re not alone—there are world-class companies to help them execute."


          SlantRange and Microsoft Partner on Scalable Crop Analytics Solutions for Agriculture      Cache   Translate Page      
SlantRange, Inc., provider of remote sensing and analytics systems for agriculture, announced a new partnership with Microsoft to bring a new set of powerful and scalable aerial measurement and data solutions to the global agriculture market. The partnership will combine Microsoft’s latest Internet of Things (IoT) connectivity and cloud analytics with SlantRange’s proven edge-computing capabilities […]
          Bitfury Secures $80M in Private Funding Round      Cache   Translate Page      

Cryptocurrency mining firm Bitfury Group has closed a Series C, $80 million funding round led by EU-based Korelya Capital. The round also included crypto merchant bank Galaxy Digital, Lian and Jabre Group, Dentsu Inc., Armat Group and others. Bitfury is a diversified blockchain company known for its expertise in developing high-performance computing technologies, processing capabilities […]

Post source: Bitfury Secures $80M in Private Funding Round

More Bitcoin News and Cryptocurrency News on TheBitcoinNews.com


          Into Thin Air      Cache   Translate Page      
On this episode we begin by discussing the problems with setting your clocks and the excitement of local ballot initiatives. Then we get into this week's tech news including Apple's confusing laptop line up, racks of Mac Minis and why the iPad is the future of computing. dontpanic.io Twitter: @dontpanicshow Proud member of the Coffee & Beer family of podcasts, streaming at coffeeandbeer.tv.
          Technical Architect (Salesforce experience required) Cheyenne - Silverline Jobs - Cheyenne, WY      Cache   Translate Page      
Company Overview: Do you want to be part of a fast paced environment, supporting the growth of cutting edge technology in cloud computing? Silverline...
From Silverline Jobs - Sun, 29 Jul 2018 06:18:46 GMT - View all Cheyenne, WY jobs
          Apple Highlights 2018 MacBook Air and Mac Mini Reviews      Cache   Translate Page      
Reviews for the new 2018 MacBook Air and Mac mini went live this morning ahead of tomorrow's launch, and in a press release, Apple this afternoon highlighted reviews from several media sites that were able to spend some time with the new machines.

Apple shared review passages from sites that include CNBC, WIRED, Daring Fireball, PC Mag, Six Colors, Tom's Guide, and more.


Daring Fireball, for example, called the MacBook Air the MacBook that "most people should buy," and the Daily Express said "fans of this laptop" will love the new update because "it takes the concept of power and ultimate portability to a whole new level."

Gear Patrol said the MacBook Air is the "perfect computer" for anyone looking to do "normal things" like web browsing, answering emails, and watching movies, while Refinery29 highlighted the MacBook Air's 12-hour battery life.

As for the Mac mini, Six Colors said that the new update allows it to fill a wide range of needs, from basic server needs to "high-end applications that require a great deal of processor power."

Tom's Guide said that the Mac mini is the best option for those who want a compact Mac desktop for streaming media or getting into Apple computing, and ZDNet said the new version is "designed for all types of users" and is "no longer serving a niche market."

As with prior reviews roundups for devices like the iPad Pro, Apple has only highlighted the positive elements from each review. For anyone considering a purchase of one of these machines, it's worth taking a deeper dive into the reviews to get a full picture of both the positives and the negatives.

Apple's full list of Mac mini and MacBook Air review selections can be seen in the article shared through the Apple Newsroom, while additional reviews can be found in our Mac mini and MacBook Air review roundups.

The new 2018 MacBook Air and Mac mini models officially launch tomorrow and base configurations will be available in Apple retail stores and from third-party retailers.

The first pre-orders for the machines are also set to be delivered on November 7 and have already started arriving in Australia and New Zealand.

Related Roundups: Mac mini, MacBook Air

Discuss this article in our forums


          Mac mini 2018 Reviews Roundup: Long-Awaited Update Should Impress Fans and Pro Users, But Upgrade Options Can Get Pricey      Cache   Translate Page      
The first round of Mac mini reviews were published online this morning. Below we've highlighted some of the key takeaways from around the web ahead of Apple's official November 7 launch.

Four years in the waiting, the new Mac mini comes in Space Gray, features 4- and 6-core 8th-Generation Intel Core processors, four Thunderbolt 3/USB-C ports, support for up to 64GB RAM, and up to 2TB of solid-state storage. It also includes Apple's T2 chip for added security.


Review Highlights


On the new Mac mini's largely unchanged design:

Six Colors's Jason Snell:
In the last few years, Intel has pushed the idea of extremely small desktop PCs, leading people like me to speculate that perhaps the next Mac mini would be even more mini. That didn’t happen. Instead, Apple has decided to use the existing Mac mini design, a low-lying slab of machined aluminum with curved edges. The only real difference is that now it’s darker, the old silver look replaced with a new space gray finish.
On Apple's port choices for the Mac mini:

TechCrunch's Brian Heater:
The biggest turn on the I/O side of things, however, is the inclusion of an impressive four Thunderbolt 3 ports. That’s the same number found on the iMac Pro and twice as many as you get on the 2017 standard iMac. It opens things up to a lot more computing versatility. As far as my own desk is concerned, I welcome the ability to power the LG 4K monitor Apple sent along for testing purposes.
Developer Marco Arment:
The ports are different, and versatile. Like the iMac Pro, the Mac mini recognizes that it’s useful to offer both USB-C/Thunderbolt 3 and USB-A ports. There are four of those Thunderbolt 3 ports, two classic USB-A ports, HDMI, a headphone jack, and Ethernet—Gigabit by default, with up to 10Gb Nbase-T Ethernet available as a $100 option. You can hang two 4K displays or one 5K display off of the Thunderbolt 3 ports. You can use adapters to connect to Thunderbolt 3 or Thunderbolt 2 or to give yourself more USB-A or… really, whatever you can think of. It’s a lot of ports.
On Apple's upgrade choices for the Mac mini:

Macworld's Ramon Loyola:
The $799 model comes with a 128GB drive, but if that isn’t enough, Apple offers upgrades all the way up to 2TB if you’re willing to pay. The SSDs are PCI-e cards and Apple doesn’t consider them user-upgradeable. So, if you prefer to house your storage inside the computer instead of attaching an external drive, you might consider shelling out more money for an upgrade.

The $799 Mac mini comes standard with 8GB of 2666MHz DDR4 memory, installed as a pair of 4GB SO-DIMMs. The mini supports a maximum of 64GB, and you can upgrade the memory later, but Apple doesn’t consider the Mac mini to be user-configurable, and it recommends that memory upgrades be performed by a certified Apple service provider.
Six Color's's Jason Snell:
Today the Mac mini is about flexibility and filling niches. This update allows it to span a wide range from basic server needs all the way up to high-end applications that require a great deal of processor power, fast storage, ultra-fast networking, and even beyond (via Thunderbolt 3). The high-end configurations might actually provide enough power for people to consider them over buying the Mac Pro, whenever it comes out.
On the new Mac mini's performance:

Marco Arment:
The big story to me is how incredibly fast this thing is. Granted, I’m testing the fastest CPU offered, but damn.

Geekbench results are very strong. The i7 Mac Mini scored better on single-core performance than every other Mac today (!) at 5912, and its multi-core score of nearly 24,740 beats every Mac to date except the iMac Pro and the old 12-core 2013 Mac Pro.

"Performance-competitive with pro Macs" was not high on my prediction list for a Mac Mini update, but here we are.
CNET's Lori Grunin:
For many pros, it may be hamstrung by Intel's integrated graphics processor. I'm not saying it needs a powerful gaming or rendering GPU. A Kaby Lake G CPU, for example, would be a nice alternative to the i3 simply to make the system low-end VR ready, to take some of the video decoding burden or to help reduce overhead in audio production.

[...]

Apple really seems to be betting on external GPUs as a solution for much of its graphics woes. But one of the benefits of the Mini is that it's mini. Having to make space for a big eGPU just for better-than-basic graphics acceleration kind of defeats the purpose of a tiny system, especially when you're likely going to be hanging a multitude of external drives and other accessories off it as well.
TechCrunch's Brian Heater:
Even the lowest-speced version should be plenty fine for most tasks. I've shifted my standard tech blogger work flow over the machine for the last couple of days and am perfectly happy with the results. On the other hand, if your workload requires anything processor or graphics intensive, you're going to want to pimp this thing out — or seriously consider picking up a desktop with the word "Pro" in the name.
On the Mac mini's price:

Marco Arment:
Apple lent me a high-end configuration for review — 6-core i7, 32 GB RAM, 1 TB SSD — which would cost $2499 (much of which is the SSD). This would’ve sounded crazy to spend on a Mac Mini a few years ago, but when it’s specced up like this, it’s targeting a much higher-end market than the previous model could. Compared to similarly specced iMacs and MacBook Pros, the pricing is generally reasonable.
TechCrunch's Brian Heater:
For the budget-strapped, it’s also easy to flinch at the $300 price increase on the base-level. While it’s true that the components are pricier this time, it’s hard to shake the feeling that the company has priced out the true entry-level user this time out, in favor of offering a product that’s more of a gateway into the Pro ecosystem.

Review and Unboxing Videos





More Reviews

Pricing on the Mac mini starts at $799 for the base model with a 3.6GHz processor, 128GB of storage, and 8GB RAM and goes up to $4,199 for a maxed out machine with 3.2GHz Core i7 processor, 64GB RAM, a 2TB SSD, and the upgraded 10Gb Ethernet option.

The Mac mini is available for purchase from Apple's online store. Orders will be delivered on November 7, the day that it will be available for purchase in retail stores.

Related Roundup: Mac mini
Buyer's Guide: Mac Mini (Buy Now)

Discuss this article in our forums


          Broadcom completes acquisition of CA Technologies      Cache   Translate Page      
Broadcom completed its previously announced acquisition of CA Technologies (NASDAQ: CA).

CA will operate as a wholly owned subsidiary of Broadcom.

"Today, we are pleased to complete this transaction, which strengthens Broadcom's position as a leading provider of semiconductor and infrastructure software solutions and enables us to better serve our customers," said Hock Tan, President and Chief Executive Officer of Broadcom. "Broadcom has a track record of successfully integrating and growing the businesses we acquire. We believe this transaction will enable us to offer customers a leading portfolio of best-in-class solutions across a diverse set of technologies. We intend to invest in and grow the CA business to further enhance its capabilities in mission-critical infrastructure software solutions."


Broadcom to acquire CA Technologies for $18.9 billion

Broadcom agreed to acquire CA Technologies (NASDAQ: CA) for $44.50 per share in cash, representing an enterprise value of $18.9 billion -- a premium of approximately 20% to the closing price of CA common stock on July 11, 2018.

CA, which was founded by Charles Wang and Russell Artzt in 1976 and formerly known as Computer Associates,  is one of the world's leading providers of information technology (IT) management software and solutions. The company is based in New York City and is primarily known for its B2B mainframe, distributed computing, and enterprise software.

Broadcom notes that CA benefits from predictable and recurring revenues with the average duration of bookings exceeding three years.

Hock Tan, President and Chief Executive Officer of Broadcom, said, "This transaction represents an important building block as we create one of the world's leading infrastructure technology companies. With its sizeable installed base of customers, CA is uniquely positioned across the growing and fragmented infrastructure software market, and its mainframe and enterprise software franchises will add to our portfolio of mission critical technology businesses. We intend to continue to strengthen these franchises to meet the growing demand for infrastructure software solutions."

"We are excited to have reached this definitive agreement with Broadcom," said Mike Gregoire, CA Technologies Chief Executive Officer. "This combination aligns our expertise in software with Broadcom's leadership in the semiconductor industry. The benefits of this agreement extend to our shareholders who will receive a significant and immediate premium for their shares, as well as our employees who will join an organization that shares our values of innovation, collaboration and engineering excellence. We look forward to completing the transaction and ensuring a smooth transition."



          New iPad Pro: Great Tablet, Still Can't Replace Your Laptop      Cache   Translate Page      
More power, more features and a real USB port make Apple’s iPad Pro the best tablet yet. But it still falls short on some basic computing needs.
          This Company Wants to Make the Internet Load Faster      Cache   Translate Page      

The internet went down on February 28, 2017. Or at least that's how it seemed to some users as sites and apps like Slack and Medium went offline or malfunctioned for four hours. What actually happened is that Amazon's enormously popular S3 cloud storage service experienced an outage , affecting everything that depended on it.

It was a reminder of the risks when too much of the internet relies on a single service. Amazon gives customers the option of storing their data in different "availability regions" around the world, and within those regions it has multiple data centers in case something goes wrong. But last year's outage knocked out S3 in the entire North Virginia region. Customers could of course use other regions, or other clouds, as backups, but that involves extra work, including possibly managing accounts with multiple cloud providers.

A San Francisco based startup called Netlify wants to make it easier to avoid these sorts of outages by automatically distributing its customers’ content to multiple cloud computing providers. Users don't need accounts with Amazon, Microsoft Azure, Rackspace, or any other cloud company―Netlify maintains relationships with those services. You just sign-up for Netlify, and it handles the rest.

You can think of the company's core service as a cross between traditional web hosting providers and content delivery networks, like Akamai, that cache content on servers around the world to speed up websites and apps. Netlify has already attracted some big tech names as customers, often to host websites related to open source projects. For example, Google uses Netlify for the website for its infrastructure management tool Kubernetes, and Facebook uses the service for its programming framework React. But Netlify founders Christian Bach and Mathias Biilmann don't want to just be middlemen for cloud hosting. They want to fundamentally change how web applications are built, and put Netlify at the center.

Traditionally, web applications have run mostly on servers. The applications run their code in the cloud, or in a company's own data center, assemble a web page based on the results, and send the result to your browser. But as browsers have grown more sophisticated, web developers have begun shifting computing workloads to the browser. Today, browser-based apps like Google Docs or Facebook feel like desktop applications. Netlify aims to make it easier to build, publish, and maintain these types of sites.

Back to the Static Future

Markus Seyfferth, the COO of Smashing Media, was converted to Netlify's vision when he saw Biilman speak at a conference in 2016. Smashing Media, which publishes the web design and development publication Smashing Magazine and organizes the Smashing Conference, was looking to change the way it managed its roughly 3,200-page website.

Since its inception in 2006, Smashing Magazine had been powered by WordPress, the content management system that runs about 32 percent of the web according to technology survey outfit W3Techs, along with e-commerce tools to handle sales of books and conference tickets and a third application for managing its job listing site. Using three different systems was unwieldy, and the company's servers struggled to handle the site’s traffic, so Seyfferth was looking for a new approach.

When you write or edit a blog post in WordPress or similar applications, the software stores your content in a database. When someone visits your site, the server runs WordPress to pull the latest version from the database, along with any comments that have been posted, and assembles it into a page that it sends to the browser.

Building pages on the fly like this ensures that users always see the most recent version of a page, but it's slower than serving prebuilt "static" pages that have been generated in advance. And when lots of people are trying to visit a site at the same time, servers can bog down trying to build pages on the fly for each visitor, which can lead to outages. That leads companies to buy more servers than they typically need; what’s more, servers can still be overloaded at times.

"When we had a new product on the shop, it needed only a couple hundred orders in one hour and the shop would go down," Seyfferth says.

WordPress and similar applications try to make things faster and more efficient by "caching" content to reduce how often the software has to query the database, but it's still not as fast as serving static content.

Static content is also more secure. Using WordPress or similar content managers exposes at least two "attack surfaces" for hackers: the server itself, and the content management software. By removing the content management layer, and simply serving static content, the overall "attack surface" shrinks, meaning hackers have fewer ways to exploit software.

The security and performance advantages of static websites have made them increasingly popular with software developers in recent years, first for personal blogs and now for the websites for popular open source projects.

In a way, these static sites are a throwback to the early days of the web, when practically all content was static. Web developers updated pages manually and uploaded pre-built pages to the web. But the rise of blogs and other interactive websites in the early 2000s popularized server-side applications that made it possible for non-technical users to add or edit content, without special software. The same software also allowed readers to add comments or contribute content directly to a site.

At Smashing Media, Seyfferth didn't initially think static was an option. The company needed interactive features, to accept comments, process credit cards, and allow users to post job listings. So Netlify built several new features into its platform to make a primarily static approach more viable for Smashing Media.

The Glue in the Cloud

Biilmann, a native of Denmark, spotted the trend back to static sites while running a content management startup in San Francisco, and started a predecessor to Netlify called Bit Balloon in 2013. He invited Bach, his childhood best friend who was then working as an executive at a creative services agency in Denmark, to join him in 2015 and Netlify was born.

Initially, Netlify focused on hosting static sites. The company quickly attracted high-profile open source users, but Biilman and Bach wanted Netlify to be more than just another web-hosting company; they sought to make static sites viable for interactive websites.

Open source programming frameworks have made it easier to build sophisticated applications in the browser . And there's a growing ecosystem of services like Stripe for payments, Auth0 for user authentication, and Amazon Lambda for running small chunks of custom code, that make it possible to outsource many interactive features to the cloud. But these types of services can be hard to use with static sites because some sort of server side application is often needed to act as a middleman between the cloud and the browser.

Biilmann and Bach want Netlify to be that middleman, or as they put it, the "glue" between disparate cloud computing services. For example, they built an e-commerce feature for Smashing Media, now available to all Netlify customers, that integrates with Stripe. It also offers tools for managing code that runs on Lambda.

Smashing Media switched to Netlify about a year ago, and Seyfferth says it's been a success. It's much cheaper and more stable than traditional web application hosting. "Now the site pretty much always stays up no matter how many users," he says. "We'd never want to look back to what we were using before."

There are still some downsides. WordPress makes it easy for non-technical users to add, edit, and manage content. Static site software tends to be less sophisticated and harder to use. Netlify is trying to address that with its own open source static content management interface called Netlify CMS. But it's still rough.

Seyfferth says for many publications, it makes more sense to stick with WordPress for now because Netlify can still be challenging for non-technical users.

And while Netlify is a developer darling today, it's possible that major cloud providers could replicate some of its features. Google already offers a service called Firebase Hosting that offers some similar functionality.

For now, though, Bach and Biilmann say they're just focused on making their serverless vision practical for more companies. The more people who come around to this new approach, the more opportunities there are not just for Netlify, but for the entire new ecosystem.

More Great WIRED Stories Self-improvement in the internet age andhow we learn A drone-flinging cannon proves UAVscan mangle planes Google's human-sounding phone bot comes to the Pixel How Jump designed aglobal electric bike US weapons systems are easy cyberattack targets Looking for more? Sign up for our daily newsletter and never miss our latest and greatest stories
          Power analysis of sorting algorithms on FPGA using OpenCL      Cache   Translate Page      
With the advent of big data and cloud computing, there is tremendous interest in optimised algorithms and architectures for sorting either using software or hardware. Field Programmable Gate Arrays (FPGAs) are being increasingly used in high end data servers providing a bridge between the flexibility of software and performance benefits of hardware. In this paper […]
          A Comparative Measurement Study of Deep Learning as a Service Framework      Cache   Translate Page      
Big data powered Deep Learning (DL) and its applications have blossomed in recent years, fueled by three technological trends: a large amount of digitized data openly accessible, a growing number of DL software frameworks in open source and commercial markets, and a selection of affordable parallel computing hardware devices. However, no single DL framework, to […]
          OpenCL Performance Prediction using Architecture-Independent Features      Cache   Translate Page      
OpenCL is an attractive model for heterogeneous high-performance computing systems, with wide support from hardware vendors and significant performance portability. To support efficient scheduling on HPC systems it is necessary to perform accurate performance predictions for OpenCL workloads on varied compute devices, which is challenging due to diverse computation, communication and memory access characteristics which […]
          AI startup Flex Logix touts vastly higher performance than Nvidia      Cache   Translate Page      
Four-year-old startup Flex Logix has taken the wraps off its novel chip design for machine learning. CEO Geoff Tate describes how the chip may take advantage of an "explosion" of inferencing activity in "edge computing," and how Nvidia can't compete on performance.
          Virginia, NYC already home to Amazon’s fastest-growing businesses      Cache   Translate Page      
Amazon's advertising and cloud computing businesses are largely responsible for the company's record profits this year.

          IT Program Manager      Cache   Translate Page      
MN-Minneapolis, Title: Program Manager Location: Minneapolis, Minn Duration: 1 year contract or could go full time MADJV Specific · 5-7 years of MADJV Infrastructure workstream management · Proven experience in managing MADJV infrastructure workstreams that consists of network, server, database, communication and collaboration, End user computing scope · Ability to handle multiple MADJV infrastructure workstreams
          CURRENT AFFAIRS --OCTOBER 11 TO 20 2018 --IBPS PO/CLERKS MAINS ALSO FOR SSC/LIC/IAS ETC      Cache   Translate Page      

OCTOBER 1 TO 10  CA     PL READ

http://www.sbank.in/2018/11/current-affairs-october-1-to-10-2018.html

Important Current Affairs 11th October 2018
‘Olly’ made Hockey World Cup mascot
Turtle ‘Olly’ has been declared as the official mascot for the Odisha Men’s Hockey World Cup.Hockey World Cup is scheduled to be held at the Kalinga Stadium, Bhubaneswar from November 28 to December 16, 2018.‘Olly’ represents the endangered Olive Ridley sea turtles.Olly was also the mascot for Asian Athletics Championships held in 2017.
INS & Aircraft reach for IND-INDO CORPAT
Indian Naval Ship (INS) Kulish and an Indian Dornier (naval maritime time patrol aircraft) from Andaman and Nicobar command entered Belawan harbour, IndonesiaINS Kulish and Indian Dornier will attend the 32nd edition of ‘India – Indonesia coordinated patrol’ (IND-INDO CORPAT).IND-INDO CORPAT began on 11 October 2018 and will end on 27 October 2018.
Pravin appointed as Chief Statistician
The Appointments Committee of the Cabinet has appointed Pravin Srivastava as Chief Statistician of India, and Secretary of the Statistics Ministry.Before this, he worked as additional director general in the national accounts division of the Statistics Ministry.Pravin Srivastava is the 1983-batch Indian Statistical Service officer.
‘Bioelectronic medicine’ which repair nerves        
Researchers at Washington University have developed the first bioelectronic medicine.The medicine is an implantable, biodegradable wireless device that speeds nerve regeneration and improves the healing of a damaged nerve.The device provides therapy and treatment over a clinically relevant period of time and directly at the site where it’s needed.
Nirmala on a 3-day visit to France
Defence Minister Nirmala Sitharaman began a three-day visit to France on 11 October 2018.Ms Sitharaman will hold wide-ranging talks with her French counterpart Florence Parly on ways to deepen strategic cooperation between the two countries.Ms Sitharaman will also take stock of progress in the supply of 36 Rafale jets by Dassault to the Indian Air Force under a Rs. 58,000 crore deal.
Sundar Singh won silver in javelin throw
Indian javelin thrower Sundar Singh Gurjar won a silver medal in the men’s F46 category of the Asian Para Games in Jakarta, Indonesia.The F46 category of disability covers upper limb deficiency, impaired muscle power or impaired range of movement.Gurjar won the silver medal with an effort of 61.33m in his fifth attempt.
32nd conference of WUWM inaugurated
Union Minister of State for Agriculture and Farmers’ Welfare Purushottam Rupala inaugurated the 32nd world conference of ‘World Union of Wholesale Markets’ (WUWM).The Conference was held at Gurugram, Haryana on 11 October 2018.The theme of the conference is  ‘The Wholesale Markets in the Digital Era: Challenges and Opportunities’.
Sunil Bhaskaran to head AirAsia India
Sunil Bhaskaran has been appointed as the Chief Executive Officer and Managing Director of low-cost carrier AirAsia India with effect from November 15, 2018.The AirAsia airline is jointly owned by Tata Sons and Air Asia Bhd.Mr Bhaskaran is currently vice-president, Corporate Services at Tata Steel.AirAsia India has a market share of less than 5% and a fleet of 19 aircraft.
RBI board gets two new directors
The government has appointed Sachin Chaturvedi to the central board of the Reserve Bank of India.Revathy Iyer, a former Indian Audit and Accounts Services officer, was also nominated to the RBI board.Both are appointed for a period of four years with effect from September 19, 2018.With these appointments, RBI will now have 18 members on its central board.
International Day of the Girl Child:11 October
International Day of the Girl is observed on 11 October 2018.The day aims to highlight and address the needs and challenges girls face while promoting girls’ empowerment and the fulfilment of their human rights.The theme for 2018 is ‘With Her: A Skilled Girl Force’.October 11, 2012, was the first International Day of the Girl Child.
Sushma Swaraj to attend SCO meeting
External Affairs Minister Sushma Swaraj participated in the 17th Council of Heads of Government (CHG) meeting of the Shanghai Cooperation Organization.The meeting was held in Tajikistan on 11 October 2018.This is the second CHG meeting since India became a full member of SCO in June 2017.In 2017, CHG meeting was held in Sochi, Russia.
Online Assurances Monitoring System inagurated
Minister of State (MoS) for Parliamentary Affairs Vijay Goel inaugurated the Online Assurances Monitoring System (OAMS).OAMS has been developed by the Parliamentary Affairs Ministry.This system has made the information regarding assurances given on the floor of the Houses of Parliament paperless and available in digital format.
Cabinet approved the merger of NCVT & NSDA
The Union Cabinet has approved the merger of the regulatory institutions in the skills space – National Council for Vocational Training (NCVT) and the National Skill Development Agency (NSDA).The new merged will be named as National Council for Vocational Education and Training (NCVET).NCVET will regulate the functioning of entities engaged in vocational education and training.
IWAI launched Ro-Ro service to Majuli Island
Inland Waterways Authority of India (IWAI) started Roll on-Roll off (Ro-Ro) facility in collaboration with the Government of Assam for Majuli Island.IWAI has procured a new vessel ‘MV Bhupen Hazarika’ for the new Ro-Ro service.Majuli is one of the biggest riverine islands in the world located on river Brahmaputra in Assam.
Cabinet approves MoC between India and Finland
The government approved an agreement between India and Finland on cooperation in environment protection in both the countries.The agreement is expected to bring in the latest technologies and best practices suited for bringing about better environment protection.The areas of cooperation also includes air and water pollution prevention and purification, remediation of contaminated soils.
Goa Maritime Symposium – 2018
The Indian Navy will host the ‘Goa Maritime Symposium’ on 16 October 2018.The event is a follow-on to the maiden Goa Maritime Conclave held in 2017.The theme for the one day symposium is “Building Stronger Maritime Partnerships in Indian Ocean Region”.The focus of the symposium is on capacity building among Indian Ocean Region navies to tackle emerging maritime threats,
MoU between India and Lebanon approved
The Union Cabinet has approved the signing of a Memorandum of Understanding (MoU) between India and Lebanon for cooperation in the field of agriculture and allied sectors.The MoU will promote understanding of best Agricultural practices in the two countries.The MoU will also help in better productivity at farmer fields as well as improved global market.
Tushar Mehta is the new Solicitor General
The Government of India has appointed Tushar Mehta as the Solicitor General of India.At present, Tushar Mehta holds the charge of Additional Solicitor General.He will remain in office till 30th of June, 2020 or till further orders.Solicitor General of India is the second highest ranking law officer of the government.
Saurabh Chaudhary won gold in 10m air pistol      
Indian shooter Saurabh Chaudhary clinched the gold medal in the 10m air pistol event at the Youth Olympic Games on 10 October 2018.Saurabh also won gold medal in the Asian Games and Junior ISSF World Championship.This is India’s third gold medal in Buenos Aires and the fourth medal overall for the shooting contingent.
Govt sets ‘minimum river flows’ for the Ganga
The government of India had notified the minimum ‘environmental flows’ for Ganga river.Environmental flows are the acceptable flow regimes that are required to maintain a river in the desired environmental state or predetermined state.The upper stretches of the Ganga would have to maintain 20% of the monthly average flow between November and March.

Important Current Affairs 12th October 2018
Centre approved land pooling policy for Delhi
The government of India has approved a land pooling policy for Delhi.The policy was approved by the Delhi Development Authority (DDA) under the chairmanship of Lt Governor Anil Baijal in September 2018.Under the policy, agencies will develop infrastructures like roads, schools, hospitals, community centres and stadia on part of the pooled land
Over 900 prisoners get special remission
As part of the commemoration of the 150th birth anniversary of Mahatma Gandhi, over 900 prisoners have been released in the first phase of the Government’s scheme for grant of special remission to specific categories of prisoners.The decision was taken by the Union Cabinet on July 18, 2018.The prisoners will be released in three phases- October 2, 2018, April 6, 2019, and October 2, 2019.
Silver Jubilee celebrations of NHRC began
Silver Jubilee celebrations of the National Human Rights Commission (NHRC) began on 12 October 2018.The Commission will organize a ‘Human Rights Mela’ and ‘Human Rights Street Theatre Festival’.NHRC is an autonomous public body responsible for the protection and promotion of human rights.Retired Justice HL Dattu is the Chairperson of NHRC.
Govt hiked import duty on electronic items
The government has increased basic customs duty on electronic and telecom equipment to 20% from the current 10%.The items that will face customs duty hike include smartwatches, optical transport equipment and voice over internet protocol equipment.The hike will come into effect on 12 October 2018.Restricting imports is a part of the government’s strategy to arrest the rupee’s fall.
World Arthritis Day observed on October 12
World Arthritis Day is observed on the 12th of October every year.The theme of World Arthritis Day 2018 is “It’s in your hands, take action”.World Arthritis Day was launched by the Arthritis Foundation.The objective of the day is to spread awareness about arthritis, and how it affects the lives of those that suffer with it.
India suffered economic loss due to disasters
The report titled ‘Economic Losses, Poverty and Disasters 1998-2017’ was released by the UN Office for Disaster Risk Reduction.According to the report, India suffered a $79.5 billion economic loss due to climate-related disasters in the last 20 years.The greatest economic losses have been experienced by the US at $944.8 billion, followed by China, Japan, India and Puerto Rico.
WB to provide $195 million to Nepal
The World Bank (WB) has announced that it will provide around US$195 million concessional loans to Nepal.The loan amount will be used by Nepal to reform the country’s financial and energy sectors.An agreement to this effect was reached during the ongoing annual meeting of the World Bank and International Monetary Fund (IMF) at Bali in Indonesia.
Arun Kumar appointed as Bhilai Steel Plant CEO
Arun Kumar Rath took charge as the new CEO of Bhilai Steel plant on 11 October 2018.He succeeds M Ravi who was removed from the post on October 10 after the fire accident at Bhilai Steel Plant.Rath was earlier the CEO of Durgapur Steel Plant.Anirban Dasgupta, CEO of SAIL’s IISCO Steel Plant at Burnpur, takes additional charge of Durgapur Plant.
Centre for 4th Industrial Revolution launched
The World Economic Forum launched its new Centre for the Fourth Industrial Revolution in India.The centre would be based in Maharashtra.It has selected drones, artificial intelligence and blockchain as the first three project areas.The WEF has also entered into partnerships with the Maharashtra and Andhra Pradesh governments for the new initiative
Amway hires Milind Pant as first global CEO
Direct selling company Amway has announced Milind Pant as its Chief Executive Officer.Mr. Pant will report directly to Amway’s Board of Directors effective January 2, 2019.Amway has been co-led by Van Andel who has served as Amway Chairman since 1995 and Doug DeVos who has served as Amway’s president since 2002.
BoB CEO P.S. Jayakumar gets one-year extension
The government extended the tenure of Bank of Baroda Managing Director and Chief Executive Officer P.S. Jayakumar by one year.Before joining Bank of Baroda, Jayakumar founded VBHC Value Homes Pvt. Ltd along with Jaithirth Rao and worked with Citigroup bank.Jayakumar is a chartered accountant by qualification.
21% Indian children are under-weight: GHI
According to the Global Hunger Index (GHI) 2018, at least one in five Indian children under the age of five are wasted, which means they have extremely low weight for their height, reflecting acute under-nutrition.Overall, India has been ranked at 103 out of 119 countries in the Index.GHI is a peer-reviewed publication released annually by ‘Welthungerhilfe and Concern Worldwide.
Punjab govt released 3 apps
Punjab Chief Minister Amarinder Singh launched three mobile apps aimed at checking crop residue burning.The apps also aim to create awareness about the effects of crop residue burning on the environment and human health.The three Android mobile applications have been developed by Punjab Remote Sensing Centre (PRSC).The three apps are i-Khet Machine, e-PEHaL and e-Prevent.
Sushil Modi released book ‘Lalu Leela’
Bihar deputy chief minister Sushil Kumar Modi has come out with a nearly 200-page book titled “Lalu Leela”.The book documents “benami” land deals allegedly involving the RJD national president, Lalu Prasad Yadav and his family members.The preface has been penned by another Union minister, Ravi Shankar Prasad.
‘Save Ganga’ crusader Agarwal dead
GD Agarwal who devoted his life to the cause of saving river Ganga, died on 11 October 2018.Agarwal was on a fast-unto-death for the last 111 days.He was a former professor at the Indian Institute of Technology in Kanpur.In 2012, he formally renounced the world and adopted the name Swami Gyanswaroop Sanand.
Malaysia abolishes capital punishment
Malaysia’s cabinet has agreed to abolish the death penalty and halt pending executions.Capital punishment in Malaysia is currently mandatory for murder, kidnapping, possession of firearms and drug trafficking, among other crimes.In April 2017, human rights group Amnesty International ranked Malaysia 10th in the use of the death penalty.
Govt package for footwear and leather sector
The Central Government has approved a special package for employment generation in leather and footwear sector.The package involves implementation of Central Sector Scheme – Indian Footwear, Leather & Accessories Development Programme (IFLADP) with an approved expenditure of Rs. 2600 Crore for 2017-20.The scheme aims at development of infrastructure for the leather sector.
Space centre to be set up at Jammu University
The Indian Space Research Organisation (ISRO) signed a MoU with the Central University of Jammu (CUJ) in Jammu for setting up of the Satish Dhawan Center for Space Science in the University.The centre will take care of the emerging geospatial and space technology requirements for the development of the region.Apart from this, the disaster management centre will also be set up.
World Bank’s Human Capital Index released
The World Bank released a Human Capital Index (HCI) as part of the World Development Report 2019.The broader theme of the World Development Report (WDR) 2018 is “The Changing Nature of Work”.India is ranked at 115.The report almost reiterated that Indian children are not learning enough in schools.
AIM & IBM India design Internship Programme
NITI Aayog and IBM India announced a first-of-its-kind internship programme for students selected by Atal Innovation Mission (AIM).The Atal Innovation Mission conducted the Atal Tinkering Marathon in 2017.The students will be equipped with the skills in areas like artificial intelligence, Internet-of-Things, cybersecurity, cloud computing and blockchain.

Important Current Affairs 13th October 2018
Hurricane Leslie heading to Portugal, Spain
Hurricane Leslie is heading toward Portugal and Spain.The Category 1 storm was about 910 km southwest of Lisbon, Portugal, and about 320 km northwest of Madeira, the U.S. National Hurricane Center in Miami said.Leslie is moving northeast at 36 mph and it has maximum sustained winds of 80 mph.The storm is expected to pass north of Madeira.
Archer Harvinder Singh clinched gold
Archer Harvinder Singh notched up the men’s individual recurve gold, while track-and-field athletes added a silver and a bronze to India’s tally in the Asian Para-Games in Jakarta.Harvinder defeated China’s Zhao Lixue 6-0 in the W2/ST category final to claim the top honours and take India’s gold tally to seven.Monu Ghangas claimed the silver in the men’s discus throw F11 category.
PM Modi to visit Japan for India-Japan Summit
Modi will visit Japan on 28-29 of this month for the 13th India-Japan Annual Summit.This will be the fifth Annual Summit meeting between Modi and the Japanese Prime Minister Shinzo Abe and their twelfth meeting overall since 2014.Prime Minister’s visit will reaffirm the traditional bonds of friendship between the two countries and strengthen their multifaceted cooperation in diverse fields
Saurabh clinched gold in 10-m air pistol
Pistol shooter Saurabh Chaudhary bagged the Gold Medal in the 10-metre air pistol event in the ongoing Youth Olympic Games in Argentina.In Buenos Aires, the 16-year old blew the field away in the final as he finished a massive Seven and a half points ahead of his closest rival.It is India’s 3rd gold in the history of Youth Olympic Games and all 3 have come in this edition in Buenos Aires.
Deepa clinched bronze in Asian Para Games
At the Asian Para Games in Jakarta, Rio Paralympics medallist Deepa Malik bagged her second medal as she clinched a bronze in the women’s F51/52/53 discus throw event.Deepa produced her best effort in her fourth attempt, a 9.67 metre to claim the third spot.Elnaz Darabian of Iran took home the gold and set a new Asian record with her best throw of 10.71 meters.
ICC launched women’s T20I ranking
In the newly launched ICC global Women’s T20I Team Rankings, India is placed fifth while three-time champions Australia topped the 46-team table.The ICC’s move to launch the women’s T20I rankings follows its decision earlier this year to award international status to all T20 matches.An ICC release in Dubai said all women’s T20 matches between members have international status.
5 gold for India on penultimate day
India grabbed 5 gold medals on the penultimate day of the Asian Para Games at Jakarta.K Jennitha Anto clinched the gold in women’s individual rapid P1 chess event while Kishan Gangolli got the better of Majid Bagheri in the men’s individual event to claim the top spot.In para-badminton, Parul Parmar notched up a victory over Wandee Kamtam to win the gold medal in the women’s singles event.
Cyclone Luban in Oman
Oman has closed schools and ports in the southern part of the country while Yemen’s local authorities prepared health facilities ahead of cyclone Luban.Luban is currently a category one cyclone, which is likely to develop into a Category 2 cyclone within the next 48 hours.\ Luban is travelling northwest, and cloud bands of the cyclone are currently 327 kilometres away from the coast of Oman.
International Day for Disaster Reduction
The International Day for Disaster Reduction was started in 1989, after a call by the United Nations General Assembly for a day to promote a global culture of risk-awareness and disaster reduction.It is held every year on 13 October.The 2018 theme continues as part of the “Sendai Seven” campaign, centred on the seven targets of the Sendai Framework.
India-Azerbaijan signed protocol
The 5th meeting of India-Azerbaijan Inter-Governmental Commission on Trade and Economic, Science and Technology Cooperation (IA-IGC) was held on 11-12 October 2018 in New Delhi.Both sides agreed to take measures to enhance trade relations and expand business relations.Novruz Mammadov is the PM of Azerbaijan.
Online portal for grant of IEM and IL
Department of Industrial Policy and Promotion has developed a new online portal for facilitating the filing of online applications for IEM and Industrial Licence (IL) under Arms Act as well as Industries (Development & Regulation)[I(D&R)] Act, 1951 at https://services.dipp.gov.in.This portal will be available for public with effect from 16th October 2018 for filing application.
Word Egg day celebrated
The Department of Animal Husbandry, Dairying and Fisheries organized “World Egg Day” on 12 October.A booklet on poultry entrepreneurs’ success stories was released.International Egg Commission has declared the second Friday of October every year as World Egg Day.This is a unique opportunity to help raise awareness of the nutritional benefits of eggs.
13th convention of CIC inaugurated
Shri Ram Nath Kovind inaugurated the 13th Convention of the Central Information Commission in New Delhi.The Convention will deliberate on three specific subjects – Data privacy and Right to Information, Amendment in the RTI Act and Implementation of the RTI Act.The Central Information Commission set up under the Right to Information Act is the authorised body, established in 2005.
SBI signed MoU with Nepal’s NBI
State Bank of India has signed an MoU with Kathmandu-based National Banking Institute (NBI) for the development of human resources of the latter.Under the MoU, the strategic training unit of SBI will impart education, training and development to facilitate transformation of NBI’s HR department.SBI signed the three-year MoU with NBI to establish a mutually beneficial strategic alliance.
India remains polio-free: UNICEF, WHO
The UNICEF and the WHO reiterated India’s status as a polio-free country.This came after some oral polio vaccine vials were found contaminated with the type-2 polio virus last month.India has a high routine immunisation coverage and so the risk of children getting vaccine-derived polio virus was “minimal”, said the two global organisations in a joint statement.
India’s biggest Zika outbreak in Jaipur
Fifty cases of Zika have been confirmed in Jaipur in India’s biggest outbreak of the disease with 11 pregnant women among them.The mosquito-borne virus puts the unborn child at risk of microcephaly, a birth defect where the baby’s head is smaller than normal.The symptoms include high fever, rash, joint and muscle pain, headache and conjunctivitis.
First IIIC Opened in Bengaluru
The country’s first India-Israel Innovation Centre (IIIC), an entrepreneurial technology hub, was launched in Bengaluru.The IIIC is a significant step towards facilitating penetration of Israeli companies in India.It aims to forge local partnerships and joint ventures between companies from the two countries.It will provide an ecosystem to support entrepreneurship.
NSE signed a pact with Uttarakhand
Leading stock exchange NSE has signed a pact with the Uttarakhand government to provide access to capital to MSMEs.This which will fuel the growth of such entities in the state.The bourse will play an active role in nurturing the SMEs and start-ups by increasing awareness.NSE’s SME Platform has currently 182 companies listed, which together raised over Rs 2,850 crore.
India elected to UNHRC
India has been elected to the United Nations’ Human Rights Council with the highest vote among all candidates.It secured 188 votes in the Asia-Pacific category for a period of three years beginning January 1, 2019.In the Asia Pacific category, India got 188 votes followed by Fiji with 187 and Bangladesh 178 votes.
Legendary musician Annapurna Devi passed away
Legendary musician Annapurna Devi has passed away in Mumbai. She was 91.Annapurna Devi was an Indian surbahar player of Hindustani classical music and she was the daughter and disciple of Allauddin Khan.She was married to sitar maestro Ravi Shankar.

Important Current Affairs 14th October 2018
Important sports News (8-13 Oct 2018)
          minigun 0.0.8      Cache   Translate Page      
Web scraping API to outsource tons of GET & xpath to cloud computing
          vctoolkit 0.1.2.3      Cache   Translate Page      
A simple wrapper for commonly used tools in visual computing.
          minigun 0.0.7      Cache   Translate Page      
Web scraping API to outsource tons of GET & xpath to cloud computing
          Senior Reverse Engineer - Irdeto - Ottawa, ON      Cache   Translate Page      
Our Security Assurance team is an Ethical Hacking group within Irdeto bringing its considerable knowledge of the dark corners of computing to bear against...
From Irdeto - Mon, 22 Oct 2018 08:49:48 GMT - View all Ottawa, ON jobs
          Globalne inwestycje w chmurę podwoją się w ciągu trzech lat       Cache   Translate Page      
Cloud computing stał się standardem. Z opublikowanego przez Deloitte raportu „Oustourcing Survey 2018. Traditional outsourcing is dead. Long...
          David Austin, Forever a Member of PC Pitstop Family      Cache   Translate Page      
It is with a heavy heart that we announce the loss of David Austin. Over the last decade, David has been an irreplaceable member of the PC Pitstop community.  He began as a strong member of the PC Pitstop forums, a virtual community for people to share their computing experiences.  His commitment to the forums […]
          Problem Solving with C      Cache   Translate Page      
Campus: 
Lowell
Format: 
Online
Level: 
Undergraduate
Subject: 
Computing
Information Technology
Number: 
INFO.3640-031
Semester: 
Spring 2019
Registration Status: 
Open
Registration: 
Monday, November 5, 2018 to Monday, January 28, 2019

          Protecting Data In Use With Fortanix Runtime Encryption and Intel® SGX      Cache   Translate Page      

Our mission at Fortanix is to solve cloud security and privacy. We recognize the importance of secure and private cloud computing in unlocking the true potential of the digital era. In fact, organizations consistently rate security as one of the top challenges as they migrate to the cloud. Fortanix recognizes the vastness of compute infrastructure ...continue reading Protecting Data In Use With Fortanix Runtime Encryption and Intel® SGX

The post Protecting Data In Use With Fortanix Runtime Encryption and Intel® SGX appeared first on IT Peer Network.

[...]

Read More...

The post Protecting Data In Use With Fortanix Runtime Encryption and Intel® SGX appeared first on Blogs@Intel.


          Operating Systems Foundations      Cache   Translate Page      
Campus: 
Lowell
Format: 
Online
Level: 
Graduate
Subject: 
Computing
Information Technology
Number: 
MSIT.5170-031
Semester: 
Spring 2019
Registration Status: 
Open
Registration: 
Monday, November 5, 2018 to Monday, January 28, 2019

          Electronic tattoos fit wearable computing designs      Cache   Translate Page      

These stretchable, inexpensive, tattoo-like circuits were made with an inkjet printer at Carnegie Mellon University 

The post Electronic tattoos fit wearable computing designs appeared first on Electronic Products & Technology.


          Hollywood’s favorite UX designers just created a real smartwatch      Cache   Translate Page      

The Huami Amazfit Verge is Tony Stark’s smartwatch.

Territory Studio creates the biggest mass market spectacles that can never fit in your pocket. It’s a visual effects design studio with a very particular talent, building the futuristic heads-up displays we see in movies like Blade Runner 2049, The Martian, or The Avengers: Infinity War. The company tells Hollywood what the future of computing will look like.

Read Full Story


          Senior Technical Program Manager - Amazon.com - Seattle, WA      Cache   Translate Page      
Job Description Amazon Simple Storage Service (S3) is storage for the Internet. Through the use of pioneering techniques in distributed computing, developers...
From Amazon.com - Wed, 10 Oct 2018 19:23:20 GMT - View all Seattle, WA jobs
          Accurate hybrid template–based and MR-based attenuation correction using UTE images for simultaneous PET/MR brain imaging applications      Cache   Translate Page      
Attenuation correction is one of the most crucial correction factors for accurate PET data quantitation in hybrid PET/MR scanners, and computing accurate attenuation coefficient maps from MR brain acquisitions...
          David Rosenthal: Making PIEs Is Hard      Cache   Translate Page      
In The Four Most Expensive Words In The English Language I wrote:
Since the key property of a cryptocurrency-based storage service is a lack of trust in the storage providers, Proofs of Space and Time are required. As Bram Cohen has pointed out, this is an extraordinarily difficult problem at the very frontier of research.
The post argues that the economics of decentralized storage services aren't viable, so the difficulty of Proofs of Space and Time isn't that important. All the same, this area of research is fascinating. Now, in One File for the Price of Three: Catching Cheating Servers in Decentralized Storage Networks Ethan Cecchetti, Ian Miers, and Ari Juels have pushed the frontier further out by inventing PIEs. Below the fold, some details.

Here's the problem the Cornell team is working on:
Decentralized Storage Networks (DSNs) such as Filecoin want to store your files on strangers spare disk space. To do it properly, you need to store the file in multiple places since you don't trust any individual stranger's computer. But how do you differentiate between three honest servers with one copy each and three cheating servers with one copy total? Anything you ask one server about the file it can get from its collaborator.
This is most of the problem of Proofs of Space. Their solution is:
the world's first provably secure, practical Public Incompressible Encoding (PIE). A PIE lets you encode a file in multiple different ways such that anyone can decode it, but nobody can efficiently use one encoding to answer questions about another. Using known techniques, you can ask simple questions to see if someone is storing an encoded replica, giving you a Proof of Replication (PoRep).
In other words, instead of storing N identical replicas of the original file, N different replicas are stored. From any one of the different replicas, the original file can be recovered. But an auditor can ask questions that are specific to each individual replica.

Anyone can already do this for private data:
Sia, Storj, MaidSafe, etc. do this by encrypting your pictures three times and distributing those encrypted copies. This strategy solves the problem perfectly if you're the one encrypting your photos and someone else is storing them.
But not for public data. The Cornell team's goal is to do it for public data such as blockchains:
What happens if it's a public good like blockchain state? Blockchains are getting huge—Ethereum is over 75 GB and growing fast—and it's really expensive to have everyone store everything. But who encrypts the blockchain state? Everyone needs to read it. And worse, we don't trust anyone to encrypt it properly. We need something totally different that anyone can check and anyone can decode.
The process of encrypting each of the "copies" needs to be slow, and previous proposals about how to make it slow have been broken. The Cornell team's proposal describes their computation as:
a directed acyclic graph (DAG). Each vertex represents an operation with two steps: first we derive a key using KDF [Key Derivation Function - think hash], and then we encrypt some data using that key. Edges are either data edges, representing the inputs and outputs of the encryption, or key edges, representing the data used by KDF to derive the key.
In order to ensure that a copy is intact, the computation must be:
A depth-robust graph (DRG) is a DAG with ... this property: even if a (potentially sizable) fraction of the vertices are removed, it retains a long path.
Thus, if the computation is a DRG, not storing some of the data doesn't avoid the worst case. But that's not enough. What's needed is that not storing all of the data doesn't avoid the best case. The Cornell team ensure this by layering alternate DRGs with:
a second type of graph called butterfly graph, which has the property that there's a path from every input node to every output node. This graph, with its dependency of every output on every input, helps ensure, roughly speaking, that Mallory must compute every input node, and therefore cannot avoid computing along the long sequential path in the depth-robust graph.
The result is what they call a Dagwood sandwich. Now they have a Public Incompressible Encoding, they propose to use it to build a Decentralized Storage Network:
Pretty much any PIE-based DSN architecture involves two steps for a given file:
  1. Prove once that the file is encoded correctly.
  2. Audit by verifying continuously that the file is intact.
Let's start with (1). Storage providers in the DSN must prove to somebody—the file owner or the network—that an encoding G of a file F is a correct PIE. Given an authenticated version of F, such as a hash stored in a trusted place, it's easy to verify that a PIE is correct.
I hope to return to the issues raised by "Given an authenticated version of F" in a later post. As with LOCKSS:
As for (2), it's not much help for G to be correct if it goes missing. It's critical to continuously check that storage providers are still storing G and haven't thrown data away. There are a number of efficient, well established techniques for this purpose.
So far, I may be a bit hazy on the details but I think I understand the big picture. They then propose:
A blockchain can then perform the auditing. This could be an existing blockchain like Ethereum or, as with schemes like Sia, a new one whose consensus algorithm is independent of its storage goals. A particularly intriguing option, though, is to create a new blockchain where audit = mining.
The idea of audit = mining is where they lose me. Here follows the explanation for my confusion.

In conventional blockchains such as Bitcoin's, a miner (or more likely a mining pool) decides which transactions are in the block it will mine. Among them will be one coinbase transaction:
A special kind of transaction, called a coinbase transaction, has no inputs. It is created by miners, and there is one coinbase transaction per block. Because each block comes with a reward of newly created Bitcoins (e.g. 50 BTC for the first 210,000 blocks), the first transaction of a block is, with few exceptions, the transaction that grants those coins to their recipient (the miner). In addition to the newly created Bitcoins, the coinbase transaction is also used for assigning the recipient of any transaction fees that were paid within the other transactions being included in the same block.
If the block the miner created wins, the coinbase and other transactions in the block take effect. The miner has created their own reward for the resources they devoted to the primary function of the blockchain, in this case, verifying transactions.

In DSNs, the major costs are incurred by the storage nodes. Audit is a minor, albeit necessary, cost. Presumably, a storage node cannot audit itself. Thus audit is a function that some other node has to perform on behalf of each storage node. Audit = mining, as I see it, gives rise to a number of issues:
  • Auditors will create the blocks they mine, deciding which transactions are included, and thus which nodes they audit for this block. Among the transactions will be the coinbase transaction, rewarding the auditor for auditing. How are the storage nodes rewarded for storing data? Presumably, the idea is that the auditor will also include transactions that transfer fees paid for storage from the owners of the data they store to each of the nodes audited in this block. This means that storage nodes will depend on the kindness of strangers to get paid.
  • So, like wallets that want to transact Bitcoin, storage nodes will need to pay fees to auditors. Like transactions in Bitcoin, storage nodes will be in a blind auction for auditing, leading to both over-bidding and long delays from under-bidding.
  • For the same economic reasons as in Bitcoin, auditors will forms pools. Auditing will be dominated by a few large pools. They will be able to collude in various forms of anti-competitive behavior, such as auditing only storage nodes which are members of the pools, or charging higher audit fees to non-members. Doing so would increase the costs of competing storage nodes.
  • But the key point is that if the economics are to work out, audit fees and the inflation of the cryptocurrency by the issuance of audit rewards must be only a small part of the cost of running a storage node. In The Four Most Expensive Words In The English Language I pointed out that DSN storage nodes can't charge more than Amazon's S3, and realistically have to charge much less. Thus the income from auditing has to be minuscule.
  • But the idea is that audit = mining. It may seem like a laudable goal to make mining cheap, but it is problematic. Eric Budish writes:
    From a computer security perspective, the key thing to note ... is that the security of the blockchain is linear in the amount of expenditure on mining power ... In contrast, in many other contexts investments in computer security yield convex returns (e.g., traditional uses of cryptography) — analogously to how a lock on a door increases the security of a house by more than the cost of the lock.
    Bram Cohen's Chia Network is using Proofs of Space and Time to force miners to waste resources by storing large amounts of otherwise useless data, so running a miner is expensive. But if audit = mining in a DSN storing useful data, running a miner (= auditor) has to be cheap, and thus the network will be vulnerable.
Cecchetti et al don't elaborate on the details of their audit = mining concept, and a Google search doesn't reveal other sources for details. So it is possible that I have misinterpreted their ideas. But unless they have some way to make mining (= auditing) expensive, they are on the wrong track.


          Digital Library Federation: Call for Applications: 2019 DLF + DHSI Tuition Grants      Cache   Translate Page      

We are now taking applications for tuition grants to the 2019 Digital Humanities Summer Institute (DHSI) in Victoria, B.C.!

The Digital Humanities Summer Institute has grown by leaps and bounds, and we are excited to connect our DLF-DHSI Tuition Grant recipients with its extensive offerings in the summer of 2019. (June 3-7 and 10-14)

Members not interested in a tuition scholarship opportunity are welcome to register for DHSI courses at any time, using DLF discount codes available here: http://dhsi.org/registration.html. (You must be affiliated with a DLF member institution to use the codes. Courses fill quickly, so don’t delay!)

Application

The application requests the following information:

  1. contact information
  2. brief, one-paragraph bio
  3. a one-paragraph statement about how attending DHSI might expand your professional horizons, what you hope to learn, and what skills or ideas you might bring back from DHSI to the DLF community.

The award will cover tuition only, and is only available to participants from DLF member institutions. (Check your eligibility.) Applicants or their employers are responsible for the costs of travel and lodging, and winners must register by April 1st in order to use the award.

DLF-DHSI Tuition Grant awardees will also be invited to contribute a DLF blog post about their experiences after the event.

Applications are due November 23rd.

Apply Now

 

Please contact awards@diglib.org with any questions.

About DHSI

The Digital Humanities Summer Institute provides an ideal environment for discussing and learning about new computing technologies and how they are influencing teaching, research, dissemination, creation, and preservation in different disciplines, via a community-based approach.

A time of intensive coursework, seminars, and lectures, participants at DHSI share ideas and methods, and develop expertise in using advanced technologies. Every summer, the institute brings together faculty, staff, and students from the Arts, Humanities, Library, and Archives communities as well as independent scholars and participants from areas beyond.

Described by one participant as an event that “combines the best aspects of a skills workshop, international conference, and summer camp,” the DHSI prides itself on its friendly, informal, and collegial atmosphere. We invite you to join the DHSI community in Victoria for a time of focused practice, learning, and connecting with (and making new) friends and colleagues.

About the DLF Tuition Grants

We make a growing number of travel and tuition grants available year-round to DLF members and to the broader community invested in digital library work. Many of these grants bring individuals from other communities to the DLF Forum, or help DLF practitioners who wish to build a dynamic and diverse peer network make it to events they may not otherwise attend.

Learn about Previous Awardees

Read reflections on DHSI 2018 from Steven D. Booth and Jennifer Nichols & DHSI 2017 from Chelcie Rowell, Rebecca Chung, and John Edward Martin.

 

The post Call for Applications: 2019 DLF + DHSI Tuition Grants appeared first on DLF.


          Huawei to launch cloud data centre in Joburg       Cache   Translate Page      


Huawei has announced plans to launch its first public cloud data centre in Africa. Multinational ICT...


          Assessment Manager      Cache   Translate Page      
Job Title: Assessment Manager (Maths and ICT Group) Contract: Full Time Permanent Salary: £32,000 - £40,000 Location: Cambridge What it’s about This role would suit an experienced Computing/ICT and/or Mathematics specialist with an interest in international and UK assessments. It involves managing assessment products for qualifications ranging from Cambridge IGCSE and O Level to Cambridge International A Level. You will be checking, proofreading and signing off assessment materials, as well as managing examiners to ensure accuracy of marking and conformity to Cambridge Assessment International Education’s assessment standards. You will be working with a range of stakeholders and ensuring that assessment providers are fully competent to deliver assessments in accordance with Cambridge standards. Part of the role involves supporting a diverse range of customers. What you'll be doing Manage the design, development and delivery of a portfolio of syllabuses that reflect the values of the Cambridge Learner and teacher and also meet the needs of customers, meet Cambridge Assessment International Education’s assessment standards and the Code of Practice. Ensure that question papers and key documentation are produced efficiently, in line with procedures, on time and to the highest standards of quality and accuracy. Ensure that marking, grading and results and appeals procedures and responsibilities assigned to the post are carried out accurately and effectively, according to agreed procedures and to schedule. Manage the appointment, allocation of work, performance and succession planning of Setters, Revisers and Vetters, item writers, Assistant Examiners, Principal Examiners and other assessment providers to ensure that assessments are produced, marked and graded in accordance with Cambridge Assessment International Examination’s standards. In conjunction with the Development Division as appropriate, work collaboratively with schools, partner organisations and ministries to develop and revise syllabuses and associated materials to ensure that they meet their needs, are cost effective and reflect the current developments in the subject area. Contribute to the development of Cambridge Assessment International Education’s strategy to use technology to provide on-line assessment, training and teacher support materials. Contribute to improvement projects (systems/quality improvements), innovations, and working groups as appropriate in respect to continuous improvements and maintenance of quality procedures or the on-going delivery of assessment projects. Organise the provision of consultancy services in some situations and contribute to training for partner organisations and ministries in relation to assessment of subjects in the portfolio and deliver outcomes to agreed timescales and quality. Maintain quality control standards of qualifications submitted for accreditation in order to ensure that Cambridge accreditation services are met, if relevant. This may include in country evaluation of assessment processes. To monitor costs of assessment materials production or project budgets. What we’re looking for Qualifications Essential: Educated to degree level in the subject area where the portfolio focuses Knowledge of assessment in education High standard of English Desirable: Post-graduate qualification in educational assessment, management or project management Teaching qualification Knowledge of international education Skills Ability to work under pressure and to tight deadlines High level of attention to detail Positive ‘can do’ attitude Strong track record of effective ‘people’ skills Excellent organisational and planning skills Excellent communication skills – verbal and written Team player Highly proactive Ability to self-manage Ability to prioritise Negotiation skills Ability to work with basic statistics/data handling and interpretation ability Able to engage with technology and basic IT skills Experience Essential: Extensive teaching experience and/or project management experience Desirable: Experience in education-related project management at a senior level Examination administration Examining experience Behaviours Flexible Can-do and proactive Appropriate judgement on decisions essential Collaborative, open and takes responsibility Open to change Meticulous approach; following procedures is essential Who we are Cambridge Assessment International Education prepares school students for life, helping them develop an informed curiosity and a lasting passion for learning. We are part of Cambridge Assessment, a department of the University of Cambridge. Our international qualifications are recognised by the world’s best universities and employers, giving students a wide range of options in their education and career. As a not-for-profit organisation, we devote our resources to delivering high-quality educational programmes that can unlock learners’ potential. This is an excellent opportunity to join a market leader and be rewarded with valuable learning opportunities, a competitive salary and benefits. Benefits In addition to a competitive salary, we offer a comprehensive package of benefits to help with your life both inside and outside of work: Generous contributory pension 28 days annual leave, plus bank holidays Annual performance related bonus and increases (discretionary) Enhanced maternity/paternity pay and childcare voucher scheme Childcare vouchers Employee discount and cash back scheme at 2,500 retailers Cycle scheme Season Ticket Loan Subsidised staff restaurants Support for professional qualifications Discounted access to the University of Cambridge Sport Centre, along with various other local gyms. Work/life balance is important to us here at Cambridge Assessment, and we offer all our colleagues a range of flexible working options, which suit both the business and the employee. So please let us know of any flexible working requi
          Could edge computing be the next big thing?      Cache   Translate Page      
Michael Dell explains why data will soon reside on the edge as opposed to in the cloud.
          (PR) AMD announces Radeon Instinct MI60 and Instinct MI50      Cache   Translate Page      
AMD Unveils World’s First 7nm Datacenter GPUs -- Powering the Next Era of Artificial Intelligence, Cloud Computing and High Performance Computing (HPC) AMD Radeon Instinct™ MI60 and MI50 accelerators with supercharged compute performance, high-speed connectivity, fast memory bandwidth and updated ROCm open software platform power the most demanding deep learning, HPC, cloud and rendering applications SAN FRANCISCO, Nov. 06, 2018 (GLOBE NEWSWIRE) -- AMD(NASDAQ: AMD) today announced the AMD Radeon Instinct™ MI60 and MI50 accelerators, the world’s first 7nm datacenter GPUs, designed to deliver the compute performance required for next-generation deep learning, HPC, cloud computing and rendering applications. Researchers, scientists and...

Keep on reading: (PR) AMD announces Radeon Instinct MI60 and Instinct MI50
          Senior BIOS Engineer - ZT Systems - Secaucus, NJ      Cache   Translate Page      
Join us at this critical growth inflection point as we engineer the hardware infrastructure powering a world of cloud computing, cloud storage, artificial...
From Indeed - Tue, 23 Oct 2018 14:28:36 GMT - View all Secaucus, NJ jobs
          Why Cloud Computing Is a Must for Small Business      Cache   Translate Page      

Cloud computing has managed to redefine all we know about connectivity and efficiency. Learn what cloud computing can do for your small business.

The post Why Cloud Computing Is a Must for Small Business appeared first on Small Business Bonfire.


          Ginger 3.7.227      Cache   Translate Page      

Ginger to darmowe narzędzie działające w formie wtyczki multimedialnej, przeznaczone do sprawdzania pisowni przy użyciu inteligentnej chmury obliczeniowej (Cloud Computing). Ginger służy do sprawdzania pisowni, w tym między innymi gramatyki i ortografii. Integruje się z najpopularniejszymi programami biurowymi (np. Microsoft Office), a także z zainstalowanymi przeglądarkami internetowymi (Google Chrome, Firefox itp.).

Program sprawdza pisownię wyłącznie w języku angielskim. W tym wypadku doskonale nadaje się do nauki pisania w języku uniwersalnym, a także do sprawdzania poprawnej treści w utworzonym bądź modyfikowanym dokumencie. Aby zaznaczyć i sprawdzić fragment dowolnego tekstu, należy go zaznaczyć i nacisnąć klawisz F2 lub przycisk pojawiający na górze ekranu. Program automatycznie połączy się z serwerem (w chmurze) i sprawdzi pismo.

Ginger sprawdza fragmenty tekstu lub skanuje zawartość całego dokumentu. Przeprowadza korektę dokumentu w celu wykrycia błędów ortograficznych, stylistycznych czy ortograficznych. Za jego pomocą sprawdzimy poprawność treści w każdym dokumencie, na stronach internetowych, podczas tworzenia prezentacji w PowerPoint lub wysyłania wiadomości drogą elektroniczną.

Uwaga:

Ginger wymaga stałego połączenia z internetem. Nie można z niego korzystać w trybie offline.


          Network Development Engineer II - Amazon.com - Herndon, VA      Cache   Translate Page      
Job Description Do you like helping U.S. Intelligence Community agencies implement innovative cloud computing solutions and solve technical problems? Would...
From Amazon.com - Tue, 11 Sep 2018 19:23:37 GMT - View all Herndon, VA jobs
          Forget Cloud Computing, Blockchain is the Future      Cache   Translate Page      
Forget Cloud Computing, Blockchain is the Future video note Is blockchain the technology of the […]
          CMGT 557 Teaching Effectively-tutorialrank.com      Cache   Translate Page      
By Soaps38    In Education    9 minutes ago
For more course tutorials visit www.tutorialrank.com CMGT 557 Cloud Computing Matrix
Tags: entire, course, dq's, check, points

          10 Very Useful Slack Commands      Cache   Translate Page      

Have you heard of Slack yet? The Searchable Log of All Conversation and Knowledge – ‘Slack’ is a software application that uses cloud computing for collaborating the internal tasks and communications of a company. This team messaging application was developed by Stewart Butterfield in order to have a single platform for collaboration among the people […]

The post 10 Very Useful Slack Commands appeared first on JaypeeOnline.


          1969 UCLA: first station in a nationwide computer network      Cache   Translate Page      
https://www.aneddoticamagazine.com/wp-content/uploads/UCLA-computer-network.jpg

Today in 1969, UCLA issued a press release stating it “will become the first station in a nationwide computer network which, for the first time, will link together computers of different makes and using different machine languages into one time-sharing system.”



Supported by the Advanced Research Project Agency (ARPA), the aptly named ARPANET would link multiple universities and other hubs of advanced computing into a network – a network that was, for all intents and purposes, the internet! It would be decades before Tim Berners-Lee would release his work on the World Wide Web, but the internet, as a network, began on this day in 1969.


 



 



 


 


Posted by: PEEKPOKE_inv1 Club/Computer museum


Aneddotica Magazine - Collaborative Blog since 2012 https://www.aneddoticamagazine.com/ucla-first-station-in-a-nationwide-computer-network/
          Sr Principal Infra Engg - Mphasis - Bengaluru, Karnataka      Cache   Translate Page      
Primary Comp & : Cloud Computing - Azure Architect Skill Percentage - 100 Skill Version - 1 Proficiency - Advanced(>5 & <=9yrs) EDUCATION : ITO NICHE SKILLS -...
From Mphasis - Tue, 06 Nov 2018 12:28:56 GMT - View all Bengaluru, Karnataka jobs
          Technical Architect (Salesforce experience required) Cheyenne - Silverline Jobs - Cheyenne, WY      Cache   Translate Page      
Company Overview: Do you want to be part of a fast paced environment, supporting the growth of cutting edge technology in cloud computing? Silverline...
From Silverline Jobs - Sun, 29 Jul 2018 06:18:46 GMT - View all Cheyenne, WY jobs
          Robotics and Automation Market by Cloud Robotics, UAV/Drones, Robotics Equipment, Components, Solutions, Apps and Services      Cache   Translate Page      
...usage will rapidly increase with improvements to artificial intelligence, robotic form factors and fitness for use, cloud computing and related business models, such as robotics as a service. Download the full report: https://www.reportbuyer.com/product/5608499 This research evaluates ...


          The Global Network Firewall Market, Forecast to 2022      Cache   Translate Page      
...to 2022 [November 06, 2018] The Global Network Firewall Market, Forecast to 2022 NEW YORK , Nov. 6, 2018 /PRNewswire/ -- Emerging Business Practices Demands New Technologies The enterprise network is evolving rapidly with new technologies and business practices such as cloud computing ...


          11-28-2018 CS Distinguished Lecture: Rodney Allen Brooks (MIT, iRobot, Rethink) - Steps Towards Super Intelligence       Cache   Translate Page      
Speaker: Rodney Allen Brooks, MIT, iRobot, Rethink Talk Title: Steps Towards Super Intelligence Series: CS Distinguished Lectures Abstract: In his 1950 paper "Computing Machinery and Intelligence" Alan Turing estimated that sixty people working for fifty years should be able to program a computer (running at 1950 speed) to have human level intelligence. AI researchers have spent orders of magnitude more effort than that and are still not close. Why has AI been so hard and what are the problems that we might work on in order to make real progress to human level intelligence, or even the super intelligence that many pundits believe is just around the corner? This talk will discuss those steps we can take, what aspects we really still do not have much of a clue about, what we might be currently getting completely wrong, and why it all could be centuries away. Importantly the talk will make distinctions between research questions and barriers to technology adoption from research results, with a little speculation on things that might go wrong (spoiler alert: it is the mundane that will have the big consequences, not the Hollywood scenarios that the press and some academics love to talk about). This lecture satisfies requirements for CSCI 591: Research Colloquium. Biography: Rodney Brooks earned Bachelors and Masters degrees in pure mathematics from Flinders University in South Australia. In 1977 he joined the Artificial Intelligence Lab at Stanford graduating with a PhD in computer science in 1981. After post-docs at Carnegie Mellow and MIT, and a faculty position back at Stanford he joined the MIT faculty at the Artificial Intelligence Laboratory there in 1984. He worked in computer vision, robotics, and artificial life. He became director of the AI Lab in 1997 and in 2003 he founded the Computer Science and Artificial Intelligence Lab, CSAIL, which is the largest lab at MIT with over 1,000 members. Along the way he started a software company in silicon valley, a boutique robotics venture capital fund, the company iRobot which has delivered tens of millions of home cleaning robots and many thousand ground robots to the US military, and more recently spent 10 years developing collaborative robots for manufacturing at Rethink Robotics. He retired from MIT In 2010, and currently advises companies large and small, including Toyota and their autonomous driving efforts. He is a member of the NAE and a Fellow of the American Academy of Arts and Sciences, and of the IEEE, ACM, AAAS, and AAAI. He writes at rodneybrooks.com/blog. Host: Maja Mataric
          Senior Software Engineer - Security and Platform Distribution - Cray - Bloomington, MN      Cache   Translate Page      
Our business is supercomputing. We are seeking an engineer in Cray R&amp;D who is responsible for the distributions of Linux used in Cray Products and for security...
From Cray - Tue, 30 Oct 2018 20:18:46 GMT - View all Bloomington, MN jobs
          Artificial Intelligence Solutions Architect Team Lead - Cray - San Jose, CA      Cache   Translate Page      
This position is responsible for understanding and complying with Cray internal controls. Our business is supercomputing....
From Cray - Thu, 13 Sep 2018 02:18:21 GMT - View all San Jose, CA jobs
          Protecting what we love about the internet: our efforts to stop online piracy      Cache   Translate Page      

The internet has enabled people worldwide to connect, create and distribute new works of art like never before. A key part of preserving this creative economy is ensuring creators and artists have a way to share and make money from their content—and preventing the flow of money to those who seek to pirate that content. Today, we're releasing our latest update on those efforts..

Our 2018 "How Google Fights Piracy" report explains the programs, policies, and technology we put in place to combat piracy online and ensure continued opportunities for creators around the world.

We invest significantly in the technology, tools and resources that prevent copyright infringement on our platforms. We also work with others across the industry on efforts to combat piracy. These efforts appear to be having an effect: around the world, online piracy has been decreasing, while spending on legitimate content is rising across content categories.

Here are a few of our findings from this year's Piracy report:

  • $3 billion+:The amount YouTube has paid to rights holders who have monetized use of their content in other videos through Content ID, our industry-leading rights management tool.
  • $100 million+: The amount we’ve invested in building Content ID, including staffing and computing resources.
  • $1.8 billion+:The amount YouTube paid to the music industry from October 2017 to September 2018 in advertising revenue alone
  • 3 billion+:The number of URLs that were removed from Search for infringing copyright since launching a submission tool for copyright owners and their agents.
  • 10 million+:The number of ads that were disapproved by Google in 2017 that were suspected of copyright infringement or that linked to infringing sites.

As we continue our work in the years ahead, five principles guide our substantial investments in fighting piracy:

Create more and better legitimate alternatives: Piracy often arises when it's difficult for consumers to access legitimate content. By developing products that make it easy for users to access legitimate content, like Google Play Music and YouTube, Google helps drive revenue for creative industries and give consumers choice.

Follow the money: As the vast majority of sites dedicated to online piracy are doing so to make money, one way to combat them is to cut off their supply. We prevent actors that engage in copyright infringement from using our ads and monetization systems and we enforce these policies rigorously.

Be efficient, effective, and scalable: We strive to implement anti-piracy solutions that work at scale. For example, as early as 2010, we began making substantial investments in streamlining the copyright removal process for search results. As a result, these improved procedures allow us to process copyright removal requests for search results at the rate of millions per week.

Guard against abuse: Some actors will make false copyright infringement claims in order to have content they don't want online taken down. We’re committed to detecting and rejecting bogus infringement allegations, such as removals for political or competitive reasons.

Provide transparency: We’re committed to providing transparency. In our Transparency Report, we disclose the number of requests we receive from copyright owners and governments to remove information from our services.

Today, our services are generating more revenue for creators and rights holders, connecting more people with the content they love, and doing more to fight back against online piracy than ever before. We’re proud of the progress this report represents. Through continued innovation and partnership, we’re committed to curtailing infringement by bad actors while empowering the creative communities who make many of the things we love about the internet today.


          LXer: Advance Your Open Source Skills with These Essential Articles, Videos, and More      Cache   Translate Page      
Published at LXer: Recent industry events have underscored the strength of open source in today’s computing landscape. With billions of dollars being spent, the power of open source development,...
          Announcing .NET Standard 2.1      Cache   Translate Page      

Since we shipped .NET Standard 2.0 about a year ago, we’ve shipped two updates to .NET Core 2.1 and are about to release .NET Core 2.2. It’s time to update the standard to include some of the new concepts as well as a number of small improvements that make your life easier across the various implementations of .NET.

Keep reading to learn more about what’s new in this latest release, what you need to know about platform support, governance and coding.

What’s new in .NET Standard 2.1?

In total, about 3k APIs are planned to be added in .NET Standard 2.1. A good chunk of them are brand-new APIs while others are existing APIs that we added to the standard in order to converge the .NET implementations even further.

Here are the highlights:

  • Span<T>. In .NET Core 2.1 we’ve added Span<T> which is an array-like type that allows representing managed and unmanaged memory in a uniform way and supports slicing without copying. It’s at the heart of most performance-related improvements in .NET Core 2.1. Since it allows managing buffers in a more efficient way, it can help in reducing allocations and copying. We consider Span<T> to be a very fundamental type as it requires runtime and compiler support in order to be fully leveraged. If you want to learn more about this type, make sure to read Stephen Toub’s excellent article on Span<T>.
  • Foundational-APIs working with spans. While Span<T> is available as a .NET Standard compatible NuGet package (System.Memory) already, adding this package cannot extend the members of .NET Standard types that deal with spans. For example, .NET Core 2.1 added many APIs that allow working with spans, such as Stream.Read(Span<Byte>). Part of the value proposition to add span to .NET Standard is to add theses companion APIs as well.
  • Reflection emit. To boost productivity, the .NET ecosystem has always made heavy use of dynamic features such as reflection and reflection emit. Emit is often used as a tool to optimize performance as well as a way to generate types on the fly for proxying interfaces. As a result, many of you asked for reflection emit to be included in the .NET Standard. Previously, we’ve tried to provide this via a NuGet package but we discovered that we cannot model such a core technology using a package. With .NET Standard 2.1, you’ll have access to Lightweight Code Generation (LCG) as well as Reflection Emit. Of course, you might run on a runtime that doesn’t support running IL via interpretation or compiling it with a JIT, so we also exposed two new capability APIs that allow you to check for the ability to generate code at all (RuntimeFeature.IsDynamicCodeSupported) as well as whether the generated code is interpreted or compiled (RuntimeFeature.IsDynamicCodeCompiled). This will make it much easier to write libraries that can exploit these capabilities in a portable fashion.
  • SIMD. .NET Framework and .NET Core had support for SIMD for a while now. We’ve leveraged them to speed up basic operations in the BCL, such as string comparisons. We’ve received quite a few requests to expose these APIs in .NET Standard as the functionality requires runtime support and thus cannot be provided meaningfully as a NuGet package.
  • ValueTask and ValueTask<T>. In .NET Core 2.1, the biggest feature was improvements in our fundamentals to support high-performance scenarios, which also included making async/await more efficient. ValueTask<T> already exists and allows to return results if the operation completed synchronously without having to allocate a new Task<T>. With .NET Core 2.1 we’ve improved this further which made it useful to have a corresponding non-generic ValueTask that allows reducing allocations even for cases where the operation has to be completed asynchronously, a feature that types like Socket and NetworkStream now utilize. Exposing these APIs in .NET Standard 2.1 enables library authors to benefit from these improvements both, as a consumer, as well as a producer.
  • DbProviderFactories. In .NET Standard 2.0 we added almost all of the primitives in ADO.NET to allow O/R mappers and database implementers to communicate. Unfortunately, DbProviderFactories didn’t make the cut for 2.0 so we’re adding it now. In a nutshell, DbProviderFactories allows libraries and applications to utilize a specific ADO.NET provider without knowing any of its specific types at compile time, by selecting among registered DbProviderFactory instances based on a name, which can be read from, for example, configuration settings.
  • General Goodness. Since .NET Core was open sourced, we’ve added many small features across the base class libraries such as System.HashCode for combining hash codes or new overloads on System.String. There are about 800 new members in .NET Core and virtually all of them got added in .NET Standard 2.1.

For more details, you might want to check out the full API diff between .NET Standard 2.1 and .NET Standard 2.0. You can also use apisof.net to quickly check whether a given API will be included with .NET Standard 2.1.

.NET platform support

In case you missed our Update on .NET Core 3.0 and .NET Framework 4.8, we’ve described our support for .NET Framework and .NET Core as follows:

.NET Framework is the implementation of .NET that’s installed on over one billion machines and thus needs to remain as compatible as possible. Because of this, it moves at a slower pace than .NET Core. Even security and bug fixes can cause breaks in applications because applications depend on the previous behavior. We will make sure that .NET Framework always supports the latest networking protocols, security standards, and Windows features.

.NET Core is the open source, cross-platform, and fast-moving version of .NET. Because of its side-by-side nature it can take changes that we can’t risk applying back to .NET Framework. This means that .NET Core will get new APIs and language features over time that .NET Framework cannot. At Build we showed a demo how the file APIs are faster on .NET Core. If we put those same changes into .NET Framework we could break existing applications, and we don’t want to do that.

Given many of the API additions in .NET Standard 2.1 require runtime changes in order to be meaningful, .NET Framework 4.8 will remain on .NET Standard 2.0 rather than implement .NET Standard 2.1. .NET Core 3.0 as well as upcoming versions of Xamarin, Mono, and Unity will be updated to implement .NET Standard 2.1.

Library authors who need to support .NET Framework customers should stay on .NET Standard 2.0. In fact, most libraries should be able to stay on .NET Standard 2.0, as the API additions are largely for advanced scenarios. However, this doesn’t mean that library authors cannot take advantage of these APIs even if they have to support .NET Framework. In those cases they can use multi-targeting to compile for both .NET Standard 2.0 as well as .NET Standard 2.1. This allows writing code that can expose more features or provide a more efficient implementation on runtimes that support .NET Standard 2.1 while not giving up on the bigger reach that .NET Standard 2.0 offers.

For more recommendations on targeting, check out the brand new documentation on cross-platform targeting.

Governance model

The .NET Standard 1.x and 2.0 releases focused on exposing existing concepts. The bulk of the work was on the .NET Core side, as this platform started with a much smaller API set. Moving forward, we’ll often have to standardize brand-new technologies, which means we need to consider the impact on all .NET implementations, not just .NET Core, and including those managed in other communities such as Mono or Unity. Our governance model has been updated to best include all considerations, including:

A .NET Standard review board. To ensure we don’t end up adding large chunks of API surface that cannot be implemented, a review board will sign-off on API additions to the .NET Standard. The board comprises representatives from .NET platform, Xamarin and Mono, Unity and the .NET Foundation and will be chaired by Miguel de Icaza. We will continue to strive to make decisions based on consensus and will leverage Miguel’s extensive expertise and experience building .NET implementations that are supported by multiple parties when needed.

A formal approval process. The .NET Standard 1.x and 2.0 version were largely mechanically derived by computing which APIs existing .NET implementations had in common, which means the API sets were effectively a computational outcome. Moving forward, we are implementing an editorial approach:

  • Anyone can submit proposals for API additions to the .NET Standard.
  • New members on standardized types are automatically considered. To prevent accidental fragmentation, we’ll automatically consider all members added by any .NET implementation on types that are already in the standard. The rationale here is that divergence at that the member level is not desirable and unless there is something wrong with the API it’s likely a good addition.
  • Acceptance requires:
    • A sponsorship from a review board member. That person will be assigned the issue and is expected to shepherd the issue until it’s either accepted or rejected. If no board member is willing to sponsor the proposal, it will be considered rejected.
    • A stable implementation in at least one .NET implementation. The implementation must be licensed under an open source license that is compatible with MIT. This will allow other .NET implementations to jump- start their own implementations or simply take the feature as-is.
  • .NET Standard updates are planned and will generally follow a set of themes. We avoid releases with a large number of tiny features that aren’t part of a common set of scenarios. Instead, we try to define a set of goals that describe what kind of feature areas a particular .NET Standard version provides. This simplifies answering the question which .NET Standard a given library should depend on. It also makes it easier for .NET implementations to decide whether it’s worth implementing a higher version of .NET Standard.
  • The version number is subject to discussion and is generally a function of how significant the new version is. While we aren’t planning on making breaking changes, we’ll rev the major version if the new version adds large chunks of APIs (like when we doubled the number of APIs in .NET Standard 2.0) or has sizable changes in the overall developer experience (like the added compatibility mode for consuming .NET Framework libraries we added in .NET Standard 2.0).

For more information, take a look at the .NET Standard governance model and the .NET Standard review board.

Summary

The definition of .NET Standard 2.1 is ongoing. You can watch our progress on GitHub and still file requests.

If you want to quickly check whether a specific API is in .NET Standard (or any other .NET platform), you can use apisof.net. You can also use the .NET Portability Analyzer to check whether an existing project or binary can be ported to .NET Standard 2.1.

Happy coding!


          Protecting what we love about the internet: our efforts to stop online piracy      Cache   Translate Page      

The internet has enabled people worldwide to connect, create and distribute new works of art like never before. A key part of preserving this creative economy is ensuring creators and artists have a way to share and make money from their content—and preventing the flow of money to those who seek to pirate that content. Today, we're releasing our latest update on those efforts..

Our 2018 "How Google Fights Piracy" report explains the programs, policies, and technology we put in place to combat piracy online and ensure continued opportunities for creators around the world.

We invest significantly in the technology, tools and resources that prevent copyright infringement on our platforms. We also work with others across the industry on efforts to combat piracy. These efforts appear to be having an effect: around the world, online piracy has been decreasing, while spending on legitimate content is rising across content categories.

Here are a few of our findings from this year's Piracy report:

  • $3 billion+:The amount YouTube has paid to rights holders who have monetized use of their content in other videos through Content ID, our industry-leading rights management tool.
  • $100 million+: The amount we’ve invested in building Content ID, including staffing and computing resources.
  • $1.8 billion+:The amount YouTube paid to the music industry from October 2017 to September 2018 in advertising revenue alone
  • 3 billion+:The number of URLs that were removed from Search for infringing copyright since launching a submission tool for copyright owners and their agents.
  • 10 million+:The number of ads that were disapproved by Google in 2017 that were suspected of copyright infringement or that linked to infringing sites.

As we continue our work in the years ahead, five principles guide our substantial investments in fighting piracy:

Create more and better legitimate alternatives: Piracy often arises when it's difficult for consumers to access legitimate content. By developing products that make it easy for users to access legitimate content, like Google Play Music and YouTube, Google helps drive revenue for creative industries and give consumers choice.

Follow the money: As the vast majority of sites dedicated to online piracy are doing so to make money, one way to combat them is to cut off their supply. We prevent actors that engage in copyright infringement from using our ads and monetization systems and we enforce these policies rigorously.

Be efficient, effective, and scalable: We strive to implement anti-piracy solutions that work at scale. For example, as early as 2010, we began making substantial investments in streamlining the copyright removal process for search results. As a result, these improved procedures allow us to process copyright removal requests for search results at the rate of millions per week.

Guard against abuse: Some actors will make false copyright infringement claims in order to have content they don't want online taken down. We’re committed to detecting and rejecting bogus infringement allegations, such as removals for political or competitive reasons.

Provide transparency: We’re committed to providing transparency. In our Transparency Report, we disclose the number of requests we receive from copyright owners and governments to remove information from our services.

Today, our services are generating more revenue for creators and rights holders, connecting more people with the content they love, and doing more to fight back against online piracy than ever before. We’re proud of the progress this report represents. Through continued innovation and partnership, we’re committed to curtailing infringement by bad actors while empowering the creative communities who make many of the things we love about the internet today.


          Comment on In India, Initially Who Implemented Traffic System? by Anonymous      Cache   Translate Page      
Since 2006, biosimilar medicines contain generated more than 400 million passive days of clinical experience. With ActivStyle's monogrammed rite, you can throw away more organize caring representing your loved one and less anon a punctually worrying take their medical supplies. Much and many children are overweight, likewise [url=https://www.webicosoft.com/advantage/discussion-38/exploration-1/index.php]discount 2.5 ml xalatan fast delivery[/url]. The two-dimensional construct of this formulationsubsequently is applied to the tender knee joint to examine the conditioned by energetic agitation between thefemur and tibia as ok as the ligament and association forces developed in the joint. From thearea of computer engineering, this feedback can be conceptualized in termsdescribed as frizzy feedback. And, evidently, it totality [url=https://www.webicosoft.com/advantage/discussion-38/exploration-5/index.php]order ketoconazole cream 15 gm online[/url]. Thither are herbal remedies that are reportedly safe in causation death. Of direction whatever substance somaesthesia should be addressed in a artefact that doesn't count upon opiates, and this power concern running with a fittingness trainer, nutritionist, hypnotherapist, acupuncturist, and early professionals. personal eudaemonia organizers [url=https://www.webicosoft.com/advantage/discussion-38/exploration-9/index.php]buy citalopram 10 mg amex[/url]. Scientists mark that bacteria helped shape and metamorphosis the infantile planet's situation, done creating atmospheric oxygen that enabled other, more complex soul forms to develop. Enterotoxigenic stains were solitary from 91 cases of diarrhoea ad from 29 supervise cases. I-ness today lone resides in those living me [url=https://www.webicosoft.com/advantage/discussion-38/exploration-6/index.php]600 mg motrin amex[/url]. Deficiency to hold on this again results in injuries of the lower cervical backbone being missed. Practical electrical stimulation Following spinal rope mischief, tone down motor neurone pathways may endure sound and be enduring the budding to be electrically stimulated. half the assignment against corpulency is realised [url=https://www.webicosoft.com/advantage/discussion-38/exploration-10/index.php]buy atorlip-10 10 mg on line[/url]. J'ai pris un outfit alimentaire, le fameux 5-HTP carcanet 3 semaines mais apres lecture de votre article, j'ai fasten d'arreter la prise. The Biosimilar Medicines Club is a sector corps of Medicines into Europe, representing the primary companies developing, manufacturing and marketing biosimilar medicines across Europe. Thither are some explore writing on the benefits of mangosteen [url=https://www.webicosoft.com/advantage/discussion-38/exploration-7/index.php]discount bactroban 5gm without a prescription[/url]. Prices owing such computing clouds are ordinarily dependent on the part, the operating system, and the following resources: CPU power, celebration dimensions, storage mass, or data transfer. In reference to this result, genetic epileptic syn- dromes are secondary to mutations produced predominantly on ion channels, which are, in uncountable cases, the constant ion channels targeted by most AEDs (Kwan et al. O cleansers do not impact these "healthy" bacterium [url=https://www.webicosoft.com/advantage/discussion-38/exploration-8/index.php]order 250mg tetracycline with mastercard[/url]. The 3-year-old exhibits telegraphic song, using small sentences that accommodate solely the essential information. Leukocytes, owing case, were intelligence to penetrate the CNS at best when there was an infection in the capacity and only because the BBB had weakened down. Tell no to caffein [url=https://www.webicosoft.com/advantage/discussion-38/exploration-2/index.php]500 mg ampicillin otc[/url]. e. When soul that carries H pylori alo drinks inebriant and coffee, and smokes, the substances privileged these products revive the ingestion of the membrane. What around [url=https://www.webicosoft.com/advantage/discussion-38/exploration-3/index.php]cheap 25mg benadryl with amex[/url]. It may then be applicable to tool a ?nite-element model of a undiminished fallible at a cellular au fait with. Muse on this information is entirely representing your personal say, so be honest with yourself. The body's have systems are not ample [url=https://www.webicosoft.com/advantage/discussion-38/exploration-4/index.php]generic requip 2mg visa[/url].
          Los Alamos pursues efficient computing with Cray, Marvell, and Arm      Cache   Translate Page      
(DOE/Los Alamos National Laboratory) In a drive to significantly boost usable operations per watt, per dollar and per development hour for extreme-scale computing, Los Alamos National Laboratory is running classified simulation codes in support of the National Nuclear Security Administration's Stockpile Stewardship Program on the new Cray ® XC50 ™ system with Marvell ® ThunderX2 ® processors. (Source: EurekAlert! - Social and Behavioral Science)
          Senior Software Development Engineer - Distributed Computing Services (Hex) - Amazon.com - Seattle, WA      Cache   Translate Page      
Knowledge and experience with machine learning technologies. We enable Amazon’s internal developers to improve time-to-market by allowing them to simply launch...
From Amazon.com - Thu, 26 Jul 2018 19:20:25 GMT - View all Seattle, WA jobs
          Gartner: Immersive Experiences Among Top Tech Trends for 2019      Cache   Translate Page      
By Dian Schaffhauser, Campus Technology IT analyst firm Gartner has named its top 10 trends for 2019, and the “immersive user experience” is on the list, alongside blockchain, quantum computing and seven other drivers influencing how we interact with the world. The annual trend list covers breakout tech with broad impact and tech that could […]
          Background Extraction Based on Joint Gaussian Conditional Random Fields      Cache   Translate Page      
Background extraction is generally the first step in many computer vision and augmented reality applications. Most existing methods, which assume the existence of a clean background during the reconstruction period, are not suitable for video sequences such as highway traffic surveillance videos, whose complex foreground movements may not meet the assumption of a clean background. Therefore, we propose a novel joint Gaussian conditional random field (JGCRF) background extraction algorithm for estimating the optimal weights of frame composition for a fixed-view video sequence. A maximum a posteriori problem is formulated to describe the intra- and inter-frame relationships among all pixels of all frames based on their contrast distinctness and spatial and temporal coherence. Because all background objects and elements are assumed to be static, patches that are motionless are good candidates for the background. Therefore, in the algorithm method, a motionless extractor is designed by computing the pixel-wise differences between two consecutive frames and thresholding the accumulation of variation across the frames to remove possible moving patches. The proposed JGCRF framework can flexibly link extracted motionless patches with desired fusion weights as extra observable random variables to constrain the optimization process for more consistent and robust background extraction. The results of quantitative and qualitative experiments demonstrated the effectiveness and robustness of the proposed algorithm compared with several state-of-the-art algorithms; the proposed algorithm also produced fewer artifacts and had a lower computational cost.
          Senior Software Developer - Anyon Systems - Québec City, QC      Cache   Translate Page      
Anyon Systems is a quantum computing company located in the Greater Montreal Area. We work at the cutting edge of technology to develop and commercialize...
From GlassDoor - Thu, 25 Oct 2018 22:41:02 GMT - View all Québec City, QC jobs
          Full Stack Developer - Anyon Systems - Québec City, QC      Cache   Translate Page      
Anyon Systems is a quantum computing company located in the Greater Montreal Region. We work at the cutting edge of technology to develop and commercialize...
From GlassDoor - Thu, 18 Oct 2018 10:21:57 GMT - View all Québec City, QC jobs
          EEE, Openwashing and Surveillance as Linux Foundation 'Thing'      Cache   Translate Page      

read more


          Salesforce Senior Engagement Manager, Director - Silverline Jobs - Casper, WY      Cache   Translate Page      
Silverline is a Salesforce Platinum Cloud Alliance Partner focused on delivering robust business solutions leveraging cloud-computing platforms....
From Silverline Jobs - Fri, 28 Sep 2018 06:19:27 GMT - View all Casper, WY jobs
          Salesforce Senior Engagement Manager, Director - Silverline Jobs - Cheyenne, WY      Cache   Translate Page      
Silverline is a Salesforce Platinum Cloud Alliance Partner focused on delivering robust business solutions leveraging cloud-computing platforms....
From Silverline Jobs - Fri, 28 Sep 2018 06:19:27 GMT - View all Cheyenne, WY jobs
          Fastest Analytics Using Hybrid Architectures with Machine Learning      Cache   Translate Page      

Click to learn more about author Henry Bequet. Every year scientists and researchers gather at a conference called Super Computing, or SC, to exchange their views, solutions and problems in computational science. At SC17, there were no fewer than 22 presentations and keynotes involving Machine Learning and Deep Learning (DL). There were actually many more presentations about […]

The post Fastest Analytics Using Hybrid Architectures with Machine Learning appeared first on DATAVERSITY.


          VoiceBase Extends Deep Learning Neural Network Compute to Verne Global      Cache   Translate Page      

A recent press release reports, “Verne Global, a provider of advanced data center solutions for high performance computing (HPC), today announced that VoiceBase, the leading provider of speech analytics for the cloud, is utilizing its HPC-optimized bare-metal infrastructure – hpcDIRECT – to accelerate the development of new artificial intelligence (AI) powered voice analytics services. California-based […]

The post VoiceBase Extends Deep Learning Neural Network Compute to Verne Global appeared first on DATAVERSITY.


          How to Make Connected Manufacturing a Reality - IndustryWeek      Cache   Translate Page      

IndustryWeek

How to Make Connected Manufacturing a Reality
IndustryWeek
No matter how well your manufacturing business is performing, it can always perform better. If you want to keep up with emerging trends such as shop floor automation, additive manufacturing, and the Industrial Internet of Things (IIoT), you'll need to ...


          Senior Financial Analyst at The Candel Company Limited      Cache   Translate Page      
The Candel Company Limited was incorporated on the 10th of September, 1992 as a Private Limited Liability Company to develop and carry on the production, marketing and distribution of agrochemicals, specialized fertilizers, seeds and allied products in Nigeria.We are recruiting to fill the vacant position below:Job Title: Senior Financial AnalystLocation:&nbsp;LagosJob Function: Finance, AdministrationReports To: Finance ManagerEmployment Type: Full TimeArea of ResponsibilitiesPerform bank reconciliationsAssist in writing bank letters and drafts:Assist in monitoring the utilization of LC linePrepares of various financial statements and reports.Assist in opening up of LC&#39;sComputing and re-computing of finance charges and bank interests for our financing banksCoordinates preparation of external audit materials and external financial reporting.Reviews financial statements with management personnel.Monitor payments of import duties, NAFDAC charges, shipping company bills &amp; terminal charges.Assist in cost reduction initiativesVAT ManagementCarry out other duties as may be assigned to you by your supervisor.&nbsp;

Apply at https://ngcareers.com/job/2018-11/senior-financial-analyst-at-the-candel-company-limited-393/


          Shell Scripting      Cache   Translate Page      
Campus: 
Lowell
Format: 
Online
Level: 
Undergraduate
Subject: 
Computing
Information Technology
Number: 
INFO.3120-061
Semester: 
Spring 2019
Registration Status: 
Open
Registration: 
Monday, November 5, 2018 to Monday, January 28, 2019

          Dept Chair/Head - Industrial Engineering - Clemson University - Freeman, SD      Cache   Translate Page      
The Department of Industrial Engineering, in the College of Engineering, Computing and Applied Sciences at Clemson University, is seeking applicants for its...
From Clemson University - Thu, 04 Oct 2018 20:09:51 GMT - View all Freeman, SD jobs
          Comment on John Gruber reviews Apple’s new MacBook Air: ‘It’s pretty damn sweet’ by spyintheskyuk      Cache   Translate Page      
Well that has never been Apple so why are you with them now based on that product preference. Anyway the way things are going I suspect that in time Apple won't be the last to jump ship on Intel for at the rate things are going it would be like staying with the horse and cart as the world turned to the motor car, unless Intel can achieve a turn around that they have patently failed to achieve this century. Most computing does not need Intel and it's very possible the bit that presently does will be one an unsustainable rump in a gorse enable future.
          IT-Trends für CIOs: Gartner nennt 7 disruptive Trends      Cache   Translate Page      

          3D Artist - OVA - Québec City, QC      Cache   Translate Page      
Substance Designer, Substance Painter, Photoshop, etc .; As Canadian leaders in the international immersive and spatial computing space, OVA and StellarX...
From Indeed - Tue, 16 Oct 2018 16:18:33 GMT - View all Québec City, QC jobs
          HPE delivers first above-the-cloud supercomputing services for astronauts to advance space exploration      Cache   Translate Page      

The Spaceborne Computer will open high performance capabilities to space explorers aboard the International Space Station Hewlett Packard Enterprise (HPE)  today announced it is opening high-performance computing (HPC) capabilities to astronauts on the International Space Station (ISS) as part of its continued experiments on the Spaceborne Computer project.  Spaceborne Computer is the first commercial off-the-shelf (COTS) supercomputer that HPE and NASA launched into space for a  one-ye...

Read the full story at https://www.webwire.com/ViewPressRel.asp?aId=230980


          Mentor Graphics HPC Application Development Environment Now Available for AMD EPYC™ and Ryzen™ CPUs and AMD Radeon Instinct™ GPUs      Cache   Translate Page      

AMD  (NASDAQ: AMD) today announced the availability of the  Mentor Graphics®  Sourcery™ CodeBench Lite Edition development environment for AMD EPYC™ and Ryzen™ CPUs and AMD Radeon Instinct™ GPUs. The Sourcery CodeBench Lite Edition is a no cost, complete C/C++ and Fortran development environment for scientific and high performance computing (HPC) applications. Designed for complex multicore heterogeneous architectures, it allows AMD Radeon Instinct™ GPUs to be targeted for execution usin...

Read the full story at https://www.webwire.com/ViewPressRel.asp?aId=230965


          A dark consensus about screens and kids begins to emerge in Silicon Valley      Cache   Translate Page      
The people who are closest to a thing are often the most wary of it. Technologists know how phones really work, and many have decided they don’t want their own children anywhere near them. A wariness that has been slowly brewing is turning into a regional consensus: The benefits of screens as a learning tool are overblown, and the risks for addiction and stunting development seem high. The debate in Silicon Valley now is about how much exposure to phones is OK. “Doing no screen time is almost easier than doing a little,” said Kristin Stecher, a former social computing researcher married to a Facebook engineer. “If my kids do get it at all, they just want it more.
          DataArt IoT trends and predictions for 2019: IoT goes mainstream      Cache   Translate Page      

The Internet of Things, once a niche technology for startups, is now a technology that multimillion corporations are built on. IoT has already changed the way we live and 2019 promises to be a significantly transformative year. IoT Practice experts at global technology consultancy DataArt predict that the following trends will dominate the IoT landscape in the year ahead: Edge computing: - Devices will become more and more powerful enabling local data processing and AI capabilities. It...

Read the full story at https://www.webwire.com/ViewPressRel.asp?aId=230940


          Associate Faculty in Informatics, Data Mining and Data Analytics      Cache   Translate Page      
IN-Indianapolis, The Department of Human-Centered Computing, School of Informatics and Computing, seeks one Associate Faculty to teach one or more sections of the INFO-I421 Applications of Data Mining course. This undergraduate course is offered in the fall and spring semesters. Depending on the enrollment, we also may offer the course during summer sessions. Course Description The course explores the use of data
          VMware’s New In-Product Support Experience – Help At Your Fingertips      Cache   Translate Page      

VMware is committed to re-imagining the support experience for our customers. VMware is trusted to run the digital foundation of over 500,000 customers globally. Technology innovation and cloud computing are reshaping customers’ expectations and transforming almost every sector of every industry. Today’s businesses are dependent on a digital infrastructure and when something goes wrong, customers

The post VMware’s New In-Product Support Experience – Help At Your Fingertips appeared first on VMware Support Insider.


          Associate Faculty in Cloud Computing and Service-oriented Web Applications      Cache   Translate Page      
IN-Indianapolis, The Department of Human-Centered Computing, School of Informatics and Computing at IUPUI, seeks an Associate Faculty to teach the INFO I425 Web Services in Information Systems course. This undergraduate course is offered in the fall and spring semesters. Depending on the enrollment, we also may offer the course during summer sessions. Course Description This course examines how cloud computing and
          Computing Convergence at the Edge – Intel Chip Chat Network Insights – Episode 169      Cache   Translate Page      
Intel Chip Chat – Network Insights audio podcast with Allyson Klein: Mory Lin, Director, Embedded System Product for Supermicro joins us in this archive of a livecast from Intel network Builders Summit in conjunction with SDN/NFV World Congress to discuss the Supermicro announcement of an Intel Select Solution for uCPE (universal customer premises equipment) which [...]
          System Engineer - AI Services - Amazon.com - Seattle, WA      Cache   Translate Page      
The Amazon Web Services team is innovating new ways of building massively scalable distributed systems and delivering the next generation of cloud computing...
From Amazon.com - Sat, 03 Nov 2018 01:21:44 GMT - View all Seattle, WA jobs
          Wed, 7 Nov 10:00am - Computer Access/Help      Cache   Translate Page      
Net Axs - based in the Citizens Advice Bureau, Thurso, our friendly staff are there to help you with your basic computing needs, whether signing on-line, accessing websites or simply using a computer. No need to book, just pop in!. ...
          Senior Systems Engineer - AI Services - Amazon.com - Seattle, WA      Cache   Translate Page      
The Amazon Web Services team is innovating new ways of building massively scalable distributed systems and delivering the next generation of cloud computing...
From Amazon.com - Sun, 15 Jul 2018 20:48:54 GMT - View all Seattle, WA jobs
          AMD Radeon Instinct MI50 and MI60 bring 7-nm GPUs to the data center      Cache   Translate Page      

Alongside a preview of its first 7-nm Epyc CPUs built with the Zen 2 microarchitecture, AMD debuted its first 7-nm data-center graphics-processing units today. The Radeon Instinct MI50 and Radeon Instinct MI60 take advantage of a new 7-nm GPU built with the Vega architecture to crunch through tomorrow's high-performance computing, deep learning, cloud computing, and virtualized desktop applications.

...

Read more...


          Saxophone Day Shortbread      Cache   Translate Page      
I knew there'd be an image of someone playing one under a bridge.
PC hardware and computing

Steelseries Rival 650 Wireless and Rival 710 Gaming mouse review @ PC Perspective
be quiet! Silent Base 601 case review @ Gamers Nexus
Asus ROG Strix B450-I Gaming motherboard review @ HardOCP
Deepcool Fryzen Threadripper cooler review @ Hexus
Corsair SF600 Platinum review @ JonnyGuru
Das Keyboard 5Q review @ TechPowerUp
Intel Xeon E Six-Core review: E-2186G, E-2176G, E-2146G, and E-2136 tested @ AnandTech
The best entry level gaming CPU: Athlon 200GE vs. Pentium G5400 vs. Ryzen 3 2200G @ TechSpot
Games, culture, and VR

Read more...


          Updated: Cascade Lake-AP Xeon CPUs embrace the multi-chip module      Cache   Translate Page      

After taking a little over a year to think on it, Intel appears to have decided that glue can be pretty Epyc after all. The company teased plans for a new Xeon platform called Cascade Lake Advanced Performance, or Cascade Lake-AP, this morning ahead of the Supercomputing 2018 conference. This next-gen platform doubles the cores per socket from an Intel system by joining a number of Cascade Lake Xeon dies together on a single package with the blue team's Ultra Path Interconnect, or UPI. Intel will allow Cascade Lake-AP servers to employ up to two-socket (2S) topologies, for as many as 96 cores per server.

...

Read more...


          Senior Information Security Consultant - Network Computing Architects, Inc. - Bellevue, WA      Cache   Translate Page      
With the ability to interface and communicate at the executive level, i.e. CIO's, CTO's and Chief Architects....
From Network Computing Architects, Inc. - Wed, 10 Oct 2018 05:21:36 GMT - View all Bellevue, WA jobs
          Mastering VMware vSphere 6.7      Cache   Translate Page      

 
Master your virtual environment with the ultimate vSphere guide

Mastering VMware vSphere 6.7 is the fully updated edition of the bestselling guide to VMware's virtualization solution. With comprehensive coverage of this industry-leading toolset, this book acts as an informative guide and valuable reference. Step-by-step instruction walks you through installation, configuration, operation, security processes, and much more as you conquer the management



Read More...

          Excel Formulas & Functions For Dummies, 5th Edition      Cache   Translate Page      

 

Put the power of Excel functions to work in your formulas

There are more than 400 built-in functions in Excel 2019, from AGGREGATE to Z.TEST. The question is which ones will make your work easier? How and why should you use a particular function in your formulas? Excel Formulas and Functions For Dummiesoffers thorough but easy-to-read coverage of powerful Excel functions.

With this book, you’ll learn to apply the power of Excel functions and formulas



Read More...

          macOS Mojave For Dummies      Cache   Translate Page      

 

Pro tips for macOS from “Dr. Mac”

Your shiny new iMac or trusty old MacBook both rely on macOS to help you get things done. It helps to have an equally reliable guidebook to steer you through the tasks and steps that make macOS run efficiently.

This fun and friendly guide provides the direction you need to easily navigate macOS. Longtime expert Bob "Dr. Mac" LeVitus shares his years of experience to help you better understand macOS and make it a timesaving



Read More...

          QuickBooks 2019 For Dummies      Cache   Translate Page      

 

The bestselling guide to QuickBooks—now in a new edition

QuickBooks 2019 For Dummies is here to make it easier than ever to familiarize yourself with the latest version of the software. It shows you step by step how to build the perfect budget, simplify tax return preparation, manage inventory, track job costs, generate income statements and financial reports, and every other accounting-related task that crosses your desk at work.  



Read More...

          Office 2019 For Seniors For Dummies      Cache   Translate Page      

 

Make sense of Office 2019   

Just like using a computer for the first time, learning Microsoft Office applications can be confusing and intimidating at any age. Office 2019 For Seniors For Dummies helps seniors get up to speed quickly with clear-cut, easy-to-read-and-understand steps on how to get the most out of Microsoft Word, Excel, PowerPoint, and Outlook.    

The book assumes no prior information and starts with showing how to start each application



Read More...

          Beyond Artificial Intelligence: From Human Consciousness to Artificial Consciousness      Cache   Translate Page      

 

This book will present a complete modeling of the human psychic system that allows to generate the thoughts in a strictly organizational approach that mixes a rising and falling approach. The model will present the architecture of the psychic system that can generate sensations and thoughts, showing how one can feel thoughts.

The model developed into an organizational architecture based on massive multiagent systems. The architecture will be fully



Read More...

          Excel VBA Programming For Dummies, 5th Edition      Cache   Translate Page      

 

Take your Excel programming skills to the next level

To take Excel to the next level, you need to understand and implement the power of Visual Basic for Applications (VBA). Excel VBA Programming For Dummies introduces you to a wide array of new Excel options, beginning with the most important tools and operations for the Visual Basic Editor.

Inside, you’ll find an overview of the essential elements and concepts for programming with Excel. In no time



Read More...

          Reviving Wallpaper Collection Downloads      Cache   Translate Page      
Most everyone loves to customize their computing devices so I am starting to add more wallpaper collections to the site to expand on the current selection of packages. This post catches up with the latest additions in the past week and moving forward I will highlight each new package when I post them.
          Los Alamos pursues efficient computing with Cray, Marvell, and Arm      Cache   Translate Page      
(DOE/Los Alamos National Laboratory) In a drive to significantly boost usable operations per watt, per dollar and per development hour for extreme-scale computing, Los Alamos National Laboratory is running classified simulation codes in support of the National Nuclear Security Administration's Stockpile Stewardship Program on the new Cray® XC50™ system with Marvell® ThunderX2® processors.
          Protecting what we love about the internet: our efforts to stop online piracy      Cache   Translate Page      

The internet has enabled people worldwide to connect, create and distribute new works of art like never before. A key part of preserving this creative economy is ensuring creators and artists have a way to share and make money from their content—and preventing the flow of money to those who seek to pirate that content. Today, we're releasing our latest update on those efforts..

Our 2018 "How Google Fights Piracy" report explains the programs, policies, and technology we put in place to combat piracy online and ensure continued opportunities for creators around the world.

We invest significantly in the technology, tools and resources that prevent copyright infringement on our platforms. We also work with others across the industry on efforts to combat piracy. These efforts appear to be having an effect: around the world, online piracy has been decreasing, while spending on legitimate content is rising across content categories.

Here are a few of our findings from this year's Piracy report:

  • $3 billion+:The amount YouTube has paid to rights holders who have monetized use of their content in other videos through Content ID, our industry-leading rights management tool.
  • $100 million+: The amount we’ve invested in building Content ID, including staffing and computing resources.
  • $1.8 billion+:The amount YouTube paid to the music industry from October 2017 to September 2018 in advertising revenue alone
  • 3 billion+:The number of URLs that were removed from Search for infringing copyright since launching a submission tool for copyright owners and their agents.
  • 10 million+:The number of ads that were disapproved by Google in 2017 that were suspected of copyright infringement or that linked to infringing sites.

As we continue our work in the years ahead, five principles guide our substantial investments in fighting piracy:

Create more and better legitimate alternatives: Piracy often arises when it's difficult for consumers to access legitimate content. By developing products that make it easy for users to access legitimate content, like Google Play Music and YouTube, Google helps drive revenue for creative industries and give consumers choice.

Follow the money: As the vast majority of sites dedicated to online piracy are doing so to make money, one way to combat them is to cut off their supply. We prevent actors that engage in copyright infringement from using our ads and monetization systems and we enforce these policies rigorously.

Be efficient, effective, and scalable: We strive to implement anti-piracy solutions that work at scale. For example, as early as 2010, we began making substantial investments in streamlining the copyright removal process for search results. As a result, these improved procedures allow us to process copyright removal requests for search results at the rate of millions per week.

Guard against abuse: Some actors will make false copyright infringement claims in order to have content they don't want online taken down. We’re committed to detecting and rejecting bogus infringement allegations, such as removals for political or competitive reasons.

Provide transparency: We’re committed to providing transparency. In our Transparency Report, we disclose the number of requests we receive from copyright owners and governments to remove information from our services.

Today, our services are generating more revenue for creators and rights holders, connecting more people with the content they love, and doing more to fight back against online piracy than ever before. We’re proud of the progress this report represents. Through continued innovation and partnership, we’re committed to curtailing infringement by bad actors while empowering the creative communities who make many of the things we love about the internet today.


          Weak self-scrambling SSDs opens up Windows BitLocker      Cache   Translate Page      
Crucial MX300 Adding software encryption recommended to boost BitLocker security.

Users whose believe the data on their drives are protected with Microsoft's Windows Bitlocker could be in for lengthy workarounds, after researchers showed that the default hardware-based encryption on solid state storage isn't secure.

Carlo Meijer and Bernard van Gastel of Radboud University, Netherlands, detailed in their paper [pdf] how techniques known to be used by the US National Security Agency (NSA) can get around encryption that looks strong and impenetrable on paper.

This is a problem for Bitlocker which defaults to hardware encryption on SSDs as per the Trusting Computing Group Opal Self Encrypting Drive (SED) specification.

Bitlocker can be coaxed into using software encryption with the Windows Group Policy tool, if users have admin rights on the computers in question.

However, on Bitlocked drives that are already using the default hardware encryption, changing Group Policy settings has no effect.

"Only an entirely new installation, including setting the Group Policy correctly and securely erasing the internal drive, enforces software encryption," the researchers noted.

As a workaround to boost Bitlocker security, the researchers suggested using an open source utility such as VeraCrypt along with the SSD hardware encryption.

Using different techniques such as Joint Test Action Group (JTAG) industry standard debugging ports, and modified firmware or password validation, the researchers found that they could bypass full disk encryption on the following solid-state drives:

  • Crucial MX100
  • Crucial MX200
  • Crucial MX300
  • Samsung 840 EVO
  • Samsung 850 EVO
  • Samsung T3
  • Samsung T5

Crucial and Samsung were given six months by the researchers to issue fixed firmware for the SSDs; while the former company updated all three models, Samsung only issued new firmware for the T3 and T5, and recommends software encryption for the 840 and 850 EVO drives.

With improved cryptographic hardware in modern processors the main reason for using only the built-in encryption feature in SSDs - improved performance - no longer applies, the researchers said.

Instead, they suggested a combination of the two for users to keep their data on SSDs secure.

"One should not rely solely on hardware encryption as offered by SSDs for confidentiality," they said.

"We recommend users that depend on hardware encryption implemented in SSDs to employ also a software full-disk encryption solution, preferably an open-source and audited one.

Got a news tip for our journalists? Share it with us anonymously here.

          cloud readiness assessment framework      Cache   Translate Page      
cloud readiness assessment framework the idea to develop cloud computing framework to test the organization readiness for cloud so we have to make the framework based on factors and issues that affect... (Budget: $250 - $750 USD, Jobs: Cisco, Cloud Computing, Computer Security, Research Writing, Technical Writing)
          cloud readiness assessment framework      Cache   Translate Page      
cloud readiness assessment framework the idea to develop cloud computing framework to test the organization readiness for cloud so we have to make the framework based on factors and issues that affect... (Budget: $250 - $750 USD, Jobs: Cisco, Cloud Computing, Computer Security, Research Writing, Technical Writing)
          Compartmentalized computing with CLIP OS      Cache   Translate Page      
Comments
           Fitting weibull ACD models to high frequency transactions data: A semi-parametric approach based on estimating functions       Cache   Translate Page      
Ng, K.H. and Allen, D. and Peiris, S. (2009) Fitting weibull ACD models to high frequency transactions data: A semi-parametric approach based on estimating functions. In: 15th International Conference on Computing in Economics and Finance, 15-17 July 2009, Sydney, Australia. (Submitted)
          Tech Roundup - 6th November 2018      Cache   Translate Page      
Stuff collated since Tech Roundup - 23rd September 2018. With headings:
Cisco (FlexPod), CompTIA (and Cybersecurity), Flackbox, Industry Commentary, Microsoft, NetApp, Veeam, VMware

Cisco (FlexPod)

FlexPod Datacenter with Cisco ACI Multi-Pod, NetApp MetroCluster IP, and VMware vSphere 6.7 Design Guide

FlexPod Datacenter with Cisco ACI Multi-Pod, NetApp MetroCluster IP, and VMware vSphere 6.7 Deployment Guide

CompTIA (and Cybersecurity)

Cool Jobs: Using Cybersecurity to Protect Nuclear Power Plants

Cybersecurity Careers: Learn More About Penetration Testing

Cybersecurity Certificates, Certifications and Degrees: How to Choose

CASP vs. CISSP: 4 Advantages of CompTIA’s Advanced Cybersecurity Certification

Flackbox

List of VSA Virtual Storage Appliances and SAN Storage Simulators

Industry Commentary

Six Reasons for Multi-Cloud Computing

IBM, Red Hat and Multi-Cloud Management: What It Means for IT Pros

Microsoft

Azure File Sync is now available to the public
*Posted on Tuesday, September 26, 2017

NetApp

General

NetApp Cloud API Documentation

Image: NetApp Cloud API Documentation

Cloud Volumes Services

NetApp Kubernetes Service Demo

Azure NetApp Files Demo

NetApp Cloud Volumes Service for AWS Demo

File Storage for AWS is Now Simpler and Faster

Discover How Data Creates Medical Breakthroughs

Transforming Medical Care With Data in the Cloud (Changing the World with Data)

DreamWorks Animation: Creating at the Speed of Imagination

Building Big Data Analytics Application on AWS with NetApp Cloud Volumes

Scaling Oracle Databases in the Cloud with NetApp Cloud Volumes

NetApp Cloud Volumes as a Persistent Storage Solution for Containers

New TRs


New NVAs (NetApp Verified Architectures)

VMware Private Cloud on NetApp HCI: NVA Design

Red Hat OpenShift Container Platform with NetApp HCI: NVA Design
Red Hat OpenShift Container Platform
The Easy Button for Delivering Better Experiences. Faster. With NetApp and Red Hat.

New Posts by Justin Parisi


New on Tech ONTAP Podcast (hosted by Justin Parisi)


New on ThePub

October 2: My Name is Rocky

New on wfaguy.com


Veeam

Veeam Backup & Replication: Quick Migration

VMware

Introducing Project Dimension

VMworld 2018: We’re Rethinking the Limits of Innovation

Taking Innovation to New and Unexpected Levels at VMworld 2018

What’s New in vSAN6.7 Update 1

What’s New in vRealize Operations 7.0

Building on the Success of Workspace ONE

Solution Brief: SD-WAN Simplified


          دانلود Dropbox v61.4.95 – فضای ابری رایگان دراپ باکس ویندوز      Cache   Translate Page      
Dropbox یک سیستم هاست فایل های تحت وب است که با استفاده از سیستم Cloud Computing و دسترسی به اینترنت به شما اجازه می‌دهد تا فایل های خود را به راحتی Share کنید. دراپ باکس به طور خودکار از پوشه‌ های شما پشتیبان‌ گیری می‌کند، که با اینکار می‌توانید از طریق دستگاه‌های دیگر به راحتی به […]
          «Ο διάβολος ζει στα κινητά μας»: Ανερχόμενοι φόβοι στη Σίλικον Βάλεϊ για τη σχέση παιδιών και οθονών      Cache   Translate Page      

Η Σίλικον Βάλεϊ σίγουρα δεν είναι ένα μέρος όπου θα περίμενε να ακούσει προβληματισμούς για την πρόοδο και εξάπλωση τεχνολογίας- ωστόσο, φαίνεται σε κάποιες περιπτώσεις αυτοί που βρίσκονται πιο κοντά σε κάτι είναι αυτοί που προβληματίζονται περισσότερο για αυτό.

Όπως αναφέρεται σε εκτενές δημοσίευμα των New York Times, είναι πολλοί αυτοί στη Σίλικον Βάλεϊ οι οποίοι εργάζονται στον κλάδο, γνωρίζοντας ακριβώς πώς λειτουργούν τα τηλέφωνα, που δεν θέλουν τα παιδιά τους να έχουν και πολλή σχέση με αυτά. Ο προβληματισμός τους είναι πως υπάρχει υπερβολή όσον αφορά στα οφέλη των οθονών ως εκπαιδευτικού εργαλείου, τη στιγμή που ο κίνδυνος εξάρτησης και αρνητικής επίδρασης στην ανάπτυξη είναι υψηλότερος από ό,τι θα έπρεπε. Οπότε, το debate στη Σίλικον Βάλεϊ αυτή τη στιγμή είναι ως προς το μέχρι ποιο σημείο η έκθεση σε τηλέφωνα είναι ασφαλής.

«Το να μην περνούν καθόλου χρόνο στην οθόνη είναι σχεδόν ευκολότερο από το να μην περνούν καθόλου» είπε η Κριστίν Στέτσερ, πρώην ερευνήτρια social computing παντρεμένη με μηχανικό του Facebook. «Αν τα παιδιά μου έχουν λίγο, απλά θέλουν περισσότερο».

Η 37χρονη Στέτσερ και ο σύζυγός της, Ρούσαμπ Ντόσι, έκαναν έρευνα πάνω στο θέμα και κατέληξαν σε ένα απλό συμπέρασμα: Δεν το θέλουν στο σπίτι τους. Οι κόρες τους, ηλικιών 5 και 3 ετών, δεν έχουν «προϋπολογισμό» χρόνου στην οθόνη, ούτε ώρες που τους επιτρέπεται να είναι μπροστά τους. Ο μόνος χρόνος που χρησιμοποιείται οθόνη είναι κατά τη διάρκεια μεγάλων ταξιδιών με το αυτοκίνητο ή το αεροπλάνο.

Κάποιοι από αυτούς που δημιουργούν προγράμματα είναι πλέον τρομαγμένοι από το πόσα είναι τα μέρη όπου ένα παιδί μπορεί πλέον να παρακολουθήσει βίντεο. Ερωτηθείς για τον περιορισμό του χρόνου που περνούν τα παιδιά μπροστά στην οθόνη, ο Χάντερ Γουόκ, venture capitalist που επί σειρά ετών εργαζόταν στο YouTube, έστειλε μια φωτογραφία «γιογιό» με ένα iPad προσαρμοσμένο πάνω τηςκαι τη σημείωση «προϊόντα που δεν αγοράσαμε». Η Αθηνά Καβάρια, που είχε εργαστεί ως executive assistant στο Facebook και πλέον δουλεύει στον φιλανθρωπικό βραχίονα του Μαρκ Ζάκερμπεργκ, το Chan Zuckerberg Initiative, είπε πως «είμαι πεπεισμένη ότι ο διάβολος ζει στα τηλέφωνά μας και καταστρέφει τα παιδιά μας». Η ίδια είπε πως δεν άφηνε τα παιδιά της να έχουν κινητά μέχρι το λύκειο, και ακόμα και τώρα απαγορεύει τη χρήση τους στο αυτοκίνητο και επιβάλλει περιορισμούς στο σπίτι. «Άλλοι γονείς ρωτούν, “δεν ανησυχείς που δεν ξέρεις πού είναι τα παιδιά σου, όταν δεν μπορείς να τα βρεις;”. Εγώ απαντώ “όχι, δεν χρειάζεται να ξέρω πού είναι κάθε δευτερόλεπτο της ημέρας».

 

 

Ο Κρις Άντερσον, που ήταν στο Wired και πλέον διευθύνων σύμβουλος εταιρείας ρομποτικής και drones και ιδρυτής του GeekDad.com, σοκαρίστηκε από το πόσο τα εργαλεία της δουλειάς του επηρέαζαν τα παιδιά του. «Σε μια κλίμακα μεταξύ γλυκών και κρακ κοκαΐνης, είναι πιο κοντά στο κρακ κοκαΐνης» λέει σχετικά για τις οθόνες. «Νομίζαμε πως μπορούσαμε να το ελέγξουμε. Είναι πέραν των δυνατοτήτων ελέγχου μας. Πηγαίνει απευθείας στα κέντρα ευχαρίστησης του αναπτυσσόμενου εγκεφάλου. Είναι πέρα από τις δυνατότητές μας ως κανονικοί γονείς να τα κατανοήσουμε» λέει σχετικά. Ο ίδιος έχει πέντε παιδιά και 12 κανόνες, μεταξύ των οποίων όχι κινητά μέχρι το καλοκαίρι πριν το λύκειο, όχι οθόνες σε υπνοδωμάτια, όχι social media μέχρι τα 13, όχι iPads κ.α. Σε περίπτωση που παραβιαστεί κάποιος κανόνας, το παιδί αποκόπτεται από το δίκτυο για 24 ώρες.

«Δεν ξέραμε τι έκαναν στο μυαλό τους, μέχρι που άρχισα να βλέπω τα συμπτώματα και τις συνέπειες...βρεθήκαμε στο χείλος της εξάρτησης, και υπήρχαν κάποια χαμένα χρόνια, για τα οποία νιώθουμε άσχημα» σημειώνει, τονίζοντας πως τα παιδιά του πήγαν σε ιδιωτικό δημοτικό σχολείο, όπου είδε τη διεύθυνση να χρησιμοποιεί iPads και «έξυπνους» πίνακες, με μόνο αποτέλεσμα τη δημιουργία χάους.

Η ιδέα πως στη Σίλικον Βάλεϊ πολλοί ανησυχούν για το τι κάνει στα παιδιά η τεχνολογία δεν είναι καινούρια. Ο Τιμ Κουκ, διευθύνων σύμβουλος της Apple, είπε νωρίτερα μέσα στο έτος πως δεν θα άφηνε τον ανιψιό του να μπει στα κοινωνικά δίκτυα, ενώ ο Μπιλ Γκέιτς απαγόρευσε στα παιδιά του τα κινητά μέχρι να μπουν στην εφηβεία (η σύζυγός του, Μελίντα, είπε πως θα ήταν καλύτερα να είχαν περιμένει λίγο ακόμα). Ακόμη, ο Στιβ Τζομπς δεν άφηνε τα παιδιά του να πλησιάζουν τα iPads. Ωστόσο, τον τελευταίο καιρό οι αντιδράσεις στη Σίλικον Βάλεϊ εντείνονται, ακόμα και στα χαμηλότερα κλιμάκια των εργαζομένων.

Ο Τζον Λίλι, venture capitalist της Σίλικον Βάλεϊ και πρώην διευθύνων σύμβουλος της Mozilla, λέει πως προσπαθεί να βοηθήσει τον 13χρονο γιο του να καταλάβει πως χειραγωγείται από αυτούς που ανέπτυξαν την τεχνολογία. «Προσπαθώ να του πω ότι κάποιος έγραψε κώδικα για να τον κάνει να νιώθει έτσι. Προσπαθώ να τον βοηθήσω να καταλάβει πώς γίνονται τα πράγματα, οι αξίες που δίνονται σε αυτά, και τι κάνουν οι άνθρωποι για να δημιουργήσουν αυτό το συναίσθημα. Και αυτός λέει απλά πως θέλει να ξοδέψει 20 δολάρια για να πάρει skins στο παιχνίδι Fortnite».


           Intel annuncia i nuovi processori Cascade Lake ad alte prestazioni e la CPU Xeon E-2100       Cache   Translate Page      
Sono stati presentati quest'oggi i nuovi processori Intel Xeon della famiglia Cascade Lake che arriveranno sul mercato entro la prima metà del 2019.
I nuovi Cascade Lake sono prodotti progettati per venire incontro alle esigenze di professionisti e aziende che acquistano macchine HPC (high-performance computing), per le elaborazioni computazionali intensive nel settore dell'intelligenza artificiale e per sostenere i carichi di lavoro in ambito IaaS (infrastructure-as-a-service).


I processori di nuova generazione utilizzeranno fino a 48 core per singola CPU e 12 canali di memoria DDR4 per socket tanto che, stando ai test condotti da Intel, le CPU in arrivo dovrebbero migliorare fino a 1,8 volte le prestazioni di uno Xeon Scalable 8180 e fino a 3,4 volte quelle di un AMD EPYC 7601.

Realizzati ricorrendo ancora una volta al processo costruttivo a 14 nm dal quale Intel ancora stenta ad allontanarsi, i Cascade Lake sfruttano un design multi-die (come peraltro già fatto da AMD nel caso dei suoi EPYC) aumentando così le prestazioni ma anche le dimensioni.

Già da oggi è invece disponibile il nuovo processore Intel Xeon E-2100, destinato ai server entry-level: caratterizzata da performance ovviamente più ridotte rispetto ai nuovi Cascade Lake, si tratta di una CPU molto più economica comunque basata sulla tecnologia SGX per la protezione in hardware dei dati e delle applicazioni dei clienti..
          Fortus 400mc Diamond Care Maintenance      Cache   Translate Page      

This is a combined synopsis/solicitation for commercial services prepared in accordance with the format in FAR subpart 12.6 as supplemented with additional information included in this notice. This announcement constitutes the only solicitation; quotes are being requested and a written solicitation will not be issued. This solicitation is being conducted under Simplified Acquisition Procedures (SAP) as a Request for Quote (RFQ).

The requirement is to provide recertification and a Diamond Care maintenance coverage plan for the Fortus 400mc 3D Production System. Service will be provided at Robins AFB and the Contractor shall provide all travel, labor, tools, materials, parts, equipment, and supervision in accordance with attached PWS dated 01 August 2018.

The proposed contract action is for services for which the Government intends to negotiate and award a five-year sole source contract to Stratasys, Inc., 7665 Commerce Way, Eden Prairie, MN 55344 (CAGE: 1GKB4). This is in accordance with Federal Acquisition Regulation (FAR) 13.106-1(b)(1)(i). 

 SMALL BUSINESS SIZE STANDARD:


•(a)   NAICS:  811212


•(b)   Dollars: $27.5 M


 
 REQUIREMENT:


 The requirement is to provide recertification and a Diamond Care maintenance coverage plan for the following Fortus 400mc 3D Production System. Service will be provided at Robins AFB and the Contractor shall provide all travel, labor, tools, materials, parts, equipment, and supervision. The contract will include a basic year with 4 option years.
 
CLIN Description:

0001:  Diamond Care Maintenance Plan for the Fortus 400mc 3D Production System. Contractor to provide all travel, labor, tools, materials, parts, equipment, and supervision. IAW attached PWS dated 1 August 2018. (FFP)
0002:  Recertification Fee (FFP)
0003:  Data (NSP) for CDRL A001, Contractor's Safety Plan, DI-SAFT-82080 IAW PWS Paragraph 3.7.1 dated 1 August 2018.
0004:  Data (NSP) for CDRl A002, Accident/Incident report, DI-SAFT-81563 NOT 1 IAW PWS Paragraph 3.7.3 dated 1 August 2018.

Option Period 1
1001:  Diamond Care Maintenance Plan for the Fortus 400mc 3D Production System. Contractor to provide all travel, labor, tools, materials, parts, equipment, and supervision. IAW attached PWS dated 1 August 2018. (FFP)
1002:  Recertification Fee (FFP)
1003:  Data (NSP) for CDRL A001, Contractor's Safety Plan, DI-SAFT-82080 IAW PWS Paragraph 3.7.1 dated 1 August 2018.
1004:  Data (NSP) for CDRl A002, Accident/Incident report, DI-SAFT-81563 NOT 1 IAW PWS Paragraph 3.7.3 dated 1 August 2018.


Option Period 2
2001:  Diamond Care Maintenance Plan for the Fortus 400mc 3D Production System. Contractor to provide all travel, labor, tools, materials, parts, equipment, and supervision. IAW attached PWS dated 1 August 2018. (FFP)
2002:  Recertification Fee (FFP)
2003:  Data (NSP) for CDRL A001, Contractor's Safety Plan, DI-SAFT-82080 IAW PWS Paragraph 3.7.1 dated 1 August 2018.
2004:  Data (NSP) for CDRl A002, Accident/Incident report, DI-SAFT-81563 NOT 1 IAW PWS Paragraph 3.7.3 dated 1 August 2018. 

Option Period 3
3001:  Diamond Care Maintenance Plan for the Fortus 400mc 3D Production System. Contractor to provide all travel, labor, tools, materials, parts, equipment, and supervision. IAW attached PWS dated 1 August 2018. (FFP)
3002:  Recertification Fee (FFP)
3003:  Data (NSP) for CDRL A001, Contractor's Safety Plan, DI-SAFT-82080 IAW PWS Paragraph 3.7.1 dated 1 August 2018.
3004:  Data (NSP) for CDRl A002, Accident/Incident report, DI-SAFT-81563 NOT 1 IAW PWS Paragraph 3.7.3 dated 1 August 2018.

Option Period 4
4001:  Diamond Care Maintenance Plan for the Fortus 400mc 3D Production System. Contractor to provide all travel, labor, tools, materials, parts, equipment, and supervision. IAW attached PWS dated 1 August 2018. (FFP)
4002:  Recertification Fee (FFP)
4003:  Data (NSP) for CDRL A001, Contractor's Safety Plan, DI-SAFT-82080 IAW PWS Paragraph 3.7.1 dated 1 August 2018.
4004:  Data (NSP) for CDRl A002, Accident/Incident report, DI-SAFT-81563 NOT 1 IAW PWS Paragraph 3.7.3 dated 1 August 2018.  



Period of Performance:
CLIN 0001-0004:  1 December 2018 - 30 November 2019
CLIN 1001-1004:  1 December 2019 - 30 November 2020
CLIN 2001-2004:  1 December 2020 - 30 November 2021
CLIN 3001-3004:  1 December 2021 - 30 November 2022
CLIN 4001-4004:  1 December 2022 - 30 November 2023

Price(s) should be FOB Destination (Robins AFB GA 30198). In addition to price and delivery, quote should include your CAGE code, DUNS number, and Taxpayer ID number.

Quotations should be emailed to Colleen Kemper (colleen.kemper@us.af.mil) no later than Friday, 9 November 2018, 2:00 pm EST. The anticipated award date is 1 December 2018. Please do not request award status prior to this date.

 


The following clauses are applicable to subject solicitation (current through FAC 2005-98 dated 31 May 2018 and DFARS Change Notice DPN 20180601):

 


FAR 52.204-7 System for Award management


FAR 52.204-13 System for Award Management Maintenance


FAR 52.204-19 Incorporation by Reference of Representations and Certifications


FAR 52.209-2 Prohibition on Contracting with Inverted Domestic Corporations--Representations


FAR 52.209-10 Prohibition on Contracting with Inverted Domestic Corporations


FAR 52.212-1 Instructions to Offerors (DEVIATION 2018-O0013)


FAR 52.212-3, Reps/Certs should be completed on-line at www.acquisition.gov


FAR 52.212-4  Contract Terms and Conditions - Commercial Items


FAR 52.217-9 Option to Extend Term of the Contract


FAR 52.222-48 Exemption from Application of the Service Contract Labor Standards to Contracts for Maintenance, Calibration, or Repair of Certain equipment-Certification (Services exempt from SCLS)


FAR 52.223-18 Encouraging Contractor Policies to Ban Text Messaging While Driving


FAR 52.225-13 Restrictions on Certain Foreign Purchases


FAR 52.225-25 Prohibition on Contracting with Entities Engaging in Certain Activities or Transactions Relating to Iran--Representations and Certifications


FAR 52.228-5 Insurance --Work on a Government Installation


FAR 52.232-1 Payments (FFP)


FAR 52.232-33 Payment by Electronic Funds Transfer-- System for Award Management


FAR 52.232-39 Unenforceability of Unauthorized Obligations


FAR 52.233-1 Disputes


FAR 52.233-3 Protest After Award


FAR 52.233-4 Applicable Law for Breach of Contract Claim


FAR 52.237-2 Protection of Government Buildings, Equipment, and Vegetation


FAR 52.243-1 Changes--Fixed Price (FFP supplies. If services, use Alt 1)


FAR 52.243-1 Changes - Fixed Price Alternate I
FAR 52.246-16 Responsibility for Supplies 


FAR 52.247-34 FOB Destination


FAR 52.252-1  Solicitation Provisions Incorporated by Reference


This solicitation incorporates one or more solicitation provisions by reference, with the same force and effect as if they were given in full text. Upon request, the Contracting Officer will make their full text available. The offeror is cautioned that the listed provisions may include blocks that must be completed by the offeror and submitted with its quotation or offer. In lieu of submitting the full text of those provisions, the offeror may identify the provision by paragraph identifier and provide the appropriate information with its quotation or offer. Also, the full text of a solicitation provision may be accessed electronically at this/these address(es):


http://farsite.hill.af.mil/vmfara.htm


http://farsite.hill.af.mil/vmdfara.htm


http://farsite.hill.af.mil/vmaffara.htm
 


FAR 52.252-5 Authorized Deviations in Provisions: (a) The use in this solicitation of any Federal Acquisition Regulation (48 CFR Chapter 1) provision with an authorized deviation is indicated by the addition of "(DEVIATION)" after the date of the regulation Solicitation Only


(b) The use in this solicitation of any DFARS (48 CFR Chapter 2) provision with an authorized deviation is Clauses Incorporated by Reference:  fill-in:  www.farsite.hill.af.mil


DFARS 252.203-7000 Requirements Relating to Compensation of Former DoD Officials


DFARS 252.203-7005 Representation Relating to Compensation of Former DoD Officials


DFARS 252.204-7004 Alternate A, System for Award Management


DFARS 252.204-7008 Compliance with Safeguarding Covered Defense Information Controls


DFARS 252.204-7009 Limitations on the Use and Disclosure of Third-Party Contractor Reported Cyber Incident Information (Services for IT and Telecommunications)


DFARS 252-204-7012 Safeguarding Covered Defense Information and Cyber Incident Reporting


DFARS 252.211-7003 Item Unique Identification and Valuation. 1st fill-in: N/A (Supplies or services furnishing supplies. Fill-in may be required.)


DFARS 252.211-7008 Use of Government Assigned Serial Numbers


DFARS 252.223-7006 Prohibition on Storage, Treatment, and Disposal of Toxic or Hazardous Materials


DFARS 252.225-7001 Buy American Act and Balance of Payments Program


DFARS 252.232-7003 Electronic Submission of Payment Requests and Receiving Reports


DFARS 252.232-7010 Levies on Contract Payments


DFARS 252.239-7009 Representation of Use of Cloud Computing (Services for IT and Telecommunications)


DFARS 252.239-7010 Cloud Computing Services (Services for IT and Telecommunications)


DFARS 252.243-7001 Pricing of Contract Modifications (FFP)
AFFARS 5352.201-9101 Ombudsman - Mr. Timothy Inman (timothy.inman@us.af.mil)


AFFARS 5352.223-9001 Health and Safety on a Government Installation


FAR 52.209-11 Representation by Corporations Regarding Delinquent Tax Liability or a Felony Conviction under any Federal Law (Feb 2016) 
(a) As required by sections 744 and 745 of Division E of the Consolidated and Further Continuing Appropriations Act, 2015 (Pub. L. 113-235), and similar provisions, if contained in subsequent appropriations acts, the Government will not enter into a contract with any corporation that--
 (1) Has any unpaid Federal tax liability that has been assessed, for which all judicial and administrative remedies have been exhausted or have lapsed, and that is not being paid in a timely manner pursuant to an agreement with the authority responsible for collecting the tax liability, where the awarding agency is aware of the unpaid tax liability, unless an agency has considered suspension or debarment of the corporation and made a determination that suspension or debarment is not necessary to protect the interests of the Government; or 
 


(2) Was convicted of a felony criminal violation under any Federal law within the preceding 24 months, where the awarding agency is aware of the conviction, unless an agency has considered suspension or debarment of the corporation and made a determination that this action is not necessary to protect the interests of the Government.


 (b) The Offeror represents that--


(1) It is [      ] is not [      ] a corporation that has any unpaid Federal tax liability that has been assessed, for which all judicial and administrative remedies have been exhausted or have lapsed, and that is not being paid in a timely manner pursuant to an agreement with the authority responsible for collecting the tax liability; and 


(2) It is [      ] is not [      ] a corporation that was convicted of a felony criminal violation under a Federal law within the preceding 24 months. 


(End of provision) 


DFARS 252.232-7006 Wide Area Workflow Payment Instructions (May 2013))


(a) Definitions. As used in this clause-


"Department of Defense Activity Address Code (DoDAAC)" is a six position code that uniquely identifies a unit, activity, or organization.


"Document type" means the type of payment request or receiving report available for creation in Wide Area WorkFlow (WAWF).


"Local processing office (LPO)" is the office responsible for payment certification when payment certification is done external to the entitlement system.


(b) Electronic invoicing. The WAWF system is the method to electronically process vendor payment requests and receiving reports, as authorized by DFARS 252.232-7003, Electronic Submission of Payment Requests and Receiving Reports.


(c) WAWF access. To access WAWF, the Contractor shall-


(1) Have a designated electronic business point of contact in the System for Award Management at https://www.acquisition.gov; and


(2) Be registered to use WAWF at https://wawf.eb.mil/ following the step-by-step procedures for self-registration available at this web site.


(d) WAWF training. The Contractor should follow the training instructions of the WAWF Web-Based Training Course and use the Practice Training Site before submitting payment requests through WAWF. Both can be accessed by selecting the "Web Based Training" link on the WAWF home page at https://wawf.eb.mil/ 


(e) WAWF methods of document submission. Document submissions may be via web entry, Electronic Data Interchange, or File Transfer Protocol.


(f) WAWF payment instructions. The Contractor must use the following information when submitting payment requests and receiving reports in WAWF for this contract/order:


(1) Document type. The Contractor shall use the following document type(s).


Note: If a "Combo" document type is identified but not supportable by the Contractor's business systems, an "Invoice" (stand-alone) and "Receiving Report" (stand-alone) document type may be used instead.)


(2) Inspection/acceptance location. The Contractor shall select the following inspection/acceptance location(s) in WAWF, as specified by the contracting officer.


 (3) Document routing. The Contractor shall use the information in the Routing Data Table below only to fill in applicable fields in WAWF when creating payment requests and receiving reports in the system.


Routing Data Table* 































































Field Name in WAWF



Data to be entered in WAWF



Pay Official DoDAAC



 



Issue By DoDAAC



 



Admin DoDAAC



 



Inspect By DoDAAC



 



Ship To Code



 



Ship From Code



 



Mark For Code



 



Service Approver (DoDAAC)



 



Service Acceptor (DoDAAC)



 



Accept at Other DoDAAC



 



LPO DoDAAC



 



DCAA Auditor DoDAAC



 



Other DoDAAC(s)



 




 (4) Payment request and supporting documentation. The Contractor shall ensure a payment request includes appropriate contract line item and subline item descriptions of the work performed or supplies delivered, unit price/cost per unit, fee (if applicable), and all relevant back-up documentation, as defined in DFARS Appendix F, (e.g. timesheets) in support of each payment request.


(5) WAWF email notifications. The Contractor shall enter the e-mail address identified below in the "Send Additional Email Notifications" field of WAWF once a document is submitted in the system.


(g) WAWF point of contact. 


(1) The Contractor may obtain clarification regarding invoicing in WAWF from the following contracting activity's WAWF point of contact.


(2) For technical WAWF help, contact the WAWF helpdesk at 866-618-5988.


(End of clause)


AFFARS 5352.242-9000 Contractor Access to Air Force Installations (Nov 2012)


(a) The contractor shall obtain base identification and vehicle passes, if required, for all contractor personnel who make frequent visits to or perform work on the Air Force installation(s) cited in the contract. Contractor personnel are required to wear or prominently display installation identification badges or contractor-furnished, contractor identification badges while visiting or performing work on the installation.


(b) The contractor shall submit a written request on company letterhead to the contracting officer listing the following: contract number, location of work site, start and stop dates, and names of employees and subcontractor employees needing access to the base. The letter will also specify the individual(s) authorized to sign for a request for base identification credentials or vehicle passes. The contracting officer will endorse the request and forward it to the issuing base pass and registration office or Security Forces for processing. When reporting to the registration office, the authorized contractor individual(s) should provide a valid driver's license, current vehicle registration, and a valid vehicle insurance certificate to obtain a vehicle pass.


(c) During performance of the contract, the contractor shall be responsible for obtaining required identification for newly assigned personnel and for prompt return of credentials and vehicle passes for any employee who no longer requires access to the work site.  


(d) When work under this contract requires unescorted entry to controlled or restricted areas, the contractor shall comply with AFI 31-101, Integrated Defense, and AFI 31-501, Personnel Security Program Management citing the appropriate paragraphs as applicable.


(e) Upon completion or termination of the contract or expiration of the identification passes, the prime contractor shall ensure that all base identification passes issued to employees and subcontractor employees are returned to the issuing office.


(f) Failure to comply with these requirements may result in withholding of final payment.


(End of clause) 




Exhibit/Attachment Table of Contents:


 











































DOCUMENT TYPE



DESCRIPTION



PAGES



DATE



Exhibit A



CDRLs A001 & A002: Contractor's Standard Operating Procedures & Accident/Incident Report



2



26-July-2018



Attachment 1



Performance Work Statement



5



01-Aug-2018



Attachment 2



Appendix C



11



24-July-2018



 



 



 



 



 



 



 



 




Set-aside code: N/A Place of performance:  Robins Air Force Base Robins AFB, GA  31098  US Contact: Colleen A Kemper, Contracting Specialist, Email colleen.kemper@us.af.mil - Lindsey Jordan, Email lindsey.jordan.1@us.af.mil
          Estágio em Tecnologia da Informação – R$ 1.000,00 – Pechincha      Cache   Translate Page      
Cargo: Estágio em Tecnologia da Informação Regime de Contratação: Estágio Número de Vagas: 1 Descrição do Cargo / Responsabilidades: Programa de formação profissional em soluções de banco de dados, sistemas operacionais e tecnologias em cloud computing; projetos e administração Leia mais...
          Offer - Cheapest Price Dell PowerEdge R730xd Server Rental and sale Coimbatore - INDIA      Cache   Translate Page      
Dell R730 is equipped with seven PCIe Gen3 expansion slots and a dedicated slot for a RAID controller to help boost IO flexibility. As a result, Dell indicates that their rack server is well suited as a compute node for IT as a service (XaaS) providers or for high-performance computing and medical-imaging solutions. Product Highlights Form Factor: 2U Rack Server Processor : Dual Intel Xeon E5-2609 v3 1.9 Ghz RAM: 16 GB DDR-4 ECC Ram HDD: 4 TB 7.5K RPM SAS HDD Dual Port Enterprise Hard Drive Others Raid Controller : PERC H730 1GB CACHE Contact Rental India Name – Chackravarthy (8754542653) Name – Anushree (8971423090) Visit Us: https://shop.rental-india.com/product/dell-poweredge-r730xd-rack-server-available-on-rental-sale/ Mail Us: enquiry@rental-india.com Mandaveli, Chennai-28.
           TiKV      Cache   Translate Page      
Distributed transactional key-value database, originally created to complement TiDB 

Build Status Coverage Status GitHub release
TiKV ("Ti" stands for Titanium) is a distributed transactional key-value database, originally created to complement TiDB, a distributed HTAP database compatible with the MySQL protocol. TiKV is built in Rust and powered by Raft, and was inspired by the design of Google Spanner and HBase, but without dependency on any specific distributed file system.
With the implementation of the Raft consensus algorithm in Rust and consensus state stored in RocksDB, TiKV guarantees data consistency. Placement Driver (PD), which is introduced to implement auto-sharding, enables automatic data migration. The transaction model is similar to Google's Percolator with some performance improvements. TiKV also provides snapshot isolation (SI), snapshot isolation with lock (SQL: SELECT ... FOR UPDATE), and externally consistent reads and writes in distributed transactions.
TiKV is hosted by the Cloud Native Computing Foundation (CNCF). If you are a company that wants to help shape the evolution of cloud native technologies, consider joining the CNCF. For details about who's involved and how TiKV plays a role, read the CNCF announcement.
TiKV has the following key features:
  • Geo-Replication
    TiKV uses Raft and the Placement Driver to support Geo-Replication.
  • Horizontal scalability
    With PD and carefully designed Raft groups, TiKV excels in horizontal scalability and can easily scale to 100+ TBs of data.
  • Consistent distributed transactions
    Similar to Google's Spanner, TiKV supports externally-consistent distributed transactions.
  • Coprocessor support
    Similar to Hbase, TiKV implements a coprocessor framework to support distributed computing.
  • Cooperates with TiDB
    Thanks to the internal optimization, TiKV and TiDB can work together to be a compelling database solution with high horizontal scalability, externally-consistent transactions, support for RDBMS, and NoSQL design patterns.

TiKV Adopters

You can view the list of TiKV Adopters.

TiKV Roadmap

You can see the TiKV Roadmap.
from https://github.com/tikv/tikv

          Hey Alexa, What’s in a Name? Actually, Let’s Call You Amazon      Cache   Translate Page      
With “Hey Google” and “Alexa” echoing from the expo halls of Las Vegas to millions of homes, the hype around voice-controlled computing is reaching a new peak in early 2018. Voice-controlled devices are permeating our world, and this new user interface is the future of computing—or so we are told by the companies purveying it. […]
          Alexa Roundup: Amazon Improves Its Wish Fulfillment Device      Cache   Translate Page      
From its earliest days, Amazon has built its business on removing the barriers between people and the things they want to buy. New voice computing technologies and business models unveiled at the company’s annual developer conference in Las Vegas this week represent the continuation of that vision. Alexa and the ecosystem of services and skills […]
          Microsoft’s Strategy for Finding What’s Next in Healthcare A.I.      Cache   Translate Page      
[Updated 11/10/17, 10:25 a.m. See below.] Microsoft is applying the same model it used to launch its quantum computing and chatbot efforts to innovation in healthcare, signaling the company’s ambition and optimism about the transformative potential of artificial intelligence technologies in this enormous endeavor. Peter Lee is the Microsoft Research executive in charge of the […]
          The Evolution of TV Election Coverage Technology      Cache   Translate Page      

Every election night, news networks are forced to contend with two seemingly contradictory problems: more information than they can possibly report and more time than they can possibly fill. For the last 70 years, anchors, reporters, and producers from rival TV networks have competed to air the best, most accurate (and entertaining) coverage. Here are some of the most memorable innovations in TV election night technology:

The Chalkboard (1948)

The contest between Truman and Dewey was the first election night ever televised in the United States. While the election ended in a shocking Truman win, the TV broadcast itself was relatively sedate, with three anchors seated at a desk in front of Life magazine covers of the candidates. Much of the coverage was radio-friendly, but NBC adapted to the new visual medium in a few key ways, including by displaying vote totals on chalkboards that were erased and updated throughout the evening. Though the chalkboards were pretty messy by the end of the night, NBC’s coverage remains a master class in the lost art of legible handwriting.

UNIVAC Calls It for Eisenhower (1952)

In advance of the 1952 election, CBS tiptoed into the information age by buying a computer to predict election results and then ignoring its predictions. The network purchased a UNIVAC, one of the first commercially available computers, and commissioned a cutting-edge algorithm to project the electoral college and popular vote. Reporter Charles Collingwood provided updates on UNIVAC’s predictions from CBS headquarters while receiving dispatches from the actual room-sized computer in Philadelphia. Polls showed a close race between Dwight D. Eisenhower and Adlai Stevenson, but UNIVAC’s early calculations predicted an Eisenhower landslide. Afraid of looking stupid by trusting their “fabulous electronic machine” more than human pundits, CBS decided to tell viewers a little white lie. “We fed him some figures which were a little out of the line of the sort of thing that he’d been expecting,” Collingwood explained. “And so UNIVAC came up and said he just wouldn’t work under these conditions.” CBS adjusted its algorithm and then predicted a much closer race. But they’d made a mistake in the numbers and, once it was corrected, the computer again showed a huge Eisenhower lead. In the end, UNIVAC’s prediction was almost exactly right, and the first Republican president since Hoover was swept into office. Later that night, CBS came clean: “We should have had nerve enough to believe the machine in the first place. It was right, we were wrong. Next year, we’ll believe it.”

NBC’s Plastic Electoral College Map (1976)

Though the first few decades of broadcast news saw many revolutionary changes (including the proliferation of color TV), by the 1970s, results were still communicated mostly through numerical returns and flat graphics of the electoral map. According to the Los Angeles Times’ Stephen Battaglio, NBC anchor John Chancellor wanted to try something different for 1976. Chancellor spoke to executive Gordon Manning, who came up with the idea for an enormous clear plastic map that could be filled in with colored gels as states were called for Gerald Ford and Jimmy Carter. The political parties’ colors were assigned based on the British tradition—red for Democrats (after the Labour Party) and blue for Republicans (after the Conservative Party). NBC exiled Saturday Night Live from Studio 8H for three weeks to prepare for the election night broadcast, but discovered during rehearsals that the bright studio lights caused the plastic map to melt. NBC installed a cooling system before the big night and made the map a focal point of election coverage.

The Life and Death of the Voter News Service (1990)

After years of competing for the fastest exit polls and projections, ABC, CBS, NBC, and CNN banded together to form a single exit-polling group, Voter Research & Surveys (later renamed Voter News Service), in advance of the 1990 midterms. The VNS served as a centralized pollster and decision desk, allowing every network to call races at the same time on election nights. But in 1994, much to the surprise of the other networks, ABC commissioned its own projection analysts and successfully scooped everyone else in a number of important races. In 2000, the VNS famously botched its Florida call. And after facing major technical difficulties in 2002, the VNS—and its spirit of cooperation—died out.

Tim Russert’s Whiteboard (2000)

Election night TV is crowded with prognosticators of all experience levels and political persuasions (CNN likes to make them all sit at a table and argue). And though advances in computing and statistical modelling have led to all kinds of new predictive insight, sometimes the simplest available technology is also the best. As early returns rolled in on election night 2000, NBC’s Tim Russert tallied the electoral math on a small whiteboard (which now sits in the Smithsonian). When the returns showed an increasingly close race, Russert jotted down three words: “Florida, Florida, Florida,” thereby Beetlejuicing the craziest election in modern American history into existence.

CNN’s Virtual Capitol (2008)

The next three entries on this list all come from CNN’s coverage of election night 2008, which was all-encompassing and spanned five dimensions (length, width, depth, time, and Wolf Blitzer). To help visualize the houses of Congress, CNN commissioned a virtual model of the Capitol building. CNN adapted the 3D model for subsequent elections and later perfected the form with myriad simulations of Malaysia Airlines Flight 370.

CNN’s will.i.am Hologram (2008)

CNN’s most memorable technological advance of 2008 didn’t have anything to do with electoral returns. Throughout the night, the network hyped up its new “holograms,” which would allow anyone to have a realistic conversation with Wolf Blitzer or Anderson Cooper. Blitzer spoke to reporter Jessica Yellin and beamed in will.i.am from Chicago, where Sen. Barack Obama’s soon-to-be-victory party was underway. Of course, the absurdly unrealistic “holograms” were not holograms at all, but composite images made by dozens of high-def cameras in front of a circular green screen. CNN’s senior video producer later said the network added the fuzzy blue glow to make the “holograms” seem less realistic, in order to avoid future suspicion that realistic news footage might be fake.

John King’s Magic Wall (2008)

John King debuted his magic wall of data 10 years ago, and other networks are still playing catch-up. King became an instant sensation for his touch-screen map of unprecedented geographic and demographic detail, as well as for the semifrequent technical difficulties and awkward pauses it created. Magic walls continue to be the real star makers of the election reporting business, from King to MSNBC’s Steve Kornacki.

NBC Brings Democracy Plaza Into the Future (2016)

Every two years, the major networks jockey for the best broadcasting infrastructure, but NBC has a built-in advantage no other network can claim: an ice skating rink. Since 2004, NBC has celebrated big elections by repurposing its Rockefeller Plaza headquarters into Democracy Plaza. That typically includes an electoral map of the United States drawn on its famous seasonal skating rink. In 2016, NBC took it to the next level with a virtual map that appeared to float above the rink. NBC has confirmed the return of Democracy Plaza in 2018, when it will presumably include a real-time rendering of the cast of This Is Us.


          The new sleek, light, and powerful Asus Zenbooks are now available      Cache   Translate Page      

Announced at IFA 2018, Asus' 13-inch, 14-inch, and 15-inch Zenbook laptops are now available for purchase. The devices pack slim bezel displays and come configured with Intel's eighth-generation Whiskey Lake processors under the hood.

The post The new sleek, light, and powerful Asus Zenbooks are now available appeared first on Digital Trends.


          Dear Colleague Letter: Directorate for Computer and Information Science and Engineering (CISE), Division of Computing and Communications Foundations (CCF) - Employment Opportunities for Multiple Program Director Positions (Open Until Filled)      Cache   Translate Page      

Available Formats:
HTML: https://www.nsf.gov/pubs/2019/ccf19001/ccf19001.jsp?WT.mc_id=USNSF_147
PDF: https://www.nsf.gov/pubs/2019/ccf19001/ccf19001.pdf?WT.mc_id=USNSF_147

Document Number: ccf19001


This is a NSF Vacancies item.

          Comment on iiPad-first boggers: “will always take some of the sting out of losing hours trying to figure out how to upload a file to a website”      Cache   Translate Page      
Link. They always seem silly to me. Like old ink-computing enthusiasts.
          textbook$ @@ Oxford International Primary Computing: Teacher's Guide 2 ^^Full_Books^^      Cache   Translate Page      

[PDF] Download Oxford International Primary Computing: Teacher's Guide 2 Ebook | READ ONLINE Download at https://belipdfbooksmurahcoll8u3w.blogspot.com/0198356897 Download Oxford International Primary Computing: Teacher's Guide 2 read ebook Online PDF EPUB KINDLE Oxford International Primary Computing: Teacher's Guide 2 pdf download Oxford International Primary Computing: Teacher's Guide 2 read online Oxford International Primary Computing: Teacher's Guide 2 epub Oxford International Primary Computing: Teacher's Guide 2 vk Oxford International Primary Computing: Teacher's Guide 2 pdf Oxford International Primary Computing: Teacher's Guide 2 amazon Oxford International Primary Computing: Teacher's Guide 2 free download pdf Oxford International Primary Computing: Teacher's Guide 2 pdf free Oxford International Primary Computing: Teacher's Guide 2 pdf Oxford International Primary Computing: Teacher's Guide 2 Oxford International Primary Computing: Teacher's Guide 2 epub download Oxford International Primary Computing: Teacher's Guide 2 online Oxford International Primary Computing: Teacher's Guide 2 epub download Oxford International Primary Computing: Teacher's Guide 2 epub vk Oxford International Primary Computing: Teacher's Guide 2 mobi Download or Read Online Oxford International Primary Computing: Teacher's Guide 2 => Sign up now for download this book: https://belipdfbooksmurahcoll8u3w.blogspot.com/0198356897 #downloadbook #book #readonline #readbookonline #ebookcollection #ebookdownload #pdf #ebook #epub #kindle
          CERN openlab workshop: quantum computing for high-energy physics      Cache   Translate Page      
Photos of speakers at quantum computing workshop in main auditorium
          Senior BIOS Engineer - ZT Systems - Secaucus, NJ      Cache   Translate Page      
Join us at this critical growth inflection point as we engineer the hardware infrastructure powering a world of cloud computing, cloud storage, artificial...
From Indeed - Tue, 23 Oct 2018 14:28:36 GMT - View all Secaucus, NJ jobs
          Unofficial Potter County Election Results; 59% Turnout      Cache   Translate Page      
Unofficial Potter County Election Results; 59% Turnout
November 6th, 2018--Potter County Today

Voter turnout in Potter County was 59 percent for the Nov. 6, 2018, General Election, according to Sandy Lewis, director of elections. Following are unofficial returns with all 33 of the precincts reporting:

U.S. Senator: Bob Casey Jr. (D) 1,542, Lou Barletta (R) 4,551, Neal Gale (Green) 38, Dale R. Kerns Jr. (Lib.) 61.

Governor/Lt. Governor: Tom Wolf and John Fetterman (D) 1,450; Scott Wagner & Jeff Bartow (R) 4,723; Paul Glover and Jocolyn Bowser-Bostick (Green) 42; Ken V. Krawchuk and Kathleen S. Smith (Lib.) 66.

Representative in Congress (Pa. 12th District): Marc Friedenberg (D) 1,414; Tom Marino (R) 4,841

Representative in Pa. General Assembly (67th District): Maryanne Cole (D) 974, Martin T. Causer (R) 4,853.

Representative in Pa. General Assembly (68th District): Carrie Heath (D) 122, Clint Owlett (R) 332.

All returns are unofficial until they are certified through the official count of the Potter County Canvassing and Computing Board.
          Is 2019 the year the robots take over? Not quite      Cache   Translate Page      

With all the buzz around AI and machine learning, it can seem impossible for many marketers to separate the signal from the noise. Is it the best thing since the internet? Are we all out of a job? As with most new technologies, the truth is slightly less dramatic (at least in the short term), and it helps to be armed with some basic knowledge to cut through the noise.

In reality, these technologies are more and more part of our everyday lives and, most vividly apparent where brands connect with consumers, from Amazon’s Alexa to online chat support. These are just two customer touch points that marketers should be aware of the impact of AI. There are many more, ranging from how and when your ads show up online, to revealing new customer segments that you might market to, or even develop new products for.

So, as we increasingly see this new technology insert itself into new parts of our lives, these are my top truths and myths to help marketers identify what’s worth paying attention to, and what’s just hype.

Three truths about AI

1. Anything that can be automated will be (and probably should be)

Marketers are drowning in data. To be effective, modern marketing needs billions of decisions to be made quickly and accurately every day. These decisions help determine which audiences see which messages and the right level of a client’s budget to assign. Humans cannot be expected to handle all of these decisions and thus we turn to machines. Machines excel at processing vast amounts of data and can analyse complex patterns at scale in milliseconds. What’s more, they’re excellent at identifying patterns that humans might miss, which helps identify emerging areas of demand that a brand may have previously overlooked.

2. When you say AI you probably mean machine learning

While both terms are synonymous for most people, knowing the difference will earn you serious points with any engineers you might work with. AI is a poorly defined term, referring to a field of research concerned with the creation of human-like intelligence. Machine learning is concerned with getting machines to complete tasks without being explicitly programmed to handle those tasks. These machines thus “learn” and get better at subsequent tasks with experience. An example of this would be Amazon’s Alexa. Alexa is not explicitly programmed to recognize all speech, rather the machine learning algorithms that it employs get better at understanding commands by improving its own recognition of different accents and common combinations through exposure to more and more examples.

3. Brands that make better use of first-party data will win

Most of us are familiar with the phrase ‘garbage in, garbage out’. The same holds true for machine learning, but more so. If we, as humans, are capable of making disastrously poor decisions based on incomplete data, imagine that scaled up to the speed and power of modern computing technology.

The biggest culprit of bad machine-led decisions - and cause of executive disappointment - is the use of a hodgepodge of second or third-hand data bought or borrowed from various partners by companies. Invariably out of date and massaged to fit the task at hand, what started as a partial look at a particular audience suddenly risks becoming wildly misleading ‘insights’ that could spell disaster for marketers that bet their careers on them. This sort of data manipulation should be avoided. Instead, marketers should make it their focus to turn over every rock in the search for owned data that is directly linked to customer buying decisions, for example, customer relationship (CRM) systems. These are more complete and up-to-date and will drive better business decisions.

Three myths about AI:

1. The robots are about to take over

While some might be concerned about robot dogs opening doors, (perhaps unnerving for some), we’re still some way off ceding power to our robot overlords. Guru Banavar, the head of the team at IBM responsible for creating Watson (the AI system that mastered Jeopardy) told Tech Republic that most people don't have a good understanding of what machine learning is. He said: "We can teach a computer to recognise a car, but we can't ask that same computer, 'How many wheels does that car have?' or, 'What kind of engine does it have?'. Can you ask anything else about what this car is made of or how it is made? None of those things is possible. Those are all far away."

The type of AI known as Artificial General Intelligence is still a long way off.

2. Machines will take all of our jobs

Not all, but they will do better at some than we ever can. Mundane, repetitive and dangerous jobs will be replaced. This is nothing new and has proven to be a good thing in the past when it comes to our general well-being and longevity, as has been the case as we’ve moved from the fields to the factories to the modern internet age.

The good news is that as some jobs are phased out, as repetitive and rote jobs are automated, new industries will emerge, which will create a host of new opportunities.

3. Machines will swallow all your personal data

It’s true that AI systems have the ability to collect, store and analyse vast amounts of consumer data – but so do non-AI systems. It’s important to note that the same privacy by design principles that should be applied to a traditional approach can and should be applied to AI-based systems (especially in light of the recent GDPR implementation in Europe and new regulations on the horizon in the US and around the world). Consumer data must be handled carefully and transparently. What’s more, companies need to ensure they’re gathering only the minimum amount of data they need to deliver the service consumers expect.

The good news for APAC marketers is that they are ahead of the global curve when it comes to adopting, understanding and embracing the benefits of AI, according to Adobe and Econsultancy’s Digital Intelligence Briefing: 2018 Digital Trends report. Those that are combining digital marketing skills with technology are nearly twice as likely to have surpassed their 2017 business goals by a significant margin (20% vs. 11%).

As data gets more abundant and processing get smarter, the innovation available to marketers will multiply. We’re already seeing it in the way in which consumers engage with brands today, but we can expect it to disrupt every consumer engagement, every company and every industry in the coming years. Armed with these myths and truths, you’ll be better equipped to spot the most trustworthy signals.

Konrad Feldman is founder and CEO of Quantcast.


          Shortening the rare-earth supply chain via recycling      Cache   Translate Page      
Shortening the rare-earth supply chain via recycling#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000 Kanazawa, Japan (SPX) Nov 05, 2018

Modern life is closely intertwined with a set of 17 elements at the foot of the periodic table. Known as rare earths (REs), many of these metals are highly magnetic, and find use in computing, green power and other technologies. However, because of rising ... Reported by Energy Daily 4 hours ago.
          Stage: Afstudeeropdracht richting Infrastructuur, Beheer, IoT, Security in Veenendaal      Cache   Translate Page      
<p><strong>IoT fleet management</strong></p> <p>Zie jij het als een uitdaging om je tijdens je afstudeeropdracht te verdiepen in de beheerkant van Internet of Things en in de securityproblemen die IoT met zich meebrengt?<br /><br />The Internet of Things wordt vaak de 3rd wave of computing genoemd; dit gaat gepaard met een explosie aan allerhande edge devices die op één of andere manier onderdeel zijn van het internet. Deze enorme hoeveelheid edge devices herintroduceren aloude beheer- en securityproblemen op een nieuwe manier. Hoe rol je updates uit? Hoe houd je ‘Things’ secure? Hoe ga je om met End of Life? Wat doe je als je er remote niet meer bij komt? Tijdens jouw afstudeeropdracht ga jij hiermee aan de slag!<br /><br /><u>Onderzoek</u></p> <p>Je onderzoekt en bedenkt strategieën hoe je remote IoT devices het beste kunt updaten. Je neemt hierbij vragen mee als: welke mechanismes zijn er al? Hoe goed zijn die en waar zitten de uitdagingen? Denk bijvoorbeeld aan PKI onderhoud (waarbij je bijvoorbeeld je CA moet vervangen en al je IoT devices voorzien moeten worden van een nieuw root certificate). Denk daarbij ook aan andere zaken die bij fleetmanagement komen kijken.<br /><br />Daarnaast breng je in kaart wat je moet organiseren om een ‘verloren’ fleet weer onder controle te krijgen. Bedenk ook strategieën en technieken voor een fall back. Je werkt een scenario uit en demonstreert dit aan de hand van een Proof of Concept.<br /><br />Je gaat deze opdracht samen met een engineer van Info Support verder uitwerken. Dit met als doel om tot een definitieve afstudeeropdracht, compleet met deliverables, te komen die bij jou past.</p> ...
          Beijing Cancer Hospital Utilizes Varian RapidPlan to Win IDC Digital Transformation Award      Cache   Translate Page      
...in 2017, with the application of cloud computing, big data and artificial intelligence as the main features. The development of information technology has become a key driving force for the transformation of medical and health services. The application of artificial intelligence ...

          (USA-VA-Herndon) Scrum Master: Startup | Small Business | $100K - $135K Salary      Cache   Translate Page      
Scrum Master: Startup | Small Business | $100K - $135K Salary Scrum Master: Startup | Small Business | $100K - $135K Salary - Skills Required - Scrum Master, Project Management, CSM | PMP-ACP | CSP Certification, Agile Principles | Practices | Theory, Online Products, Software as a Service (SaaS) Products, Agile Approaches (Scrum | Lean | XP | Kanban), Atlassian JIRA, PSM I | PSM II | SAFe, DevOps Tools and CI/CD Processes If you're a Certified Scrum Master with SMB and/or Startup experience, please read on! We apply artificial intelligence to solve complex, real-world problems at scale. Our Human+AI operating system, blends capabilities ranging from data handling, analytics, and reporting to advanced algorithms, simulations, and machine learning, enabling decisions that are just-in-time, just-in-place, and just-in-context. If this type of environment sounds exciting, please read on! **Top Reasons to Work with Us** - Benefits start on day 1 - Free onsite gym - Unlimited snacks and drinks - Located 1 mile from Wiehle-Reston East Station on the Silver line **What You Will Be Doing** RESPONSIBILITIES: As Scrum Master / Agile Lead, you will manage Agile-focused engineering development of our proprietary technology. You'll be working closely with the Product Manager and Engineer Lead, facilitating the Sprint process from beginning to end, ensuring the accurate and timely completion of product requirements. In addition, you'll drive the team's education in best practices of Agile development through a variety of methods meant to provide positive impact across the team. You should have a strong Project Management and/or Scrum Master background and want to be an active member of the team, not just someone who enforces Agile methodology. A background in working with online products and Software as a Service (SaaS) is strongly preferred, and the ability to handle the challenges faced by startups is key. Along with the Product and Engineering leads, you'll be part of the 3-person leadership team who will bring cutting edge and sometimes complex products to market, then identifying ways to evolve these products over time. You'll work closely with your leadership colleagues to ensure road-maps are built using reality as the driving force, not smoke and mirrors or unjustified optimism. - Lead diverse software development teams to on-time fulfillment of applications and services in a hybrid public-private cloud/computing environment - Facilitate the development and delivery of our proprietary products between Product and Engineering teams that drive market leading features into our customers hands - Act as a liaison for your team throughout the organization - Provide day-to-day oversight of the product road-map to ensure that timelines are met, tasks are prioritized appropriately, there is clear definition of scope and the team isn't over-committing - Ensure teams have appropriate direction and priority at all times to remain on track to reach internal and customer commitments and deadlines - Work with Product and Engineering to ensure the right level of understanding and the right culture/process exists to take high level concepts and feature ideas and help break them down into stories and sub-tasks - Track and report status of all projects you own during our weekly updates. In identifying areas where any risk may exist, proactively build, communicate and lead recovery actions - Participate in “scrum-of-scrum” meetings and assist in ongoing coordination of corporate wide road-maps to ensure alignment between teams across the organization - Manage the delivery of software enhancements and fixes per release schedules using Agile development methodologies - Help to shape and improve the product road-map by consolidating and communicating feedback captured during the execution and retrospective analysis of sprints and strategy meetings - Work with Product and Sales team to understand customer engagement needs and ensure product readiness is in alignment with road-map commitments and the teams ability to deliver - Work with Software Development leadership and teams to ensure technical requirements for engagement can be met on schedule; if necessary, identify and plan for any customer specific engineering requirements with Product - Follow customer integration needs, update implementation plans and report customer satisfaction outcomes internally to cross-functional teams - Ensure that all product milestones are tracking to schedule and communicate effectively to Product and or cross-functional teams whenever obstacles to meeting customer expectations surface **What You Need for this Position** QUALIFICATIONS: - Bachelor's Degree - 2+ years of experience as a full-time Scrum Master - Scrum Master certification (CSM) PMP-ACP or CSP certification - Expertise in diligently applying Agile principles, practices, and theory (User Stories, Story Pointing, Velocity, Burndown Metrics, Agile Games, Tasking, Retrospectives, Cycle Time, Throughput, Work in Progress levels, Product Demos) - Experience working with online products and Software as a Service (SaaS) - Experience working with different Agile approaches (Scrum, Lean, XP, Kanban, etc.) - Hands on experience with Agile ALM tools like Atlassian Jira with knowledge of other tools such as Aha!, Wrike, or ProductPlan - Knowledge of servant leadership, facilitation, situational awareness, conflict resolution, continual improvement, empowerment, influence and transparency - Agile or Project Management certification (PSM I, PSM II, SAFe) - Extensive experience with Atlassian products - Understanding of DevOps tools and CI/CD processes - Experience and interest in large-scale distributed systems - Interest in with Apache Spark, Apache Pig, AWS Pipelines, Google Dataflow, or MapReduce **What's In It for You** - Competitive Salary ($100,000 - $135,000) - Incentive Stock Options - Medical, Dental & Vision Coverage - 401(K) Plan - Flexible “Personal Time Off (PTO) Plan - 10+ Paid Holiday Days Per Year So, if you're a Certified Scrum Master with SMB and/or Startup experience, please apply today! Applicants must be authorized to work in the U.S. **CyberCoders, Inc is proud to be an Equal Opportunity Employer** All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status, or any other characteristic protected by law. **Your Right to Work** – In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification document form upon hire. *Scrum Master: Startup | Small Business | $100K - $135K Salary* *VA-Herndon* *WT1-1492800*
          (USA-MA-Boston) Java Developer - Dropwizard, Cloud Computing, Java      Cache   Translate Page      
Java Developer - Dropwizard, Cloud Computing, Java Java Developer - Dropwizard, Cloud Computing, Java - Skills Required - Dropwizard, Cloud Computing, Java, MySQL, AWS, Linux If you are a Java Developer with experience, please read on! **What You Need for this Position** At Least 3 Years of experience and knowledge of: - Dropwizard - Cloud Computing - Java - MySQL - AWS - Linux **What's In It for You** - Vacation/PTO - Medical - Dental - Vision - Relocation - Bonus - 401k So, if you are a Java Developer with experience, please apply today! Applicants must be authorized to work in the U.S. **CyberCoders, Inc is proud to be an Equal Opportunity Employer** All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status, or any other characteristic protected by law. **Your Right to Work** – In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification document form upon hire. *Java Developer - Dropwizard, Cloud Computing, Java* *MA-Boston* *TB7-1492874*
          (USA-VA-Springfield) Computer Scientist - Machine Learning      Cache   Translate Page      
Computer Scientist - Machine Learning Computer Scientist - Machine Learning - Skills Required - Computer Science, Machine Learning, large scale data, linear algebra, calculus If you are a Computer Scientist with a background in machine learning, please read on! You must have an active DoD secret clearance to be considered. This is a full time W2 position and great medical benefits are offered. This is not a contract. **What You Will Be Doing** As a lead technologist you will work with other scientists, engineers and performers to develop analytic capabilities for Military operations. - Conduct systems and application evaluations for developmental software systems - Consult with others to determine computing goals and systems requirements - Work with computer engineers and scientists to solve computing problems in relationship to threat spectrum - Use theoretical principles to guide development of software and hardware solutions - Help in the design of new computer technology - Use analytic programs, machine learning and statistical methods to prepare data for use in modeling - Devise new algorithms to solve problems **What You Need for this Position** More Than 5 Years of experience and knowledge of Computer Science: - A Ph.D in Computer Science is highly desired - Computer Science - Machine Learning - k-nearest neighbors, random forests, ensemble methods, etc. - CS related math skills - linear algebra, calculus, statistics and discrete mathematics - Complex problem solving skills - Machine learning techniques and frameworks - Can analyze large scale data - Design, validate and characterize algorithms and systems **What's In It for You** - Competitive compensation with excellent benefits - Long term job opportunity with growth potential - Work with a great group of colleagues that will support your work So, if you are a Computer Scientist with a background in machine learning, please apply today! Applicants must be authorized to work in the U.S. **CyberCoders, Inc is proud to be an Equal Opportunity Employer** All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status, or any other characteristic protected by law. **Your Right to Work** – In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification document form upon hire. *Computer Scientist - Machine Learning* *VA-Springfield* *RK-1492789*
          ASRock Rack Intel Xeon E Processor Server Solutions Announced      Cache   Translate Page      
ASRock Rack specialized in high performance and high-efficiency cloud computing server technology, t...
          (USA-TX-Flower Mound) Web Applications Developer - Thriving Consumer Electronics Co      Cache   Translate Page      
Web Applications Developer - Thriving Consumer Electronics Co Web Applications Developer - Thriving Consumer Electronics Co - Skills Required - JIRA, HTML5, CSS3, JavaScript, HTML, CSS, Angular, REACT, Vue, Polymer If you are a Web Applications Developer with experience, please read on! **Top Reasons to Work with Us** 1. Based just outside of Dallas, we are a thriving Consumer Electronics company. 2. Have been around for 10+ years and we are continuously growing. 3. You will get the chance to work on exciting new projects. **What You Will Be Doing** - Work on our web-based e-commerce and operational software eco-system. **What You Need for this Position** - Experience with JIRA Experience and Git/Github - Thorough knowledge of HTML 5, CSS3, and JavaScript - Thorough knowledge of responsive design - 3+ years of deep expertise and hands on experience with Web Applications and programming technologies, to include, but not limited to HTML, CSS, JavaScript - 3+ years of experience developing modular front-end components and advanced web experiences using JavaScript, HTML5, CSS3 and modern component-based client frameworks or libraries (Angular, React, Vue, Polymer etc…) - 3+ years of experience working with NoSQL databases (MongoDB preferred) - Deep functional knowledge or hands on design experience with Web Services (REST, SOAP, etc ..) is needed to be successful in this position. - Working knowledge/experience with SQL commands and database (postgres) - Working knowledge/experience designing and building server-side JavaScript systems (node/express) - Experience with client-side web performance optimization (mobile and web) - Understanding of progressive web applications are requirements - Good understanding of full stack frameworks and methodologies - Experience with any CSS preprocessors: SASS, LESS or STYLUS etc… - Experience with build tools (Webpack/RequireJS or similar) - Familiarity with cloud deployment processes - Knowledge of at least one of the popular cloud computing platforms is essential. (DigitalOcean is a plus) - Experience working on small Agile teams - HTML: 3 years (Required) - Databases: 3 years (Preferred) - CSS: 3 years (Required) - Mongo DB: 2 years (Preferred) - Javascript: 3 years (Required) - Vue: 1 year (Preferred) - Node: 2 years (Preferred) **What's In It for You** -Competitive Base Salary ($75k-$85k) -401k -Medical/Dental/Vision Insurance -Vacation/PTO -Life Insurance So, if you are a Web Applications Developer with experience, please apply today! Applicants must be authorized to work in the U.S. **CyberCoders, Inc is proud to be an Equal Opportunity Employer** All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status, or any other characteristic protected by law. **Your Right to Work** – In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification document form upon hire. *Web Applications Developer - Thriving Consumer Electronics Co* *TX-Flower Mound* *KC9-1492769*
          Computing Convergence at the Edge – Intel Chip Chat Network Insights – Episode 169      Cache   Translate Page      
Intel Chip Chat – Network Insights audio podcast with Allyson Klein: Mory Lin, Director, Embedded System Product for Supermicro joins us in this archive of a livecast from Intel network Builders Summit in conjunction with SDN/NFV World Congress to discuss the Supermicro announcement of an Intel Select Solution for uCPE (universal customer premises equipment) which [...]
          AMD Radeon Instinct MI50 and MI60 bring 7-nm GPUs to the data center      Cache   Translate Page      

Alongside a preview of its first 7-nm Epyc CPUs built with the Zen 2 microarchitecture, AMD debuted its first 7-nm data-center graphics-processing units today. The Radeon Instinct MI50 and Radeon Instinct MI60 take advantage of a new 7-nm GPU built with the Vega architecture to crunch through tomorrow's high-performance computing, deep learning, cloud computing, and virtualized desktop applications.

...

Read more...


          'SC18' inspires next generation to change the world through supercomputing      Cache   Translate Page      
(MediaSource) SC18 is the premier international conference showcasing the many ways high performance computing, networking, storage, and analysis lead to advances in scientific discovery, research, education, and commerce. The event, created and sponsored by the ACM (Association for Computing Machinery) and the IEEE Computer Society, attracts HPC professionals and educators from around the globe to participate in its complete technical education program, workshops, tutorials, a world-class exhibit area, demonstrations, and the world's fastest temporary computer network.
          (USA-WA-Bellevue) Machine Learning Scientist - NLP, Recommender/Ranking Systems      Cache   Translate Page      
Machine Learning Scientist - NLP, Recommender/Ranking Systems Machine Learning Scientist - NLP, Recommender/Ranking Systems - Skills Required - Machine Learning, NLP, Recommender Systems, Python, Deep Learning Theory, Hadoop, SPARK, Building Data Pipelines If you are a Machine Learning Scientist with experience, please read on! One of the largest and most well-known travel agencies is looking for a Machine Learning Scientist. We are an online travel agency that enables users to access a wide range of services. We books airline tickets, hotel reservations, car rentals, cruises, vacation packages, and various attractions and services via the world wide web and telephone travel agents. Our team helps power many of the features on our website. We design and build models that help our customers find what they want and where they want to go. As a member of our group, your contributions will affect millions of customers and will have a direct impact on our business results. You will have opportunities to collaborate with other talented data scientists and move the business forward using novel approaches and rich sources of data. If you want to resolve real-world problems using state-of-the-art machine learning and deep learning approaches, in a stimulating and data-rich environment, lets talk. **What You Will Be Doing** You will provide technical leadership and oversight, and mentor junior machine learning scientists You will understand business opportunities, identify key challenges, and deliver working solutions You will collaborate with business partners, program management, and engineering team partners You will communicate effectively with technical peers and senior leadership **What You Need for this Position** At Least 3 Years of experience and knowledge of: - PhD (MS considered) in computer science or equivalent quantitative fields with 3+ years of industry or academic experience - Expertise in NLP or recommender systems (strongly preferred) - Deep understanding of classic machine learning and deep learning theory, and extensive hands-on experience putting it into practice - Excellent command of Python and related machine learning/deep learning tools and frameworks - Strong algorithmic design skills - Experience working in a distributed, cloud-based computing environment (e.g., Hadoop or Spark) - Experience building data pipelines and working with live data (cleaning, visualization, and modeling) **What's In It for You** - Vacation/PTO - Medical - Dental - Vision - Bonus - 401k So, if you are a Machine Learning Scientist with experience, please apply today! Applicants must be authorized to work in the U.S. **CyberCoders, Inc is proud to be an Equal Opportunity Employer** All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status, or any other characteristic protected by law. **Your Right to Work** – In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification document form upon hire. *Machine Learning Scientist - NLP, Recommender/Ranking Systems* *WA-Bellevue* *GK2-1493004*
          (USA-CA-Los Angeles) Software Engineer, Infrastructure - Python, PostgreSQL, AWS, GCP      Cache   Translate Page      
Software Engineer, Infrastructure - Python, PostgreSQL, AWS, GCP Software Engineer, Infrastructure - Python, PostgreSQL, AWS, GCP - Skills Required - Python, Gunicorn, Celery, PostgreSQL, AWS, GCP, Finance, Real Estate If you are a Software Engineer, Infrastructure with experience, please read on! We offer 100% financing to PACE approved, energy efficient upgrades to your home or commercial building. If your upgrade saves energy or water, we have you covered with no money out of pocket. We partner with local governments to bring you low cost financing that gets repaid through your property tax bill. The financing can be used for improvements that are good for the environment and save you money on your utility bills. **What You Will Be Doing** - Building out our cloud infrastructure. We haven't started yet, and it will be your job to help design it and build it - Continuous Integration and Deployment are in our future, you'll need to work with our product engineers to define, instrument and build out our deployment pipeline **What You Need for this Position** - Excellent knowledge of Python and Python applications (eg: Gunicorn, Celery) - Working knowledge of relational (PostgreSQL) and distributed Databases - You have a real passion for implementing and building upon cloud computing platforms (especially AWS and GCP) - You have strong systems fundamentals - You believe in automation, testing and instrumentation and have demonstrated it throughout your career - You are an excellent communicator with desire to share and learn - 5+ years of full time industry experience - Degree in Computer Science or related field - Experience in Finance or Real Estate industries **What's In It for You** - Competitive Compensation - Paid Time Off - Medical, Dental & Vision Insurance - 401K So, if you are a Software Engineer, Infrastructure with experience, please apply today! Applicants must be authorized to work in the U.S. **CyberCoders, Inc is proud to be an Equal Opportunity Employer** All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status, or any other characteristic protected by law. **Your Right to Work** – In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification document form upon hire. *Software Engineer, Infrastructure - Python, PostgreSQL, AWS, GCP* *CA-Los Angeles* *GC3-1492994*
          (USA-CA-San Francisco) 100% REMOTE- Senior Software Developer      Cache   Translate Page      
100% REMOTE- Senior Software Developer (Java/AWS) 100% REMOTE- Senior Software Developer (Java/AWS) - Skills Required - Java, AWS, EC2 If you are a Software Developer with Java and AWS experience, please read on! We are a private, for-profit company founded by scientists from Stanford University and based out of the bay area. We are seeking candidate that will take us to the next level and believe in our mission to enable discovery from big data in immunology. We develops, hosts, and supports cloud-computing software applications for scientists to perform single cell analysis. A cloud-based informatics platform that addresses the needs of researchers to manage, analyze, and share flow cytometry data. An opportunity that allows you to take part in collaborating with scientists all over the world learn how our immune system works at a cellular level. A fully funded and backed by FDA organization with huge growth potential. **Top Reasons to Work with Us** Competitive Salary and benefits Stock options, medical benefits, munchies and beverages Contribute to humanity by helping leading scientists around the world discover and develop therapies for cancer, infectious disease, immunological malignancies, among other diseases **What You Will Be Doing** Design and build new backend services on AWS to support our platform Design and build new front-end features API design and development Maintain and improve the performance of existing software Write tests for existing and created code to ensure compatibility and stability **What You Need for this Position** More Than 5 Years of experience and knowledge of: Bachelor's Degree in Computer Science or equivalent Solid understanding of computer science fundamentals, data structure, algorithm distributed systems, and asynchronous or event-driven architectures Excellent Core Java Skills and 4+ years of experience with java frameworks, server side components, libraries, tools on highly scalable backend systems Experience coding and testing applications that use AWS services components such as EC2, API Gateway, Lambda, S3, EBS, RDS, SQS Ability to multi-task easily and juggle priorities in a fast-paced environment Familiarity with source control, Git and working with complex branching Ability to rapidly design, prototype, and iterate to solve problems and fix bugs **What's In It for You** - Competitive base salary - Bonus potential - Regular performance/salary reviews - Healthcare benefits - PTO - Work/life balance - Casual company culture So, if you are a Software Developer with Java and AWS experience, please apply today! Applicants must be authorized to work in the U.S. **CyberCoders, Inc is proud to be an Equal Opportunity Employer** All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status, or any other characteristic protected by law. **Your Right to Work** – In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification document form upon hire. *100% REMOTE- Senior Software Developer* *CA-San Francisco* *DK3-1492980*
          Bright Computing and Huawei Partner to Accelerate HPC with ARM and AI      Cache   Translate Page      

Bright Computing and Huawei Partner to Accelerate HPC with ARM and AI

(PRWeb November 07, 2018)

Read the full story at https://www.prweb.com/releases/bright_computing_and_huawei_partner_to_accelerate_hpc_with_arm_and_ai/prweb15898091.htm


          (USA-CA-Sunnyvale) Full Stack Software Engineer      Cache   Translate Page      
Full Stack Software Engineer (Java, REACT) Full Stack Software Engineer (Java, REACT) - Skills Required - Java, REACT, SQL, Big Data, Spring MVC, Version Control, Enterprise Level Applications, JavaScript, Python, Cloud Computing If you are a Full Stack Software Engineer with experience, please read on! Based in Palo Alto, we are the leading SaaS provider for some of the world's top Consumer Brands! We are internationally recognized for delivering top-notch predictive analytics and big data solutions that have that transformed the way major corporations view their financial data! Join us as we continue to solve big data problems! **Top Reasons to Work with Us** 1.Industry Leader & Career stability 2.Latest technologies 3.Upward career growth and much more! **What You Will Be Doing** -This is a hands-on development role working alongside well-educated engineers, in a high-pace environment! -Design, build and support backend services for managing open data -Developing a new core Java product, implementing robust, well tested, scalable code and -Design, build and deploy high-performance, cloud-based applications including coding, caching mechanisms, state management, error logging, scalability, environment configuration, testing procedures, etc. **What You Need for this Position** Bachelor's Degree in Computer Science or related field and: -3+ years of professional experience developing enterprise applications in Java -Strong JavaScript background using REACT or similar frameworks -Experience working on cloud-based products -Strong Relational Database experience, preferably with PostgreSQL -Experience with Spring and/or Hibernate preferred -Experience working with version control systems **What's In It for You** EXCELLENT benefits Including: - Competitive salaries (DOE) - Bonus - Vacation/PTO - Medical - Dental - Vision - 401(k) and much more! So, if you are a Full Stack Software Engineer with experience, please apply today! Applicants must be authorized to work in the U.S. **CyberCoders, Inc is proud to be an Equal Opportunity Employer** All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status, or any other characteristic protected by law. **Your Right to Work** – In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification document form upon hire. *Full Stack Software Engineer* *CA-Sunnyvale* *BB7-1493018*
          (USA-FL-Sarasota) Full Stack Developer - REMOTE!      Cache   Translate Page      
Full Stack Developer - REMOTE! Full Stack Developer - REMOTE! - Skills Required - AWS, SQL, Java, JavaScript, API Development, NoSQL If you are a Full Stack Developer with experience, please read on! We are a full service tracking platform for publishers seeking ROI optimization and digital marketing analytics. Founded by publishers who saw a need to understand the ROI for each piece of content marketed through various partners, we have proven ourselves a must-have for publishers looking for the most effective way to market their content to the most valuable audience. Recently, we've built one of the top 100 sites in the USA, partnered with the world's leading advertising companies, and have developed a propriety analytics and monetization platform for publishers. **Top Reasons to Work with Us** - OPTION TO WORK REMOTE! (Must live within 90 minutes of Sarasota & be able to visit office for meetings) - Great starting salary up to 120k (depending on experience) + benefits + PTO + other perks - We work with the latest technologies & are always implementing new tools **What You Will Be Doing** You will need to have an established background in developing client-facing experiences, a strong technical ability, great communication skills, a motivation to achieve results in a fast-paced environment, high creativity, great analytical reasoning skills, and, of course a passion for artificial intelligence. You'll work on highly scaled back-end services and cutting edge client-side software. You will develop services that run on Amazon's cloud computing infrastructure (AWS) and have opportunities to interact with teams across Amazon. **What You Need for this Position** Must Have- -2+ years of professional experience in software design and development. -Experience developing in Javascript (we use lots of JavaScript!) -Solid experience with Amazon Web Services (AWS) -Experience with relational databases and SQL -Focus on clean code and solid designs -Experience with full stack development (both front- and back-end) and operation of a customer-facing cloud-based, scalable, production software system Extra Credit- -Experience with critical, 24×7 systems -Experience developing web services, or other scalable distributed systems that have been successfully delivered to customers -Experience writing interactive applications for the web (browser and mobile), and with several of the following: Java, AJAX, JavaScript, MVC frameworks, RDBMS, NoSQL data persistence, API development **What's In It for You** - Competitive base salary and overall compensation package - Full benefits: Medical, Dental, Vision - 401 (K) with generous company match - Generous Paid time off (PTO) - Vacation, sick, and paid holidays - Life Insurance coverage So, if you are a Full Stack Web Developer... 1. Apply directly to this job opening here! Or 2. E-mail directly for more information: alec@cybercoders.com Applicants must be authorized to work in the U.S. **CyberCoders, Inc is proud to be an Equal Opportunity Employer** All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status, or any other characteristic protected by law. **Your Right to Work** – In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification document form upon hire. *Full Stack Developer - REMOTE!* *FL-Sarasota* *AP3-1492968*
          (USA-PA-Latrobe) Utility Forester / Work Planner      Cache   Translate Page      
**Utility Forester – Work Planner (RESUME PREFERRED)** Positions available: Full time **ArborMetrics Solutions, LLC** (AMS) is seeking a motivated and highly skilled individual to provide planning, scheduling, reporting, and project management for utility right-of-way vegetation management programs. **Duties include but are not limited to:** + Inspect right-of-ways to assess vegetation conditions and determine required maintenance activities. + Assist with develop bid package maps and work manifests. + Research easement and land rights for widths, rights and restrictions. + Meet with land owners to explain vegetation management work. + Mark work in the field where required. + Respond to public concerns and questions about the work. + Assist in the development of public relations materials. + Respond to contractor questions concerning work specification and requirements. + Document work activity using GIS equipped computer and custom work planning software. + Inspect work completed by contractors for compliance to utility specifications. + Assist in the management of contractors during storm restoration operations. + Provide support and assistance on special projects as assigned by the utility. **Benefits:** + Company vehicle provided. + Benefits of employment include: health insurance, dental insurance, 401K with company match, paid holidays, paid sick leave, paid vacation, paid training & continuing education opportunities. **Qualifications:** + Due to the inherently dangerous nature of the industry and requirements to work with or around hazardous equipment, employees must be able to maintain attention and concentration for extended periods of time. + 2-4 year degree in Forestry, Natural Resource Sciences/Management, Horticulture or related field. + ISA Certified Arborist or ability to obtain certification within 1 year, ISA Utility Specialist preferred. + Working knowledge of IVM, techniques and equipment used for vegetation management. + Excellent personal computing skills, GIS knowledge preferred. + Valid driver’s license. + At least 2 years applicable work experience preferred but not required. ​​ **Physical Requirements:** - - - **Key:** _Rarely_ = less than 10% _Occasionally_ =up to 33% _Frequently_ = up to 66% _Continuously_ = 67% to 100% - - - **Standing:** _Frequently_ **Seeing:** _Continuously_ **Walking:** _Frequently_ **Reading:** _Frequently_ **Sitting:** _Occasionally_ **Reaching:** _Occasionally_ **Stooping:** _Rarely_ **Range of Motion:** _Occasionally_ **Kneeling:** _Rarely_ **Hearing - Speech Range:** _Frequently_ **Squatting:** _Rarely_ **Depth Perception:** _Frequently_ **Body Twisting:** _Rarely_ **Color Vision:** _Rarely_ **Crawling:** _Rarely_ **Lifting:** _Rarely_ **Sense of Touch:** _Frequently_ **Carrying:** _Occasionally_ **Manual Dexterity:** _Occasionally_ **Pushing:** _Rarely_ **Speaking Clearly:** _Continuously_ **Pulling:** _Rarely_ **Seeing Distant:** _Frequently_ **Climbing Ladders:** _Rarely_ **Climbing On/Off Truck:** _Occasionally_ **Climbing Stairs:** _Rarely_ **Climbing Poles:** _Rarely_ **Balancing:** _Occasionally_ **Gripping:** _Occasionally_ **Lifting up to 10 lbs:** _Occasionally_ **Lifting over 10 lbs to 50 lbs:** _Rarely_ **Lifting up to 50 lbs:** _Rarely_ Hazards: + Works in all temperatures and weather + May work around excessive noise from machines, chain saw, wood chipper and other equipment with hearing protection + May be exposed to nature i.e., irritating plants and biting or stinging insects, and dust + May work on unlevel terrain + May be exposed to dogs and other animals **General Duties and Responsibilities** + Obtains oral/written permission from property owners to trim or remove trees and apply herbicides. Arranges with customer or property owner to obtain access to property, advises of any interruption in services, explains work to be performed, etc. + Discusses responsibility for apparent damage to property, repairs for minor damage, and refers controversial cases to the General Foreperson/Project Coordinator. **RESUME PREFERRED** Individuals must be able to perform the essential functions of the position with or without a reasonable accommodation. Individuals with a disability who desire a reasonable accommodation should contact the ADA Coordinator at 1-800-248-8733, ext 1339. An Equal Opportunity Employer, including disabled and vets.
          (USA-MD-Frederick) Utility Forester / Work Planner      Cache   Translate Page      
**Utility Forester – Work Planner (RESUME PREFERRED)** Positions available: Full time **ArborMetrics Solutions, LLC** (AMS) is seeking a motivated and highly skilled individual to provide planning, scheduling, reporting, and project management for utility right-of-way vegetation management programs. **Duties include but are not limited to:** + Inspect right-of-ways to assess vegetation conditions and determine required maintenance activities. + Assist with develop bid package maps and work manifests. + Research easement and land rights for widths, rights and restrictions. + Meet with land owners to explain vegetation management work. + Mark work in the field where required. + Respond to public concerns and questions about the work. + Assist in the development of public relations materials. + Respond to contractor questions concerning work specification and requirements. + Document work activity using GIS equipped computer and custom work planning software. + Inspect work completed by contractors for compliance to utility specifications. + Assist in the management of contractors during storm restoration operations. + Provide support and assistance on special projects as assigned by the utility. **Benefits:** + Company vehicle provided. + Benefits of employment include: health insurance, dental insurance, 401K with company match, paid holidays, paid sick leave, paid vacation, paid training & continuing education opportunities. **Qualifications:** + Due to the inherently dangerous nature of the industry and requirements to work with or around hazardous equipment, employees must be able to maintain attention and concentration for extended periods of time. + 2-4 year degree in Forestry, Natural Resource Sciences/Management, Horticulture or related field. + ISA Certified Arborist or ability to obtain certification within 1 year, ISA Utility Specialist preferred. + Working knowledge of IVM, techniques and equipment used for vegetation management. + Excellent personal computing skills, GIS knowledge preferred. + Valid driver’s license. + At least 2 years applicable work experience preferred but not required. ​​ **Physical Requirements:** - - - **Key:** _Rarely_ = less than 10% _Occasionally_ =up to 33% _Frequently_ = up to 66% _Continuously_ = 67% to 100% - - - **Standing:** _Frequently_ **Seeing:** _Continuously_ **Walking:** _Frequently_ **Reading:** _Frequently_ **Sitting:** _Occasionally_ **Reaching:** _Occasionally_ **Stooping:** _Rarely_ **Range of Motion:** _Occasionally_ **Kneeling:** _Rarely_ **Hearing - Speech Range:** _Frequently_ **Squatting:** _Rarely_ **Depth Perception:** _Frequently_ **Body Twisting:** _Rarely_ **Color Vision:** _Rarely_ **Crawling:** _Rarely_ **Lifting:** _Rarely_ **Sense of Touch:** _Frequently_ **Carrying:** _Occasionally_ **Manual Dexterity:** _Occasionally_ **Pushing:** _Rarely_ **Speaking Clearly:** _Continuously_ **Pulling:** _Rarely_ **Seeing Distant:** _Frequently_ **Climbing Ladders:** _Rarely_ **Climbing On/Off Truck:** _Occasionally_ **Climbing Stairs:** _Rarely_ **Climbing Poles:** _Rarely_ **Balancing:** _Occasionally_ **Gripping:** _Occasionally_ **Lifting up to 10 lbs:** _Occasionally_ **Lifting over 10 lbs to 50 lbs:** _Rarely_ **Lifting up to 50 lbs:** _Rarely_ Hazards: + Works in all temperatures and weather + May work around excessive noise from machines, chain saw, wood chipper and other equipment with hearing protection + May be exposed to nature i.e., irritating plants and biting or stinging insects, and dust + May work on unlevel terrain + May be exposed to dogs and other animals **General Duties and Responsibilities** + Obtains oral/written permission from property owners to trim or remove trees and apply herbicides. Arranges with customer or property owner to obtain access to property, advises of any interruption in services, explains work to be performed, etc. + Discusses responsibility for apparent damage to property, repairs for minor damage, and refers controversial cases to the General Foreperson/Project Coordinator. **RESUME PREFERRED** Individuals must be able to perform the essential functions of the position with or without a reasonable accommodation. Individuals with a disability who desire a reasonable accommodation should contact the ADA Coordinator at 1-800-248-8733, ext 1339. An Equal Opportunity Employer, including disabled and vets.
          (USA-WV-Berkeley Springs) Utility Forester / Work Planner      Cache   Translate Page      
**Utility Forester – Work Planner (RESUME PREFERRED)** Positions available: Full time **ArborMetrics Solutions, LLC** (AMS) is seeking a motivated and highly skilled individual to provide planning, scheduling, reporting, and project management for utility right-of-way vegetation management programs. **Duties include but are not limited to:** + Inspect right-of-ways to assess vegetation conditions and determine required maintenance activities. + Assist with develop bid package maps and work manifests. + Research easement and land rights for widths, rights and restrictions. + Meet with land owners to explain vegetation management work. + Mark work in the field where required. + Respond to public concerns and questions about the work. + Assist in the development of public relations materials. + Respond to contractor questions concerning work specification and requirements. + Document work activity using GIS equipped computer and custom work planning software. + Inspect work completed by contractors for compliance to utility specifications. + Assist in the management of contractors during storm restoration operations. + Provide support and assistance on special projects as assigned by the utility. **Benefits:** + Company vehicle provided. + Benefits of employment include: health insurance, dental insurance, 401K with company match, paid holidays, paid sick leave, paid vacation, paid training & continuing education opportunities. **Qualifications:** + Due to the inherently dangerous nature of the industry and requirements to work with or around hazardous equipment, employees must be able to maintain attention and concentration for extended periods of time. + 2-4 year degree in Forestry, Natural Resource Sciences/Management, Horticulture or related field. + ISA Certified Arborist or ability to obtain certification within 1 year, ISA Utility Specialist preferred. + Working knowledge of IVM, techniques and equipment used for vegetation management. + Excellent personal computing skills, GIS knowledge preferred. + Valid driver’s license. + At least 2 years applicable work experience preferred but not required. ​​ **Physical Requirements:** - - - **Key:** _Rarely_ = less than 10% _Occasionally_ =up to 33% _Frequently_ = up to 66% _Continuously_ = 67% to 100% - - - **Standing:** _Frequently_ **Seeing:** _Continuously_ **Walking:** _Frequently_ **Reading:** _Frequently_ **Sitting:** _Occasionally_ **Reaching:** _Occasionally_ **Stooping:** _Rarely_ **Range of Motion:** _Occasionally_ **Kneeling:** _Rarely_ **Hearing - Speech Range:** _Frequently_ **Squatting:** _Rarely_ **Depth Perception:** _Frequently_ **Body Twisting:** _Rarely_ **Color Vision:** _Rarely_ **Crawling:** _Rarely_ **Lifting:** _Rarely_ **Sense of Touch:** _Frequently_ **Carrying:** _Occasionally_ **Manual Dexterity:** _Occasionally_ **Pushing:** _Rarely_ **Speaking Clearly:** _Continuously_ **Pulling:** _Rarely_ **Seeing Distant:** _Frequently_ **Climbing Ladders:** _Rarely_ **Climbing On/Off Truck:** _Occasionally_ **Climbing Stairs:** _Rarely_ **Climbing Poles:** _Rarely_ **Balancing:** _Occasionally_ **Gripping:** _Occasionally_ **Lifting up to 10 lbs:** _Occasionally_ **Lifting over 10 lbs to 50 lbs:** _Rarely_ **Lifting up to 50 lbs:** _Rarely_ Hazards: + Works in all temperatures and weather + May work around excessive noise from machines, chain saw, wood chipper and other equipment with hearing protection + May be exposed to nature i.e., irritating plants and biting or stinging insects, and dust + May work on unlevel terrain + May be exposed to dogs and other animals **General Duties and Responsibilities** + Obtains oral/written permission from property owners to trim or remove trees and apply herbicides. Arranges with customer or property owner to obtain access to property, advises of any interruption in services, explains work to be performed, etc. + Discusses responsibility for apparent damage to property, repairs for minor damage, and refers controversial cases to the General Foreperson/Project Coordinator. **RESUME PREFERRED** Individuals must be able to perform the essential functions of the position with or without a reasonable accommodation. Individuals with a disability who desire a reasonable accommodation should contact the ADA Coordinator at 1-800-248-8733, ext 1339. An Equal Opportunity Employer, including disabled and vets.
          stellar - a simplified container runtime cluster      Cache   Translate Page      
_____ __ ____ / ___// /____ / / /___ ______ \__ \/ __/ _ \/ / / __ `/ ___/ ___/ / /_/ __/ / / /_/ / / /____/\__/\___/_/_/\__,_/_/

Simplified Container Runtime Cluster

Stellar is designed to provide simple container runtime clustering. One or more nodes are joined together to create a cluster. The cluster is eventually consistent making it ideal for transient workloads or edge computing where nodes are not always guaranteed to have high bandwidth, low latency connectivity.

Why

There are several container platforms and container orchestrators out there. However, they are too complex for my use. I like simple infrastructure that is easy to deploy and manage, tolerates failure cases and is easy to debug when needed. With the increased tolerance in failure modes, this comes at a consistency cost. It may not be for you. Use the best tool for your use case. Enjoy :)

Features Container execution via containerd Multihost Networking via CNI Service Discovery via DNS Cluster event system via NATS Builtin Proxy using Blackbird (zero downtime reloads, canary deploys, health checks, automatic HTTPS) Masterless design Efficient use of system resources Simple daemon deployment Building

In order to build Stellar you will need the following:

A working Go environment (1.11+) Protoc 3.x compiler and headers (download at the Google releases page )

Once you have the requirements you can build.

If you change / update the protobuf definitions you will need to generate:

make generate

To build the binaries (client and server) run:

make

Docker

Alternatively you can use Docker to build:

To generate protobuf:

make docker-generate

To build binaries:

make docker-build

Running

To run Stellar, once you have a working containerd installation follow these steps:

Install Containerd Build binaries or get a release Copy /bin/sctl to /usr/local/bin/ Copy /bin/stellar to /usr/local/bin/ Copy /bin/stellar-cni-ipam to /opt/containerd/bin/ or /opt/cni/bin

First, we will generate a config:

$> stellar config > stellar.conf

This will produce a default configuration. Edit the addresses to match your environment. For this example we will use the IP 10.0.1.70 .

{ "ConnectionType": "local", "ClusterAddress": "10.0.1.70:7946", "AdvertiseAddress": "10.0.1.70:7946", "Debug": false, "NodeID": "dev", "GRPCAddress": "10.0.1.70:9000", "TLSServerCertificate": "", "TLSServerKey": "", "TLSClientCertificate": "", "TLSClientKey": "", "TLSInsecureSkipVerify": false, "ContainerdAddr": "/run/containerd/containerd.sock", "Namespace": "default", "DataDir": "/var/lib/stellar", "StateDir": "/run/stellar", "Bridge": "stellar0", "UpstreamDNSAddr": "8.8.8.8:53", "ProxyHTTPPort": 80, "ProxyHTTPSPort": 443, "ProxyTLSEmail": "", "GatewayAddress": "127.0.0.1:9001", "EventsAddress": "10.0.1.70:4222", "EventsClusterAddress": "10.0.1.70:5222", "EventsHTTPAddress": "10.0.1.70:4322", "CNIBinPaths": [ "/opt/containerd/bin", "/opt/cni/bin" ], "Peers": [], "Subnet": "172.16.0.0/12" }

To start the initial node run:

$> stellar -D server --config stellar.conf

To join additional nodes simply add the AdvertiseAddress of the first node to the Peers config option of the second node:

For example:

{ "ConnectionType": "local", "ClusterAddress": "10.0.1.71:7946", "AdvertiseAddress": "10.0.1.71:7946", "Debug": false, "NodeID": "dev", "GRPCAddress": "10.0.1.71:9000", "TLSServerCertificate": "", "TLSServerKey": "", "TLSClientCertificate": "", "TLSClientKey": "", "TLSInsecureSkipVerify": false, "ContainerdAddr": "/run/containerd/containerd.sock", "Namespace": "default", "DataDir": "/var/lib/stellar", "StateDir": "/run/stellar", "Bridge": "stellar0", "UpstreamDNSAddr": "8.8.8.8:53", "ProxyHTTPPort": 80, "ProxyHTTPSPort": 443, "ProxyTLSEmail": "", "GatewayAddress": "127.0.0.1:9001", "EventsAddress": "10.0.1.71:4222", "EventsClusterAddress": "10.0.1.71:5222", "EventsHTTPAddress": "10.0.1.71:4322", "CNIBinPaths": [ "/opt/containerd/bin", "/opt/cni/bin" ], "Peers": ["10.0.1.70:7946"], "Subnet": "172.16.0.0/12" }

You will now have a two node cluster. To see node information, use sctl .

$> sctl --addr 10.0.1.70:9000 cluster nodes NAME ADDR OS UPTIME CPUS MEMORY (USED) stellar-00 10.0.1.70:9000 linux (4.17.0-3-amd64) 7 seconds 2 242 MB / 2.1 GB stellar-01 10.0.1.71:9000 Linux (4.17.0-3-amd64) 6 seconds 2 246 MB / 2.1 GB Deploying an Application

To deploy an application, create an application config. For example, create the following as example.conf :

{ "name": "example", "labels": [ "env=prod", "region=us-east" ], "services": [ { "name": "redis", "image": "docker.io/library/redis:alpine", "runtime": "io.containerd.runtime.v1.linux", "process": { "uid": 0, "gid": 0, "args": ["redis-server"] }, "labels": [ "env=prod" ], "network": true } ] }

Then run the following to deploy:

$> sctl --addr 10.0.1.70:9000 apps create -f ./example.conf

You should now see the application deployed:

$> sctl --addr 10.0.1.70:9000 apps list NAME SERVICES example 1 $> sctl --addr 10.0.1.70:9000 apps inspect example Name: example Services: - Name: example.redis Image: docker.io/library/redis:alpine Runtime: io.containerd.runtime.v1.linux Snapshotter: overlayfs Labels: containerd.io/restart.status=running stellar.io/application=example stellar.io/network=true

By default all applications that have networking enabled will have a corresponding nameserver record created. To view the records use the following:

$> sctl --addr 10.0.1.70:9000 nameserver list NAME TYPE VALUE OPTIONS example.redis.stellar A 172.16.0.4 example.redis.stellar TXT node=stellar-00; updated=2018-09-08T10:71:02-04:00


          (USA-MD-Lexington Park) Systems Administrator II      Cache   Translate Page      
**Job Description** The selected candidate will be responsible for supporting and maintaining workstations, laptops, and servers in a development environment. Duties may include setting up administrator and service accounts, maintaining system documentation using MS Word, Excel and Visio, monitoring and tuning system performance, installing system wide software and operating system patches and ensuring network security using ACAS, SCAP and DISA STIGs. Make recommendations to purchase hardware and software, coordinate installation and provide backup recovery. Set up and maintain computer simulators for landing system interfaces. Provides computer support to ensure lab and building security. This position is located in scenic and historic Southern Maryland in the St. Mary's County Technology Corridor adjacent to the Patuxent River Naval Air Station. There is no monetary relocation assistance budgeted for this position. Applicants must be currently residing in or state willingness to relocate self to St. Mary's County, Maryland or surrounding areas. Please be sure to address all requirements of posted requisition in resume. Only resumes that include all requirements will be considered. **Typical Education & Experience** High School diploma and at least 6 years of Department of Defense related IT experience or Associate Degree and 4 years of DoD related IT experience or Bachelor's degree and 2 years of related DoD IT experience **Required Skills and Education** High School diploma and at least 6 years of Department of Defense related IT experience or Associate Degree and 4 years of DoD related IT experience or Bachelor's degree and 2 years of related DoD IT experience Ability to obtain and maintain the required security clearance IAT Level II Certification (CompTIA Security CE or equivalent) Microsoft Operating System Certification (MCITP, MCP, MCSE, etc.) Strong experience with Microsoft Windows 7/10 and Server 2016 operating systems Experience working with Microsoft Windows Active Directory creating/removing users and computers and resetting user account passwords Experience creating and applying domain group policy objects Strong technical troubleshooting and problem solving skills Experience with RedHat and CentOS Linux Local Area Network knowledge and troubleshooting experience **Preferred Skills and Education** Active security clearance ACAS experience Experience applying DISA STIGs and performing SCAP scans Microsoft Windows OS and/or Linux OS certifications Knowledge of Navy landing systems and interfaces **About BAE Systems Intelligence & Security** BAE Systems is a premier global defense and security company with approximately 90,000 employees delivering a full range of products and services for air, land and naval forces, as well as advanced electronics, security, information technology solutions and customer support and services. Information Solutions, based in Reston, Virginia, is among the 10 largest IT providers to the U.S. government, serving most of the federal defense and civilian marketplace. It provides network-centric command, control, computing, and intelligence (C3I) solutions; wideband networking radio systems; information systems for the U.S. intelligence community; geospatial information services; and information technology services. Leveraging its knowledge of signals and data derived from signals, Information Solutions has attained a market-leading position in advanced information technology research, intelligence analysis and production, and geospatial exploitation software. Equal Opportunity Employer/Females/Minorities/Veterans/Disabled/Sexual Orientation/Gender Identity/Gender Expression **Systems Administrator II** **BAE1US21203** EEO Career Site Equal Opportunity Employer. Minorities . females . veterans . individuals with disabilities . sexual orientation . gender identity . gender expression
          (USA-MN-Minneapolis) Structural Dynamics Analyst      Cache   Translate Page      
**Job Description** BAS Systems is seeking a structural-dynamics analyst to join our team at our Minneapolis location.The primary responsibilities would be working with one or more munitions and weapons programs under the direction of a senior analyst to provide structural analysis needed to support design and testing.Our primary analysis tool is ABAQUS, and we also use ANSYS, COMSOL, and NASTRAN.The position works within an interdisciplinary design team supporting the iterative and evolving design process.Primary responsibilities include: Working with senior analysts and program engineers to meet program analysis needs-?xml:namespace prefix = "o" /-> Working on the analysis throughout the entire process, from using the appropriate tools and inputs to performing the simulation on internal computing assets and other computations as needed Working with our internal materials group to gather or measure the needed material properties Providing detailed results and recommendations to the senior analyst and program engineers **Typical Education & Experience** Typically a Bachelor's Degree and 2 years work experience or equivalent experience **Required Skills and Education** + Bachelor s Degree in Mechanical Engineering or equivalent field plus 2 years of experience, or Master s Degree in Mechanical Engineering or equivalent field + Experience performing FEA simulations on complex geometries and load cases + Experience generating detailed reports and analysis of simulation results + Experience using one or more of these analysis tools: ABAQUS, ANSYS, NASTRAN, COMSOL + Familiarity with MATLAB **Preferred Skills and Education** + Experience in structural analysis in defense-related applications + Proficiency using one or more of these analysis tools: ABAQUS, ANSYS, NASTRAN, COMSOL + Working knowledge of fluid-structure interaction phenomena or other multi-physics environments + Experience using MATLAB + Familiarity with Pro/E or Creo + Familiarity with material testing techniques that support structural dynamics analysis **About BAE Systems Platforms & Services** BAE Systems is a premier global defense and security company with approximately 90,000 employees delivering a full range of products and services for air, land and naval forces, as well as advanced electronics, security, information technology solutions and customer support and services. Platforms & Services designs, develops, produces, supports, maintains, modernizes and upgrades armored combat vehicles, wheeled vehicles, naval guns, surface ship combatants, commercial vessels, missile launchers, artillery systems, military ordnance, and protective wear and armor. Equal Opportunity Employer: Females/Minorities/Veterans/Disability/Sexual Orientation/Gender Identity/Gender Expression **Structural Dynamics Analyst** **BAE1US21213** EEO Career Site Equal Opportunity Employer. Minorities . females . veterans . individuals with disabilities . sexual orientation . gender identity . gender expression
          11/7/2018: | POLITICS POLICY: Effective mgmt of tech leads to better work-life balance Flexible Timings To Help Employees Cope With Stress      Cache   Translate Page      
Our life has transformed as we transition from an analogue to a digital world. We are connected 24x7 through technology. Apart from connected devices, cloud computing and artificial intelligence (AI), our world seems digitised in more ways than...
          neurosciencestuff: Machine-learning system processes sounds like...      Cache   Translate Page      


neurosciencestuff:

Machine-learning system processes sounds like humans do

Using a machine-learning system known as a deep neural network, MIT researchers have created the first model that can replicate human performance on auditory tasks such as identifying a musical genre.

This model, which consists of many layers of information-processing units that can be trained on huge volumes of data to perform specific tasks, was used by the researchers to shed light on how the human brain may be performing the same tasks.

“What these models give us, for the first time, is machine systems that can perform sensory tasks that matter to humans and that do so at human levels,” says Josh McDermott, the Frederick A. and Carole J. Middleton Assistant Professor of Neuroscience in the Department of Brain and Cognitive Sciences at MIT and the senior author of the study. “Historically, this type of sensory processing has been difficult to understand, in part because we haven’t really had a very clear theoretical foundation and a good way to develop models of what might be going on.”

The study, which appeared in the April 19 issue of Neuron, also offers evidence that the human auditory cortex is arranged in a hierarchical organization, much like the visual cortex. In this type of arrangement, sensory information passes through successive stages of processing, with basic information processed earlier and more advanced features such as word meaning extracted in later stages.

MIT graduate student Alexander Kell and Stanford University Assistant Professor Daniel Yamins are the paper’s lead authors. Other authors are former MIT visiting student Erica Shook and former MIT postdoc Sam Norman-Haignere.

Modeling the brain

When deep neural networks were first developed in the 1980s, neuroscientists hoped that such systems could be used to model the human brain. However, computers from that era were not powerful enough to build models large enough to perform real-world tasks such as object recognition or speech recognition.

Over the past five years, advances in computing power and neural network technology have made it possible to use neural networks to perform difficult real-world tasks, and they have become the standard approach in many engineering applications. In parallel, some neuroscientists have revisited the possibility that these systems might be used to model the human brain.

“That’s been an exciting opportunity for neuroscience, in that we can actually create systems that can do some of the things people can do, and we can then interrogate the models and compare them to the brain,” Kell says.

The MIT researchers trained their neural network to perform two auditory tasks, one involving speech and the other involving music. For the speech task, the researchers gave the model thousands of two-second recordings of a person talking. The task was to identify the word in the middle of the clip. For the music task, the model was asked to identify the genre of a two-second clip of music. Each clip also included background noise to make the task more realistic (and more difficult).

After many thousands of examples, the model learned to perform the task just as accurately as a human listener.

“The idea is over time the model gets better and better at the task,” Kell says. “The hope is that it’s learning something general, so if you present a new sound that the model has never heard before, it will do well, and in practice that is often the case.”

The model also tended to make mistakes on the same clips that humans made the most mistakes on.

The processing units that make up a neural network can be combined in a variety of ways, forming different architectures that affect the performance of the model.

The MIT team discovered that the best model for these two tasks was one that divided the processing into two sets of stages. The first set of stages was shared between tasks, but after that, it split into two branches for further analysis — one branch for the speech task, and one for the musical genre task.

Evidence for hierarchy

The researchers then used their model to explore a longstanding question about the structure of the auditory cortex: whether it is organized hierarchically.

In a hierarchical system, a series of brain regions performs different types of computation on sensory information as it flows through the system. It has been well documented that the visual cortex has this type of organization. Earlier regions, known as the primary visual cortex, respond to simple features such as color or orientation. Later stages enable more complex tasks such as object recognition.

However, it has been difficult to test whether this type of organization also exists in the auditory cortex, in part because there haven’t been good models that can replicate human auditory behavior.

“We thought that if we could construct a model that could do some of the same things that people do, we might then be able to compare different stages of the model to different parts of the brain and get some evidence for whether those parts of the brain might be hierarchically organized,” McDermott says.

The researchers found that in their model, basic features of sound such as frequency are easier to extract in the early stages. As information is processed and moves farther along the network, it becomes harder to extract frequency but easier to extract higher-level information such as words.

To see if the model stages might replicate how the human auditory cortex processes sound information, the researchers used functional magnetic resonance imaging (fMRI) to measure different regions of auditory cortex as the brain processes real-world sounds. They then compared the brain responses to the responses in the model when it processed the same sounds.

They found that the middle stages of the model corresponded best to activity in the primary auditory cortex, and later stages corresponded best to activity outside of the primary cortex. This provides evidence that the auditory cortex might be arranged in a hierarchical fashion, similar to the visual cortex, the researchers say.

“What we see very clearly is a distinction between primary auditory cortex and everything else,” McDermott says.

Alex Huth, an assistant professor of neuroscience and computer science at the University of Texas at Austin, says the paper is exciting in part because it offers convincing evidence that the early part of the auditory cortex performs generic sound processing while the higher auditory cortex performs more specialized tasks.

“This is one of the ongoing mysteries in auditory neuroscience: What distinguishes the early auditory cortex from the higher auditory cortex? This is the first paper I’ve seen that has a computational hypothesis for that,” says Huth, who was not involved in the research.

The authors now plan to develop models that can perform other types of auditory tasks, such as determining the location from which a particular sound came, to explore whether these tasks can be done by the pathways identified in this model or if they require separate pathways, which could then be investigated in the brain.


          Apple MacBook Air (2018) Review: The Present Of Computing, by Dieter Bohn, The Verge      Cache   Translate Page      

People like the Mac. It’s great to have a computer that does all of the computer stuff you want in a way you’re familiar with. Until recently, the best computer for most people was the MacBook Air, and Apple took way too long to update it. So people have been waiting. And waiting.

Now, the wait is over. But if you were hoping that lightning would strike twice and this new MacBook Air would be as revolutionary as the old MacBook Air, well, it’s not. It’s basically a MacBook that finally includes all of the stuff that has been happening with laptops for the past few years. It is on par with the rest of the laptop world, but it hasn’t moved beyond it. Sometimes that means the fan is going to spin up on you.


          Support system for ATLAS distributed computing operations      Cache   Translate Page      
The ATLAS distributed computing system has allowed the experiment to successfully meet the challenges of LHC Run 2. In order for distributed computing to operate smoothly and efficiently, several support teams are organized in the ATLAS experiment. The ADCoS is a dedicated group of shifters who follow and report failing jobs, failing data transfers between sites, degradation of ATLAS central computing services, and more. The DAST provides user support to resolve issues related to running distributed analysis on the Grid. The CRC maintains a global view of the day- to-day operations. In this paper, the status and operational experience of the support system for ATLAS distributed computing in LHC Run 2 are reported. This report also includes operation experience from the Grid site point of view, and an analysis of the errors that create the biggest waste of wallclock time. The report of operation experience will focus on some of the more time-consuming tasks for shifters, and on the introduction of new technologies, such as machine learning, to ease the work.
          Product Line Manager - VMware Cloud on AWS - Bellevue, WA 98005      Cache   Translate Page      
Business Summary: We re changing the way enterprises run their cloud infrastructure and building the next generation of cloud computing. You will be responsible for...
          Senior Software Development Engineer - Distributed Computing Services (Hex) - Amazon.com - Seattle, WA      Cache   Translate Page      
Knowledge and experience with machine learning technologies. We enable Amazon’s internal developers to improve time-to-market by allowing them to simply launch...
From Amazon.com - Thu, 26 Jul 2018 19:20:25 GMT - View all Seattle, WA jobs
          Sondage : selon vous, quelles sont les meilleures bases de données en mode cloud (DBaaS) pour les développeurs ? Partagez vos avis      Cache   Translate Page      
Selon vous, quelles sont les meilleures bases de données en mode cloud (DBaaS) pour les développeurs ? Pourquoi ?
Partagez vos avis

De nos jours, force est de constater que le cloud computing est considéré par la plupart d'entre nous comme une véritable révolution informatique. En effet, ce dernier est aujourd'hui utilisé aussi bien par les entreprises que par les particuliers et les professionnels pour sauvegarder des données. Comme évoqué dans notre précédent sondage, « nous ne...
          Outbound Computer Technician - Arrow Technology Group - High Level, AB      Cache   Translate Page      
Must have valid driver’s license and reliable vehicle. Administer all IT equipment – desktop computing, servers, printers, telephone instruments and equipment,...
From Indeed - Thu, 25 Oct 2018 20:18:31 GMT - View all High Level, AB jobs
          New research center to explore spintronics materials for advanced computing      Cache   Translate Page      
Advances in the materials needed for spintronics devices could enable new computational systems, including neuromorphic systems inspired by the human brain that promise to dramatically improve the efficiency of important tasks.
          Senior Information Security Consultant - Network Computing Architects, Inc. - Bellevue, WA      Cache   Translate Page      
With the ability to interface and communicate at the executive level, i.e. CIO's, CTO's and Chief Architects....
From Network Computing Architects, Inc. - Wed, 10 Oct 2018 05:21:36 GMT - View all Bellevue, WA jobs
          Radio Free HPC Podcast: A Look at the Spaceborne Supercomputer One Year Later      Cache   Translate Page      
In this podcast, the Radio Free HPC team sits down with Mark Fernandez from HPE to discuss the Spaceborne Supercomputer that it currently orbiting the planet in the International Space Station.

Last week, HPE announced it is opening high-performance computing capabilities to astronauts on the International Space Station (ISS) as part of its continued experiments on the Spaceborne Computer project.

Spaceborne Computer is the first commercial off-the-shelf (COTS) supercomputer that HPE and NASA launched into space for a one-year experiment to test resiliency and performance, achieving one teraFLOP (a trillion floating point operations per second) and successfully operating on the International Space Station (ISS).  After completing its one-year mission proving it can withstand harsh conditions of space – such as zero gravity, unscheduled power outages, and unpredictable levels of radiation – Spaceborne Computer will now, for the first time ever, open its supercomputing capabilities for use aboard the ISS. These “above-the-cloud” services will allow space explorers and experimenters to run analyses directly in space instead of transmitting data to and from Earth for insight.

After that, we do our Catch of the Week.

Download the MP3 * Subscribe on iTunes * RSS Feed

Sign up for our insideHPC Newsletter.
          A computational scheme of pKa values based on the three-dimensional reference interaction site model self-consistent field theory coupled with the linear fitting correction scheme      Cache   Translate Page      

Phys. Chem. Chem. Phys., 2018, 20,27272-27279
DOI: 10.1039/C8CP04354J, Paper
Ryo Fujiki, Yukako Kasai, Yuki Seno, Toru Matsui, Yasuteru Shigeta, Norio Yoshida, Haruyuki Nakano
A scheme for quantitatively computing the acid dissociation constant of hydrated molecules is proposed based on 3D-RISM-SCF and LFC methods.
The content of this RSS Feed (c) The Royal Society of Chemistry

          An Efficient Protocol for Computing the pKa of Zn-bound Water      Cache   Translate Page      
Phys. Chem. Chem. Phys., 2018, Accepted Manuscript
DOI: 10.1039/C8CP05029E, Paper
Cedric Grauffel, Benjamin Chu, Carmay Lim
At a given pH, whether a metal-bound water molecule is deprotonated or not can be determined if the pKa of the metal-bound water molecule (denoted as pKw) is known. Whereas...
The content of this RSS Feed (c) The Royal Society of Chemistry

          Healthcare Cognitive Computing Market Share,Trends,Business Strategy and Forecast to 2025      Cache   Translate Page      
(EMAILWIRE.COM, November 06, 2018 ) An exclusive Healthcare Cognitive Computing Market research report created through broad primary research (inputs from industry experts, companies, and stakeholders) and secondary research, the report aims to present the analysis of Global Healthcare Cognitive...
          Senior Reverse Engineer - Irdeto - Ottawa, ON      Cache   Translate Page      
Our Security Assurance team is an Ethical Hacking group within Irdeto bringing its considerable knowledge of the dark corners of computing to bear against...
From Irdeto - Mon, 22 Oct 2018 08:49:48 GMT - View all Ottawa, ON jobs
          100% REMOTE- Senior Software Developer (Java/AWS)      Cache   Translate Page      
CA-San Francisco, If you are a Software Developer with Java and AWS experience, please read on! We are a private, for-profit company founded by scientists from Stanford University and based out of the bay area. We are seeking candidate that will take us to the next level and believe in our mission to enable discovery from big data in immunology. We develops, hosts, and supports cloud-computing software applications
          Wellington gets two super computers – ten times as fast as before      Cache   Translate Page      
News from NZ Government Research, Science and Innovation Minister Dr Megan Woods today officially opened New Zealand’s High Performance Computing Facility at NIWA’s campus in Wellington. The High Performance Computing Facility comprises three new interconnected supercomputers – two based in Wellington and one in Auckland – that will meet the needs of New Zealand researchers […]
          MuleSoft Architect - Silverline Jobs - Casper, WY      Cache   Translate Page      
Company Overview: Do you want to be part of a fast-paced environment, supporting the growth of cutting edge technology in cloud computing? Silverline...
From Silverline Jobs - Fri, 05 Oct 2018 00:30:11 GMT - View all Casper, WY jobs
          Tower company SBA jumps into edge computing with Packet deal      Cache   Translate Page      
Edge computing company Packet announced that it has broken ground on its first Boston edge computing data center location; the data center sits at the base of a cell tower operated by SBA Communications. The companies said they expect the location will be open for customers by the end of this year.
          Adventures in Open Source: #OSMC 2018 – Day 0: Prometheus Training      Cache   Translate Page      

To most people, monitoring is not exciting, but it seems lately that the most exciting thing in monitoring is the Prometheus project. As a project endorsed by the Cloud Native Computing Foundation, Prometheus is getting a lot of attention, especially in the realm of cloud applications and things like monitoring Kubernetes.

At this year’s Open Source Monitoring Conference they offered a one day training course, so I decided to take it to see what all the fuss was about. I apologize in advance that a lot of this post will be comparing Prometheus to OpenNMS, but in case you haven’t guessed I’m biased (and a bit jealous of all the attention Prometheus is getting).

The class was taught by Julian Pivotto who is both a Prometheus user and a decent instructor. The environment consisted of 15 students with laptops set up on a private network to give us something to monitor.

Prometheus is written in Go (I’m never sure if I should call it “Go” or if I need to say “Golang”) which makes it compact and fast. We installed it on our systems by downloading a tarball and simply executing the application.

Like most applications written in the last decade, the user interface is accessed via a browser. The first thing you notice is that the UI is incredibly minimal. At OpenNMS we get a lot of criticism of our UI, but the Prometheus interface is one step above the Google home page. The main use of the web page is for querying collected metrics, and a lot of the configuration is done by editing YAML files from the command line.

Once Prometheus was installed and running, the first thing we looked at was monitoring Prometheus itself. There is no real magic here. Metrics are exposed via a web page that simply lists the variables available and their values. The application will collect all of the values it finds and store them in a time series database called simply the TSDB.

The idea of exposing metrics on a web page is not new. Over a decade ago we at OpenNMS were approached by a company that wanted us to help them create an SNMP agent for their application. We asked them why they needed SNMP and found they just wanted to expose various metrics about their app to monitor its performance. Since it ran on Linux system with an embedded web server, we suggested that they just write the values to a file, put that in the webroot, and we would use the HTTP Collector to retrieve and store them.

The main difference between that method and Prometheus is that the latter expects the data to be presented in a particular format, whereas the OpenNMS method was more free-form. Prometheus will also collect all values presented without extra configuration, whereas you’ll need to define the values of interest within OpenNMS.

In Prometheus there is no real auto-discovery of devices. You edit a file in which you create a “job”, in our case the job was called “Prometheus”, and then you add “targets” based on IP address and port. As we learned in the class, for each different source of metrics there is usually a custom port. Prometheus stats are on port 9100, node data is exposed on 9090 via the node_exporter, etc. When there is an issue, this can be reflected in the status of the job. For example, if we added all 15 Prometheus instances to the job “Prometheus” and one of them went down, then the job itself would show as degraded.

After we got Prometheus running, we installed Grafana to make it easier to display the metrics that Prometheus was capturing. This is a common practice these days and a good move since more and more people are becoming familiar it. OpenNMS was the first third-party datasource created for Grafana, and the Helm application brings bidirectional functionality for managing OpenNMS alarms and displaying collected data.

After that we explored various “components” for Prometheus. While a number of applications are exposing their data in a format that Prometheus can consume, there are also other components that can be installed, such as the node_exporter which displays server-related metrics and to provide data that isn’t otherwise natively available.

The rest of the class was spent extending the application and playing with various use cases. You can “federate” Prometheus to aggregate some of the collected data from multiple instance under one, and you can separate out your YAML files to make them easier to read and manage.

The final part of the class was working with the notification component called the “alertmanager” to trigger various actions based on the status of metrics within the system.

One thing I wish we could have covered was the “push” aspect of Prometheus. Modern monitoring is moving from a “pull” model (i.e. SNMP) to a “push” model where applications simply stream data into the monitoring system. OpenNMS supports this type of monitoring through the telemetryd feature, and it would be interesting to see if we could become a sink for the Prometheus push format.

Overall I enjoyed the class but I fail to see what all the fuss is about. It’s nice that developers are exposing their data via specially formatted web pages, but OpenNMS has had the ability to collect data from web pages for over a decade, and I’m eager to see if I can get the XML/JSON collector to work with the native format of Prometheus. Please don’t hate on me if you really like Prometheus – it is 100% open source and if it works for you then great – but for something to manage your entire network (including physical servers and especially networking equipment like routers and switches) you will probably need to use something else.


          A billion aircraft: the future of drones      Cache   Translate Page      
If US futurist Thomas Frey is right, in only 12 years drones will be as ubiquitous as cars. Frey says there will be 1 billion drones in use around the world by 2030. What exotic new roles will these combinations of computing, robotics and aerodynamics play in society? Here are a few exciting new ways […]
          Apps&Tools kombinieren oder Branchenlösungen verwenden-      Cache   Translate Page      
Cloud-Computing und Apps. Das sind die Trends für Microsoft Dynamics 365, den Unidienst bei den eigenen Produkten mitgeht. Allerdings nicht immer und nicht mit allen Mitteln. Warum? Geschäftsführer Bert Enzinger steht nach wie vor hinter seinen Branchenlösungen und findet, dass diese jederzeit eine gute Wahl sind. Microsoft baut die Cloud-Lösungen stetig aus und bietet mit […]
          Senior Director of AWS Alliances - Snowflake Computing - Alwal, Hyderabad, Telangana      Cache   Translate Page      
Develop and manage Snowflake's relationship with our Cloud Alliances (Microsoft, Amazon, Google, Tableau, Looker, MicroStrategy, Informatica, Talend and others...
From Snowflake Computing - Wed, 03 Oct 2018 22:11:40 GMT - View all Alwal, Hyderabad, Telangana jobs
          Senior Manager of Cloud Alliances - Snowflake Computing - Alwal, Hyderabad, Telangana      Cache   Translate Page      
Develop and manage Snowflake's relationship with our Cloud Alliances (Microsoft, Amazon, Google, Tableau, Looker, MicroStrategy, Informatica, Talend and others...
From Snowflake Computing - Thu, 23 Aug 2018 22:11:25 GMT - View all Alwal, Hyderabad, Telangana jobs
          Antenados e ambiciosos, profissionais de mais de 60 anos viram empreendedores digitais: 'Sou um jovem de 67 anos'      Cache   Translate Page      

Diversas motivações levam pessoas mais experientes para este mercado, como a realização de objetivos pessoais ou a busca por investimentos. 'Sou um jovem de 67 anos', brinca o empreendedor Paulo Camiz BBC Startup, coworking, big data, cloud computing, firewall, chatbot, malware… até pouco tempo, esses termos eram utilizados mais comumente pelos jovens. Hoje em dia, no entanto, eles têm feito parte do dia a dia de muitos dos que passaram dos 60 anos, e olha que no Brasil já são mais de 30 milhões, segundo o IBGE (Instituto Brasileiro de Geografia e Estatística). O fato é que é o aumento da longevidade - só para se ter uma ideia, a expectativa de vida no país subiu de 45,5 anos em 1940 para 75,8 anos em 2016 -, a queda da taxa de fecundidade (a projeção para este ano é de 1,77 filho por mulher e, em 2060, 1,66) e a melhora na saúde como um todo estão promovendo mudanças na sociedade, fazendo com que uma grande parcela da população idosa adie a aposentadoria e empreenda, em especial na área de tecnologia e, mais ainda, na de negócios digitais (ou online). A pesquisa qualitativa e quantitativa "Tsunami Prateado", conduzida pela Pipe.Social e Hype60+ com 2.330 entrevistados, mostra exatamente isso. Pelos dados computados, um em cada 4 (25%) declarou que deseja ter sua própria empresa no futuro, e muitos estão criando negócios inovadores, até por conta da dificuldade em encontrar produtos e serviços que atendam as suas necessidades. É o caso de Veronique Forat e Marta Monteiro, de 61 e 64 anos, respectivamente. As duas desenvolveram a plataforma de residência compartilhada morar.com.vc, que conecta pessoas com base nas suas características, demandas e afinidades para morarem juntas em "cohousing" ou "coliving". Elas se conheceram em julho de 2016 no workshop "Reinvenção do Trabalho 60+", do Lab60+, e perceberam que tinham algo em comum, além de energia de sobra e vontade de continuar trabalhando, de preferência em algo diferente do que já faziam: o interesse por novos modelos de moradia. "Vimos aí uma oportunidade, mas, antes de dar qualquer passo, fizemos uma pesquisa informal para verificar se havia mesmo mercado para isso. Em 10 dias, recebemos 1,2 mil respostas, das quais 85% eram positivas. Depois, criamos um site, mesmo sem experiência nenhuma, e fomos atrás de apoio", conta Veronique. Marta Monteiro e Veronique Forat desenvolveram juntas plataforma voltada para o mercado da moradia BBC Para a empreendedora, que atuava na área de marketing de relacionamento - sua sócia era do mercado imobiliário -, iniciar um novo negócio depois dos 60 anos tem algumas vantagens. "Nossa bagagem é maior. Fora isso, é uma maneira de acabar com estereótipos errôneos sobre o que é envelhecer. Ser velho não tem de ser algo depreciativo e, com o aumento da longevidade, estamos chegando em idades mais avançadas de uma forma diferente, com saúde, disposição e ainda tendo muito a contribuir profissionalmente." Veronique destaca ainda que não é preciso ser expert em tecnologia para ter um negócio digital. "No nosso caso, não estamos inventando um hardware ou um software, mas apenas utilizando a tecnologia para preencher uma necessidade, com o benefício de atender em uma escala maior, com um custo mais baixo e de forma mais fácil e rápida." Oportunidades para todos Outro profissional sênior que enxergou uma oportunidade no mundo online foi Paulo Camiz de Fonseca, de 67 anos. Engenheiro formado pela Escola Politécnica da Universidade de São Paulo (Poli-USP) e administrador pela Fundação Getulio Vargas (FGV), ele, junto com o filho, o clínico geral e geriatra Paulo Camiz de Fonseca Filho, criaram há cerca de dois anos e meio o Mente Turbinada. Trata-se de um aplicativo que ajuda a exercitar o cérebro, por meio de jogos 3D, com o objetivo de prevenir e reabilitar doenças neurológicas, melhorar a performance profissional e auxiliar a concentração e a memorização. Inicialmente desenvolvido para a terceira idade, ele pode ser usado por pessoas de qualquer faixa etária. Recentemente, a dupla também lançou o Attena, sistema de avaliação cognitiva de perfil de pessoas que estão em busca de uma vaga no mercado de trabalho, a fim de facilitar a contratação por parte das empresas. O programa analisa o grau de concentração e de atenção, a memória de curto e longo prazos, a capacidade de aprendizado e como está a percepção, o raciocínio e a velocidade de processamento mental do candidato. "Estamos cada vez mais dependentes da tecnologia, tanto na parte pessoal quanto na profissional, e empreender em uma área diferente seria até um contrassenso. As possibilidades estão aí, basta ficar atento, independentemente da idade. Eu, por exemplo, sou um jovem de 67 anos", declara Camiz em tom bem humorado. Sempre atuando na área de informática, Kazuo Kaneto, de 71 anos, empreendeu pela primeira vez aos 60 anos de idade, quando criou o sistema de gestão escolar Babica. Uma década depois, ele decidiu que era hora de se aposentar e passou o comando da empresa para os filhos. Mas o descanso durou pouco. "Cheguei num ponto em que eu podia passear, viajar ou ficar sem fazer nada, mas não era isso o que queria. Então, apaguei todo o passado e recomecei. Passei quase um ano estudando o mercado digital e tive a ideia de nova ferramenta para a área de educação, para que o professor possa acompanhar a evolução do aluno com base em habilidade e competência", revela. Segundo Kaneto, não existe idade para aprender e empreender. "Claro que o corpo físico não é mais o mesmo, exigindo que a gente diminua o ritmo. Mas com a mente não é assim, ela não definha. Quando a treinamos, conseguimos avolumar o nível de conhecimento", complementa. Empreendedores da terceira idade De acordo com a pesquisa Empreendedorismo na 3ª Idade, realizada pelo Serviço Brasileiro de Apoio às Micro e Pequenas Empresas (Sebrae), no geral, são quatro os motivos que levam uma pessoa com 60 anos ou mais a continuar empreendendo ou mesmo iniciar-se neste caminho: ter uma fonte de renda ou complementar a renda familiar, identificação de uma área ou segmento bom para investir, questões pessoais (mais independência, qualidade de vida e liberdade) e concretização de um sonho, objetivo ou vocação. O levantamento ainda demonstra que 40% dos entrevistados resolveram montar um negócio próprio após os 60 anos. Dentre os pontos positivos dessa empreitada, eles disseram trabalhar com o que se gosta (18%), poder aprender sempre com os erros e acertos (14%) e ter a sensação de satisfação por ter alcançado os objetivos (14%). Os negativos foram ter que assumir sozinho as frustrações e os fracassos (15%), pagar impostos (13%) e correr riscos (11%). "Temos realmente percebido as pessoas empreendendo em idades mais avançadas, pelas razões citadas no estudo, e também porque elas querem aproveitar a experiência profissional e empresarial que adquiriam ao longo da vida. Fora isso, muitos sempre tiveram o desejo de empreender e não tiveram oportunidade antes", expõe Vinicius Lages, diretor de Administração e Finanças do Sebrae. Quando se trata da área de tecnologia, ele comenta que barreiras têm sido quebradas por conta da democratização de ferramentas que antes precisavam de um grande domínio. "Os empresários mais velhos estão começando a explorar melhor os negócios conectados. E, apesar de não serem nativos do mundo da internet, eles sabem que ela é fundamental para o sucesso", complementa. Rodrigo Garzi, cofundador do Alto Tietê Valley, comunidade de startups da região do Alto Tietê, em São Paulo, e coordenador do Polo Digital de Mogi das Cruzes, que, atualmente, conta com 1,5 mil pessoas inscritas, sendo 10% com 60 anos ou mais - Kazuo Kaneto é uma delas -, avalia que este é mesmo um ótimo segmento para se investir, inclusive em idades mais avançadas. "São muitas as possibilidades, sem contar a flexibilidade, tanto de local quanto de horário, e os idosos ainda têm uma vantagem em relação aos jovens. Como estão no mercado há mais tempo, conhecem certos atalhos, dão valor a processos e organizações e têm mais conexões e network", observa. A pesquisa do Sebrae pontua que estes profissionais também se diferenciam por serem mais seguros e corajosos e por terem credibilidade, mais tranquilidade, liberdade e respeito. Kaneto tentou descansar, mas logo voltou a trabalhar para desenvolver uma ferramenta digital para a educação BBC Dicas para quem quer empreender no mundo digital Para quem quer começar a empreender na área digital, algumas recomendações são necessárias, e isso independe da idade. Lages indica pesquisar, se preparar ao máximo e entender o mercado e seus riscos. "O interessante é que na nova economia não é preciso fazer grandes investimentos em equipamento e estoque. Por outro lado, exige um cuidado maior com o cliente, pois ele se tornou mais exigente", acrescenta. Renata Zanuto, head de startups do Cubo Itaú, um dos maiores hubs de fomento ao empreendedorismo tecnológico da América Latina, aconselha o futuro empreendedor a se envolver no ecosistema das startaups. "Ele deve participar de eventos, se engajar em alguma comunidade ou grupo e estudar para adquirir conhecimento, além de fazer contatos e parcerias e estar aberto a colaborações, a compartilhar e ouvir as ideias de quem está em volta", finaliza.
          Embedded Subscriber Identity Module Market to Reach $6.88 Bn, Globally, at 30.7% CAGR, by 2025, Says Allied Market Research      Cache   Translate Page      

PORTLAND, Oregon, November 7, 2018 /PRNewswire/ -- Extensive adoption of IoT, cloud computing, and connected devices; favorable government regulations boosting machine-to-machine communications; technological advancements among the various industry sectors drive the growth of the embedded ...


          $166.10 - Single Slot Mobile Computer Cradle For MC3000      Cache   Translate Page      
#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000

Model #: CRD3000-100RES
Item #: N82E16858994228
Price: $166.10
Save: 24%
Add To Cart


          $61.31 - Motorola BTRY-MC7XEAB00 Lithium Ion Mobile Computer Battery      Cache   Translate Page      
#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000

Model #: BTRY-MC7XEAB00
Item #: N82E16858994134
Price: $61.31
Save: 39%
Add To Cart


          Associate Faculty in Informatics, Data Mining and Data Analytics      Cache   Translate Page      
IN-Indianapolis, The Department of Human-Centered Computing, School of Informatics and Computing, seeks one Associate Faculty to teach one or more sections of the INFO-I421 Applications of Data Mining course. This undergraduate course is offered in the fall and spring semesters. Depending on the enrollment, we also may offer the course during summer sessions. Course Description The course explores the use of data
          Associate Faculty in Cloud Computing and Service-oriented Web Applications      Cache   Translate Page      
IN-Indianapolis, The Department of Human-Centered Computing, School of Informatics and Computing at IUPUI, seeks an Associate Faculty to teach the INFO I425 Web Services in Information Systems course. This undergraduate course is offered in the fall and spring semesters. Depending on the enrollment, we also may offer the course during summer sessions. Course Description This course examines how cloud computing and
          Racing the clock      Cache   Translate Page      
Ten teams of students waited to see what their efforts were worth as the room fell silent in anticipation as assistant professor of software engineering, Stefan Christov, began to announce the winners of the Hackathon competition.  Over fifty Quinnipiac students competed at the Quinnipiac Computing Club’s (QCC) semiannual Hackathon on Saturday, Nov. 3. Hackathons are […]
          Information Technology (IT)      Cache   Translate Page      

Information TechnologyCareer Clusters include occupations in the same field of work that need related skills. He states, In 1960, when taking into account all jobs in the American economy, 20{2a93735a54d6ee8bbdcdf83abb1b48ecf23f2deb16e310e6b2c1776a2899df79} needed a four-year degree or higher. One other element in the Information Technology sector is international vendor-particular IT certifications. Amidst all of this speak of the super higher technology of the future, let us not forget that the technology of the 19th Century may well properly kill us all however. The growth of corporations sending jobs like programming offshore has created some wonder about the future of IT jobs in the United States.

Another element is the truth that the computer science degree, with classes on hardware as properly as software program, mathematics and logic, and training in a number of software program languages, tends to make it a universally recognized degree. BCIT’s programs in Computing and Information Technology involve software development, networking, and database design and style.

IT professionals possess the suitable mixture of information and practical, hands-on experience to take care of both an organization’s information technology infrastructure and the individuals who use it. They assume duty for picking hardware and software goods suitable for an organization. These who do graduate are having trouble discovering jobs to pay back their substantial college debt.

The Bachelor of Science in Information Technology provides a difficult, state-of-the-art education for those interested in studying the dynamic and developing field of information technology. Aspiring IT specialists normally have to have a bachelor’s degree in a technologies field, such as pc science, data systems management, programming or networking. In the 19th Century a group of textile workers located that they were losing their jobs to machines.

Systems and applications computer software developer jobs have been anticipated to grow 22{2a93735a54d6ee8bbdcdf83abb1b48ecf23f2deb16e310e6b2c1776a2899df79} from 2012-2022. In order to work as a technical support officer, you need to have thorough understanding of how the data systems perform and how to apply technical understanding for numerous software and hardware connected issues. Information technology coursework teach students who to query significant databases and produce reports. The pc science plan is normally element of the engineering department, while information technology may perhaps either fall beneath the engineering department or be considered portion of the business system.… READ MORE


          AMD anunță noile plăci Radeon Instinct MI60 și MI50      Cache   Translate Page      
AMD anunță noile plăci Radeon Instinct MI60 și MI50

Primele plăci Radeon construite pe procesul de 7 nanometri au fost dezvăluite seara trecută de către AMD.

Acestea nu sunt pentru gaming, în cazul în care vă întrebați, ci fac parte din seria Instinct, gândită pentru accelerarea aplicațiilor din sectorul High Performance Computing și Machine Learning.

Citeste articolul pe site-ul ZONA


          Gartner: Immersive Experiences Among Top Tech Trends for 2019      Cache   Translate Page      
By Dian Schaffhauser, Campus Technology IT analyst firm Gartner has named its top 10 trends for 2019, and the “immersive user experience” is on the list, alongside blockchain, quantum computing and seven other drivers influencing how we interact with the world. The annual trend list covers breakout tech with broad impact and tech that could […]
          Senior Software Development Engineer - Distributed Computing Services (Hex) - Amazon.com - Seattle, WA      Cache   Translate Page      
Knowledge and experience with machine learning technologies. We enable Amazon’s internal developers to improve time-to-market by allowing them to simply launch...
From Amazon.com - Thu, 26 Jul 2018 19:20:25 GMT - View all Seattle, WA jobs
          Destructuring Assignment in JavaScript      Cache   Translate Page      

JavaScript is an... interesting... language. I personally love it, but can see why others wouldn't be so fond of it. ECMAScript 6, a.k.a. ES6, introduced a good handful of really nice features that make JavaScript development more enjoyable. In this short post, I want to talk a little bit about destructuring assignment and provide some practical examples where this might be useful.

MDN describes destructuring assignment in the following way:

The destructuring assignment syntax is a JavaScript expression that makes it possible to unpack values from arrays, or properties from objects, into distinct variables.

This means that you can take an array or object, and easily pluck out values from it and assign them to variables.

Destructuring Assignment with Objects

Suppose you've got an object representing a point in 3-dimensional space:

let myPointInSpace = {
  x: 3,
  y: -2,
  z: 2.7
}

Suppose you want to do some computing with the coordinates of the point [like compute its distance from the origin, (0, 0, 0)], so you'd like to throw the x, y, and z coordinates of the point in some variables for easy reference. One might do the following:

let x = myPointInSpace.x;
let y = myPointInSpace.y;
let z = myPointInSpace.z;

let distance = Math.sqrt(x*x + y*y + z*z);

This certainly works! But if you do that enough times, you might get sick of copy/pasting. With destructuring assignment, you can pluck those coordinates in a much more succinct way! Here's how:

let {x, y, z} = myPointInSpace;

let distance = Math.sqrt(x*x + y*y + z*z);

The curly-braces in this case indicate the destructuring assignment. The first line above looks at the myPointInSpace variable, and looks for any properties indicated within the curly-braces, and will return those back in individual variable assignments.

Conveniently, you can pluck only a subset of an object's property-values. For example, if you just needed the x and y coordinates, you could just as well do:

let {x, y} = myPointInSpace;

Destructuring Assignment with Arrays

Destructuring assignment is great when used with objects, but it can also be used with arrays in a similar way. Let's suppose that instead our point in space is represented as a 3-tuple (or array of 3 values).

let myPointInSpace = [3, -2, 2.7];

The old-school way of plucking the coordinates of this point would be:

let x = myPointInSpace[0];
let y = myPointInSpace[1];
let z = myPointInSpace[2];

With destructuring assignment, we can shorten this to:

let [x, y, z] = myPointInSpace;

Pretty neat!

Some real examples

I read about destructuring assignment a few times before I actually made use of it and appreciating its utility. I showed a simple example above that involved simply plucking values, but I want to showcase a couple more useful examples.

Setting Default Function Values

When writing functions, I often like to use a single object as the input, and then pull values from that object - that way I don't have to worry about the order of my inputs. Destructuring assignment helps with this, and allows us to make use of "default parameters" that were introduced in ES6.

Let's say you want to write a function that takes a number of hours, minutes, and seconds and converts that amount of time into a number of milliseconds. We can do this via the following:

let toMilliseconds = ({
  hours = 0,
  minutes = 0,
  seconds = 0
}) => {
  // Compute the # of ms
  let ms = (hours * 60 * 60 * 1000) + (minutes * 60 * 1000) + (seconds * 1000);
  // Return the # of ms
  return ms;
}

This might look like a strange function declaration, but it entails that we can pass in an object as the input to toMilliseconds() and the function will look for keys hours, minutes, and seconds to use. If it doesn't find any one of those keys in the object that was passed in, it will just default to 0. Putting this to use might look like the following:

let ms1 = toMilliseconds({hours: 3, minutes: 42, seconds: 33});
let ms2 = toMilliseconds({minutes: 7});

In the second line above, hours and seconds get defaulted to 0 and we don't have to explicitly pass a number of hours or seconds.

I've grown to like this way of writing functions, as some functions have a lot of a lot parameters that all need defaults - and this form of a function declaration feels readable to me.

Swapping Values

Swapping variables' values is a somewhat common procedure, and often involves creating a temporary variable. Here's a classic example of this.

// Initial values
let x = 5;
let y = 3;

// Now swap, creating tmp variable
let tmp = y;
y = x;
x = tmp;
delete tmp;

However, destructuring assignment makes this more succinct, and in my opinion, a little more readable:

// Initial values
let x = 5;
let y = 3;

// Now swap
[x, y] = [y, x];

If you find yourself swapping variables often, destructuring can be a real nice tool.

Pulling Values and Giving New Names

With object destructuring, you can actually name your variables things other than the keys of the object you are destructuring. Suppose you're using an API, and the api sends back a response where the object has weird names that you don't prefer to use. Something like the following:

let apiResponse = {
  someWeirdKeyForX: 3,
  someWeirdKeyForY: -7
}

We could pull the x and y values out of that response and name them whatever we'd like - say x and y. To do this, we use the following syntax:

let {someWeirdKeyForX: x, someWeirdKeyForY: y} = apiResponse;

The someWeirdKeyForX: x part of the destructuring declares that you want to pull the key someWeirdKeyForX from apiResponse and you'd like to assign it to a variable named x. This can be surprisingly useful. Realistically, I like to use this in scenarios as simple as assigning something like apiResponse.latitutde to lat and apiResponse.longitude to lng.

Look out!

One little "gotcha" that I stumbled on a few times was the fact that sometimes you need to wrap your destructuring statements in parentheses. If your destructuring statement doesn't start with a variable declaration keyword (like var, let, or const), you'll need to wrap your statement in parentheses. I'm assuming this is so the compiler knows how to distinguish between the { ... } in the destructuring statement and the { ... } that indicate blocks of code.

Here's what I mean by this. Consider the following code:

// Declare x and y ahead of time
let x, y;
// Object that we will destructure
let o = {x: 3, y: -7};

// Try to destructure
{x, y} = o; // -> No good!

The compiler doesn't know how to interpret that last line of code. You'll need to change it to:

// Declare x and y ahead of time
let x, y;
// Object that we will destructure
let o = {x: 3, y: -7};

// Successfully destructure
({x, y} = o); // -> Good!

If you find yourself using destructuring, make sure you're aware of this little caveat!

And more!

MDN has many more examples of destructuring assignment. If you want to know more, check that page out.

In my next post, we'll take a dive into the rest and spread operators in Javascript, and see how they play into destructuring assignment.


          Teaching Functional Programming: Two Big Picture Approaches      Cache   Translate Page      

Functional Programming (FP) has been around just as long if not longer than Object-Oriented Programming (OOP), but it's only (relatively) recently gaining in popularity, particularly (maybe specifically?) in the JavaScript community. Why?

I went to MIT in the early 00's. Structure and Interpretation of Computer Programs (SICP - sick-pee) was my textbook. So my first formally-taught programming language was functional. Then I worked in industry for over a decade and hardly ever had to think much about FP. Now I'm shocked to learn that the textbook from college I didn't pay much mind to is considered the "functional programming bible".

Don't get me wrong. It's a good textbook. I'm sure it made me a better programmer. But it wasn't something I applied very often in my Java/ActionScript/PHP/Python/Ruby/JavaScript career.

Then I taught at Wyncode Academy for four years and found myself trying to explain FP concepts to newcomers. It's hard - much harder than OOP.

Why is FP so much harder than OOP?

Related question: Why has it taken so long for FP to catch on?

We in the coding community need to grapple with why FP is so hard to teach. Evangelizing FP like a religion repeats the same mistakes that caused FP to languish in the industry for so long.

Many introductions to FP are missing something. It's not just an alternative programming style. It's a new way of thinking. When introducing something big and new to my students, I try to ease them into it. These same tricks may also work with more experienced programmers from OOP backgrounds.

One of the techniques I used at Wyncode to get a running start into a hard concept is storytelling. If I can get my students to understand the context - the big picture - I find it easier to later explain the technical details.

Big Picture 1: History

Sometimes it's good to start from the beginning: How does a computer work?

The most common (popular? easy-to-understand?) model of computing is the Turing Machine. The state that FP programmers complain about is staring us right in the face in a Turing Machine. An algorithm for operating this machine represents transitions between different states, e.g. from some boxes being on/off (1 or 0) to some other boxes being on/off.

If we try to imagine two Turing Machines operating on the same section of tape at the same time, we can begin to understand why "shared state" and concurrency in OOP are hard problems. But that's another story.

The Turing Machine is a universal machine. It can be used to solve every solvable (effectively calculable) math and logic problem. This simple collection of operations - move left, move right, write a dot, read a dot, erase a dot - are enough (given enough time and resources) to tackle every math problem in the universe. That's what Alan Turing proved in 1936.

In many ways, a Turing Machine is how a computer "works".

But this is also how a computer works.

full adder circuit#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
A full adder circuit

This is a circuit for adding numbers together. It's the kind of component found inside the CPU of a computer.

This is not a Turing Machine. It's not universal. It's just addition. It can't (easily) be "reprogrammed".

There's also no Turing-machine-like "state". Apply voltage to the inputs corresponding to the numbers to add and detect voltage in the outputs corresponding to the sum. As soon as the voltage is shut off, the answer goes away. There's no "tape" sitting around to read or manipulate. Two circuits can't operate on the same logic gates simultaneously. (I don't think they can, but I'm sure someone will comment to prove me wrong.)

This circuit is also fast. While a classic Turing Machine flips 1s and 0s back-and-forth on some medium, this circuit operates at the speed of electricity through a wire. There are no moving parts.

A circuit is a different model of computation. Each of the logic gates (AND, OR, NAND, NOR, XOR, etc.) are pure functions. They accept inputs and produce outputs with no side-effects. If all we have is the ability to create and combine these "functions", we can also solve every solvable math problem in the universe. That's what Alonzo Church proved, also in 1936.

So we've got two different models of computing: the Turing Machine's little boxes of 0s and 1s (objects) and Alonzo's Church's lambda calculus built out of logic gates (functions). Which one is correct?

For a time there was a debate about whether an abstract Turing Machine could solve the same set of math problems as lambda calculus (and vice versa). Eventually they were proven to be equivalent.

Being equivalent means that they're equally powerful. Any algorithm that can be written for a Turing Machine can also be written using functions. So any program that can be written in Turing Machine software can also be represented in circuitry hardware.

What does it mean to "program in hardware"?

We can see "hardware programming" embodied in Application-specific Integrated Circuits (ASICs). Circuits can be created that are "programmed" to do one thing very quickly, like mine Bitcoin or play chess.

Since the proposal of the Church-Turing Thesis, we've had two programming options. Hardware is faster and software is slower. Make a mistake in software? Just hit the delete key and try again. Make a mistake in hardware? It's time to grab a soldering iron. It's a classic engineering design trade-off.

So let's say we have an algorithm written in an OOP style that we'd like to convert into an ASIC. It's probably a good strategy to rewrite the program in a FP style so it better maps to the circuit diagram's domain. Most programming languages are flexible enough to do that, but some are better at it others.

# Elixir pipes
"1" |> String.to_integer() |> Kernel.*(2) # returns 2

FP-oriented languages tend to look like circuits. Specifically the "pipe operators" in Unix, Elixir, F#, JavaScript (maybe someday) and others make code look like a circuit diagram: inputs go into the left, flow through a number of "gates" (pipes) until they're transformed into the final output on the right. It's probably not a coincidence that the pipe operator used by some languages (|>) looks like a logic gate.

NOT logic gate#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
The NOT gate

Putting my coding instructor hat back on, a good "big picture" way of introducing FP is to start by talking about how circuits work, how they can be "programmed", and how we can model circuit diagrams in code.

Big Picture 2: Philosophy

I picked up a Philosophy minor with my CS degree, so one of the things I'm fascinated by is the intersection between those two fields of study. I find talking about the overlap helpful when teaching new coders, particularly those with Humanities instead of STEM backgrounds.

A philosophically important concept in FP is "functional equivalence".

Perhaps the best example demonstrating this equivalence is Tom Stuart's great article "Programming From Nothing".

Stuart demonstrates how a program (specifically the ubiquitous FizzBuzz) can be written entirely out of functions. I'm not going to repeat that exercise here, but I am going to borrow his explanation of how numbers can be represented entirely with functions (the Church encoding).

Start by defining the concept of zero as a function that accepts a function argument and does nothing with it.

# Ruby
ZERO = -> (func) { 
  # does nothing
  func
}

Similarly we can define all the natural numbers as functions that accept function arguments and call them n-times.

ONE = -> (func) {
  # calls it once
  # same as func.call()
  func[];
  func
}

TWO = -> (func) {
  # calls it twice
  func[]
  func[]
  func
}

To test these "function-numbers", pass them a test function.

HELLO = ->() { puts "hello" }

# same as: ZERO.call(HELLO)
ZERO[HELLO] # nothing displayed
ONE[HELLO]  # one "hello" displayed
TWO[HELLO]  # "hello" twice

This functional-numeric representation can be hard to play around with and debug.

p ZERO
# outputs #<Proc:0x000055d195ae57b0@(repl):3 (lambda)>

So to make it easier to work with we can define a function that will convert these functional-numbers into the object-numbers we're used to.

# convert number function into number object
def to_integer(func)
  # count how many times counter is called
  n = 0
  counter = ->() { n += 1 }
  func[counter]
  n
end

p to_integer(ZERO) # 0
p to_integer(ONE)  # 1
p to_integer(TWO)  # 2

This converter creates a counting function and passes it to the numeric function. The ZERO function will call it zero times, the ONE function will call it one time, etc. We keep track of how many times the counter has been called to get the result.

Given these function-number definitions, we can implement addition.

ADD = -> (func1, func2) {
  -> (f) { func1[func2[f]] }
}

sum = ADD[ZERO, ZERO]
p to_integer(sum) # 0

sum = ADD[ZERO, ONE]
p to_integer(sum) # 1

sum = ADD[ONE, ONE]
p to_integer(sum) # 2

If TWO calls a function twice, then ADD[TWO, TWO] will return a function-number that calls its argument four times (the function-number FOUR).

It's a mind-bending exercise. When I get to the end of "Programming From Nothing", I get the sense that this is an interesting product of the clever application of a fundamental computer science concept, but not something I could use in my day job.

And that's exactly the sense that I (and I suspect many others) have about FP in general - it's clever, but doesn't seem very useful. That's the problem we need to solve.

So a better place to start teaching FP than Church numerals is The Matrix.

In that 1999 sci-fi film, the reality perceived by most humans is actually a simulation called "The Matrix". A few months ago Elon Musk suggested that this "simulation hypothesis" may be real, starting weeks of "Intro to Philosophy"-level media on the topic.

What does The Matrix have to do with FP?

The metaphysical debate, of which the "simulation hypothesis" is but one response, is very old and mind-numbingly complicated at times. So my attempt to summarize it won't do it justice. But the big idea is that we have no proof that the world around us is real. Maybe there are actual objects in the world or maybe we're just brains in jars.

So there are at least two contradictory theories of what, for example, the number one is. Is it a thing (a noun, an object) that we can interact with (touch & feel)? Or is it an action (a verb, a function), something that acts on the world, but isn't embodied?

The functional-one is a simulation of the number one. It's functionally equivalent to the object-one, meaning it does everything the object-one can do. For example, we can do arithmetic with it.

But it's not really "there" in the way that objects in OOP are "there". It's a Matrix simulation. It doesn't have inherent attributes - it isn't x, it just does x.

To pick a less abstract example, is the chair you're sitting in real or just forces pressing against your body? A "chair" may be a chair-object that exists in the real world or a chair-function: a (hopefully comfortable) force pushing against you with no underlying objective basis.

red delicious apple#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
A red delicious apple

Consider color. Is a red delicious apple really red (adjective describing a noun) or does it act red (verb)? Is color an inherit attribute of a real underlying apple-object or just an action that an apple-function is programmed to do when light shines on it? Is the apple real or just a simulation?

# A "real" apple
class Apple
  attr_reader :color
  def initialize
    @color = "ruby red"
  end
end

p Apple.new.color # "ruby red"
# A "simulated" apple
APPLE = -> (applied) {
  return "ruby red" if applied == "light"
}

p APPLE["light"] # "ruby red"

The difficulty of this philosophical concept is good metaphor for why FP is so hard to teach. To help students understand, start by opening up their minds to the possibility of a world made up solely of "functions". Start with that big picture concept, then transition towards FP models of the world: how they differ from OOP representations and how they have equivalent results.

Conclusion

FP is hard. It's not just a different programming style. It's an alternative model of the world. And the better we are at easing students into that paradigm shift, the easier it'll be to avoid another half-century of ignoring this useful tool in the coder's toolbox.


          Parallels launches Toolbox 3      Cache   Translate Page      

Parallels (www.parallels.com/about) has launched Parallels Toolbox 3 for macOS and Windows (www.parallels.com/toolbox) with even more single-click easy-to-use tools that simplify tedious everyday computing chores down to just a click or two. In addition, now users can quickly search for tools in the Toolbox window on their PC or Mac, as well as customize which tools and […]

The post Parallels launches Toolbox 3 appeared first on MacTech.com.


          Dept Chair/Head - Industrial Engineering - Clemson University - Freeman, SD      Cache   Translate Page      
The Department of Industrial Engineering, in the College of Engineering, Computing and Applied Sciences at Clemson University, is seeking applicants for its...
From Clemson University - Thu, 04 Oct 2018 20:09:51 GMT - View all Freeman, SD jobs
          Cloud computing: il mercato italiano vale 2,34 miliardi      Cache   Translate Page      

Il cloud computing italiano è in buona salute e cresce del 19% rispetto al 2017. Analisi dei dati raccolti dall'Osservatorio Cloud Transformation.

The post Cloud computing: il mercato italiano vale 2,34 miliardi appeared first on InternetPost.it.


          Technology Time      Cache   Translate Page      
When: Saturday, November 10, 2018 - 3:00 PM - 5:00 PM
Where: Long Branch

Need help using Internet, email, downloading audio and e-books, using apps, your tablets or smart phones? Learn more about basic computing, using smart phones and other technologies. Come with your computer, tablet, or smart phone and any technology questions. Tech time meets in the Digital Media Lab.
          Technology Time      Cache   Translate Page      
When: Tuesday, November 13, 2018 - 1:30 PM - 3:00 PM
Where: Long Branch

Need help using Internet, email, downloading audio and e-books, using apps, your tablets or smart phones? Learn more about basic computing, using smart phones and other technologies. Come with your e-book readers, computer, tablet, or smart phone and any technology questions every Tuesday 1:30pm to 2:30pm for one to one help. Tech time meets in the Digital Media Lab.
          One Stop Systems to Acquire Bressner Technology in Europe      Cache   Translate Page      

Today One Stop Systems announced that the company has acquired Bressner Technology GmbH, a leading specialized high-performance computing supplier in Europe. "Based in GRÖBENZELL, Germany near Munich, Bressner provides standard and customized servers, panel PCs, and PCIe expansion systems. Their primary headquarters provides manufacturing, test, sales and marketing services for customers throughout Europe and the Middle East. The company has over 700 customers throughout Europe. Its major OEM customers include Novartis, Ipsotek, Intel, Rohde & Schwarz, BMW, and others. Bressner generates revenue of approximately €14 million per year."

The post One Stop Systems to Acquire Bressner Technology in Europe appeared first on insideHPC.


          DDN to showcase World’s Fastest Storage and more at SC18      Cache   Translate Page      

Today DDN announced it will showcase a number of new innovations optimized for HPC, AI and hybrid cloud at SC18 in Dallas. Designed, optimized and right-sized for commercial HPC, AI, deep learning (DL), and exascale computing, DDN’s new products and solutions are fully integrated for any data-at-scale need. “DDN continues to advance powerful new storage solutions, and we’re excited to see its latest offerings at SC18 next week.”

The post DDN to showcase World’s Fastest Storage and more at SC18 appeared first on insideHPC.


          TYAN steps up with New Intel Xeon E-2100 Processors