Next Page: 10000

          Snapdragon 855 is Qualcomm's next flagship mobile platform built for 5G      Cache   Translate Page      
Here's a new processor for you to lust after. It's official: the latest and greatest mobile platform from Qualcomm to lust after is the Snapdragon 855. The name and initial details were unveiled during the company's annual "Tech Summit" in Hawaii, where it's taking a full week to unveil its upcoming plans for mobile computing and networks. Qualcomm is, of course, talking up the Snapdragon 855's 5G capabilities as we get ready to head into the new frontier of the latest and greatest wireless networks. The 855 is the first commercially-available mobile processor that supports multi-gigabit 5G connectivity, hopefully easing our transition into 5G networks without the need for a complicated or inefficient secondary modem. Consumer-ready 5G networks have yet to be deployed in earnest in the U.S., but Qualcomm is getting ahead of the curve by announcing its latest processor and modem so that it can be integrated into upcoming smartphones as the first networks go live. It's also workin...
          Supermicro C9Z390-PGW Motherboard Review: Enterprise Grade. For Gamers      Cache   Translate Page      

Today on the test bench we have our first Z390 based motherboard for review. As you know from the title, this isn't a board from "the big four" as I like to call them, but from Supermicro, a company much better known in the enterprise and server space than for the consumer side and gaming. The C9Z390-PGW we will be looking at isn't their first foray into this arena however, as they have had consumer level motherboards since the Z170 days. Read More

Supermicro C9Z390-PGW Motherboard Review: Enterprise Grade. For Gamers is a post from: Overclockers - The Performance Computing Community


          NVIDIA Announces Titan RTX: Business Up Front, Party in Back!      Cache   Translate Page      

Today, NVIDIA has announced its latest release using the Turing architecture with its Titan RTX. This follows the heels of the Quadro RTX that was announced in August. NVIDIA positions the card more for the prosumer than a consumer/gaming card but will still manage to be the fastest card most can buy. The Titan RTX will cost $2499 and will be available later this month. Read More

NVIDIA Announces Titan RTX: Business Up Front, Party in Back! is a post from: Overclockers - The Performance Computing Community


          Industrial Computing Specialist - HyLife Foods LP - Neepawa, MB      Cache   Translate Page      
This position is based in the vibrant community of Neepawa, Manitoba which has a reputation for its beauty and high quality of life....
From HyLife Foods LP - Fri, 02 Nov 2018 02:47:34 GMT - View all Neepawa, MB jobs
          Commencement Regalia Pickup Begins Thursday, Dec. 13      Cache   Translate Page      
Commencement exercises will be held Saturday, Dec. 15, in the Show Me Center. Ceremonies are scheduled at 10 a.m. for graduates of the Harrison College of Business and Computing and the College of Education, Health and Human Studies; and at 2 p.m. for graduates of the College of Science, Technology, Engineering and Mathematics, College of Humanities […]
          Research Computing Training Assistant - Inspired HR on behalf of Westgrid - Vancouver, BC      Cache   Translate Page      
Familiarity with Linux, HPC and research computing. WestGrid is a not-for-profit organization that works with other Canadian organizations and Compute Canada to...
From Indeed - Tue, 04 Dec 2018 21:44:57 GMT - View all Vancouver, BC jobs
          StorMagic Included in Gartner Magic Quadrant for Hyperconverged Infrastructure      Cache   Translate Page      
...is a simple solution for edge computing environments that demand low cost, high availability and easy management, due to restricted budgets and limited IT staff." In this latest Gartner Magic Quadrant, 14 HCI vendors were included in this research and evaluated ...

          After the Bad Boy      Cache   Translate Page      

Anyone who thinks that because of the internet, contemporary young female celebrities are subjected to an unprecedented degree of personal scrutiny and moral judgement might want to acquaint themselves with the lives of Annabella Milbanke and her daughter, Ada. Until fairly recently, neither woman (born in 1792 and 1815, respectively) was known for much more than her relationship to Annabella’s husband and Ada’s father: Lord Byron, the romantic poet. Ada, who married the Earl of Lovelace, was a talented and imaginative mathematician, and in the past few decades, she has been redeemed from obscurity and christened the first computer programmer. But during Ada’s life (she died of cervical cancer at the age of 36) and Annabella’s (who survived her by eight years), mother and daughter stood under a kind of shadow, both in the public’s eye and in their own. Ada was Byron’s only legitimate child, the product of a mismatched couple who lived together for only one year, then, to widespread disapproval, never saw each other again. So overwhelming was the gravitational pull of Byron’s fame that he made them both notorious, dominating Ada’s life as well as her mother’s, even after his death in Greece in 1824.

Byron was the first modern celebrity, a figure who enthralled and scandalized the Western world. Writers and artists had been revered before Byron. People collected engravings of fashionable socialites. A royal mistress with a ready wit could be enshrined as a beloved national personality. But with Byron, for the first time, an artist’s work and persona became indistinguishable and equally worshipable. The heroes (or, often, antiheroes) of his poems were always understood to be versions of Byron himself: a brooding, brilliant, passionate rule-breaker. One of his many married lovers, Lady Caroline Lamb, famously described the poet as “mad, bad, and dangerous to know,” a quote perhaps more familiar today than any of Byron’s own verse. (Lamb emulated his shocking behavior by dressing up as a boy to sneak into his rooms and sending him a note containing a lock of her pubic hair.) Byron created a model of stormy, tormented male glamour familiar even to people who have never heard of him. He inspired, among many other things, the first literary vampire. Every moody singer-songwriter, every sardonic romantic hero from Heathcliff and Mr. Rochester to Rhett Butler and Christian Grey, has a little (or a lot) of Byron in him.

According to Miranda Seymour’s new mother-daughter biography, In Byron’s Wake, Annabella married this poor husband material because he presented himself as a man who needed to be rescued from himself, and she believed that she could do it. No blithely amoral libertine, the poet referred to himself as a “fallen spirit.” You can’t fall from grace unless you believe in grace to begin with, and when they were courting, Byron expressed the need for his fiancée to “control” his worst impulses. The nature of his wickedness seemed to consist of the usual rakish shenanigans: baldfaced whoring, adultery, drinking, and gambling. Byron had also conducted homosexual affairs as a boy at boarding school (considered more or less par for the course in a member of his class) and (less acceptably) traveled to the Levant as a young man seeking more of the same. But the sin that most tormented him was probably his relationship to his half-sister, Augusta Leigh. Hardcore Byron apologists maintain that incest between Byron and Augusta has never been conclusively proven, but rumors of it clung to the pair even before he married Annabella, who initially dismissed these “intimations” as mere scandalmongering.

Seymour treats the Byronic incest as a given and presents the poet’s proposal to Annabella as a mixture of genuine respect, hope that she could reform or at least moderate him, and opportunism given his multiple scandals and his mounting debts. Byron exchanged many breathtakingly cynical letters with Annabella’s aunt about the utility of the match and the intricacies of managing his own reputation. “I see nothing but a marriage and a speedy one can save me,” he wrote to Lady Melbourne. “If your Niece is attainable I should prefer her.”

No one could be surprised at the speedy failure of such a marriage, especially when the rich uncle Byron had been counting on left his money to Annabella’s mother instead of her. Despite a few interludes of happiness, he made her life a misery. His often violent moods changed by the hour, with the one constant being an attitude that the novelist Walter Scott described as “irritable to the point of mental disease.” He made suggestive remarks about his preference for his sister, who lived with them during much of their time together—that is, when she wasn’t living alone with Byron elsewhere. He also conducted public affairs with actresses and once reported to Annabella that he’d reclined between two naked prostitutes, debating which one to bring home to live with them. (This last story so shocked Annabella’s faithful attorney that he recalled it with horror to the end of his days.) When she complained, Byron told her, “You will remember I have neither beaten nor confined you.”

When she became pregnant with Ada, Annabella resorted to posting a guard at her bedroom door to keep her husband from bursting through it in a rage and triggering a miscarriage. So extreme was Byron’s behavior that Annabella and her parents began to engineer a plan to have him declared insane, but he left England, never to return, before they could execute it. Ada was 4 months old. The pro-Byron take on the couple’s separation holds that Annabella—a devout Unitarian who practiced a serene self-control—drove Byron mad with her cold, judgmental, and controlling behavior. This characterization has often repeated in accounts of Ada’s life. Seymour makes the case that Annabella, while decidedly on the prim side, deeply loved and successfully nurtured Ada, who reciprocated her mother’s devotion, even as, paradoxically, both women later came to cherish their connection to the legendary Byron himself.

Unfortunately, In Byron’s Wake is a taxing book, the sort of biography that feels enslaved by its source material—in this case, the many letters written by the various principals—into reporting all the numbing details of daily life. Every tutor hired, every change of address (19th-century aristocrats moved around a lot), every notable visitor or encounter, every minor illness as well as the major ones, it seems, must be mentioned. Seymour offers both too much information and not enough. She gushes over Ada’s personal charisma while providing only the most cursory account of her mathematical insights—Ada was the first person by more than 100 years to recognize that computing machines could be used to do more than calculate numbers. Annabella, for her part, was an indefatigable philanthropist and abolitionist who hired a black American couple who had escaped enslavement to teach in one of the schools she founded. Seymour clearly admires this but doesn’t meaningfully place Lady Byron in the larger context of 19th-century reform movements.

What makes In Byron’s Wake worth reading is its account of how reputation and public image worked in early Victorian England, particularly for women, and how little this minefield has changed despite the technological advances Ada’s work predicted. A gossipy writer herself, Seymour understands the workings of gossip better than most, and Annabella and Ada’s lives were shaped by celebrity and rumor. Annabella issued no public statements about her reasons for separating from Byron during her life. For his part, after leaving England, Byron published a lachrymose poem lamenting the loss of his family, “Fare Thee Well,” that, as Seymour puts it, portrayed the poet as “a martyred hero.” Byron’s effort to define the story of his marriage failed—at first. Satirists published cartoons of the poet bidding a tearful adieu to his baby daughter from a ship’s deck while surrounded by strumpets and floozies. Byron’s daring misbehavior suddenly looked like self-indulgent immorality.

Annabella, Seymour points out, understood just how quickly that disapproval could flip back again, and how easily she could be blamed even if it didn’t. At 24, to appear justified in leaving a husband who had treated her so cruelly and to protect her daughter from scandal, she was obliged to live a highly circumspect life. She never remarried or even came close to it. She abandoned fashionable London society for the company of irreproachably dull vicars and middle-aged maiden ladies devoted to good works in quiet country towns. Even so, people stared and pointed at her and her little daughter in public places when they traveled. Avoiding the infamy attached to her husband’s name became a lifelong project, even as both mother and daughter took pride in their connection to a poet many readers adored.

While Annabella succeeded in erecting a façade of flawless respectability during her life, after her death she was demonized by Byron partisans. A far-flung controversy surrounding her marriage began with the publication of the memoirs of Byron’s Venetian mistress, Countess Teresa Guiccioli. Intent on proving that only she had truly loved and understood the poet, the countess condemned Annabella as “a spoilt child, a slave to rule, to habits and ideas as unchanging and inflexible as the figure she loved to study.” Guiccioli uses Annabella’s mathematical aptitude, evident from childhood, to portray her as the natural enemy of Byron’s spontaneous, poetic soul. (Byron himself mockingly nicknamed his wife “the Princess of Parallelograms.”) While much has been made of the gifts Ada inherited from her father, it was her gift for abstract reasoning that finally made her famous in her own right. And that was her mother’s legacy, not his.

A glowing magazine review of Guiccioli’s book in 1869 set off a cavalcade of the Victorian equivalent of hot takes. The review’s author, John Paget, accused Annabella of enveloping her late husband’s character in a “poisonous miasma … raised by her breath, and which only her breath could have dispersed.” By some fascinating contortion of logic, Paget insisted that Annabella had slandered Byron by saying nothing at all against him. Silence, rather than offering up an explanation for the end of her marriage, was her crime, and in the hysterical Paget’s eyes, it made her tantamount to a murderess.

The attack infuriated Harriet Beecher Stowe, author of the international best-seller Uncle Tom’s Cabin and a friend of Annabella’s. She published an indignant response to Paget’s review in which the allegations of incest between Byron and his sister were expressed publicly for the first time. This was a bona fide bombshell. More than 15,000 scandalized readers canceled their subscriptions to the Atlantic Monthly, which published the piece, and George Eliot herself scolded Stowe for violating the Byron family’s privacy. The whole affair provided the press with weeks of salacious fodder. Unfortunately, Stowe got several important facts wrong, creating the impression that Annabella had been, in Seymour’s words, a “complicit, knowing witness” to her husband’s affair with his half-sister. Instead of vindicating Lady Bryon, Stowe unwittingly ended up making a bad situation infinitely worse.

Those who challenged Stowe’s version of events chose to frame their responses as defenses of the “retired, gentle, pure and modest life” of Augusta Leigh. Tellingly, Byron himself almost seemed to drop out of the discussion. Either you believed Annabella was a monster or you believed that Augusta was, and Paget implored the female readers of Blackwood’s Magazine to repudiate Byron’s widow, as must every woman “who had not sunk into a state of degradation lower than that of the lowest prostitute that ever haunted the night-houses of the Haymarket.” Although Annabella was in no way responsible for the incest rumors, in the muddled mind of her detractors, the stories were written off as “the deluded fantasy of [Byron’s] jealous and consummately deceitful wife.”

As Ariana Grande can attest, blaming a woman for the self-destructive behavior of her partner or former partner remains a common response when fans discover the flaws in their idols. Even Annabella was guilty of it, convincing herself long after Byron’s death that she and her husband might have found happiness together had not his half-sister deliberately sabotaged her marriage, enticing Byron away from the connubial redemption for which he yearned. It’s a ridiculous scenario, given that Augusta was widely considered a sweet but foolish and spineless woman and Byron never needed much encouragement to play the bad boy. Seymour herself takes pains to point out Annabella’s fidelity to various requests Byron made of her when they separated, as if to defend her subject from a century and a half of accusations of disloyalty to a husband who had no right to expect anything else. A better book would have looked harder at this stubborn inclination to make excuses for famous and talented men as it took root during the birth of celebrity culture.


          Accountant – Descasio Nigeria      Cache   Translate Page      
Descasio is the leading cloud computing solutions provider in the sub region. We are the bridge between cloud based solutions and legacy On-Premise solutions. We harness cloud-computing technologies...

          GridGain® In-Memory Computing Platform Is Integrated with Oracle Cloud and Now Available in the Oracle Cloud Marketplace      Cache   Translate Page      
...built on Apache® Ignite™. GridGain solutions are used by global enterprises in financial, software, e-commerce, retail, online business services, healthcare, telecom and other major sectors, with a client list that includes ING, Sberbank, Finastra, IHS Markit, Workday, and Huawei. GridGain ...

          Unix Folklore #VintageComputing #History #Unix #BellLabs #Photography      Cache   Translate Page      
Peter Adams Photography posts their pictures on Unix Folklore. Nine pictures capture some of the memorabilia saved by Bell Labs during the heydey of Unix development, starting in the early 1970s and extending 30 years.Each picture has its history explained and prints may be purchased of the pictures themselves.See this post for more details.
          Frédéric Plais (Platform.sh) : "Après les IaaS d'Amazon, Microsoft et Orange, notre cloud s'étend chez Google"      Cache   Translate Page      
A l'occasion du Podcast Tech Attitude, le patron de l'éditeur français lève le voile sur les derniers chapitres de sa stratégie. En ligne de mire : proposer une plateforme adossée aux principaux clouds de la planète.
          #10: A Very Public Offering: The Story of theglobe.com and the First Internet Revolution      Cache   Translate Page      

Pick your books posted a photo:

#10: A Very Public Offering: The Story of theglobe.com and the First Internet Revolution



A Very Public Offering: The Story of theglobe.com and the First Internet Revolution
by Stephan Paternot (Author, Narrator), Actarus Press (Publisher)
(3)

Buy new: $19.95 $17.46

(Visit the Hot New Releases in Networking & Cloud Computing list for authoritative information on this product's current rank.)

Buy now: #10: A Very Public Offering: The Story of theglobe.com and the First Internet Revolution www1.pickyourbook.net/?p=51966


          Cloud implementations growing but strategies lack security      Cache   Translate Page      
Private, public and hybrid clouds are growing in popularity as lift and shift cloud apps are making migration easier for businesses. Christian Mahncke, Enterprise Business Development at Routed, a vendor neutral cloud infrastructure provider, says that while cloud computing has proven that it is a better option than in-house servers, security challenges remain a concern [&hellip
          Efficient and Secure Outsourcing of Genomic Data Storage, by João Sá Sousa and Cédric Lefebvre and Zhicong Huang and Jean Louis Raisaro and Carlos Aguilar and Marc-Olivier Killijian and Jean-Pierre Hubaux      Cache   Translate Page      
Cloud computing is becoming the preferred solution for efficiently dealing with the increasing amount of genomic data. Yet, outsourcing storage and processing of sensitive data, such as genomic data, comes with important concerns related to privacy and security. This calls for new sophisticated techniques that ensure data protection from untrusted cloud providers and still enables researchers to obtain useful information. We present a novel privacy-preserving algorithm for fully outsourcing the storage of large genomic data files to a public cloud and enable researchers to efficiently search for variants of interest. To preserve data and query confidentiality from possible leakage, our solution exploits optimal encoding for genomic variants and combines it with homomorphic encryption and private information retrieval. The proposed algorithm is implemented in C++ and evaluated on real data as part of the 2016 iDash genome privacy-protection challenge. Results show that our solution outperforms the state-of-the-art and enables researchers to search over millions of encrypted variants in a few seconds. As opposed to prior beliefs that sophisticated privacy-enhancing technologies (PETs) are unpractical for real operational settings, our solution demonstrates that, in the case of genomic data, PETs can represent very efficient enablers.
          Bragi Reveals First Applications Of nanoAI      Cache   Translate Page      
Bragi, the company behind The World’s First Hearable , confirmed in February of this year its long-term plan of developing AI on IoT devices. Nine months after the introduction of nanoAI, Bragi discloses the first pilot applications of its technology in cooperation with various industry leaders. The amount of IoT devices deployed worldwide is exploding across all industries and cloud computing is overwhelmed with challenges that prevent IoT from […]
          Apple Technician - Simply Computing - Winnipeg, MB      Cache   Translate Page      
Time management skills, able to prioritize, capable of working under pressure. Apple TechnicianLocationWinnipeg, MBJob TypeFull-time....
From GlassDoor.com - Tue, 04 Dec 2018 23:40:31 GMT - View all Winnipeg, MB jobs
          Solutions Architect - NVIDIA - Washington State      Cache   Translate Page      
Assist field business development in through the enablement process for GPU Computing products, technical relationship and assisting machine learning/deep...
From NVIDIA - Sun, 19 Aug 2018 07:55:46 GMT - View all Washington State jobs
          Solutions Architect, Accelerated Computing - NVIDIA - Santa Clara, CA      Cache   Translate Page      
Assist field business development in through the enablement process for GPU Computing products, technical relationship and assisting machine learning/deep...
From NVIDIA - Thu, 22 Nov 2018 07:57:08 GMT - View all Santa Clara, CA jobs
          Bose Actually Turned Its Funky Sunglasses Headphones Concept Into A Real Gadget - Gizmodo Australia      Cache   Translate Page      

Gizmodo Australia

Bose Actually Turned Its Funky Sunglasses Headphones Concept Into A Real Gadget
Gizmodo Australia
Earlier this year, Bose showed off a product concept that seemed like the Snapchat Spectacles of the audio world, complete with buzzwords such as augmented reality and digital assistants littered throughout this description. But for a company like Bose ...
Block out the sun and drown out the haters with Bose's new AR sunglassesDigital Trends
Bose's $199 audio-based AR sunglasses are available for preorderThe Verge
Bose Frames will bring 'audio augmented reality' to $199 sunglassesVentureBeat
TrustedReviews -MakeUseOf -TechRadar India -SlashGear
all 24 news articles »

          Heterogeneous Memory System (HMS) Prototype Published For The Linux Kernel      Cache   Translate Page      
The past several years Red Hat developer Jerome Glisse has been working on Heterogeneous Memory Management (HMM) for the Linux kernel to handle the mirroring of process address spaces, system memory that can be transparently used by any device process, and similar functionality around today's GPU computing needs and other devices. Jerome today published the next step as part of his low-level memory device management work and that is the Heterogeneous Memory System for exposing complex memory topologies of today's systems...
          Architecting Systems of the Future      Cache   Translate Page      
In this episode, Eric Werner discusses research that he and several of his colleagues are conducting to help software developers create systems for the many-core central processing units in massively parallel computing environments. Eric and his team are creating a software library that can exploit the heterogeneous parallel computers of the future and allow developers to create systems that are more efficient at computation and power consumption.   Listen on Apple Podcasts.
          Standards in Cloud Computing Interoperability      Cache   Translate Page      
Organizations that use the cloud want the ability to easily move workloads and data from one cloud provider to another or between private and public clouds. A common tactic for enabling interoperability is the use of open standards, and many cloud standardization projects are developing standards for the cloud. In this podcast, Grace Lewis discusses her latest research exploring the role of standards in cloud-computing interoperability, which covers cloud-computing basics, standard-related efforts, cloud-interoperability use cases, and provides some recommendations for moving forward with cloud-computing adoption regardless of the maturity of standards for the cloud. Listen on Apple Podcasts.
          Cloud Computing for the Battlefield      Cache   Translate Page      
Soldiers can use handheld mobile computing devices (aka smart-phones) to help with various tasks, such as speech and image recognition, natural language processing, decision making and mission planning. There are challenges to achieving these capabilities such as unreliable networks and bandwidth, lack of computational power, and the toll that computation-intensive tasks take on battery power. In this episode, Grace discusses research that she is leading to overcome these challenges by using cloudlets, which are localized, lightweight servers running one or more virtual machines on which soldiers can offload expensive computations from their handheld mobile devices, thereby providing greater processing capacity and helping conserve battery power. Listen on Apple Podcasts.
          Dive Deep into the Possibilities of Multi-Cloud at KubeCon 2018      Cache   Translate Page      

KubeCon is almost here! As the Cloud Native Computing Foundation’s flagship community event marks a return to Seattle next week, Rackspace is excited to participate and support the community as a first-time sponsor of KubeCon + CloudNativeCon North America. Kubernetes and the entire cloud native community have demonstrated exceptionally strong growth in a relatively short […]

The post Dive Deep into the Possibilities of Multi-Cloud at KubeCon 2018 appeared first on The Official Rackspace Blog.


          Pioneering pattern recognition      Cache   Translate Page      

Dec. 4, 2018 

University Distinguished Professor Anil Jain named Fellow by The World Academy of Sciences 

Anil Jain of Michigan State University has been named a Fellow of The World Academy of Sciences (TWAS) for a lifetime of perspectives and publications that have inspired students and researchers worldwide. He was one of 46 new fellows elected at the 28th TWAS general meeting in Trieste, Italy, Nov. 27-29.University Distinguished Professor Anil Jain has been named a Fellow of The World Academy of Sciences for inspiring students and researchers worldwide. 

A University Distinguished Professor of Computer Science and Engineering, Jain is being honored for his pioneering contributions to pattern recognition resulting in novel solutions for a rapidly evolving biometrics industry. 

TWAS was founded 35 years ago to increase representation by women and researchers from the world's science- and technology-lagging countries. Jain said it is not typical to have a person from a developed nation be elected a fellow by the worldwide organization. 

Jain was nominated for the honor by Tieniu Tan of the Chinese Academy of Sciences (CAS), where he is a professor of computer vision and pattern recognition, CAS deputy secretary-general and director general of the CAS Bureau of International Cooperation. 

Tan called Jain an internationally renowned scholar and educator. “For the past 40 years, he has actively promoted the research topics of pattern recognition, computer vision and biometrics in developing nations through lectures, exchange programs, technical assistance and student and postdoc training. 

“Very few people get elected every year from North America,” he added. “He most certainly deserves the recognition.” 

Co-nominator Sankar Pal, distinguished scientist and former director of the Indian Statistical Institute in Kolkata, India, said Jain’s high quality pioneering research has had an enormous impact on statistical pattern recognition and computer vision. 

“It is evident from a Google scholar h-index of 179, with total citation 185,000,” Pal said. “His IEEE-PAMI publications have made him a role model scientist to many of us and to young researchers in machine learning. All these extra-ordinary achievements made his election to TWAS Foreign Fellowship successful. I am happy to be a part of this endeavor.”

Jain is known around the world for his expertise in biometric recognition, computer vision, and fingerprint-matching technology.

“It has been my honor to work on projects in countries including India, China, and Indonesia," Jain said. “I advised the world’s largest biometrics project, Aadhaar, in India that has enrolled more than 1 billion residents utilizing fingerprints and iris images for de-duplication in India’s social welfare system.” 

Jain also worked on a prototype fingerprint system to recognize infants and toddlers for vaccination tracking in Benin and India. The World Food Program is utilizing the prototype child ID system in field trials in Somalia in an effort to eliminate fraud in food distribution to children.

Anil Jain advised the world's largest biometrics project, Aadhaar, in India that has enrolled more than 1 billion residents utilizing fingerprints and iris images for India's medical system.

He holds one of 17 inaugural appointments to the U.S. Forensic Science Standards Board, a newly developed organization dedicated to identifying and fostering standards and guidelines for the nation’s forensic science community. 

Jain has previously served as a member of the Defense Science Board and the National Academies panels on Whither Biometrics and Improvised Explosive Devices. 

His list of honors is extensive. In 2016, he was elected to the United States National Academy of Engineering (among engineering’s highest honors) and as a Foreign Fellow of the Indian National Academy of Engineering. In 2015, he was named a fellow of the National Academy of Inventors for innovative discovery and technology, significant impact on society, and support and enhancement of innovation.

Jain is also a fellow of the Institute of Electrical & Electronics Engineers (IEEE); Association of Computing Machinery (ACM); American Association for the Advancement of Science (AAAS); International Society for Optics and Photonics Society (SPIE); and International Association of Pattern Recognition (IAPR).

He is a recipient of the Guggenheim Fellowship, Humboldt Research Award, Fulbright Scholarship, King-Sun Fu Prize, and W. Wallace McDowell Award. 

Jain is regularly invited to speak at national and internal forums, including the Third Annual ID4AFRICA Conference in Namibia in 2017; the 103rd Indian Science Congress, Information & Communication Science and Technology in India in 2016; the Royal Society meeting on United Kingdom forensics in London, 2015, and the keynote address at the Microsoft Computing in the 21st Century Conference in Beijing, 2014.

TWAS
TWAS is a global science academy based in Trieste, Italy. It was founded in 1983 by a distinguished group of scientists from the developing world who shared a belief that building strength in science and engineering could build the knowledge and skill to address the challenges of hunger, disease and poverty. 

The newest 46 fellows increase the academy's total to 1,267 Fellows from 104 countries – the most countries represented since TWAS’s creation. The academy elected its first fellows ever from Bolivia, the Lao People's Democratic Republic, Libya, Nicaragua, and Zambia. In addition, members were elected from Iraq, Sudan, Turkey, and Uzbekistan. Thirteen of the new fellows are women, who now account for 13 percent of the total membership.


          (USA-TX-Richardson) Systems Analyst      Cache   Translate Page      
Description: As the health care industry continues to rapidly transform, our IT team conceives, develops and delivers impactful technology solutions to support access to quality, affordable health care for our members. We are driven by our collective company purpose: To do everything in our power to stand with our members in sickness and in health®. Our IT team unleashes the power of this purpose through technology. We come to work every day to make a difference, and we deliver the highest quality and best solutions to our members. Job Purpose: This position is responsible for application and technical-related forensics work; providing subject matter expertise as required working with the Application Maintenance teams to troubleshoot incidents and problems; contributing the technical investment plan to the product roadmap; supporting product development and technical business requirements as needed. Required Job Qualifications*Bachelor Degree and 2 years Information Technology OR Technical Certification and/or College Courses and 4 year Information Technology experience OR 6 years Information Technology experience.*Web Technologies - HTML/CSS/Java*Database Technologies*Knowledge of application configuration*Service Oriented Architecture - SOAP / REST*Rapid prototyping*SDLC Methodology - Agile / Scrum / Iterative Development*System Performance management*Conceptual thinking*Creative thinking*Problem solving and analytical thinking*Strong oral/written communication skills Preferred Job Qualifications:*Bachelor Degree in Computer Science or Information Technology related*System Log Analysis Tools, such as Splunk*Debugging Tools - Dynatrace / Wily*Database Technologies - DB2 / MongoDB*Knowledge of API Gateways - Mulesoft*Knowledge of Big Data Analytics - HAVeN / HADOOP/ Autonomy / Vertica*Knowledge of Cloud computing / SaaS / IaaS / PaaS technologies*Knowledge of Integration Technologies - Tibco/Informatica/CAS*Knowledge of Mobile technologies - Phonegap / iOS / Android / Java / HTML5*Knowledge of Scripting Languages - BASH / PERL / PYTHON / RUBY*Requirements definition & management*Ability to execute *CA Location: TX - Richardson Activation Date: Tuesday, December 4, 2018 Expiration Date: Saturday, December 29, 2018 Apply Here
          (USA-IL-Chicago) Infrastructure Portfolio Delivery Consultant      Cache   Translate Page      
Description: As the health care industry continues to rapidly transform, our IT team conceives, develops and delivers impactful technology solutions to support access to quality, affordable health care for our members. We are driven by our collective company purpose: To do everything in our power to stand with our members in sickness and in health®. Our IT team unleashes the power of this purpose through technology. We come to work every day to make a difference, and we deliver the highest quality and best solutions to our members. Job Purpose: This position is responsible for tracking end-to-end infrastructure project delivery; maintaining aggregate view of all infrastructure projects across all IT portfolios and internal infrastructure projects; coordinating overall communication, reporting and consolidation of demands on Infrastructure; ensuring program and project performance metrics are met to deliver key business values. This position will assist Portfolios to follow the intake and demand process to ensure proper tracking and unnecessary work efforts/demand on infra is avoided. Required Job Qualifications: + Bachelors Degree and 7 years in Information Technology or equivalent work experience. + Experience in Project Management. + Knowledge of Infrastructure Products and Technologies. + Knowledge of Cloud computing / SaaS / PaaS. + Knowledge of DevOps / continuous deployment / integration process. + Knowledge of ITILv3. + Ability to tie together solutions across systems. + Project / portfolio management tools - MS Project / CBA / PPM / PMP Leadership. + Business acumen. + Consultative problem solving / consulting. + Prioritize and make trade-off decisions. + Adaptability / ability to manage change. Preferred Job Qualifications: + Master’s degree in Computer Science, MIS. + Customer relationship management. + Experience working in a highly outsourced / offshore environment. + Knowledge of SDLC / Iterative / Agile / Scrum development. + Vendor / SLA management. + Problem solving / analytical thinking. + Prior Intake and demand management Location: IL - Chicago Activation Date: Tuesday, December 4, 2018 Expiration Date: Wednesday, December 12, 2018 Apply Here
          The empirical characteristics of human pattern vision defy theoretically-driven expectations      Cache   Translate Page      
by Peter Neri Contrast is the most fundamental property of images. Consequently, any comprehensive model of biological vision must incorporate this attribute and provide a veritable description of its impact on visual perception. Current theoretical and computational models predict that vision should modify its characteristics at low contrast: for example, it should become broader (more … Continua la lettura di The empirical characteristics of human pattern vision defy theoretically-driven expectations
          Detection and analysis of spatiotemporal patterns in brain activity      Cache   Translate Page      
by Rory G. Townsend, Pulin Gong There is growing evidence that population-level brain activity is often organized into propagating waves that are structured in both space and time. Such spatiotemporal patterns have been linked to brain function and observed across multiple recording methodologies and scales. The ability to detect and analyze these patterns is thus … Continua la lettura di Detection and analysis of spatiotemporal patterns in brain activity
          TAMMiCol: Tool for analysis of the morphology of microbial colonies      Cache   Translate Page      
by Hayden Tronnolone, Jennifer M. Gardner, Joanna F. Sundstrom, Vladimir Jiranek, Stephen G. Oliver, Benjamin J. Binder Many microbes are studied by examining colony morphology via two-dimensional top-down images. The quantification of such images typically requires each pixel to be labelled as belonging to either the colony or background, producing a binary image. While this … Continua la lettura di TAMMiCol: Tool for analysis of the morphology of microbial colonies
          Performance of convolutional neural networks for identification of bacteria in 3D microscopy datasets      Cache   Translate Page      
by Edouard A. Hay, Raghuveer Parthasarathy Three-dimensional microscopy is increasingly prevalent in biology due to the development of techniques such as multiphoton, spinning disk confocal, and light sheet fluorescence microscopies. These methods enable unprecedented studies of life at the microscale, but bring with them larger and more complex datasets. New image processing techniques are therefore … Continua la lettura di Performance of convolutional neural networks for identification of bacteria in 3D microscopy datasets
          A comprehensive ensemble model for comparing the allosteric effect of ordered and disordered proteins      Cache   Translate Page      
by Luhao Zhang, Maodong Li, Zhirong Liu Intrinsically disordered proteins/regions (IDPs/IDRs) are prevalent in allosteric regulation. It was previously thought that intrinsic disorder is favorable for maximizing the allosteric coupling. Here, we propose a comprehensive ensemble model to compare the roles of both order-order transition and disorder-order transition in allosteric effect. It is revealed that … Continua la lettura di A comprehensive ensemble model for comparing the allosteric effect of ordered and disordered proteins
          Neural responses to natural and model-matched stimuli reveal distinct computations in primary and nonprimary auditory cortex      Cache   Translate Page      
by Sam V. Norman-Haignere, Josh H. McDermott A central goal of sensory neuroscience is to construct models that can explain neural responses to natural stimuli. As a consequence, sensory models are often tested by comparing neural responses to natural stimuli with model responses to those stimuli. One challenge is that distinct model features are often … Continua la lettura di Neural responses to natural and model-matched stimuli reveal distinct computations in primary and nonprimary auditory cortex
          FSF Blogs: Register today for LibrePlanet 2019!      Cache   Translate Page      

The free software community spans the entire world, with supporters in nearly every corner of the globe, busily coding, tinkering, and spreading the word about the growing importance of controlling our computing. The Internet provides us with many great tools to share the latest news and advances, but ultimately, there’s nothing quite like meeting in person at the LibrePlanet conference! At LibrePlanet, you can meet other developers, activists, policy experts, students, and more, to make connections and help us strategize the future of free software.

REGISTER FOR LIBREPLANET 2019 HERE

LibrePlanet 2019 is only four months away, on March 23-24, here in the Greater Boston area. We’re already in high gear here at the Free Software Foundation (FSF): we’ve secured four amazing keynote speakers, and we’re hard at work putting together an exciting schedule. Session topics will include:

  • Free software activism;

  • Practical and creative applications of free software;

  • Case studies;

  • Legal and compliance issues;

  • Fighting surveillance and defending our privacy; and much more!

LibrePlanet 2019's theme is "Trailblazing Free Software." In 1983, the free software movement was born with the announcement of the GNU Project. FSF founder Richard Stallman saw the dangers of proprietary code from the beginning: when code was kept secret from users, they would be controlled by the technology they used, instead of vice versa. In contrast, free software emphasized a community-oriented philosophy of sharing code freely, enabling people to understand how the programs they used worked, to build off of each other's code, to pay it forward by sharing their own code, and to create useful software that treated users fairly.

LibrePlanet boasts three days of free software activities, starting with a Friday night party at the FSF office in Boston. Saturday and Sunday are packed with conference sessions, lectures, workshops, lightning talks, and a party. To attend LibrePlanet, simply register online. Registration is gratis for FSF members, and $90 for both days or $60 for one day for non-members.

See you in March!


          Machine Learning / Artificial Intelligence Scientist      Cache   Translate Page      
MI-Dearborn, Ford Motors' Global Data Insight and Analytics (GDI&A) organization is looking for smart, nice and curious data scientists with exceptional skills in Machine Learning (ML), Artificial Intelligence (AI) and Scalable Computing. No other industry has the diversity, difficulty and economic impact of quantitative-based solutions as those found in the automotive industry. And no other automotive company
          Full Time Contract Pharmacist - Coquitlam, British Columbia - Loblaw Companies Limited - Coquitlam, BC      Cache   Translate Page      
Bachelor of Science, Pharmacy and a Class A Pharmacists license a must. Strong personal computing skills, as well as knowledge of KROLL Pharmacy Computer system...
From Loblaw Companies Limited - Wed, 05 Dec 2018 00:44:51 GMT - View all Coquitlam, BC jobs
          HR Generalist - Benefits & Compliance      Cache   Translate Page      
NY-Manhattan, The Benefits and Compliance Specialist is responsible for the administration, maintenance, design, and enhancements of all internal HR policies and benefits programs. This role reports into the Global Benefits & Compliance Manager. Client Details My client is a next-generation, cloud computing database. Description Benefits Analyze existing benefits policies and prevailing practices among similar
          CLINICAL SYSTEMS IT TRAINER LEVEL 2      Cache   Translate Page      
My client, a leading supplier of clinical software for GP practice management systems with offices based in Bodmin & Plymouth are looking for a Clinical Systems IT Trainer Level 2. As a Clinical IT Trainer you will train Healthcare staff throughout the Country and internal staff in the use of the Open Evolution clinical system and associated programs. To provide, develop and maintain associated training material. To update customer accounts after visits and training events, To assist with software demonstrations at major exhibitions / road-shows and other key sales events when required throughout the Country. The post holder should have a good general education, excellent keyboard, interpersonal and communication skills. A medical background, preferably within General Practice and previous use of Open Evolution would be desirable but is not essential. The applicant should be able to work under pressure, and have the ability to prioritise and work to deadlines with minimal or no supervision. General computing qualifications is advantageous but not essential The post holder must hold a full, clean, current driving licence. Having previous experience of dealing with clinical safety would be highly advantageous. In addition to the above salary the candidates will receive £4,000 per annum car/vehicle allowance paid monthly along with their salary. They will also receive a mileage allowance of £0.20p/mile whilst travelling for the company. Company benefits include: • 28 Days annual leave (inc. Bank Holidays) increasing to 33, pro-rata. • Pension scheme, • Health Care Plans, • Salary sacrifice bicycle schemes plus many more. For further information about this role please contact Daniel Nile on or email
          La tarjeta gráfica dedicada de Intel usará tecnología nunca vista en otras GPU      Cache   Translate Page      

Durante una entrevista llevada a cabo en otro portal web, Ari Rauch, Vicepresidente de Core & Visual Computing, desgranó varios detalles de las nuevas tarjetas gráficas dedicadas Intel Arctic Sound, y sobre cuál es el impacto que cree la compañía que podrán tener en el mercado, tanto de ordenadores de sobremesa, como en el mercado

The post La tarjeta gráfica dedicada de Intel usará tecnología nunca vista en otras GPU appeared first on HardZone.


          Veeva Systems stock falls after Citron makes short call, likens to pre-selloff Nvidia      Cache   Translate Page      

Shares of Veeva Systems Inc. are down 5% in midday trading Tuesday after noted short seller Citron Research made a negative call on the stock, setting a price target of $65. The shares are currently trading near $94 and were trading as high as $100.16 earlier in the session. "Competition has arrived as multiple is at peak and short interest at low," Citron wrote in a tweet. "A market correction will hit [Veeva] harder than any other SaaS name." Veeva makes cloud-computing software for the health space. The Citron analysts likened Veeva's stock to Nvidia Corp.'s prior to a recent selloff that's shaved more than 40% off the chipmaker's market value over the past three months. Veeva's stock has dropped 9.3% over that time, though it's still up more than 70% so far this year, compared with a 1.7% rise for the S&P 500 in that time.

Market Pulse Stories are Rapid-fire, short news bursts on stocks and markets as they move. Visit MarketWatch.com for more information on this news.


          One Raspberry Pi 3 not powerful enough? Try this five Pi cluster for computing on the edge      Cache   Translate Page      
A new system lets users pack up to five Raspberry Pi Compute Module 3 boards into a single compact, relatively low-cost, power-efficient computing cluster.
          Hardware and Networking training provider in India, Cloud Computing Training Provider in India,      Cache   Translate Page      
Webel and Indus Group jointly runs a WIKC- Webel Training centre Kolkata center in Kolkata. They are one of the nest hardware and Networking training provider in India and Cloud Computing Training Pro[...]
          Royal Info Service Offered      Cache   Translate Page      
Wondering how you can get a part time job and earn Rs.10000+ monthly from our company. Start your career as an Ad Publishing Worker of Royal Info Service, just simple computing idea. Home Based Job, w[...]
          The Unitary Fund: a no-strings attached grant program for Open Source quantum computing      Cache   Translate Page      
The Unitary Fund: a no-strings attached grant program for Open Source quantum computing   Posted August 20, 2018 by post-info This is a Guest Post written by Will Zeng. Editorial Note: As part of our
          Data entry job opportunities      Cache   Translate Page      
Wondering how you can get a part time job and earn Rs.10000+ monthly from our company. Start your career as an Ad Publishing Worker of Royal Info Service, just simple computing idea. Home Based Job, w[...]
          Royal Info Service Offer      Cache   Translate Page      
Wondering how you can get a part time job and earn Rs.10000+ monthly from our company. Start your career as an Ad Publishing Worker of Royal Info Service, just simple computing idea. Home Based Job, w[...]
          Data entry job opportunities Data entry job      Cache   Translate Page      
Wondering how you can get a part time job and earn Rs.10000+ monthly from our company. Start your career as an Ad Publishing Worker of Royal Info Service, just simple computing idea. Home Based Job, w[...]
          System administrator      Cache   Translate Page      
Server Management System Administration Project Management Technical support Cloud Computing and Management (AWS) Linux and Open source Apache Web Server Administration PHP installation and Configuration Network management (Firewall) Desktop support VOIP / EPABX File Server Management IT Infrastructure asset management JOB Roles and Responsibility Fresher, undergraduate graduate, ccna, windows,...
          Post-doctoral Fellowship - CSIR - Pretoria, Gauteng      Cache   Translate Page      
Implement climate model simulations on national computer infrastructures such as the Centre for High Performance Computing, for the purpose of generating...
From CSIR - Fri, 16 Nov 2018 13:36:44 GMT - View all Pretoria, Gauteng jobs
          High - Capacity Dell Power Edge R620 Server on Rentals in Pune      Cache   Translate Page      
server with hyper –dense memory up to768GB and powered by Intel® Xeon® E5-2600 processors. The PowerEdge R620 packs more computing power into a space-challenged data center with an exceptionall[...]
          Estas son las principales tendencias en infraestructura y operaciones para 2019      Cache   Translate Page      
IA y 'edge computing', cambios en los perfiles profesionales y nuevas modalidades en infraestructura marcan las agendas de los responsables de gestión y desempeño de TI.
          Lavoro, 88mila nuovi posti entro il 2020. Ma servono più laureati      Cache   Translate Page      
(Teleborsa) - L’Italia presenta oggi un’accelerazione verso la digitalizzazione globale, specie nelle aree cloud computing, big data e cyber security, ma fatica a reperire le competenze tecnologiche necessarie a...
          Accounting Clerk      Cache   Translate Page      
SC-Columbia, Job Description: This Accounting Clerk Position Features: ? Central Location ? Great Team ? Stable Hours Terrific opportunity for a professional individual ready to move ahead in a great career. As a accounting clerk for this family-oriented Business Services - Other company, you will be responsible for processing and reconciliation of all payables, responding to vendor inquiries and computing and
          Another Student Visit from NUS!      Cache   Translate Page      
Today, we had another opportunity to share our startup company’s values, business model and our team to a group of Chinese exchange students from NUS! These are the students who are currently pursuing a computing degree. We’re very fortunate and privileged to have them visit our company! The previous time was back in August, where we […]
          (USA-WA-Bellevue) Product Marketing Manager      Cache   Translate Page      
As cloud technologies mature and adoption expands, customers today are asking how cloud computing can address their unique challenges. Often this means taking an industry perspective, thinking about how AI can speed genomics research, or how data can change planting strategies for crops, or how streaming media from the cloud can increase efficiency. We’re looking for someone to take a broad view of industry marketing for Azure, establishing practices that will help us tell great Azure stories that are also great industry stories. **Responsibilities** Current industry focus areas for this role include Media & Entertainment, Healthcare, and Manufacturing. Each of those industries offers great opportunities for targeted marketing – think billboards in Hollywood or Microsoft presence with devices and solutions at medical industry events. A great candidate should be passionate about finding the transformation Azure can drive in those industries. But the role also requires someone to take on the challenge of ensuring consistency in how we drive Azure industry marketing, with a rhythm of business that maximizes opportunities for collaboration. Azure marketing partners with teams across the company to highlight the unique value of Azure solutions in the context of our larger industry marketing motions. This role requires someone who can influence diverse groups of stakeholders, identify opportunities to drive value, and Ideal candidate will demonstrate strong core product marketing skills and experience. Great communication skills and an aptitude for successful collaboration in a changing environment are required for success. This role will focus on the industry-specific strategy and execution required to expand Azure usage in key verticals: + Build topline Azure messaging and positioning for selected industries such as Azure for Media & Entertainment, Azure for Health + Lead Azure Industry go-to-market efforts across field, partner, engineering, and integrated marketing for designated industries, working in concert with C+E Industry Marketing team. + Create product presentations for major events, including executive keynotes + Run disclosure process for new industry-specific certifications and solutions + Partner with engineering on creation of new industry-specific content + Coordinate across Azure product marketing for delivery of Azure technical content in industry-specific channels + Partner with Azure Industry leads for Financial Services, Retail, and Government, as well as with other industry leads across the commercial cloud business to drive a consistent approach to industry marketing for Azure. **Qualifications** Qualifications: + 5+ years experience in product marketing, product management, or marketing communications for enterprise software or technology products + Ability to work independently in ambiguous and changing environments, along with great listening and partnering skills. + Strong communication and cross-group collaboration skills; must thrive working across organizational and cultural boundaries. + Understanding of cloud computing technologies, business drivers, and emerging trends. + Excellent analytical, problem solving, written, and verbal communications skills. + History of developing innovative solutions to ambiguous problems. + BA/BS required, MBA preferred Microsoft is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable laws, regulations and ordinances. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. If you need assistance and/or a reasonable accommodation due to a disability during the application or the recruiting process, please send a request via the Accommodation request form at https://careers.microsoft.com/us/en/accommodationrequest . Benefits/perks listed below may vary depending on the nature of your employment with Microsoft and the country where you work.
          (USA-WA-Redmond) Software Engineer      Cache   Translate Page      
Are you someone with a passion for software engineering ,data, analytics, insights and technology? Do you want to work on one of the largest data Engineering teams at Microsoft, lighting up actionable insights that drive the key business decisions for the entire organization? The Currency Team is the central data Engineering team for Microsoft Windows and Servicing. We’re looking for a skilled data Engineer to help innovate and drive how we measure and improve data quality of our business-critical metrics and datasets using Data engineering and machine learning methods (i.e. anomaly and outlier detection). You will be working closely with our data engineering and product engineering teams to define quality standards, detection methods, and drive data system improvements. If you’re passionate about quality, enjoy finding issues that others miss, and using leading edge analysis techniques, this is the position for you! Our overall team plays a key role in providing end-to-end analytics for Microsoft Windows and Servicing, including: + Bringing the relevant data into a central system to create the single version of truth + Creating key metrics, reports and dashboards to support business health + Opportunity analysis and hypothesis generation for stages throughout the user lifecycle + Building advanced analytics that span across the org. **Responsibilities** To be successful in this role, you must be driven, self-directed, entrepreneurial and focused on delivering the right results. You also need to have strong skills in written and oral communications, a can-do attitude and the willingness to tackle hard problems in innovative ways. You also thrive in a team environment that values cross team collaboration and building on the success of others. Responsibilities: + Design and implement machine learning based methods of detecting data quality issues and anomalies in big datasets + Work with data engineering to define data quality standards and consult teams on how to meet those standards + Assess the quality and confidence of critical datasets used by customers and executive level metrics + Design and implement data quality metrics and provide insights on how the organization can improve them + Develop reusable libraries in Python, R, or C# to help automate data quality checks and standardize assessments + Communicate with technical and non-technical audiences on data quality issues and initiatives **Qualifications** Basic Qualification: + Expertise in R, Python implementing statistical models and machine learning models (anomaly detection, classification, clustering, time series prediction, regression models, etc.) + Knowledge of databases and SQL Preferred Qualifications: + Experience with programming skills, e.g. Java, C# is a plus + MS/PHD Degree in Math/Computer Science or related field + Experience with large scale computing systems like Hadoop, MapReduce, Spark, and/or similar systems preferred + Strong written and verbal communication to educate and work with cross functional teams Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to the following specialized security screenings: Microsoft Cloud Background Check: This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter. Microsoft is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable laws, regulations and ordinances. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. If you need assistance and/or a reasonable accommodation due to a disability during the application or the recruiting process, please send a request via the Accommodation request form at https://careers.microsoft.com/us/en/accommodationrequest . Benefits/perks listed below may vary depending on the nature of your employment with Microsoft and the country where you work.
          Local Hack Day 2018      Cache   Translate Page      
On December 1st, the RGU Computing Society hosted a Local Hack Day event in the Sir Ian Wood Building of RGU. Local Hack Day, created by Major League Hacking, is a 12-hour creation marathon that takes place around the world. This year, more than 20,000 people registered to attend. The goal is that participants will […]
          MuleSoft Architect - Silverline Jobs - Casper, WY      Cache   Translate Page      
Company Overview: Do you want to be part of a fast-paced environment, supporting the growth of cutting edge technology in cloud computing? Silverline...
From Silverline Jobs - Fri, 05 Oct 2018 00:30:11 GMT - View all Casper, WY jobs
          (USA-CO-Aurora) Network Control Specialist - TS/SCI with Polygraph      Cache   Translate Page      
Job Description Seeking motivated candidates who want to work in a fast paced and unique job environment where you can truly make an impact in the world today. Are interested in some challenging and technical work or if you just want to be a part of something bigger than you? Then this could be a perfect fit for your next job or maybe even the start of an exciting and brand new career. As a Network Control Specialist you will be responsible for monitoring the communications infrastructure and an extensive array of networks. This job is important, and every task you are responsible for is tied to something bigger and you will make a difference. + Analyzes; administers and maintains secure messaging and data communications networks + Manages the usage and performance of messaging and or data communications networks + Maintains network security and ensures compliance with security policies and procedures + Evaluates hardware and software; including peripheral; output and related equipment consisting of large server farms; intricate communication systems; and other intelligence agencies systems + Participates in the development and implementation of network-related procedures and standards. + Participates in aspects of major network upgrades and detailed system acceptance testing. + Interfaces with vendors and critical customers to ensure appropriate restoration of systems during network outages or periods of reduced performance. + Develops; authors and implements testing strategies and documentation. + Provides advice and training to end-users for message related issues and anomalies. + Troubleshoots and resolves complex computer; hardware; software anomalies. + Maintains current knowledge of relevant hardware and software applications as assigned. + Researches and recommends technical solutions for system upgrades + Participates in special projects as required. Education Bachelors Degree in Computer Science or a related technical discipline, or the equivalent combination of education, technical certifications or training, or work experience. Qualifications 2-5 years of directly related experience in network administration and support. Unique/Additional Requirements: + Manages Site Comms Processor (SCP); Automated Message Handling Systems Secure Message and routing Terminal; XML Information BUS; Information Transfer System; and the SMC Helpdesk customer message queues. + Manages error correction and troubleshooting for undelivered messages. + Responsible for managing SOCOMM and the Autodin Customer Information Database (CID) + Ensures customer information databases are up to date and synchronized. Oversees SOCOMM and AUTODIN Contingency Plans Update Master Lists; coordinate scheduled CCRP and COOP testing + Coordinates with users and other organizations to establish cause and result for after action reports for message anomalies Performs AUTODIN; AMHS backups; daily partial backups and weekly full backups. + Provides technical assistance to customers in support of complex secure message and data networks by managing message platform connections. Must possess appropriate current DOD Information Assurance (IA) certification to be considered for employment; i.e., CompTIA Security+CE, or CCNA-Security. CompTIA Security+CE is the preferred certification. In addition must attain the required DOD 8570 Computing Environment (CE) certification within six (6) months of hire date. As part of your role/function on the program, you will be granted privileged user access. Privileged Users are subject to greater scrutiny as a direct result of the significant responsibilities placed upon them. Please be aware that because of these critical duties, you will be subject to additional IT system monitoring, and supervisory evaluation to ensure continuous adherence to Privileged User processes and procedures. Privileged Users are subject to a zero tolerance policy for security violations. Because of the sensitive nature of the work being done for this government client, all candidates must hold a TS/SCI with Polygraph. Benefits of this Position: + Opportunity for Fast Growth within the program + Professional Development Assistance – Covering the Cost of Obtaining Professional & Technical Certifications (depending on program) + Educational Reimbursement – toward degree programs and individual coursework + 401K Match – with 100% vesting on day one + Health, Dental and Vision Coverage to keep you healthy, starting your first day + We know work-life balance is important, GDIT offers Paid Time Off, Plus 10 Paid Holidays + Parking and transit commuter benefits Why Work at General Dynamics IT? + Work with top talent and some of the brightest minds in your field + Support missions that make a difference to our Nation + Become part of an organization that that is committed to the highest ethical standards in all that we do + Thrive in the stability of a large organization, with the ability to move onto new opportunities, supporting different missions, building your career within GDIT + Want to move, or find a job close to home? We have positions in several locations in the United States and the world + Enjoy a culture that supports work-life balance General Dynamics is a and . #ISDCJ #DPOST #ZRPOST As a trusted systems integrator for more than 50 years, General Dynamics Information Technology provides information technology (IT), systems engineering, professional services and simulation and training to customers in the defense, federal civilian government, health, homeland security, intelligence, state and local government and commercial sectors. With approximately 32,000 professionals worldwide, the company delivers IT enterprise solutions, manages large-scale, mission-critical IT programs and provides mission support services. GDIT is an Equal Opportunity/Affirmative Action Employer - Minorities/Females/Protected Veterans/Individuals with Disabilities. Job ID2018-49645 Number of Positions1 Job FunctionInformation Technology Security Clearance LevelTop Secret/SCI with Polygraph Full/Part TimeFull Time
          (USA-CO-Aurora) Network Control Specialist - TS/SCI with Polygraph      Cache   Translate Page      
Job Description Seeking motivated candidates who want to work in a fast paced and unique job environment where you can truly make an impact in the world today. If you are interested in challenging and technical work or if you just want to be a part of something bigger than you, then this could be a perfect fit for your next job or maybe even the start of an exciting and brand new career. As a Network Control Specialist you will be responsible for monitoring the communications infrastructure and an extensive array of networks. This job is important, and every task you are responsible for is tied to something bigger and you will make a difference. + Exciting fast paced positon solving real world problems in multi-vendor-environment; utilizes critical thinking to troubleshoot complex network issues while maintaining constant vigilance over enterprise network resources + Responsible for performing 24/7 continuous monitoring to identify network incidents related to service interruptions, WAN/LAN outages, and system performance issues + Remediates network and system performance issues and coordinates and implements network changes in accordance with established network maintenance activity processes and procedures + Responsible for day-to-day O&M and administration on routers, switches, multiplexers, load balancers, and encryption and decryption devices within a multi-vendor environment + Troubleshoots SONET, MPLS, BGP, OSPF, IS-IS, Ethernet, Frame-Relay, VRF/VPN, VPLS, Tunneling and other networking technologies to identify potential switching and routing conflicts + Responsible for proactive configuration of network paths for optimum network performance and to reduce impacts to service + Interacts with Cyber Network Defense (CND) analyst to investigate network security related incidents and works to identify root causes and executes mitigation strategies + Provides Situational Awareness (SA) information to the customer for all service impacts + Maintains Job Qualification Standard (JQS) requirements and job certification with an implemented Annual Plan of Instruction (APOI) per customer direction in conjunction with DoD 8570 Requirements Education Bachelors Degree in Computer Science, Engineering, or a related technical discipline, or the equivalent combination of education, technical certifications or training, or work experience. Qualifications 2-5 years of directly related experience in network administration and support + Must have current TS/SCI with CI Polygraph + Must possess appropriate current DOD Information Assurance (IA) certification to be considered for employment; i.e., CompTIA Security+CE, or CCNA-Security + Must attain the required DOD 8570 Computing Environment (CE) certification within six (6) months of hire date + Experience with ITIL Incident Management processes + Position requires shift work: Panama Schedule: Example shown Below + As part of your role/function on the program, you will be granted privileged user access Panama 12-Hour Shift Schedule Example. (This is the schedule we follow today but is subject to change based on Government Requirements) SCHEDULE (ROTATION BETWEEN SHIFTS TAKES PLACE EVERY TWO MONTHS) MON TUE WED THU FRI SAT SUN MON TUE WED THU FRI SAT SUN MON WORK WORK OFF OFF WORK WORK WORK OFF OFF WORK WORK OFF OFF OFF As part of your role/function on the program, you will be granted privileged user access. Privileged Users are subject to greater scrutiny as a direct result of the significant responsibilities placed upon them. Please be aware that because of these critical duties, you will be subject to additional IT system monitoring, and supervisory evaluation to ensure continuous adherence to Privileged User processes and procedures. Privileged Users are subject to a zero tolerance policy for security violations. Benefits of this Position: + Opportunity for Fast Growth within the program + Professional Development Assistance – Covering the Cost of Obtaining Professional & Technical Certifications (depending on program) + Educational Reimbursement – toward degree programs and individual coursework + 401K Match – with 100% vesting on day one + Health, Dental and Vision Coverage to keep you healthy, starting your first day + We know work-life balance is important, GDIT offers Paid Time Off, Plus 10 Paid Holidays + Parking and transit commuter benefits Why Work at General Dynamics IT? + Work with top talent and some of the brightest minds in your field + Support missions that make a difference to our Nation + Become part of an organization that that is committed to the highest ethical standards in all that we do + Thrive in the stability of a large organization, with the ability to move onto new opportunities, supporting different missions, building your career within GDIT + Want to move, or find a job close to home? We have positions in several locations in the United States and the world + Enjoy a culture that supports work-life balance General Dynamics is a and . #ISDCJ #DPOST #ZRPOST As a trusted systems integrator for more than 50 years, General Dynamics Information Technology provides information technology (IT), systems engineering, professional services and simulation and training to customers in the defense, federal civilian government, health, homeland security, intelligence, state and local government and commercial sectors.With approximately 32,000 professionals worldwide, the company delivers IT enterprise solutions, manages large-scale, mission-critical IT programs and provides mission support services. GDIT is an Equal Opportunity/Affirmative Action Employer - Minorities/Females/Protected Veterans/Individuals with Disabilities. Job ID2018-49644 Number of Positions1 Job FunctionInformation Technology Security Clearance LevelTop Secret/SCI with Polygraph Full/Part TimeFull Time
          (USA-CO-Aurora) Senior Systems Administrator - TS/SCI with Polygraph      Cache   Translate Page      
Job Description Seeking motivated candidates who want to work in a fast paced and unique job environment where you can truly make an impact in the world today. If you are interested in challenging and technical work, or if you just want to be a part of something bigger than you, then this could be a perfect fit for your next job or maybe even the start of an exciting and brand new career. As a Senior Network Administrator you will be responsible for maintaining the communications infrastructure supporting an extensive array of networks. This job is important, and every server you touch, every install you support, and every configuration change you execute, all is tied to something bigger and you will make a difference. + Analyzes, administers and maintains voice, video, and/or data communications networks. + Manages the usage and performance of voice, video and/or data communications networks. + Maintains network security and ensures compliance with security polices and procedures. + Evaluates hardware and software, including peripheral, output, and related equipment. + Participates in the development and implementation of network-related procedures and standards. + Participates in and may lead aspects of major network installations and upgrades. + Interfaces with vendors to ensure appropriate resolution during network outages or periods of reduced performance. + Develops and implements testing strategies and document results. + Provides advice and training to end-users. + Troubleshoots and resolves complex problems. + May provide work leadership to less-experienced network personnel. + Maintains current knowledge of relevant hardware and software applications as assigned. + Participates in special projects as required. Education Bachelors Degree in Computer Science or a related technical discipline, or the equivalent combination of education, technical certifications or training, or work experience. Qualifications 2-5 years of directly related experience in network administration and support. Unique/Additional Requirements: + Manages Site Comms Processor (SCP); Automated Message Handling Systems Secure Message and routing Terminal; XML Information BUS; Information Transfer System; and the SMC Helpdesk customer message queues. + Manages error correction and troubleshooting for undelivered messages + Responsible for managing SOCOMM and the Autodin Customer Information Database (CID) + Ensures customer information databases are up to date and synchronized + Oversees SOCOMM and AUTODIN Contingency Plans Update Master Lists; coordinate scheduled CCRP and COOP testing + Coordinates with users and other organizations to establish cause and result for after action reports for message anomalies + Performs AUTODIN; AMHS backups; daily partial backups and weekly full backups. + Provides technical assistance to customers in support of complex secure message and data networks by managing message platform connections. Must have current TS/SCI with CI Polygraph Must possess appropriate current DOD Information Assurance (IA) certification to be considered for employment; i.e., CompTIA Security+CE, or CCNA-Security Must attain the required DOD 8570 Computing Environment (CE) certification within six (6) months of hire date Experience with ITIL Incident Management processes As part of your role/function on the program, you will be granted privileged user access. Privileged Users are subject to greater scrutiny as a direct result of the significant responsibilities placed upon them. Please be aware that because of these critical duties, you will be subject to additional IT system monitoring, and supervisory evaluation to ensure continuous adherence to Privileged User processes and procedures. Privileged Users are subject to a zero tolerance policy for security violations. Benefits of this Position: + Opportunity for Fast Growth within the program + Professional Development Assistance – Covering the Cost of Obtaining Professional & Technical Certifications (depending on program) + Educational Reimbursement – toward degree programs and individual coursework + 401K Match – with 100% vesting on day one + Health, Dental and Vision Coverage to keep you healthy, starting your first day + We know work-life balance is important, GDIT offers Paid Time Off, Plus 10 Paid Holidays + Parking and transit commuter benefits Why Work at General Dynamics IT? + Work with top talent and some of the brightest minds in your field + Support missions that make a difference to our Nation + Become part of an organization that that is committed to the highest ethical standards in all that we do + Thrive in the stability of a large organization, with the ability to move onto new opportunities, supporting different missions, building your career within GDIT + Want to move, or find a job close to home? We have positions in several locations in the United States and the world + Enjoy a culture that supports work-life balance General Dynamics is a and . #ISDCJ #DPOST #ZRPOST As a trusted systems integrator for more than 50 years, General Dynamics Information Technology provides information technology (IT), systems engineering, professional services and simulation and training to customers in the defense, federal civilian government, health, homeland security, intelligence, state and local government and commercial sectors.With approximately 32,000 professionals worldwide, the company delivers IT enterprise solutions, manages large-scale, mission-critical IT programs and provides mission support services. GDIT is an Equal Opportunity/Affirmative Action Employer - Minorities/Females/Protected Veterans/Individuals with Disabilities. Job ID2018-49647 Number of Positions1 Job FunctionInformation Technology Security Clearance LevelTop Secret/SCI with Polygraph Full/Part TimeFull Time
          (USA-VA-Herndon) Customer Services and Information Technology Officer      Cache   Translate Page      
Job Description Location: Herndon, VA, Hours 6:00 am -2:30pm. Providing Close Support at customer site. Requirements include: • Directly related work experience in a technical help desk position supporting Windows XP, Microsoft Office 2003 or later, Internet Explorer, and business applications used within a business environment • Knowledge of multiple desktop programs, configuration and debugging techniques • Detailed oriented as well as excellent oral and written communication skills • Sound problem resolution, judgment, and decision-making • Experience with TCP/IP and general networking issues • Experience providing superior customer service and support • Experience working effectively in a team environment, communicating effectively, resolving issues efficiently, and contributing to the improvement of the infrastructure • Experience with virus scanning services; Desktop, stand-alone and laptop computing services • Experience with servers, printers and peripheral services • Experience with Data transfer services • Experience with ticket tracking, closing, and escalating issues; assisting in installing peripheral IT items and Access administration • Strong interpersonal and organization skills, successful in working both independently and in a team environment • Strong troubleshooting skills • CMA/DMA/MCSA desired • Experience excellent listening and writing skills Desired Skills • O&M experience • Ability to work independently; and manage multiple task assignments • Excellent verbal and written communication skills • Demonstrated ability to describe how to use an application, system, etc. 1. Manages the functionality and efficiency of a group of computers running on one or more operating systems. 2. Maintains the integrity and security of servers and systems. 3. Sets up administrator and service accounts. 4. Maintains system documentation 5. Interacts with users and evaluates vendor products. 6. Makes recommendations to purchase hardware and software, coordinates installation and provides backup recovery. 7. Develops and monitors policies and standards for allocation related to the use of computing resources. 8. May program in an administrative language. 9. Develops and implements testing strategies and document results. 10. Provides advice and training to end-users. 11. Provides guidance and work leadership to less-experienced staff members, and may have supervisory responsibilities. 12. May serve as a technical team or task leader. 13. Maintains current knowledge of relevant technologies as assigned. 14. Participates in special projects as required. Education Bachelors Degree in Computer Science or a related technical discipline, or the equivalent combination of education, technical certifications or training, or work experience. Qualifications 8-10 years of directly related experience in systems administration and analysis. For more than 50 years, General Dynamics Information Technology has served as a trusted provider of information technology, systems engineering, training and professional services to customers across federal, state, and local governments, and in the commercial sector. Over 40,000 GDIT professionals deliver enterprise solutions, manage mission-critical IT programs and provide mission support services worldwide. GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class. #SMPOLY #CJPOST #DPOST #ISDCJ Job ID2018-49761 Number of Positions1 Job FunctionInformation Technology Security Clearance LevelTop Secret/SCI with Polygraph Full/Part TimeFull Time
          (USA-AZ-Ft Huachuca) Administrator, Systems      Cache   Translate Page      
Job Description Manages the functionality and efficiency of a group of computers running on one or more operating systems. 1. Manages the functionality and efficiency of a group of computers running on one or more operating systems. 2. Maintains the integrity and security of servers and systems. 3. Sets up administrator and service accounts. 4. Maintains system documentation 5. Interacts with users and evaluates vendor products. 6. Makes recommendations to purchase hardware and software, coordinates installation and provides backup recovery. 7. Develops and monitors policies and standards for allocation related to the use of computing resources. 8. May program in an administrative language. 9. Develops and implements testing strategies and document results. 10. Provides advice and training to end-users. 11. Maintains current knowledge of relevant technologies as assigned. 12. Participates in special projects as required. Education Bachelors Degree in Computer Science or a related technical discipline, or the equivalent combination of education, technical certifications or training, or work experience. Qualifications 2-5 years of directly related experience in systems administration and analysis. For more than 50 years, General Dynamics Information Technology has served as a trusted provider of information technology, systems engineering, training and professional services to customers across federal, state, and local governments, and in the commercial sector. Over 40,000 GDIT professionals deliver enterprise solutions, manage mission-critical IT programs and provide mission support services worldwide. GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class. Requisition ID2018-49835 # of Openings1 Job FunctionInformation Technology Security Clearance LevelTop Secret Full/Part TimeFull Time
          (USA-VA-Chantilly) Sr. Principal Windows Systems Administrator : TS/SCI with Poly Required      Cache   Translate Page      
Job Description Manages the functionality and efficiency of a group of computers running on one or more operating systems. The successful candidate will manage a Windows domain, Active Directory, Group Policy, McAfee ePolicy Orchestrator, SCCM, PowerShell, Admin Studio, and VMWare ThinApp. + Manages the functionality and efficiency of a group of computers running on one or more operating systems + Maintains the integrity and security of servers and systems. + Sets up administrator and service accounts. + Maintains system documentation. + Interacts with users and evaluates vendor products. + Makes recommendations to purchase hardware and software, coordinates installation and provides backup recovery. + Develops and monitors policies and standards for allocation related to the use of computing resources. + May program in an administrative language. + Oversees implementation of testing strategies and documentation of results. + Provides advice and training to end-users. + Provides guidance and work leadership to less-experienced staff members, and may have supervisory responsibilities. + Serves as a technical team or task leader. + Maintains current knowledge of relevant technologies as assigned. + Participates in special projects as required. Education Bachelors Degree in Computer Science or a related technical discipline, or the equivalent combination of education, technical training, or work experience. Qualifications 10-12 years of related information systems experience, including management experience. For more than 50 years, General Dynamics Information Technology has served as a trusted provider of information technology, systems engineering, training and professional services to customers across federal, state, and local governments, and in the commercial sector. Over 40,000 GDIT professionals deliver enterprise solutions, manage mission-critical IT programs and provide mission support services worldwide. GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class. Job ID2018-49831 Number of Positions1 Job FunctionInformation Technology Security Clearance LevelTop Secret/SCI with Polygraph Full/Part TimeFull Time
          (USA-CO-Aurora) Senior Systems Administrator - TS/SCI with Polygraph      Cache   Translate Page      
Job Description Seeking motivated candidates who want to work in a fast paced and unique job environment where you can truly make an impact in the world today. If you are interested in challenging and technical work, or if you just want to be a part of something bigger than you, then this could be a perfect fit for your next job or maybe even the start of an exciting and brand new career. As a Senior Network Administrator you will be responsible for maintaining the communications infrastructure supporting an extensive array of networks. This job is important, and every server you touch, every install you support, and every configuration change you execute, all is tied to something bigger and you will make a difference. + Analyzes, administers and maintains voice, video, and/or data communications networks. + Manages the usage and performance of voice, video and/or data communications networks. + Maintains network security and ensures compliance with security polices and procedures. + Evaluates hardware and software, including peripheral, output, and related equipment. + Participates in the development and implementation of network-related procedures and standards. + Participates in and may lead aspects of major network installations and upgrades. + Interfaces with vendors to ensure appropriate resolution during network outages or periods of reduced performance. + Develops and implements testing strategies and document results. + Provides advice and training to end-users. + Troubleshoots and resolves complex problems. + May provide work leadership to less-experienced network personnel. + Maintains current knowledge of relevant hardware and software applications as assigned. + Participates in special projects as required. Education Bachelors Degree in Computer Science or a related technical discipline, or the equivalent combination of education, technical certifications or training, or work experience. Qualifications 2-5 years of directly related experience in network administration and support. Unique/Additional Requirements: + Manages Site Comms Processor (SCP); Automated Message Handling Systems Secure Message and routing Terminal; XML Information BUS; Information Transfer System; and the SMC Helpdesk customer message queues. + Manages error correction and troubleshooting for undelivered messages + Responsible for managing SOCOMM and the Autodin Customer Information Database (CID) + Ensures customer information databases are up to date and synchronized + Oversees SOCOMM and AUTODIN Contingency Plans Update Master Lists; coordinate scheduled CCRP and COOP testing + Coordinates with users and other organizations to establish cause and result for after action reports for message anomalies + Performs AUTODIN; AMHS backups; daily partial backups and weekly full backups. + Provides technical assistance to customers in support of complex secure message and data networks by managing message platform connections. Must have current TS/SCI with CI Polygraph Must possess appropriate current DOD Information Assurance (IA) certification to be considered for employment; i.e., CompTIA Security+CE, or CCNA-Security Must attain the required DOD 8570 Computing Environment (CE) certification within six (6) months of hire date Experience with ITIL Incident Management processes As part of your role/function on the program, you will be granted privileged user access. Privileged Users are subject to greater scrutiny as a direct result of the significant responsibilities placed upon them. Please be aware that because of these critical duties, you will be subject to additional IT system monitoring, and supervisory evaluation to ensure continuous adherence to Privileged User processes and procedures. Privileged Users are subject to a zero tolerance policy for security violations. Benefits of this Position: + Opportunity for Fast Growth within the program + Professional Development Assistance – Covering the Cost of Obtaining Professional & Technical Certifications (depending on program) + Educational Reimbursement – toward degree programs and individual coursework + 401K Match – with 100% vesting on day one + Health, Dental and Vision Coverage to keep you healthy, starting your first day + We know work-life balance is important, GDIT offers Paid Time Off, Plus 10 Paid Holidays + Parking and transit commuter benefits Why Work at General Dynamics IT? + Work with top talent and some of the brightest minds in your field + Support missions that make a difference to our Nation + Become part of an organization that that is committed to the highest ethical standards in all that we do + Thrive in the stability of a large organization, with the ability to move onto new opportunities, supporting different missions, building your career within GDIT + Want to move, or find a job close to home? We have positions in several locations in the United States and the world + Enjoy a culture that supports work-life balance General Dynamics is a and . #ISDCJ #DPOST #ZRPOST As a trusted systems integrator for more than 50 years, General Dynamics Information Technology provides information technology (IT), systems engineering, professional services and simulation and training to customers in the defense, federal civilian government, health, homeland security, intelligence, state and local government and commercial sectors.With approximately 32,000 professionals worldwide, the company delivers IT enterprise solutions, manages large-scale, mission-critical IT programs and provides mission support services. GDIT is an Equal Opportunity/Affirmative Action Employer - Minorities/Females/Protected Veterans/Individuals with Disabilities. Job ID2018-49852 Number of Positions1 Job FunctionInformation Technology Security Clearance LevelTop Secret/SCI with Polygraph Full/Part TimeFull Time
          (USA-VA-Ft Belvoir) Sr Principal Network Engineer      Cache   Translate Page      
Job Description Network Administrator (L3) Fort Belvoir, VA Eligible for up to a 10K sign on bonus & Eligible for a 8k referral bonus! GEERAL SUMMARY: GDIT is seeking candidates to support the US Army Intelligence and Security Command (INSCOM). Under the I2TS 3 task order, INSCOM ensures reliable, uninterrupted availability of Command, Control, Communications, Computers, and Information Management (C4IM) including: networks, hardware, software, engineering, and specialized tools at the point of customer need to support INSCOM's mission. INSCOM and its Major Subordinate Commands (MSCs) provide the enabling layer to connect the Army and its tactical formations to defense and national intelligence agencies via tactical networks. The ability to provide mission critical intelligence is dependent on the successful use of its information technology (IT) networks worldwide. Principal Duties and Responsibilities: An I2TS 3 Network Administrator: + Performs administration duties for networking hardware including routers, switches, gateways, network interface cards, networking cables, firewalls, and other related network hardware + Must have knowledge of fiber and copper-based Ethernet technologies, capabilities and cabling and their connectivity to local and wide area networks + Monitors, responds to, and resolves hardware and software issues utilizing a variety troubleshooting tools and techniques + Installs and configures network hardware and software, including implementing upgrades + Respond to service requests providing outstanding technical support and training to end-users + Administers network security via firewall access controls + Analyses configuration and rules to ensure network optimization + Analyses traffic flow isolating service impairments and resolving identified issues + Provide clear written documentation on network procedures + Effectively interact with staff from other sections on complex client/server problems Desirable Skills / Experience: + Comprehensive knowledge of the principles, methods, and techniques used in network troubleshooting and support and related network hardware and software expertise + Comprehensive knowledge of routing and switching technologies to include but not limited to Site-to-Site VPNs, OSPF, and BGP + Experience working with Cisco routers, Cisco switches, Cisco ASA firewalls, Palo Alto Firewalls, Brocade Switches, Juniper Routers, and F5 Big-IP load-balancers + Experience performing network packet capture analysis + Experience leveraging network monitoring tools such as SolarWinds Certifications: + DoD 8570.01-M IAT Level II Computing Environment (CE) Certification as determined by the Program Manager is required prior to support on contract + Required Security Environment Certification: CompTIA Security+ CE or equivalent(CCNA-Security) + Required Computing Environment (CE) certification: CCNA to start, however would be required to obtain CCNP within 6 months after start) Security Clearance + TS/SCI required Additional: + Although currently not a requirement for this position, candidates must be willing and able to attain a CI Polygraph as determined by the contract + Position may require occasional travel + Position may require lifting of objects (i.e. IT Hardware), reaching/bending/kneeling (i.e. plug in cables) and other moderately strenuous activity + Contract is I2TS 3 + Travel maybe required to support this mission Education + High School Diploma/GED with 10 years of related experience, or Associate’s Degree with 8 years of experience, or Bachelor’s Degree with 6 years of experience, or Master’s Degree with 4 years of experience Qualifications 10-15 years of directly related experience in network analysis and design. For more than 50 years, General Dynamics Information Technology has served as a trusted provider of information technology, systems engineering, training and professional services to customers across federal, state, and local governments, and in the commercial sector. Over 40,000 GDIT professionals deliver enterprise solutions, manage mission-critical IT programs and provide mission support services worldwide. GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class. Job ID2018-49848 Number of Positions1 Job FunctionInformation Technology Security Clearance LevelTop Secret/SCI Full/Part TimeFull Time
          (USA-AL-Huntsville) Systems Security Engineer      Cache   Translate Page      
Job Description Responsible for the design, development, implementation, and/or integration of a DOD IA architecture, system, or system component for use within CE (computing environment), NE (network environment), and/or enclave environments. Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction. + Performs Computer Security Incident Response activities for a large organization, coordinates with other government agencies to record and report incidents. + Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation. + Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information. + Evaluate firewall change requests and assess organizational risk. + Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems. + Assists with implementation of counter-measures or mitigating controls. + Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices. + Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance. + Prepares incident reports of analysis methodology and results. + Provides guidance and work leadership to less-experienced technical staff members. + Experience with Risk Management Framework (RMF) and Host Base Security System (HBSS) highly preferred. + Maintains current knowledge of relevant technology as assigned. + Participates in special projects as required. Education Bachelors Degree in Computer Science, Engineering or a related technical discipline is required Qualifications 5-8 years of related systems engineering experience and in data security administration + The system security engineers should have a minimum of five years’ experience in performing information assurance and security engineering in the process control industry and a minimum of five years in performing information assurance and security engineering in the information technology industry for systems or networks. + This experience can be concurrent or through separate work activities with previous employers. + Knowledge of the DIACAP and RMF process, DoD IA policies, and networthiness program is required under this contract. + Provide security engineering for the Army meter data management system applications, control servers, network devices, operating systems, interfaces and communications protocols within the scope of the system security boundary. + The security engineering effort shall include identification, development, and implementation of the Information Assurance (IA) Controls, to include technical, procedural, and documentation requirements as described in DoD and Army requirements and guidelines. + The SSE is responsible for the design, development, implementation, and/or integration of a DOD IA architecture, system, or system component for use within CE (computing environment), NE (network environment), and/or enclave environments in support of higher ranking IA professionals. Must meet the Department of Defense Directive (DoDD) 8570.01 “Information Assurance Training, Certification, and Workforce Management” and DoD 8570-M “Information Assurance Workforce Improvement Program” requirements. DoD Secret security clearance required upon start. Additional desired experience: MS Window 2012 server experience MS SQL Server database and framework experience HBSS Working Level Familiarity As a trusted systems integrator for more than 50 years, General Dynamics Information Technology provides information technology (IT), systems engineering, professional services and simulation and training to customers in the defense, federal civilian government, health, homeland security, intelligence, state and local government and commercial sectors.With approximately 32,000 professionals worldwide, the company delivers IT enterprise solutions, manages large-scale, mission-critical IT programs and provides mission support services. GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class. Job ID2018-49849 Number of Positions1 Job FunctionInformation Technology Security Clearance LevelSecret Full/Part TimeFull Time
          Industrial Computing Specialist - HyLife Foods LP - Neepawa, MB      Cache   Translate Page      
This position is based in the vibrant community of Neepawa, Manitoba which has a reputation for its beauty and high quality of life....
From HyLife Foods LP - Fri, 02 Nov 2018 02:47:34 GMT - View all Neepawa, MB jobs
          Source code to PC/GEOS has been published to GitHub #VintageComputing #MSDOS #GUI #Commodore      Cache   Translate Page      
Does the above picture look like an early version of Microsoft Windows? You’d be wrong. This is GEOS and it was released well before WIndows, starting on the Commodore 64 and ported to MS-DOS as PC/GEOS.THE BIG NEWS: the source code for PC/GEOS was recently released on GitHub here!PC/GEOS This repository is the official place […]
          Crossing the Streams with CircuitPython by @aallan @hacksterio      Cache   Translate Page      
Crossing the Streams with CircuitPython – Hackster Blog by Alasdair Allan – It’s been an interesting year for micro-controller boards. We’ve seen a dramatic drop in the price of computing, along with the long anticipated collapse in the diversity of board form factors, the rise of the FPGA, and the new availability of RISC-V chips […]
          Despte soaring needs, only 64,405 students received computer science degrees      Cache   Translate Page      

ACM, the Association for Computing Machinery, has released the highly anticipated report "Retention in Computer Science Undergraduate Programs in the U.S.: Data Challenges and Promising Interventions." 

Among its key recommendations, the report calls for additional research to provide a more nuanced understanding of the dynamics of attrition and retention, and encourages higher education institutions to provide proactive advising to ensure that students are exposed to career opportunities and pathways early in their undergraduate experience.

The computing field is experiencing exponential growth, both in terms of current and projected job openings, as well as students majoring in computer science (CS). Recently, the U.S. Department of Labor projected that between 2008 and 2018, ¼ million computing jobs opened in the U.S.

According to the National Center for Education Statistics, however, in 2015-2016 only 64,405 students received computer science degrees. the main source of preparation for these jobs.

Additionally, the US Bureau of Labor Statistics estimates that employment in computer and information technology occupations is expected to grow by 13% in the next decade.

The interest in computing is also reflected in the numbers of incoming students pursuing Bachelor degrees in computing. A report by the Computing Research Association (CRA) highlights that US undergraduate enrollment in computer science is higher today than at any other time. Additionally, the CRA report outlines a 185% increase in CS undergraduates at large institutions since 2006, and a 216% increase of CS majors at smaller institutions during the same period.

Despite these trends, the challenge of retaining more women and people from underrepresented minorities (African-American, Hispanic, Native American) has been a persistent challenge in the field for decades. According to the National Science Foundation's Engineering and Science Indicators for 2016, despite the fact that women earned 50% of the Bachelor degrees in science and engineering, they accounted for only 17.9% of Bachelor degrees in the computing sciences. Additionally, data from the National Center for Education Statistics (NCES) shows that for CS Bachelor degrees granted at doctoral-granting institutions in 2015, only 8.4% of degree recipients were Latino and only 4.3% were African-American.

Data Collection and Analysis

Among its recommendations, the report includes several recommendations for improving the availability and consistency of retention data. These suggestions include better research to provide a more nuanced understanding attrition and retention, the implementation of more regular data-gathering on student retention through programs, and an increase in institutional resources to source, aggregate, analyze and report on retention data.

Promising Interventions:

The report includes an overview of specific barriers to retention and some promising interventions to overcome these barriers.

Give Students a Better Understanding of CS
The report found that many students come to college with misconceptions about computing and may hold invalid stereotypes of computer scientists. The report outlines five possible interventions for this barrier, including using students as near-peer ambassadors in outreach. With this approach, college students who are passionate about computing can help offer outreach programs to younger students.

Meet Students' Varied Backgrounds 

Most introductory CS classrooms have students with varied levels of experience and some students might be intimidated by other students in the class who have more experience. The report outlines several possible interventions for this challenge including offering summer bridge programs for students from groups with historically lower retention rates.

Increase Helpful Collaboration 

Helping students learn involves challenging them, but sometimes it is impossible to provide exactly the right level of challenge for all students. The report recommends tactics for integrating collaboration into classes and coursework. Using this approach faculty can help students tackle challenges beyond their current level of ability and ultimately expand their skills. For example, the report notes that pair programming has been shown to promote learning, improve code quality and improve student retention.

Increase Sense of Belonging and Build a Safe Learning Culture 

The report notes that one of the biggest barriers to retention is students' sense of belonging. Positive faculty-student interactions, teacher assistant-student interactions and student-student interactions can all give rise to a sense of belonging in a community. The report outlines nine detailed strategies for building a sense of belonging including encouraging affinity groups and mentoring programs.
In addition to its review of available data sources and analysis of current data sets, the report includes three case studies detailing efforts to collect and analyze retention data and implement systemic and sustained retention programs at three diverse institutions: University of California, San Diego, Colorado School of Mines, and Carnegie Mellon University.

The report concludes by emphasizing that there is no silver bullet than can transform an institution into an inclusive and equitable learning environment for all students, and that the work to create an inclusive environment is not a temporary effort. The ACM Education Board Retention Committee notes that because these constructs change very slowly, issues of equity will continue to be pressing in all fields--including computing--and therefore will require continued vigilance and determined effort.
          Nvidia Open Sources PhysX, With a Few Caveats Attached      Cache   Translate Page      
PhysX-Freature

Nvidia has taken steps to open source its PhysX implementation. Even with a few caveats, it's still not something we ever thought we'd see.

The post Nvidia Open Sources PhysX, With a Few Caveats Attached appeared first on ExtremeTech.


          With Spintronics, Intel Sees Efficiency, Density Scaling Far Beyond CMOS      Cache   Translate Page      

A new research paper from Intel suggests a new path forward for device scaling and lower power computing. We desperately need one.

The post With Spintronics, Intel Sees Efficiency, Density Scaling Far Beyond CMOS appeared first on ExtremeTech.


          Microsoft Plans Overhaul of Windows 10 Icons      Cache   Translate Page      
Office-Icons-Feature

Microsoft is taking its Office icon redesign and applying the same design principles across its operating system.

The post Microsoft Plans Overhaul of Windows 10 Icons appeared first on ExtremeTech.


          NVIDIA Open-Sourcing PhysX, miniNodes Launching a Raspberry Pi 3 CoM Carrier Board, Linux Mint 19.1 Beta Now Available, Linux Kernel 4.20-rc5 Released and New F-Bomb Fixing Patch for Kernel      Cache   Translate Page      

News briefs for December 3, 2018.

NVIDIA is open-sourcing its PhysX physics simulation engine. According to Phoronix, NVIDIA says ""We're doing this because physics simulation—long key to immersive games and entertainment—turns out to be more important than we ever thought. Physics simulation dovetails with AI, robotics and computer vision, self-driving vehicles, and high-performance computing." See also the NVIDIA blog for more details.

miniNodes is launching a new Raspberry Pi 3 CoM carrier board that will allow developers to create mini ARM clusters. ZDNet reports that the board has slots for five RPi 3s in order to "bring extreme edge compute capacity' to cramped spaces, industrial IoT applications, and remote villages". It also can be used " on the desktop for learning about compute clustering, Docker Swarm, Kubernetes, or development using Python, Arm, and Linux". The carrier board is available now for pre-order for $259 from miniNodes.

Linux Mint 19.1 beta is now available. This version features a new desktop layout and many other improvements. You can download it from here. Note that this is a beta version for testing and shouldn't be considered stable. (Source: OMG! Ubuntu!.)

Linux kernel 4.20-rc5 is out. Linus wrote "So it all looks a bit odd, although none of it is hugely _alarming_. One of the reasons the arch side is a bit bigger than usual at this stage is that we got the STIPB performance regression sorted out, for example." In addition, he addressed the timing of the final 4.20 release: "So my current suggestion is that we plan on a Christmas release, everybody gets their pull requests for the next merge window done *before* the holidays, and then we see what happens. I think we all want to have a calm holiday season without either the stress of a merge window _or_ the stress of prepping for one." (See the LKML for the full message.)

ZDNet reports that Jarkko Sakkinen, a kernel contributor from Intel, "has released a set of patches that conceal some of the f-bombs that Linux kernel developers have added to kernel code comments over the years." The patch set "addresses 15 components where 'fuck' or 'fucking' appeared in code comments, which have now been swapped out for a 'hugload of hugs'."


          Snapdragon 855 is Qualcomm's next flagship mobile platform built for 5G      Cache   Translate Page      
Here's a new processor for you to lust after. It's official: the latest and greatest mobile platform from Qualcomm to lust after is the Snapdragon 855. The name and initial details were unveiled during the company's annual "Tech Summit" in Hawaii, where it's taking a full week to unveil its upcoming plans for mobile computing and networks. Qualcomm is, of course, talking up the Snapdragon 855's 5G capabilities as we get ready to head into the new frontier of the latest and greatest wireless networks. The 855 is the first commercially-available mobile processor that supports multi-gigabit 5G connectivity, hopefully easing our transition into 5G networks without the need for a complicated or inefficient secondary modem. Consumer-ready 5G networks have yet to be deployed in earnest in the U.S., but Qualcomm is getting ahead of the curve by announcing its latest processor and modem so that it can be integrated into upcoming smartphones as the first networks go live. It's also workin...
          Red Hat leads the charge into remote site and edge computing with open source hyperconverged infrastructure      Cache   Translate Page      

According to IDC1, the hyperconverged infrastructure market experienced 76 percent year-over-year growth in the first quarter of 2018. However, the majority of hyperconverged infrastructure solutions in the market today are built upon rigid appliance-based configurations.


          Researchers at the Oak Ridge National Lab have demonstrated a new building block in quantum computing somewhere else [Spiffy]      Cache   Translate Page      
Spiffy [link] [4 comments]

          Sex and Gender: Sport, Child Neglect      Cache   Translate Page      
Trans women are keen to share the social, health and intrinsic benefits of playing sport with other women. Trans women athletes can compete with women at international level, but many women feel that transgender sportswomen are at a natural physical advantage in any competition. We look at the arguments and the evidence about whether it’s fairer to include or exclude trans women from women’s sports. Jane is joined by Dr Beth Jones and Dr Nicola Williams The NSPCC has analysed police crime figures to find that cases of child neglect and cruelty have doubled over the past five years. In the last year alone police recorded 17,000 cases of parents deliberately neglecting, mistreating or assaulting their children. Last night they launched their ‘Light For Every Childhood’ Christmas Appeal. Jane talks to Emily Hilton from the NSPCC and to Paula Hudgell who fostered and went on to adopt a little boy who was neglected by his parents. Monika Fahlbusch was shortlisted for ‘Women of the Year and ‘Transformation Leader’ at this year’s Computing’s Women’s in IT Excellence Awards. In 2016, she was named a Silicon Valley ‘women of influence’. She’s senior vice president, chief employee experience officer at BMC Software. BMC is a company that provides systems that help large companies such as the Bank of England run their IT infrastructure. She tells us why she's passionate about working in tech. According to Channel 4 boss Ian Katz rising house prices mean that young people forced to live at home for longer are spending more quality time with their parents watching television. But how easy is to find something that everyone wants to watch? And is it actually bonding time? Listener Caroline has moved back in with her parents as she works on her PhD thesis, and she joins us with her mum to discuss their experience. Plus, TV Critic Emma Bullimore tells us what will bring the whole family together in front of the box over Christmas. Presented by Jane Garvey Produced by Jane Thurlow Interviewed guest: Beth Jones Interviewed guest: Nicola Williams Interviewed guest: Emily Hilton Interviewed guest: Paula Hudgell Interviewed guest: Monika Fahlbusch Interviewed guest: Emma Bullimore
          Researchers demonstrate new building block in quantum computing      Cache   Translate Page      
(DOE/Oak Ridge National Laboratory) Researchers with the Department of Energy's Oak Ridge National Laboratory have demonstrated a new level of control over photons encoded with quantum information. The team's experimental system allows them to manipulate the frequency of photons to bring about superposition, a state that enables quantum operations and computing.
          Tuesday Morning Links -       Cache   Translate Page      


AT&T makes it more expensive to cancel DirecTV or Internet service - No more prorated final bills when you cancel DirecTV, Internet, or phone arstechnica.com
It s the beginning of the end of satellite TV in the US qz.com
Microsoft expands broadband initiative to bring internet to 3 million people in rural communities geekwire.com
Samsung and Verizon will partner to release a 5G smartphone using Qualcomm processors in the first half of 2019, plan to show a concept device this week cnet.com
Sources: Apple plans to wait until at least 2020 before releasing an iPhone that works with 5G bloomberg.com
USTelecom Measures Rural Broadband Gap: 65% of Rural Areas Have 25/3 Mbps Vs. 98% of Non-Rural Areas telecompetitor.com
Court Upholds Sprint's Victory in Old Patent Spat With TWC lightreading.com
Comcast applies for another N.H. franchise - Nation s largest cabler eyes adding Laconia to growing list of New Hampshire markets multichannel.com
Metro by T-Mobile is now charging a $15 fee every time you switch phones androidcentral.com
Appeals Court Agrees to Hear More Voices in Battle Over AT&T-Time Warner Merger hollywoodreporter.com
Someone is selling a mass-hacking service, leaving your printer exposed digitaltrends.com
read comment(s)



          Comment on Fabs Meet Machine Learning by Shuhai Fan      Cache   Translate Page      
In terms of OPC modeling(traditional or ML) and direct CAD2Mask(ML from CAD&Wafer data), they need wafer image(or CD) to close the loop. But SEM images suffer from e-beam damage to resist (resist shrinkage, heating effect and etc.). Although metrology error (including shrinkage, process variation) can be term(s) in OPC modeling and seems solvable, but I believe pre-shrinkage contour/CD plus CD normalization will benefit OPC model accuracy greatly. If we get enough computing power, idea mask writing pattern could be achievable directly from large data set of CAD and corresponding post full process pattern (post all patterning steps: litho, etch, CMP, CVD/PVD...). But I think that for the far far future. After all, we still need real CD/Contour to monitor litho process.
          Snapdragon 855 is Qualcomm's next flagship mobile platform built for 5G      Cache   Translate Page      
Here's a new processor for you to lust after. It's official: the latest and greatest mobile platform from Qualcomm to lust after is the Snapdragon 855. The name and initial details were unveiled during the company's annual "Tech Summit" in Hawaii, where it's taking a full week to unveil its upcoming plans for mobile computing and networks. Qualcomm is, of course, talking up the Snapdragon 855's 5G capabilities as we get ready to head into the new frontier of the latest and greatest wireless networks. The 855 is the first commercially-available mobile processor that supports multi-gigabit 5G connectivity, hopefully easing our transition into 5G networks without the need for a complicated or inefficient secondary modem. Consumer-ready 5G networks have yet to be deployed in earnest in the U.S., but Qualcomm is getting ahead of the curve by announcing its latest processor and modem so that it can be integrated into upcoming smartphones as the first networks go live. It's also workin...
          Museum burglary cancels kids programming club      Cache   Translate Page      
A BURGLARY at the Museum of Computing has meant a programming workshop for local kids will be put on hold.
          MuleSoft Architect - Silverline Jobs - Casper, WY      Cache   Translate Page      
Company Overview: Do you want to be part of a fast-paced environment, supporting the growth of cutting edge technology in cloud computing? Silverline...
From Silverline Jobs - Fri, 05 Oct 2018 00:30:11 GMT - View all Casper, WY jobs
          QA Senior - Grupo CMC - Madrid, España      Cache   Translate Page      
En Grupo CMC estamos buscando profesionales con al menos 3 años de experiencia como QA técnico. Funciones: Realizar planes de test funcionales y automáticos. Gestión de Configuración, versioning, Integración Continua, y automatización. Se valorará mucho conocimientos en Cloud Computing y DevOps. Zona de trabajo: Pinar de Chamartín Grupo CMC, te ofrece: Posibilidad de tele-trabajar Retribución flexible Pertenecer a un equipo de trabajo altamente cualificado en...
          Full - Stack Developer (Python) - Between Technology - Barcelona      Cache   Translate Page      
En BETWEEN apostamos por el mejor talento dentro del sector tecnológico. Contamos con una unidad de Selección Especializada en perfiles IT para incorporarse en la plantilla de nuestros clientes. Trabajamos con un amplio rango de empresas, que nos permitirá encontrarte el puesto que más se ajuste a tus necesidades e intereses profesionales. Podemos ofrecerte proyectos en las áreas de desarrollo e infraestructuras, que van desde el ámbito del Cloud Computing hasta Big Data, I+D y BI. ...
          Quantum computing, not AI, will define our future      Cache   Translate Page      
Tech Crunch At best, that is an imprecise (though entertaining) definition. When “quantum” is applied to “computing,” however, we are indeed entering an era of dramatic advancement. Quantum computing is technology based on the principles of quantum theory, which explains the nature of energy and matter on the atomic and subatomic level. It relies on the […]
          How Microsoft Quietly Became the World's Most Valuable Company      Cache   Translate Page      
Microsoft tried through the years to compete in a range of buzzy consumer businesses, but it was Chief Executive Satya Nadella’s focus on selling humdrum yet fast-growing computing services to companies that allowed it to reclaim the title of world’s most valuable company.
          High Performance Computing (HPC) Systems Engineer      Cache   Translate Page      
MD-Linthicum Heights, Job Description: Enlighten IT Consulting (EITC), an Alion company, is looking for an experienced HPC Engineer that has strong customer interaction experience. Must have experience with the installation, configuration, tuning, troubleshooting and administration of DoD HPC systems while ensuring simple, secure access. The work may include setting up access solutions spanning multiple systems and cen
          Laptop Acer NX.EFGEB.016 15,6" HD LED 4 GB RAM DDR4 INTEL CORE i3-6006U 1 TB WINDOWS 10 Fekete - Jelenlegi ára: 180 056 Ft      Cache   Translate Page      
EAN:
4713883038355
Gyártó:
Acer
Jellemzők:
iroda, számítógépek / alkatrészek
Forrás:
bigbuy
Ha szenvedélyesen rajongsz a informatikai és elektromos termékekért, és szeretsz lépést tartani a technológiával, ne maradj le a legkisebb részletekről sem, vásárold meg Laptop Acer NX. EFGEB. 016 15, 6" HD LED 4 GB RAM DDR4 INTEL CORE i3-6006U 1 TB WINDOWS 10 Fekete-et verhetetlen áron.
Your notebook for essential everyday tasks
Portability, reliability and efficiency are the key characteristics of the Extensa 15 and make it the perfect partner for business. Thanks to a compact design and proven technology, it answers to everyday needs, wherever the business day takes you.
Best portability in its class
Slim design and long battery life are key factors in mobile computing. Featuring one of the slimmest designs in its class, the Acer Extensa 15 combines a 15. 6" display with an easy grip design, maximising comfort and productivity, whether in the office or on the road.
Proficient in communication
You get appealing communication capabilities, thanks to an advanced digital microphone and high quality speakers which make for excellent web conferencing and online meetings. They enable crystal clear video chats with colleagues and clients, and help small business users reduce business travel costs.
Superior productivity
The Precision Touchpad supports six core Windows 8 gestures, enabling better screen navigation, and the reactive keyboard is outfitted with a numeric keypad and well-spaced keys with good travel distance, providing a comfortable typing experience. Driven by a range of powerful Intel? processors, these notebooks boost both performance and efficiency.
Warranty extension program
Acer notebooks come with a standard Warranty1 of 1 Year. With Acer Advantage, the warranty coverage can be extended up to five years with priority repair service. Optional Accidental Damage service available offering protection in case of accidents. RAM Memória: 4 GB DDR4Bluetooth: igenWiFi: igenProcesszor: Intel Core i3-6006UFontos információk: Ezt a számítógépet a spanyol piacra gyártják, ezért tartalmaz saját nyelvén karaktereket, mint az N betű. Azonban a Windows konfigurálása lehetővé teszi, hogy módosítsd a billentyűzet nyelvezetét bármely más európai nyelvre. Az operációs rendszer professzionális, így kiválaszthatod a telepítés nyelvét. Választhatsz a nyelvek között, amelyek között az angolt mindig megtalálod. Könnyen választhatod az országodnak megfelelő nyelvet. Ingyenes operációs rendszert, mint például a Linux, ingyen telepíthetsz. Képernyő: 15, 6"HD LEDMerevlemez: 1 TBWindows 10Intel HD Graphics 520Termék színe: FeketeTermék típus: NotebookKülső megjelenés: VédőtokÁtlós képernyő: 39, 6 cm (15. 6")Képernyő-felbontás: 1366 x 768 pixelekÉrintőképernyő: NemLED backlight: IgenHD type: HDMéretarány: 16: 9Processor frequency: 2, 00 GHzProcessszorcsalád: 6th gen Intel? Core? i3Processzor: i3-6006UProcesszor magok száma: 2Processor number of threads: 4System bus rate: 4 GT/sProcessor cache: 3 MBProcesszor-foglalat: BGA 1356Processor cache type: Smart CacheProcessor lithography: 14 nmProcessor operating modes: 64-bitLéptető: D1Bus type: OPIProcessor codename: SkylakeThermal Design Power (TDP): 15 WProcessor series: Intel Core i3-6000 Mobile Processor SeriesMaximum number of PCI Express lanes: 12PCI Express slots version: 3. 0PCI Express ? onfigurations: 1x2+2x1, 1x4, 2x2, 4x1Tjunction: 100 °CConflict Free processor: IgenECC supported by processor: NemBelső memória: 4 GBBelső memória-típus: DDR4-SDRAMMaximális belső memória: 16 GBTeljes tárolókapacitás: 1000 GBStorage media: HDDKártyaolvasó beépítve: IgenTelepített merevlemezek száma: 1Merevlemez kapacitása: 1000 GBOn-board graphics adapter: IgenDiscrete graphics adapter: NemOn-board graphics adapter model: Intel? HD Graphics 520Discrete graphics adapter model: Not availableOn-board graphics adapter base frequency: 300 MhzOn-board graphics adapter dynamic frequency (max): 900 MhzMaximum on-board graphics adapter memory: 32 GBNumber of displays supported (on-board graphics): 3On-board graphics adapter DirectX version: 12. 0On-board graphics adapter OpenGL version: 4. 4On-board graphics adapter ID: 1916Beépített mikrofon: IgenFront camera: IgenOptikai meghajtó-típus: DVD Super MultiBluetooth: Igen3G: Nem4G: NemWi-Fi: IgenWi- Fi szabványok: IEEE 802. 11acEthernet/LAN csatlakozás: IgenEthernet LAN adatátviteli sebességek: 10, 100, 1000 Mbit/sUSB 2. 0 portok száma: 2USB 3. 0 (3. 1 Gen 1) Type-A ports quantity: 1HDMI portok mennyisége: 1DVI-port: NemEthernet LAN (RJ-45) portok mennyisége: 1Dokkoló csatlakozó: NemCombo headphone/mic port: IgenDC-bemeneti jackdugó: IgenNumerikus billentyűzet: IgenMutatóeszköz: ÉrintőpadWindows-gombok: IgenBiztosított operációs rendszer: Windows 10 HomeOperating system architecture: 64-bitIntel? Wireless Display (Intel? WiDi): IgenIntel? My WiFi Technology (Intel? MWT): IgenIntel? Smart Response Technology: IgenIntel Hyper-Threading Technology: IgenIntel? Turbo Boost Technology: NemIntel? Small Business Advantage (Intel? SBA): IgenEnhanced Intel SpeedStep Technology: IgenIntel? Clear Video HD Technology (Intel? CVT HD): IgenIntel Clear Video Technology: IgenIntel? InTru? 3D Technology: IgenIntel? Quick Sync Video Technology: IgenIntel Flex Memory Access: IgenIntel? AES New Instructions (Intel? AES-NI): IgenIntel Trusted Execution Technology: NemIntel Enhanced Halt State: IgenIntel? VT-x with Extended Page Tables (EPT): IgenIntel? Secure Key: IgenIntel? TSX-NI: NemIntel? Stable Image Platform Program (SIPP): NemIntel? OS Guard: IgenIntel? Software Guard Extensions (Intel? SGX): IgenIntel? Clear Video Technology for Mobile Internet Devices (Intel CVT for MID): IgenIntel? 64: IgenExecute Disable Bit: IgenIdle States: IgenThermal Monitoring Technologies: IgenProcessor package size: 42 x 24Támogatott vezérlési készletek: AVX 2. 0, SSE4. 1, SSE4. 2Processzorkód: SSSR2UWCPU configuration (max): 1Embedded options available: NemIntel? Virtualization Technology for Directed I/O (VT-d): IgenIntel? Virtualization Technology (VT-x): IgenProcessor ARK ID: 91157Akkumulátor-technológia: Lithium Polymer (LiPo)Akkumulátorcellák száma: 4Akkumulátor élettartam: 6, 5 óAkkumulátor teljesítménye: 3220 mAhAC adapter eloszlás: 45 WSúly: 2, 4 kgSzélesség: 381, 8 mmMélység: 258 mmMagasság: 24, 6 mmMagasság (elülső): 2, 46 cmmagasság (hátulsó): 2, 46 cmAC adapter mellékelve: Igen
Laptop Acer NX.EFGEB.016 15,6" HD LED 4 GB RAM DDR4 INTEL CORE i3-6006U 1 TB WINDOWS 10 Fekete
Jelenlegi ára: 180 056 Ft
Az aukció vége: 2099-01-01 00:00
          Snowflake Announces General Availability on Microsoft Azure in EMEA      Cache   Translate Page      

SAN MATEO, Calif., Dec. 5, 2018 /PRNewswire/ -- Snowflake Computing, the data warehouse built for the cloud, today announced the general availability of Snowflake on Microsoft Azure in Europe. The expansion reflects the rising customer demand for Snowflake on Azure in Europe, matched by...


          Snowflake Announces General Availability on Microsoft Azure in EMEA      Cache   Translate Page      

Surge in international customer demand for Snowflake on Microsoft Azure delivers the cloud-built data warehouse to a much wider and global customer base SAN MATEO, California, Dec. 5, 2018 /PRNewswire/ -- Snowflake Computing, the data warehouse built for the cloud, today announced the...


          Office Management and Secretarial Development - Infinit Training Center , Kuwait, Hawalli, Al Kuwait, Al Farwaniyah, Kuwait City, Ahmadi,Hawally,Farwaniyah,Ahmadi       Cache   Translate Page      
Course Content 
Word Processing using Micro Soft Word
Basic Business Computing using Excel
Business Communication using Microsoft Outlook
English for Business
Records Management for Business
Office Operations
Business Documents 
Customer Service 
Diary Management
Filing Systems 
Office Management 
Organizing Meetings 
Reception Duties
Secretarial Procedures
Report Writing 
Telephone Skills
Time Management 
Work Planning
Business Etiquette

Cost: 150 KWD

Duration: 2 To 3 Months


          BSEM COHSEM 12th /10th Exam Time Table 2019      Cache   Translate Page      

BSEM COHSEM 12th /10th Exam Time Table 2019 

BSEM COHSEM HSLC/10 Exam Time Table 2019 Class 10 college students of Manipur who're going to write down the tenth and 12th examination this yr are desperately waiting for the examination Time Table 2019 as they want to make the approach for this examination so they can get properly grades for higher destiny. In this newsletter, we are imparting you the essential information about the BSEM, COHSEM examination ordinary, how to keep the recurring on your computer, technique to get preceding question papers for 12th /10th and reliable hyperlink of the website from wherein Time Table can be stored.


BSEM COHSEM 12th/10th Exam Time Table

Candidates who are trying to find the examination exercises of the BSEM and COHSEM Higher School Leaving Certificate and Higher School Certificate can comply with the object and recognize the information. For the convenience of our visitors, we're supplying you with the information about the examination time tables. Exam workouts are also called as exam Time tables.


BSEM COHSEM 12th /10th Exam Time Table



BSEM Exam Time Table Manipur 2019

Board Of Secondary Education Manipur and Council Of Higher Secondary Education Manipur is yet to release the examination ordinary for the instructional yr 2019 on the legitimate website. So the applicants of Manipur is cautioned to have sufferers and bookmark our website to be able to without difficulty go to our internet site and test updates approximately examination time table.
  • Board Name BSEM Board of Secondary Education Manipur
  • COHSEM Council of Higher Secondary Education Manipur
  • Exam Name 12th and 10th
  • Conducting examination for 10th and 12th college students
  • Exam Dates March 2019
  • Details About Exam Time Table
  • Status Will be to be had quickly
  • Official internet bsem.Nic.In
  • www.Cohsem.Nic.In
LBS-Kerala-Set Results IBPS-RRB Download
DBRAU Time Table Vikram-University Results

 COHSEM  Exam habitual of Manipur 2019

Exam dates are critical to be declared earlier than conduction of each and each exam. As these exam Time Tables  comprise the complete statistics about the exam date, time along with the difficulty call of the examination. This helps the scholars in getting ready for the examination correctly with the correct subject on the particular date it is going to maintain. Hence candidate eagerly waits for the exam exercises to release. Follow the commands to check these examination workouts from the officials. To recognize the tenth Exam workouts candidates must go to bsem.Nic.In which is BSEM Board. And the aspirants who're trying to find the twelfth Standard exam exercises can comply with the www.Cohsem.Nic.In the hyperlink that is for the COHSEM college students.


  • The students need to go to the official internet site of Manipur board and look for examination time desk
  • Now proper-click on at the link and store the PDF examination time desk on the computing device
  • Open the exam ordinary and start preparing for the exam
  • Open right here to go to the authentic website and get the exam ordinary of 10th Manipur
  • Click me to attain reputable website and down load the COHSEM exam habitual


previous question papers of 12th Exam Manipur 2019

Candidates who are going to put in writing this examination and who need to know the previous exam papers and want to get an idea what type of questions and the way the query paper can be can go to the reputable web. This beneath manner can be observed for checking the previous examination papers. This allows the scholars in getting ready for the examination well and acting properly inside the exam.


  • As the official link is given above after attaining the internet site look for preceding query papers
  • Now seek the question papers and click on on it and they can start viewing hyperlinks in keeping with difficulty wise
  • Now store the papers in accordance with the requirement to be able to be in PDF format
  • Names of the Subjects for which tests will prepare.


Admit Cards BSEM 10th Exam 2019:-

The aspirants who are going to write down these Higher Secondary Certificate examination for tenth Class from the Board of Secondary Education want admit playing cards. Admit cards are Hall Tickets. With out those admit cards college students will not get permission to jot down the exam. Hall tickets are crucial for each and every pupil going to jot down the examination because it includes the call of the students, examination time, examination date and center of the exam wherein candidates should gift to jot down the examination. Candidates can follow the underneath commands to get their halltickets for writing the examination.

Download COHSEM HSLC Hall Tickets for 12th Class 2019:-

To download these admit cards for each 12th and 10th tests candidate need to visit their respective reputable’s webs and follow the little by little commands as given under.


  • Visit the reliable internet site of the Boards.
  • After going there choose the tab downloads.
  • Then here look for the admit playing cards downloading link for the above-engaging in checks.
  • Select the link to open it.
  • On the following page supply the information like your registration range and other information if asking.
  • Once you put up the asking details, you hall tickets will show on the screen.
  • Check the details, take its print out after downloading.
  • Convey this hall tickets even as appearing for the examination.


COHSEM HSLC Result 2019:-

After a success of entirety of the checks, applicants will eagerly look ahead to the result assertion news. They additionally start attempting to find the effects from all other feasible webs. But those effects will announce on the personal legit webs of the Boards only.Hence applicants have to visit the reliable internet and follow the instructions to test the results.

Students can recognize their outcomes by way of providing their hallticket numbers. After checking the results take its print out for the destiny uses.

We suggest aspirants to preserve on touring the legit webs often to know the everyday updates about the updating of the examination Time Table s, information about the examination admit playing cards, results and different necessary information. We additionally update the details on our page immediately as soon as we acquire any new portions of facts from the officials. Hence we request all our visitors to visit our web page also frequently to recognise the updates.

BSEM COHSEM 12th /10th Exam Time Table 2019 Click Here

__________________________________________________________

Voter id Voter id Apply new Voter card
Voter id Voter id Apply new Voter card
TS Ration card TS PGECET AP new Voter card
AP Voter id AP Voter id Apply AP new Voter card
TS-Aasara-Pension TS -Land-RecordsTS-Degree Certificates
TS-SSC-10th-ResultsTS-SSC HALLTICKETS new Voter card
TS -PG-Certificates TS Degree-Certificates TS-PG-Degree-Results
TS-Voter-ID-Transfer Aadhar-Card TS EAMCET
TS-EAMCET TS EC TS RTA
TS Inter Admission TS Degree Admission TS Inter Online
TS KU Admission TS MGU Admission TS PU Admission
TS TSMS TSPGLCET TS Ration Card
TSRJC TSTWREISscholarship online
APSWREIS BRAOU Online Exam TS Gurukulam
AP-Gurukulam AP-Bangaru-Talli TS Govt-Portals
TS Double-Bed-Room Shadi-Mubarak Kalyana-Laxmi-Scheme
TS-Kalyana LAXMI  Telangana-ePassTelangana-ePass
TSOSS- InterTSOSS ssc Passport
TS SSC Results TS AP EC Download TS Model-School
TS-Model-School TSOSSTS-Sadarem
Traffic-E-Challans JNTU ResultsTS-Sadarem
AP-Voter-ID-Transfer TS-Adangal -Land-Records TS TET
AP VOTER ID Ration-card TS-EAMCET
Aadhaar Card TSWREIS AEPS-Aadhaar
TSMJPTBC BRAOU halltickets Tippons-Pahani
AP Voter Id TMREIS AP Pahani
TS PGECET TSPSC OU Results
AP-Voter TS-Sadarem TSTWREIS
TMREIS SWAEROCET TS-Inter
AP-Voter Encumbrance Ts pension
More Information Visit http://www.telanganaa.in

          6 Activities to Promote Computer Science Education      Cache   Translate Page      
Did you know that experts estimate there will be 1.4 million computing jobs open in 2020 and only 400,000 students […]
          IT Network Systems Administrator and Technologist - Education Analytics - Madison, WI      Cache   Translate Page      
Familiarity with statistical application R Studio, R Server and high-performance computing (bonus if the candidate has knowledge of compiling and linking with...
From Education Analytics - Wed, 21 Nov 2018 00:32:47 GMT - View all Madison, WI jobs
          Snapdragon 855 is Qualcomm's next flagship mobile platform built for 5G      Cache   Translate Page      
Here's a new processor for you to lust after. It's official: the latest and greatest mobile platform from Qualcomm to lust after is the Snapdragon 855. The name and initial details were unveiled during the company's annual "Tech Summit" in Hawaii, where it's taking a full week to unveil its upcoming plans for mobile computing and networks. Qualcomm is, of course, talking up the Snapdragon 855's 5G capabilities as we get ready to head into the new frontier of the latest and greatest wireless networks. The 855 is the first commercially-available mobile processor that supports multi-gigabit 5G connectivity, hopefully easing our transition into 5G networks without the need for a complicated or inefficient secondary modem. Consumer-ready 5G networks have yet to be deployed in earnest in the U.S., but Qualcomm is getting ahead of the curve by announcing its latest processor and modem so that it can be integrated into upcoming smartphones as the first networks go live. It's also workin...
          New LNS research: Industrial control systems and edge computing      Cache   Translate Page      


Industrial control systems and edge computing: enabling an operational architecture for applications...


          Information technology : cloud computing: interoperability and portability      Cache   Translate Page      
none
          Using AWS Athena analytics to monitor pilot job health on WLCG compute sites      Cache   Translate Page      
ATLAS Distributed Computing (ADC) uses the pilot model to submit jobs to Grid computing resources. This model isolates the resource from the workload management system (WMS) and helps to avoid running jobs on faulty resources. A minor side-effect of this isolation is that the faulty resources are neglected and not brought back into production because the problems are not visible to the WMS. In this paper we describe a method to analyse logs from the ADC resource provisioning system (AutoPyFactory) and provide monitoring views which target poorly performing resources and help diagnose the issues in good time. Central to this analysis is the use of Amazon Web Services (AWS) to provide an inexpensive and stable analytics platform. In particular, we use the AWS Athena service as an SQL query interface for logging data stored in the AWS S3 service. We describe details of the data handling pipeline and services involved leading to a summary of key metrics suitable for ADC operations.
          KPCL AE JE Syllabus 2019 Chemist/Supervisor New Exam Pattern      Cache   Translate Page      

KPCL AE JE Syllabus

KPCL AE JE Syllabus PDF is published on this web page now. Shortlisted contenders must check complete syllabus and
pattern of Assistant Engineer, JE, Chemist and Supervisor examination here. Shortlisted contenders may also grab all the details about is written exam like as date of examination and other from here after reading this web page totally. Karnataka Power Corporation announces fresh employment notice time to time to appoint able aspirants in their department on nil posts. Karnataka Power Corporation Limited is planning to select educated candidates for the posts of Assistant Engineer, JE, Chemist and Supervisor via this written examination. Total number of vacancies for these positions will be filled by exam qualified and able applicants so all the applied aspirants are required to present in this written exam with proper preparation.

Dear candidates if you are also one of them who are looking new Syllabus and Exam Pattern of KPCL AE JE then you may grab this required and exact study material from this web page. Shown data will useful for all applied applicants to get best knowledge about Assistant Engineer, JE, Chemist and Supervisor exam. If you have all the details regarding these examinations then you can make well preparation chart/ plan. If you have desire to obtain this better opportunity of government job then exact preparation is necessary for you to obtain merit marks in this written exam.

For well preparation, selected aspirants need to know overall topics covered under Assistant Engineer, JE, Chemist and Supervisor written examinations. Therefore, here we are writing best study material completely for all able candidates who are here just now. The organization will operate these exams in upcoming days shortly so applied contenders must check all the details of Latest Syllabus of KPCL AE JE to make best preparation for this written examination.

Short Details of karnatakapower.com Syllabus

Name of the Organization – Karnataka Power Corporation Limited

Page Include Information about – KPCL AE JE Syllabus

Posts Name – Assistant Engineer, JE, Chemist and Supervisor

Date of Exam – Not Updated

Status of Syllabus – Available

Official Website – karnatakapower.com

karnatakapower.com Exam Pattern Full Info

KPCL AE JE Syllabus:

Karnatakapower.com Assistant Engineer JE Exam Syllabus
Courses
Topics




Civil Engineering
Estimation, Costing, and Specifications
Fluid Mechanics
Hydrology & Water Resources Engineering
Hydraulic Structures
Surveying
Construction and Project Management
Solid Mechanics, Structural Analysis
Concrete Technology
Reinforced Concrete Structures
Soil Mechanics and Foundation Engineering
Steel Structures
Environmental Engineering
Transportation Engineering
Bridge Engineering
Civil Engineering Materials and Construction
PSC Structures
Environmental Studies







Electrical Engineering
Magnetic Circuit
AC Fundamentals
Network Theory
Electrical Machines
Basic Electronics
Measurement and measuring instruments
Basic Electrical Engineering Concepts
Utilization of Electrical Energy
Power Electronics & Drives
Estimation and costing
Analog and Digital Electronics
Power Systems
Dielectric heating
Electric traction
Lighting calculation















Computer Science and
Information Systems
Engg. Mathematics
Data Warehousing and Data Mining
Software Engineering
Statistical Methods
Introduction to Computer Programming
Physics and Chemistry
Computer Organization
Basic Electronics
Computer Graphics
Logic Design
Electronic Circuits
Network Management Systems
Database Management Systems
Operating Systems
Data Structures
Digital Signal Processing
Graph Theory and Combinatory
Electronic Circuits
Algorithms
Software testing
Compiler Design
Computer Programming and Programming Languages
Artificial Intelligence
Web-programming
Fuzzy Logic
Microprocessors
Wireless Networks and Mobile Computing
Embedded Computing Systems
Storage Area Networks
Computer Networks
Information and Network Security
Signals and Systems
Cloud, Grids, and Clusters
Object Oriented Modeling and Design
Multimedia Computing
Computer Architecture
Neural Network
VLSI Design








General Aptitude
Time and Work
Dimensions
Arithmetic Reasoning
Visualization Space
Averages
Problems on Ages
Percentages
Simplification
Pipes & Cisterns
Profit & Loss
Decision Making
Problem Solving
Ratios & Proportions
Simple Interest & Compound Interest
Time & Distance
Analogies
Areas & Volumes
Data Interpretation




General Awareness
Indian Polity
Indian Culture & Heritage
Current Events – National & International
Indian History
Indian Economy
Science & Technology
Indian Constitution
Indian Geography
IT & Space






General English/ Kannada
Spot the error
Improvement
Passage
Verbal Comprehension passage
Antonyms
Synonyms/ Homonyms
One word substitutions
Fill in the blanks
Vocabulary
Sentence structure
Grammar
Detecting Mis-spelt words
Spellings
Idioms and phrases
Verbs
Adjectives
Karnataka KPCL AE JE Exam Syllabus – Instrumentation:
Mechanical Measurement, and Industrial Instrumentation.
Transducers.
Digital Electronics.
Analytical, Optical and Bio-medical Instrumentation.
Basics of Circuits and Measurement Systems.
Analytical, Optical, and Bio-medical.
Signal and Systems.
Electrical and Electronic Measurements.
Control Systems and Process Control.
Analog Electronics.

KPCL Junior Engineer Syllabus – Mechanical:
Calculus.
Vector Calculus.
The Strength of Materials.

NIELIT O Level Syllabus

National Institute of Electronics & Information Technology has circulated notice for NIELIT O level Syllabus for those who are
eligible are pursuing O Level exam in this institute. NIELIT Subject-Wise Revised Exam Pattern PDF is also provided on this web page for all students to know the topics of the exam. Students who are willing to get good marks in upcoming exams they must download syllabus & exam pattern for effective preparation of O Level Test. Study material for exam has uploaded on the official website of NIELIT that is www.nielit.gov.in.

Candidates who are waiting test material they will get now Subject Wise Exam Pattern in Latest Format completely through this article. All candidates who are the part of this institute anywhere in the country they are required to check NIELIT O Level Subject-Wise Revised Exam Pattern Syllabus for definite preparation of this entrance exam. Dear students, if you want to do study in this institute on the applied course then you need to crack this entrance examination at first so you must check complete syllabus / exam pattern of NEST from here or official website of university.

All such passionate students who have applied for this computer courses test they are suggested to prepare better than the best as competition is being tough in upcoming days. Candidates who are eligible & ready to participate in this entrance examination they must read this web page to obtain latest details & get better study material. National Institute of Electronics & Information Technology has all right reserves to provide computer diploma/ certificate in available programmes but to receive diploma appliers need to beat exam with good grades. Further possible details related to NIELIT O Level syllabus with exam pattern are given below by www.olpxx.in.

www.nielit.gov.in Syllabus Shout Info

Institute Name - National Institute of Electronics & Information Technology

Info on this page NIELIT O Level syllabus

Syllabus Status – Available

Exam Name: O Level Test

Exam Date: Update Soon
                  
Official Website: www.nielit.gov.in

www.nielit.gov.in Syllabus & Exam Pattern Info

NIELIT O level Syllabus:
There will be Theoretical and Practical Exam and the topics that are included in the theoretical exam are given as follows:

M1-R4: IT TOOLS AND BUSINESS SYSTEMS:
This part of the exam consists of topics such as:
Computer Appreciation
Computer Organization
Operating System
Word Processing
Spreadsheet Package
Presentation Package
Data Base Operations
Information Technology and Society

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN:
Topics are as follows-
Introduction to Internet
TCP/IP – Internet Technology and Protocol
Internet Connectivity
Internet Network
Services on Internet (Definition and Functions)
Electronic Mail
Current Trends on Internet
Web Publishing and Browsing
HTML Programming Basics
Interactivity Tools
Internet Security Management Concepts, Information Privacy and Copyright Issues.

M3-R4: PROGRAMMING AND PROBLEM SOLVING THROUGH ‘C’ LANGUAGE:
Topics in this paper are as follows:
Introduction to Programming
Algorithms for Problem Solving
Introduction to ‘C’ Language
Conditional Statements and Loops
Arrays
Functions
Storage Classes
Structures and unions
Pointers
Self Referential Structures and Linked Lists
File Processing

M4.1- R4: APPLICATION OF .NET TECHNOLOGY:
This Paper will have following topics namely:
The .NET framework
C# Basics
C# Using Libraries
Advanced Features Using C#
ASP.NET 2.0
Introduction to Programming with Visual Basic.NET
File and Database Applications
Advanced Programming Constructs
.NET Architecture and Advanced Tools

M4.2-R4: INTRODUCTION TO MULTIMEDIA:
Topics includes in this paper are as follows:
Introduction to Multimedia
Computer Fonts and Hypertext
Audio fundamentals and representations
Image fundamentals and representations
Video and Animation
Multimedia Authoring

M4.3-R4: INTRODUCTION TO ICT RESOURCES:
This paper included the topics such as:
PC Assembly and Operation
Utilities
Networking Concepts
Network Administration

NIELIT O Level Grading System:
S. NO.
Marks Scored
Grade to be Awarded
1.
Below 50%
F (Failed)
2.
50% – 54%
D
3.
55% – 64%
C
4.
65% – 74%
B
5.
75% – 84%
A
6.
85% & Above 
S
NIELIT O Level Exam Pattern:
  • The revised exam pattern for long term courses namely O’ Level Course, BCA, A level, CHMO and Diploma in Computer Science and Engineering / IT. Candidates have to look in the downwards section and get the complete NIELIT O Level Exam Pattern:
  • Each subject in the exam will be of total 100 marks.
  • Theory examination will be for the duration of 3 hours.
  • Practical examination will be of total 100 marks and total time given to complete the practical examination will be three hours.

Main Reading Books
  • Miller M, “Absolute Beginners Guide to Computer Basics”, Pearson Education, 2009.
  • ITL Educational Society, “Introduction to IT”, Pearson Education, 2009.
  • K. Sinha and P. Sinha, “Foundations of Computing”, BPB Publication, 2008.
  • Sagman S, “MS Office for Windows XP”, Pearson Education, 2007.

Supplementary Reading Books
  • Perry G, “MS Office 2007”, Pearson Education, 2008.
  • Wiely& Sons.
  • Mansfield Ron, “Working in Microsoft Office”, 2008, Tata McGraw-Hill
  • Mavis Beacon, “All-in-one MS Office” CD based views for self learning, BPB Publication, 2008
  • Turban, Mclean and Wetherbe, “Information Technology and Management” John
  • Kulkarni, “IT Strategy for Business”, Oxford University Press
  • D’Suoza&D’souza, “Learn Computer Step by Step”, Pearson Education, 2006.
  • Balagurusamy E, “Fundamentals of Computers”, 2009, Tata McGraw-Hill




Note: Dear applicants to get more details of NIELIT O Level Syllabus go to Official Link.


          “As far as the laws of mathematics refer to reality, they are not certain; and as far as they are certain, they do not refer to reality.”*…      Cache   Translate Page      
The case against quantum computing (Plus- a big bang)
          Education Coordinator at Lutheran World Federation      Cache   Translate Page      
Lutheran World Relief (LWR) is a US-based non-profit organization that operates in rural development projects and responds to humanitarian disasters throughout the world. LWR currently seeking proposals to provide in-country and occasional on-site IT support to offices in Kenya for the fiscal year (FY) 2019, starting 1st October 2018 to 30th September 2019. LWR's global computing specification is currently HP and Lenovo laptops and desktops, with Windows 10 operating systems with a custom image and Office 365.
          Zukünftige Rechner-Architekturen für Künstliche Intelligenz      Cache   Translate Page      
Heutige Systeme setzen bei der Verarbeitung von Algorithmen in KI-Anwendungen typischerweise auf Heterogenes Computing. Für die Zukunft sieht Jeff Welser von IBM allerdings neue Ansätze, wie vom Gehirn-inspiriertes Approximate Computing, analoge KI-Cores und schließlich Quanten-Computing.
          BSEM COHSEM 12th /10th Exam Time Table 2019      Cache   Translate Page      

BSEM COHSEM 12th /10th Exam Time Table 2019 

BSEM COHSEM HSLC/10 Exam Time Table 2019 Class 10 college students of Manipur who're going to write down the tenth and 12th examination this yr are desperately waiting for the examination Time Table 2019 as they want to make the approach for this examination so they can get properly grades for higher destiny. In this newsletter, we are imparting you the essential information about the BSEM, COHSEM examination ordinary, how to keep the recurring on your computer, technique to get preceding question papers for 12th /10th and reliable hyperlink of the website from wherein Time Table can be stored.


BSEM COHSEM 12th/10th Exam Time Table

Candidates who are trying to find the examination exercises of the BSEM and COHSEM Higher School Leaving Certificate and Higher School Certificate can comply with the object and recognize the information. For the convenience of our visitors, we're supplying you with the information about the examination time tables. Exam workouts are also called as exam Time tables.


BSEM COHSEM 12th /10th Exam Time Table



BSEM Exam Time Table Manipur 2019

Board Of Secondary Education Manipur and Council Of Higher Secondary Education Manipur is yet to release the examination ordinary for the instructional yr 2019 on the legitimate website. So the applicants of Manipur is cautioned to have sufferers and bookmark our website to be able to without difficulty go to our internet site and test updates approximately examination time table.
  • Board Name BSEM Board of Secondary Education Manipur
  • COHSEM Council of Higher Secondary Education Manipur
  • Exam Name 12th and 10th
  • Conducting examination for 10th and 12th college students
  • Exam Dates March 2019
  • Details About Exam Time Table
  • Status Will be to be had quickly
  • Official internet bsem.Nic.In
  • www.Cohsem.Nic.In
LBS-Kerala-Set Results IBPS-RRB Download
DBRAU Time Table Vikram-University Results

 COHSEM  Exam habitual of Manipur 2019

Exam dates are critical to be declared earlier than conduction of each and each exam. As these exam Time Tables  comprise the complete statistics about the exam date, time along with the difficulty call of the examination. This helps the scholars in getting ready for the examination correctly with the correct subject on the particular date it is going to maintain. Hence candidate eagerly waits for the exam exercises to release. Follow the commands to check these examination workouts from the officials. To recognize the tenth Exam workouts candidates must go to bsem.Nic.In which is BSEM Board. And the aspirants who're trying to find the twelfth Standard exam exercises can comply with the www.Cohsem.Nic.In the hyperlink that is for the COHSEM college students.


  • The students need to go to the official internet site of Manipur board and look for examination time desk
  • Now proper-click on at the link and store the PDF examination time desk on the computing device
  • Open the exam ordinary and start preparing for the exam
  • Open right here to go to the authentic website and get the exam ordinary of 10th Manipur
  • Click me to attain reputable website and down load the COHSEM exam habitual


previous question papers of 12th Exam Manipur 2019

Candidates who are going to put in writing this examination and who need to know the previous exam papers and want to get an idea what type of questions and the way the query paper can be can go to the reputable web. This beneath manner can be observed for checking the previous examination papers. This allows the scholars in getting ready for the examination well and acting properly inside the exam.


  • As the official link is given above after attaining the internet site look for preceding query papers
  • Now seek the question papers and click on on it and they can start viewing hyperlinks in keeping with difficulty wise
  • Now store the papers in accordance with the requirement to be able to be in PDF format
  • Names of the Subjects for which tests will prepare.


Admit Cards BSEM 10th Exam 2019:-

The aspirants who are going to write down these Higher Secondary Certificate examination for tenth Class from the Board of Secondary Education want admit playing cards. Admit cards are Hall Tickets. With out those admit cards college students will not get permission to jot down the exam. Hall tickets are crucial for each and every pupil going to jot down the examination because it includes the call of the students, examination time, examination date and center of the exam wherein candidates should gift to jot down the examination. Candidates can follow the underneath commands to get their halltickets for writing the examination.

Download COHSEM HSLC Hall Tickets for 12th Class 2019:-

To download these admit cards for each 12th and 10th tests candidate need to visit their respective reputable’s webs and follow the little by little commands as given under.


  • Visit the reliable internet site of the Boards.
  • After going there choose the tab downloads.
  • Then here look for the admit playing cards downloading link for the above-engaging in checks.
  • Select the link to open it.
  • On the following page supply the information like your registration range and other information if asking.
  • Once you put up the asking details, you hall tickets will show on the screen.
  • Check the details, take its print out after downloading.
  • Convey this hall tickets even as appearing for the examination.


COHSEM HSLC Result 2019:-

After a success of entirety of the checks, applicants will eagerly look ahead to the result assertion news. They additionally start attempting to find the effects from all other feasible webs. But those effects will announce on the personal legit webs of the Boards only.Hence applicants have to visit the reliable internet and follow the instructions to test the results.

Students can recognize their outcomes by way of providing their hallticket numbers. After checking the results take its print out for the destiny uses.

We suggest aspirants to preserve on touring the legit webs often to know the everyday updates about the updating of the examination Time Table s, information about the examination admit playing cards, results and different necessary information. We additionally update the details on our page immediately as soon as we acquire any new portions of facts from the officials. Hence we request all our visitors to visit our web page also frequently to recognise the updates.

BSEM COHSEM 12th /10th Exam Time Table 2019 Click Here

__________________________________________________________

Voter id Voter id Apply new Voter card
Voter id Voter id Apply new Voter card
TS Ration card TS PGECET AP new Voter card
AP Voter id AP Voter id Apply AP new Voter card
TS-Aasara-Pension TS -Land-RecordsTS-Degree Certificates
TS-SSC-10th-ResultsTS-SSC HALLTICKETS new Voter card
TS -PG-Certificates TS Degree-Certificates TS-PG-Degree-Results
TS-Voter-ID-Transfer Aadhar-Card TS EAMCET
TS-EAMCET TS EC TS RTA
TS Inter Admission TS Degree Admission TS Inter Online
TS KU Admission TS MGU Admission TS PU Admission
TS TSMS TSPGLCET TS Ration Card
TSRJC TSTWREISscholarship online
APSWREIS BRAOU Online Exam TS Gurukulam
AP-Gurukulam AP-Bangaru-Talli TS Govt-Portals
TS Double-Bed-Room Shadi-Mubarak Kalyana-Laxmi-Scheme
TS-Kalyana LAXMI  Telangana-ePassTelangana-ePass
TSOSS- InterTSOSS ssc Passport
TS SSC Results TS AP EC Download TS Model-School
TS-Model-School TSOSSTS-Sadarem
Traffic-E-Challans JNTU ResultsTS-Sadarem
AP-Voter-ID-Transfer TS-Adangal -Land-Records TS TET
AP VOTER ID Ration-card TS-EAMCET
Aadhaar Card TSWREIS AEPS-Aadhaar
TSMJPTBC BRAOU halltickets Tippons-Pahani
AP Voter Id TMREIS AP Pahani
TS PGECET TSPSC OU Results
AP-Voter TS-Sadarem TSTWREIS
TMREIS SWAEROCET TS-Inter
AP-Voter Encumbrance Ts pension
More Information Visit http://www.telanganaa.in

          Overview of Azure SQL Database Information Protection       Cache   Translate Page      

Information protection becomes one of the dominant factors that drive modern database design and implementation. This becomes particularly evident when operating in a cloud computing environment, with Azure SQL Database serving as one of the prime examples of this trend. Microsoft delivers relevant features by leveraging several different security-related Azure services. In this article, we will provide an overview of this functionality.


          Junior IT Helpdesk Support Engineer - Degree      Cache   Translate Page      
Junior IT Helpdesk Support Engineer - Degree, Windows, Support, £competitive + Benefits, Cambridge A remarkable opportunity to join one of the UK's leading machine learning and artificial intelligence software houses who has risen above most of their competitors in the same space. They are true pioneers combining mathematics with cutting edge technologies and there is no doubt that they are here to stay. An opportunity not to be missed out on. Your skills as a Junior IT Helpdesk Support Engineer: -Degree educated in computing, information technology, mathematics, engineering, physics, network security or something related. -Must have excellent customer service skills and a confident communicator. -Perhaps you have worked within a 1st line / Helpdesk / Service desk capacity or something similar. -Technologies that you may have used could include operating systems such as MacOS, Linux, and Windows. -An understanding of networking principles firewalls and switches. - Basic PC Hardware troubleshooting capabilities. -Knowledge of Active Directory / Microsoft Exchange would be beneficial. -If you are a graduate looking to start a career in this field please feel free to apply. The role would suit someone that likes to be kept busy and is not afraid to roll up their sleeves, Desktop Support, working with third parties, providing support via email, remote support and over the phone, first line support for different offices and potentially some project work at a later date too. Prestige offices, central location, learning off some of the brightest in the industry, excellent Christmas dues and the chance to join a premier artificial intelligence software company. Sound good to you? Just apply via the link! Please note we are on the client's supplier list for this position. Please be assured that your CV will be treated in the strictest confidence and we would always speak to you before discussing your CV with any potential employer. Modis are operating as an Employment Agency. Modis are an equal opportunities employer Keywords: Graduate, Junior, IT, Helpdesk, MacOS, Linux, Windows, Firewalls, Switches, Technologies, PC, Hardware, Exchange, Degree Modis International Ltd acts as an employment agency for permanent recruitment and an employment business for the supply of temporary workers. Modis International Ltd UK is an Equal Opportunities Employer. By applying for this role your details will be submitted to Modis. Our Candidate Privacy Information Statement explains how we will use your information - please copy and paste the following link in to your browser: candidate-privacy-information-statement
          12/2/2018: News: Gold lining in Microsoft’s cloud      Cache   Translate Page      
MICROSOFT’S big bet on cloud computing is paying off as the company has surpassed Apple as the world’s most valuable publicly traded company. The software maker’s prospects looked bleak just a few years ago, as licences for its Windows system fell...
          Hetzner Cloud Windows Install      Cache   Translate Page      
I would like someone to teach me how to install windows server image on Hetzner Cloud. I'm planning to take maximum 1 hour over Google Hangouts to do the install on my account with you. I am flexible in... (Budget: €8 - €30 EUR, Jobs: Cloud Computing, Linux, System Admin, Windows Server)
          Fundamentals of Scientific Computing      Cache   Translate Page      
none
          today's leftovers      Cache   Translate Page      
  • Liferea News Reader 1.12.6 Released (Ubuntu PPA)

    Liferea (Linux Feed Reader) 1.12.6 was released day. Here’s how to install it in Ubuntu 18.04, Ubuntu 16.04, Ubuntu 18.10.

  • Necuno is a New Open Source Smartphone Running KDE

    It’s been more than two years since Ubuntu’s dream of creating a Linux smartphone was shattered. But it hasn’t discouraged others from trying their own hands on a Linux-based smartphone.

    Librem 5, the privacy-focused Linux-based smartphone, should be arriving in 2019. Even Pine64 is aiming for a budget Linux smartphone.

  • My GUADEC 2018 presentation

    I just realized that I forgot to publish my presentation from this year's GUADEC. Sorry, here it is!

  • Proxmox VE 5.3 is available

    since almost half a year we have been constantly improving Proxmox VE and adding new features. Today, we are proud to announce the final release of the new Version 5.3.

    [...]

    Here are the highlights of the new version 5.3:

    Based on Debian 9.6 and Linux Kernel 4.15
    You can create CephFS and the Metadata servers (MDS) in the GUI
    Improved disk management: add ZFS raid volumes, LVM, and LVMthin pools
    ZFS over iSCSI storage plug-in can access LIO target in the Linux kernel
    LXC: nesting is enabled for containers - you can use LXC or LXD inside a container
    PCI passthrough and vGPUs via GUI
    Countless bugfixes
    and much more...

  • VyOS 1.2.0-rc10 is available for download

    We have a bunch of issues that need testing. Please tell us if the following features work for you, or help us figure out a reproducing procedure! We need to make sure they are resolved before we make a stable 1.2.0 release, but we are either unable to reproduce them because they are hardware-specific and we don't have required hardware anywhere; or we cannot reproduce them using the provided procedure, which may mean either that the procedure is incomplete, or that the bug is already fixed.

  • Nitrux 1.1.1 overview | Meet Nitrux, powered by Linux, KDE Plasma 5, Qt and Nomad Desktop.
  • Ubuntu Server development summary – 04 December 2018

    The purpose of this communication is to provide a status update and highlights for any interesting subjects from the Ubuntu Server Team. If you would like to reach the server team, you can find us at the #ubuntu-server channel on Freenode. Alternatively, you can sign up and use the Ubuntu Server Team mailing list.

  • Design and Web team summary – 04 December 2018

    Welcome to the latest work and updates from the design and web team.

  • Máirín Duffy: Fedora Design Team Meeting, 4 Nollaig 2018
  • Linux-friendly Type 7 modules take to the skies

    Congatec unveiled two rugged, up to 16-core COM Express Basic Type 7 modules for aircraft computers: a Xeon D 15xx and Pentium D-15xx based Conga-B7XD and an Atom C3xxx driven Conga-B7AC. There’s also a new Conga-X7EVAL Type 7 carrier.

    Congatec has been slow to get into the COM Express Basic Type 7 “server-on-module” market but has made up for lost time by announcing two Linux- and Windows supported Type 7 models. Designed for “converged edge servers in aircrafts,” the Intel Xeon D and Pentium D based Conga-B7XD and the Intel Atom C3xxx based Conga-B7AC are the first aviation-focused Type 7 modules we’ve seen.

  • Rugged box PC series features PoE+ and smart hardware monitoring

    EFCO launched four Linux-ready “Eagle Eye” embedded machine vision computers with Intel 7th/6th Gen Core or Atom processors. The high-end systems support PoE+ IP cameras and EFCO’s AI-infused EKit hardware monitoring platform.

  • Flutter 1.0 Release Shows Google Is Serious About Project Fuchsia

    In Google’s quest to create a universal OS (project fuchsia), they also need the tools to make it a reality. A big part of Android’s success can be attributed to the open source nature of the OS and the excellent SDK support for developers. We know Flutter will run natively on Fuchsia, but it does bring notable benefits now.

  • Shell in a Handbasket | LINUX Unplugged 278

    We chat with a developer who's gotten Linux running on iOS devices, do a deep dive into Clear Linux, and discuss Xubuntu ending 32bit support.

    Plus why Android in the cloud, and a bunch of community news.

    Special Guests: Alan Pope, Martin Wimpress, and Theodore Dubois.

  • LHS Episode #262: RigPi Deep Dive

    Welcome to Episode 262 of Linux in the Ham Shack. In this episode, we have a special guest, Howard Nurse, W6HN, a longtime amateur radio operator and open-source enthusiast. He has developed the RigPi Station Server, a Raspberry Pi-based hardware and software rig control and operation solution that will be manufactured and sold by MFJ Enterprises.

  • Seattle’s Upbound introduces Crossplane, an open-source project to help companies manage applications across multiple public clouds

    Eventually Crossplane could help users automate deployment practices such as specifying which cloud provider — and which region inside that cloud provider’s network — should run a given application depending on how and where it is used. If it works as designed, this could make it much easier to manage a multicloud environment, which is an undertaking most companies do for strategic rather than practical reasons at the moment.

  • IBM and Red Hat want to become the leader in global hybrid and multicloud market

    When the news hit on October 29, 2018, that IBM had acquired Red Hat Inc., in a $34 billion deal, it stunned the technology world. And with good reason, as Red Hat’s merging with IBM was the biggest software acquisition ever achieved. But outside all of the hype, what will this actually mean for Red Hat going forward? To put it simply: global growth and worldwide leadership.

    “It puts us several years ahead of where we have been — or where we would have been, frankly — and ultimately … our intent is that with IBM, we’ll become the leading hybrid and multicloud provider in the world,” said Mike Ferris (pictured), vice president of technical business development and business architecture at Red Hat.

  • Quickly try Red Hat Process Automation Manager in your cloud

    t’s been some time since I last talked with you about putting JBoss BPM Suite (now called Red Hat Process Automation Manager) into your cloud, and with the new release, it’s time to talk AppDev in the cloud again.

    It’s time to update the story and see how to put Red Hat Process Automation Manager in your cloud so you are set up with a standard configuration to start your first business rules project.

  • Red Hat leads the charge into remote site and edge computing with open source hyperconverged infrastructure

    Initially aimed at remote office/branch office (ROBO) deployment, more Red Hat customers have been looking for infrastructure solutions at the edge. In industries like energy, retail, banking, telecommunications, and the public sector, many organizations rely on business-critical applications that must be deployed with limited space, budgetary constraints, and a growing scarcity of specialized IT staff.  


          Offer - Best Java Customer email database | Validated Java User DataSet - USA      Cache   Translate Page      
With Datacaptive’s Java Users Email List, avail access to Java Users Database to boost your brand presence for bigger deals & even bigger profit!Boost your prospect volume with Java Customers Mailing database.Java is a programming language & computing platform that can be used to fulfil a number of purposes such as calculate mortgage interests, play online games, watch 3D videos, live chats etc. Java has emerged as a forerunner in corporate computing by becoming an integral part of intranet applications, e- business solutions & much more!GET STARTED NOW!+1 800 523 1387Contact us today for accurate listconnect@datacaptive.com
          The CIO as Digital Conversationist: Is IT Communication a Vicious or Virtuous Cycle      Cache   Translate Page      
The goal for improving communication transparency and effectiveness is to make hierarchical systems adaptive so that they can respond to the challenges of a more complex, interconnected, and interdependent world.

Communications are the tools to solve problems, and languages are the tools to make communications. Communication clarity directly impacts on the business effectiveness and organizational maturity. However, in many organizations, miscommunication or misunderstanding leads to conflict and malfunction. Often, communication gaps are caused by cognitive difference, ambiguous process, or management bottleneck, etc. Information Technology plays a crucial role in driving information-based communication and breaking down communication bottleneck. Communication also directly impacts IT management effectiveness. The CIO as a digital conversationist needs to make an objective assessment: Does IT communication often go through a vicious or a virtuous cycle? How can IT leaders and professionals leverage different conversation styles to construct the collaborative vision and deliver high-performance IT result for the long run?

How to break down stereotypes and communication bottlenecks? IT failure is often caused by solving the wrong problems or fixing the symptoms only due to the miscommunication between IT and business. The gap between IT and business is the reality. And one of the critical root causes is lack of communication clarity. People all filter information differently based on their understanding and experiences. When communication is based on stereotypes, unconscious bias or command control, it often leads to a vicious cycle. Thus, to improve communication effectiveness, IT needs to forge a mature adult relationship with business users, since today’s multi-generational knowledge, multicultural, and multi-devicing workforce are either technology immigrants or digital natives, overall they are more savvy about the wide range of technology than IT manager gives credit for. Further, IT leaders and professionals need to reinvent their reputation from the misunderstood geeks to the trustful business partners; from “controllers” to enablers; from victims of circumstance to digital shapers; and from overloaded and unappreciated back office function to a work hard and smart innovator. The connection between IT and business lies in using the common language to help business cross that bridge to IT. Respect your audience's cognitive diversity and professional interest, and try to send the message which appeals to them. The digital transformation is in the agenda of any forward-thinking organizations, this is a phenomenal opportunity for the CIO to communicate effectively, educate other executive leadership teams on the value of IT, as well as how she/he can help to accelerate the leadership's strategy and agenda coming and for the future years.

What are great practices and tools to improve IT communication effectiveness?
Language is a method of communicating thoughts. IT leaders and professionals are polyglots who often need to understand IT jargon, business language, as well as multiple computing/programming languages in order to initiate audience tailored communications. Strategic CIOs can speak the architect’s dialect to understand things in both abstract and design level; they also need to adapt to finance tongue; of course, effective CIOs are good at technology terms to understand IT staff, and knowing some key technical details as well. Successful CIOs of today has to understand sales/marketing dialect, to "sell" his/her ideas and proposals to be effective executives. Define communication platforms and implement collaboration tools to be used. Digital platforms enabled by emerging technologies, efficient apps, and tools, help to break down functional silos, business hierarchy, and geographical border, allow people across the business ecosystem to leveraging multiple communication channels, share knowledge and work  for solving problems, overcoming common challenges, and emphasizing on communication, participation, and relationship building collaboratively. When communication leads to rumor, blame or fingerpointing, it’s gone to the vicious cycle. Remember, actions or words are said to be the second order. Thoughts are the first order. Practice information-based conversations or touch-feely talks to both connect the minds and touch the hearts for leading communication to a virtuous cycle. The ultimate goal of running a fluid digital organization is to get the mass collaboration and create business synergy through less hierarchy, cross-functional communication, with highly integrated processes designed for running a hyperconnected and interdependent business.

How to assess and measure communication outcome: Communication is the media, the tool, with the goal of leading change and business success. How to communicate just right is really critical to the business’s long-term strategy implementation and employees' engagement. It’s all about striking the right balance to communicate effectively and achieve the end goals. To break down communication bottleneck, the hard communication barriers such as outdated processes, procedures, practices should be updated, and the soft communication obstacles like culture, politics or leadership style, etc., need to be overcome. To measure communication effectiveness, focus on measuring process optimization and behavior improvement. The highly effective IT leader has to be prepared to constantly realign technology against the enterprise's business communication needs and measure how communication effectiveness enables the business's success. For example, the strategic goal of IT communication is about digital transformability. It should be measured based on the progress made for digital transformation initiatives, either through employee engagement improvement or business cross-functional collaboration enhancement. Thus, the business goal behind the IT measurement, either for soft management disciplines such as communication or the overall IT management performance has to focus on benefits generation, return on investment and contribution to either the bottom line business survival or the top-line business growth.

The goal for improving communication transparency and effectiveness is to make hierarchical systems adaptive so that they can respond to the challenges of a more complex, interconnected, and interdependent world. Breaking through the bottlenecks for improving the organizational responsiveness and changeability is a strategic imperative behind communication. The update and accurate information can make conversations more trustful; the digital platforms and tools improve communication processes and procedures for keeping communication flow and reaching the virtuous communication cycle smoothly.
          Are You a Traditional CIO or a Modernist CIO      Cache   Translate Page      
For CIO to shine as the digital modernist, they really need to evaluate the issues, do the due diligence, ask the right questions and take a logical scenario for driving changes. 

Information Technology is now permeating into every corner of the business, it’s a crucial component to run a modern business. As businesses embark on the “digital Era” of computing, the landscape for all executive roles constantly change, the CIO role also continues to be reimagined and reshaped. They should keep asking themselves: What is the future of IT? How to shape a digital IT organization? What is the nature of the digital IT leadership and what is the primary role of the CIO in harnessing the IT leadership? Am I a traditional CIO or a modernist CIO?

Traditional CIOs are classic management practitioners; modernist CIOs are systems thinkers and digital management explorers: In the evolutionary human society, Newtonian mechanics have fueled industrialization. Traditional CIOs often live in the box, leverage linear logic and take the reductionistic approach (business is the sum of parts) to manage IT, focus on efficiency - doing more with less. However, now we are moving in the hyperconnected and interdependent digital economy, digital businesses today are more like organic living things keep growing, rather than mechanical systems keeps spinning. The linear business system perception is replaced by the adaptive digital system perspective, and technical behavior is replaced by socio-technical behavior. Digital leaders should apply the multidisciplinary management approach for dynamic business planning and actions, which are always based on rough estimations of what the future conditions of business execution would be. Therefore, digital modernist IT leaders need to envision and embrace the emerging technology trends, practice Systems Thinking to ensure that IT is an integral component of the business and linchpin of the digitalization. More specifically, the role of modern CIO is to identify and blend the ways that information and technology can assist and shape the future of business by linking all digital components together to enforce value creation. Digital CIOs also need to leverage Systems Thinking to make effective decisions in IT management and orchestrate digitalization. ‘Systems Thinking' applies at both the level of technology artifacts in the resource category, as well as IT effect at the enterprise level, across all business functions, for driving changes in a structural way. System Analysis requires many forms of additional thinking - abstract, holistic, system, quantitative, objective, subjective, temporal (life cycle), and critical.

Traditional CIOs are often inside-out - operation focus, modernist CIOs are outside-in - people-centric: Traditional CIOs often manage and measure IT from inside-out IT lenses; struggle to get aligned with the business. The majority of IT organizations are pushing inside out, which could create the gaps between what the customer needs and what IT really delivers. It’s important for CIOs to both have business acumen and IT knowledge to ensure IT acting as an integral part of the business. The digital CIO should focus on the information content and context; how that information can be tapped from the underlying data and be utilized to turn it into valuable strategic insight; as well as how the information can be penetrated through the organization and be actively used in managing business processes and shaping the digital business. From the IT management perspective, contextual understanding is about getting to know the whole meaning of functional dialects and business dynamic and perceive the business insight in a cohesive way. IT has to build up a strong partnership, not just provide standardized services, but also manage customer-tailored solutions which are built upon rigorous business’s capabilities in which IT is the “super glue.” Digital CIOs are inspiring ‘storytellers” who can help business customers or partners gain open perspectives on IT performance and potential, close the perception, communication, and collaboration gaps between IT and business. They are able to initiate communication at the different level of the organization with clarity and work collaboratively with other business leaders, transform the company or organization to increase its customer-centric maturity and build a culture to focus on creating value for their customers.

Traditional CIOs are the business stabilizer, the modernist CIOs advocate changes, and digital transformation: Traditional CIOs are often controllers who “keep the lights on,” a bit reluctant to change. Their IT organizations are sometimes perceived as change laggard, drag down the speed of the business change. Nowadays, the need for change is obvious. It is IT responsibility to identify opportunity for business transformation wherever analysis and assessment indicate the potential benefits of transformation efforts. The CIO as a change agent not only touches his/her own function but also needs to make an influence on the entire organization and at the business ecosystem as well. Change is never for its own sake, the digital modernist CIOs can envision the emerging technology trends, explain the big why” behind business initiatives, articulate the strategic rationale behind the venture, as well as discover the new path for digital transformation. IT plays a change agent role in Business Transformation by leveraging systematic thinking and well thought-out planning. Thus, Change Management needs to be a mechanism embedded in the multitude of IT management as well. For CIO to shine as the digital modernist, they really need to evaluate the issues, do the due diligence, ask the right questions and take a logical scenario for driving changes and leading digitalization.

As the modern CIO, you have the most influential position in the business. Don’t waste the opportunity, seize it. For running a future-driven digital organization, digital CIOs have better sense to capture technology trends, move energy to a higher level by offering a clear vision of what is possible, have the insight to understand things holistically; respect the diversified viewpoints. If CIOs can see beyond the confines of their own function by understanding all the moving parts of the business and contribute to the overall improvement of the business, and then, this is the true proactive contribution to the top line business growth and leap the business up to the next level of the enterprise maturity.
          Proteo Media + Performance's SEPARATE OCEANS Premieres At Theaterlab January 18-20      Cache   Translate Page      

Separate Oceans, a new evening-length performance work produced by Proteo Media + Performance and choreographed by Kathleen Kelley, makes its premiere January 18-20th at Theaterlab as a part of the TLAB Shares program. Making parallels between digital spaces and the rhythms of the natural world, Separate Oceans examines virtual systems of emotion and affect. It incorporates dancing, live video feed, and projections that all draw inspiration from the ways humans increasingly depend on digital systems for desire and fulfillment. Separate Oceans features collaborators/performers Bree Breeden, Jennifer Campbell, Maddie Schimmel, and Lauren Vermilion supported by lighting designer Amanda K. Ringger, costume designer Maddie Schimmel, and projections designed by Proteo Media.

Proteo Media has been developing Separate Oceans for the past year with residency support by Chez Bushwick/Jonah Bokaer Artist-in-Residence program and a works-in-progress performance with the South Mountain Conservancy. The evening-length work will utilize live feed video streamed from iPhones, simulating the ways we live online (such as Snapchat, FaceTime, and Instagram), and will feature projection designs that evoke the increasing separation between the natural and digital worlds. These images are overlaid on a movement vocabulary that echoes the rhythms and structures of natural systems such as ocean wave patterns, animal movements, and cellular movement and division.

Separate Oceans evokes a specifically queer understanding of futurity by drawing connections between the natural and the virtual worlds. It explores the apparent emotional disconnect between beings in face-to-face communication as the dominant method of contact nowadays occurs via the phone screen. The ways our bodies connect to each other in this world has changed, especially due to the isolation, rage, and fear evoked by the current political landscape and the hope (and despair) of digital spaces. As culture moves towards affective computing and digitized emotional realities, our bodies are becoming enmeshed with computational algorithms to create feedback loops between ourselves and our virtual systems. "Likes", hearts, pictures, texts, stories, and comments can create a rich digital container for connection, but often at the expense of physical or embodied experiences or a sense of physical belonging. Kelley says, "I am interested in what this idea of digital affect does to the body's lived experiences. How can we create meaning from the body when we escape it so often?"

The rehearsal process has been a collaboration between director and dancers as the artists have focused on developing studio practices that can allow space for each dancer's individual physical perspectives and can ground the conceptual ideas into physical action. Kelley pushes her creative work to embody rather than represent, and is interested in work that is grounded in the real but "adds intensity, intention, and investment to the neutral indifference of the real" (Elizabeth Grosz, Becoming Undone: Darwinian Reflections on Life, Politics and Art).

Come to Theaterlab at 357 West 36th Street 3rd Floor, New York, NY 10018 to experience an immersive digital reality as told through movement and projections by Proteo Media. Shows are January 18th and 19th at 8 pm, and January 20th at 3 pm. Tickets are $20 general and $18 for students and seniors, and available for purchase here: web.ovationtix.com/trs/pe.c/10357241.

About Proteo Media + Performance

Proteo Media + Performance produces creative experiences that engage live performers, film, projections, installations and other forms of visual/digital data. Headed by Kathleen Kelley, our work explores rich intersections between technology and the body. We serve as digital collaborators, videographers, and producers for innovative artists, including recent work with Janessa Clark, Jose Riviera, Jr, and Roxy Gordon. In our own creative practice, we have recently produced an interactive exhibition at the Gowanus Loft, and other recent live works have shown at Chez Bushwick, Movement Research at the Judson Church, the Center for Performance Research, Triskelion Arts, Green Space, the SOAK Festival, the CURRENT SESSIONS, Nimbus OFFLINE series, and HATCH series. Recent videos have shown in TriQuarterly Literary Journal, Philly FringeArts Digital Fringe Festival, Moving Poems blog, Small Po[r]tions Intermedia Literary Journal, and the Rutgers University Momentum Technology Videos Festival.

About Kathleen Kelley

Kathleen Kelley is an Associate Professor of Dance and Technology at Montclair State University and the Artistic Director Proteo Media + Performance. She was a Chez Bushwick Artist in Residence in 2018, and a 2015-2016 LEIMAY Fellow. Recent performances include Chez Bushwick, Movement Research at the Judson, the interactive installation Digitized Figures at Gowanus Loft, a commissioned premiere in the Split Bill Series at Triskelion Arts, and showcase performances in the SOAK Festival, the CURRENT SESSIONS, Nimbus OFFLINE choreography series, and HATCH series. Her collaboration with the poet Sarah Rose Nordgren (under the moniker Smart Snow) has recently published a video work in Triquarterly literary magazine and shown work in multiple literary and dance online journals. As a scholar, she serves on the Editorial Board of Dance Education in Practice, a journal published by the National Dance Education Organization. She has a BFA from the University of NC-Greensboro and an MFA from the University of Illinois at Urbana-Champaign.

About Bree Breeden

Bree Breeden received a Bachelor of Fine Arts in Dance Performance and Choreography from Montclair State in 2016 where she performed works by Bill T.Jones, Jose Limon, Larry Keigwin, and Martha Graham. Currently, she is a dancer and the Managing Director for Proteo Media + Performance, dances with VON HOWARD PROJECT and Michiyaya DANCE. Previously she was the Operations Associate at Movement Research and Production Manager for Sidra Bell Dance New York. She also choreographs and performs her own work which has been presented at Embodied Spaces Festival in 2018, Movement Research Fall Festival at Danspace in 2018, at Earl Mosley Institute of the Arts dance talk series in 2016, and Montclair State University in 2015 in Danceworks and ACDFA.

About Jennifer Campbell

Jennifer Campbell is a Montclair State University alumna where she presented her own choreographic works and received her BFA in Dance. Jennifer has performed in works by Fredrick Earl Mosley, Kathleen Kelley, Pat Graney, Martha Graham, and José Limón.

About Maddie Schimmel

Maddie Schimmel has performed in work by Rashaun Mitchell and Silas Reiner, Jeremy Nelson and Luis Lara Malvacias, Doug LeCours, and Netta Yerushalmy. Her choreographic work has been presented at Triskelion Arts, Dixon Place, ROULETTE Intermedium, Alchemical Studios, Cathy Weis' Sundays on Broadway, and the NYU Tisch Dance Jack Crystal Theatre. She has also designed costumes for Jessie Young, Roxy + Company, and herself.

About Lauren Vermilion

Lauren Vermilion has worked with Tere O'Connor, Nico Brown, Renée Archibald, Renée Wadleigh, and Sahar Azimi. She has spent multiple seasons working for the American Dance Festival, and she holds a BFA in Dance with a minor in Mathematics from the University of Illinois at Urbana-Champaign.

About Amana K. Ringger

Amanda K. Ringger has lived in New York since 1997 designing locally, nationally and internationally with artists such as Darrah Carr, Faye Driscoll, Julian Barnett, Deborah Lohse, Laura Peterson, Cynthia Oliver, Alexandra Beller, Katie Workum, Doorknob Company, Shannon Gillen, Kota Yamazaki, and Mark Jarecke, among others. She received a BA from Goucher College in Baltimore, MD and an MFA in lighting design from Tisch School of the Arts at NYU. She is the recipient of a 2009 Bessie award for her collaboration on Faye Driscoll's 837 Venice Boulevard.

About Theaterlab and TLAB SHARES Program

Theaterlab is an artistic laboratory dedicated to research into the nature of live performance. Through the development of new and experimental work, including theater, music, and visual arts, Theaterlab supports New York City's diverse community of artists as well as the general public interested in seeing emerging new work. Theaterlab also focuses on audience development as a creative project. We regard the theatrical experience as a creative public assembly with the audience as an important partner in fulfilling our mission. In addition to producing and presenting new work, Theaterlab provides affordable space for rehearsal and project development, including resident and affiliate artists programs.

TLAB SHARES invites guest artists to produce their work in our space at affordable rates. Theaterlab reviews and selects all TLAB SHARES artists based on the Company's compatibility with Theaterlab's mission and aesthetic, a proven history of artistically and aesthetically ambitious productions, and a vision for utilizing our white box Theater in a way that supports and elevates their work.


          El 3D Sonic Sensor de Qualcomm es oficial: un sensor ultrasónico bajo la pantalla que lee la huella en 3D      Cache   Translate Page      

El 3D Sonic Sensor de Qualcomm es oficial: un sensor ultrasónico bajo la pantalla que lee la huella en 3D#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000

En Qualcomm han vuelto a plantarse en pleno Pacífico para anunciarnos sus novedades, y tal y como se esperaba conocimos ya su nueva arma para la gama alta móvil: el procesador Snapdragon 855. Pero no sólo de procesadores y CPUs vive el fabricante y entre sus novedades también está un sensor de huellas ultrasónico para insertar bajo la pantalla.

Algo que arroja cierta brisa de aire fresco sobre lo que ya es en sí aún una nueva tendencia: los lectores de huella en pantalla. Aunque no es algo totalmente nuevo ya que la propia Qualcomm ya disponía de esta tecnología, y la hemos visto integrada a modo de anticipo en móviles como el Huawei Mate 20 Pro, así que veamos qué novedades trae.

Una novedad relativa

Hasta ahora hemos estado viendo lectores ópticos. Es decir, un sistema que trabaja con fotografías de nuestro dedo y que en base a ello determina que el patrón de surcos y relieves de nuestra huella es el correcto y que hemos visto en móviles de este año como el Vivo X20 Plus UD, el OnePlus 6T o el Xiaomi Mi 8 Pro, tal y como anticipamos al hablar de ClearID, la tecnología de Synaptics que permite este desbloqueo.

No obstante, como decíamos el Huawei Mate 20 Pro no cuenta con ClearID, sino con la tecnología que Qualcomm ya disponía para la lectura bajo la pantalla y con la que lleva experimentando unos años (ya la vimos en el Xiaomi Mi 5s).

Una tecnología que ahora es oficial, tras ser anunciada por el vicepresidente de tecnología móvil de Qualcomm Alex Katouzian (como sabemos por CNet). Así, el 3D Sonic Sensor de Qualcomm trabaja con ultrasonidos, de modo que éstos penetran a través del cristal para crear una imagen tridimensional de la huella, de modo que es más seguro que la imagen en 2D de los lectores ópticos (seis veces más seguro que los sensores biométricos, según el fabricante).

¿Quién lo estrenará?

A falta de conocer más detalles de esta tecnología, todo apunta a que siguiendo la estela del Mate 20 Pro será el (o los) futuro y muy rumoreado Samsung Galaxy S10 el que estrene la actualización de Qualcomm e integre un sensor de huellas ultrasónico bajo la pantalla. Algo que sería un gran cambio en los móviles de Samsung de confirmarse, ya que hasta el momento han confiado en los lectores capacitivos (mediante botón físico) con ubicaciones varias.

Xiaomi Mi 8 Pro

Lo que de momento aseguran es que su 3D Sonic Sensor es lo suficientemente potente como para obtener una lectura al mismo nivel de profundidad de los poros de la piel y que servirá también para los pagos móviles. Cuando haya más datos (y sobre todo se pueda probar) habrá que ver si es más, menos o tan seguro como los sistemas actuales, hablando también de los de reconocimiento facial avanzado.

También te recomendamos

Qualcomm Snapdragon 855: dos confirmaciones y tres pronósticos para el nuevo procesador 5G

Porsche Design Huawei Mate RS: el lector de huellas integrado en la pantalla llega a los buques insignia

#CienciaenelParlamento o cómo Twitter puede crear una cultura política científica

-
La noticia El 3D Sonic Sensor de Qualcomm es oficial: un sensor ultrasónico bajo la pantalla que lee la huella en 3D fue publicada originalmente en Xataka por Anna Martí .


          Student Devices: Perry County, Ohio – K-12 Schools      Cache   Translate Page      

Many schools across the country are putting advanced computing power into the hands of every student. From tablets to laptops, Android to Apple, schools are examining opportunities for leveraging technology to expand opportunities for learning within and outside the classroom. One-to-one device programs allow all students to have equal and individual access to technology, content, Continue Reading

The post Student Devices: Perry County, Ohio – K-12 Schools appeared first on Connect My Community.


          NIH wraps up enrollment for adolescent brain study      Cache   Translate Page      
The U.S. National Institutes of Health (NIH) has finished enrollment for its...Read more on AuntMinnie.comRelated Reading: NIH seeks partner for UpRite chest x-ray marker NIH taps photonics researcher as new NIBIB director NIH unveils cloud computing research initiative NIH issues huge database of CT scans for AI testing Adolescent brain study begins enrollment (Source: AuntMinnie.com Headlines)
          Risky Business #523 -- So many breaches      Cache   Translate Page      

This week’s show features Patrick Gray and Adam Boileau discussing the week’s security news, including:

  • The Marriott, Quora, Dell and Sky Brazil data breaches
  • Kashoggi associate to sue NSO Group
  • Australia’s AA Bill set to pass
  • NZ give Huawei the boot
  • AutoCAD malware targets key verticals
  • Republicans’ 2018 campaign hacked
  • Czech government blames Russia for intrusions into key systems
  • Horror-show bug in Kubernetes

This week’s show is brought to you by Duo Security, big thanks to Duo for that! In this week’s sponsor interview we’ll be chatting with Duo Security’s very own Dave Lewis about some Beyond Corp stuff. Beyond Corp is the enterprise computing model of the future and Dave will be along after this week’s news to talk about some of its finer points.

Links to everything that we discussed are below. (That’s why there are extras.) You can follow Patrick or Adam on Twitter if that’s your thing.


          How to extend Wi-Fi range with another router      Cache   Translate Page      

Is there a Wi-Fi dead zone in your home or office? A Wi-Fi repeater can help. Don't buy a new one, though. Here is how to extend Wi-Fi range with another router you have lying around.

The post How to extend Wi-Fi range with another router appeared first on Digital Trends.


          The best free antivirus software of 2018      Cache   Translate Page      

Malware, spyware, and adware is never fun to find on your PC. Check out our picks for the best free antivirus software, so you can rid your system of any dangerous software that might be lurking around.

The post The best free antivirus software of 2018 appeared first on Digital Trends.


          Google denies claim that it’s tracking internet users when incognito mode is on      Cache   Translate Page      

Google is denying claims leveled against it by rival privacy-focused search engine DuckDuckGo. The rival alleged that even when incognito mode is on, Google is tracking users in order to deliver personalized search results.

The post Google denies claim that it’s tracking internet users when incognito mode is on appeared first on Digital Trends.


          A second Wells Fargo glitch results in the foreclosure of more homes      Cache   Translate Page      

A computer error has struck Wells Fargo once again, resulting in hundreds more homes being mistakenly foreclosed after a first glitch was reported in August. To compensate one customer, the bank sent a check for $25,000.

The post A second Wells Fargo glitch results in the foreclosure of more homes appeared first on Digital Trends.


          Block out the sun and drown out the haters with Bose’s new AR sunglasses      Cache   Translate Page      

Bose has announced its quirkiest listening device yet, a pair of headphone-integrated sunglasses that allow you to meander the brightest places with your favorite tunes in tow. Called the Frames, the glasses will sport 3.5 hours of battery.

The post Block out the sun and drown out the haters with Bose’s new AR sunglasses appeared first on Digital Trends.


          National Dice Day Shortbread      Cache   Translate Page      
This caption is dicey.
PC hardware and computing

MSI GeForce RTX 2080 Gaming X Trio review @ Guru3D
Intel i7-2600K revisit: 2018 benchmarks vs. 9900K, Ryzen, & more @ Gamers Nexus
Intel Core i5-9600K processor overclocking review @ HardOCP
Patriot Evlvr portable Thunderbolt 3 SSD review @ HotHardware
Crucial BX500 480GB SSD review @ KitGuru
AMD Radeon RX 590 roundup - PowerColor, Sapphire and XFX @ Legit Reviews
Overclocking the $55 AMD Athlon 200GE CPU @ TechSpot
Analyzing Core i9-9900K performance with Spectre and Meltdown hardware mitigations @ AnandTech

Read more...


          Salesforce Solution Architect - Silverline Jobs - Casper, WY      Cache   Translate Page      
Company Overview: Do you want to be part of a fast-paced environment, supporting the growth of cutting edge technology in cloud computing? Silverline...
From Silverline Jobs - Wed, 05 Sep 2018 06:21:23 GMT - View all Casper, WY jobs
          Incident & Problem Management Manager at Huawei Technologies Company (Nigeria) Limited      Cache   Translate Page      
Huawei is a leading global ICT solutions provider. Through our dedication to customer-centric innovation and strong partnerships, we have established end-to-end capabilities and strengths across the carrier networks, enterprise, consumer, and cloud computing fields. Our products and solutions have been deployed in over 170 countries, serving more than one third of the world's population.
          OSS Leftovers      Cache   Translate Page      
  • Monex Platform Now Available in Private Beta Launch: Built on Open-Source Blockchain

    Monax, a digital legal infrastructure platform built on an open-source, universal blockchain, has introduced the private beta launch of the Monax Platform, the latest in its line of smart contract products. The Monax Platform is a collaborative workspace for businesses, legal and tech professionals, with market-ready smart contract templates available for individual or commercial use.

  • 2019 telecoms forecast: the year of 5G and open source

    2019 is shaping up to be a massive year for telco companies. In the final few months of 2018, countless 5G projects have launched and several new uses cases in cloud computing and IoT have come to light, driving demand for high capacity and low latency connectivity.

    As a result of the monetisation challenges, there has been a distinct move away from just providing faster network speeds to consumers, and towards enabling a whole host of new technologies on mobile networks. To achieve this, an increasing number of telecoms operators are functioning like software companies.

  • AI in 2019: 8 trends to watch

    “Today, more leading-edge software development occurs inside open source communities than ever before, and it is becoming increasingly difficult for proprietary projects to keep up with the rapid pace of development that open source offers,” says Ibrahim Haddad, director of research at The Linux Foundation, which includes the LF Deep Learning Foundation. “AI is no different and is becoming dominated by open source software that brings together multiple collaborators and organizations.”

    In particular, Haddad expects more cutting-edge technology companies and early adopters to open source their internal AI work to catalyze the next waves of development, not unlike how Google spun Kubernetes out from an internal system to an open source project.

    “We foresee more companies open sourcing their internal AI stacks in order to build communities around those projects,” Haddad says. “This will enable companies and communities to harmonize across a set of critical projects that together will create a comprehensive open source stack in the AI, machine learning, and deep learning space. Large companies that were the first to take their AI efforts open source are already seeing early mover advantages, and we expect this to increase.”

  • The 8 biggest open source milestones in 2018

    Open source continues to climb the charts of popularity and usability. Every year that goes by marks newer and greater milestones for open source, and 2018 was no stranger to such events. The open source community enjoyed plenty of highs and suffered its share of lows.

  • Guten Tag Sindelfingen!

    This week, Collaborans will be taking part, and speaking, in this year's ESE Kongress, "the only German-language convention with an exclusive and extensive focus on the manifold issues and challenges with respect to the development of device and system software for industrial applications, automotive engineering, automation, drives, measurement systems, communication systems as well as consumer electronics and medical devices."'

  • Chrome 71 for Mac, Windows, Linux rolling out w/ ad removal on abusive sites, billing protection

    At target are websites that continue to display advertising that masquerades as fake system dialogs or ineffective ‘close’ buttons even after warnings from the Google Search Console’s Abusive Experiences Report. According to Google, this ad removal will affect a “small number of sites with persistent abusive experiences,” with scammers and phishing schemes often using these ads to steal personal information.

  • The Servo Blog: Experience porting Servo to the Magic Leap One

    We now have nightly releases of Servo for the Magic Leap One augmented reality headset. You can head over to https://download.servo.org/, install the application, and browse the web in a virtual browser.

  • SmartArt improvements in LibreOffice, part 2

    I recently dived into the SmartArt support of LibreOffice, which is the component responsible for displaying complex diagrams from PPTX. I focused especially on the case when only document model and the layout constraints are given, not a pre-rendered result.

    First, thanks to our partner SUSE for working with Collabora to make this possible.

  • BloomReach Experience Manager v13, Magnolia v6 and More Open Source News
  • Top 14 Joomla extensions

    In the first part of this series, I explained how to use the Joomla Extension Directory to find extensions to expand your Joomla website's functionality. Here, I'll describe the top 14 free Joomla extensions—the ones I don't think any site should do without.

  • Register today for LibrePlanet 2019!

    The free software community spans the entire world, with supporters in nearly every corner of the globe, busily coding, tinkering, and spreading the word about the growing importance of controlling our computing. The Internet provides us with many great tools to share the latest news and advances, but ultimately, there’s nothing quite like meeting in person at the LibrePlanet conference! At LibrePlanet, you can meet other developers, activists, policy experts, students, and more, to make connections and help us strategize the future of free software.

  • Introducing Lei Zhao, intern with the FSF tech team

    I first became aware of free software in the sense of freedom at the age of 19. I encountered free software even earlier, but it took some time to appreciate the free/libre aspect of free software.

  • PAINS management: an open source model to eliminate nuisance compounds

    High-throughput screening (HTS) technologies have enabled the routine testing of millions of compounds towards the identification of novel ‘hit’ molecules for therapeutic targets. Oftentimes in this drug discovery process, however, compounds that show promising activity in primary screens show no activity during subsequent hit qualification or progression efforts.

  • Open source tool picks best chemo drug 80% of the time
  • Inside FC Barcelona's Open-Source Strategy to Innovate in Soccer
  • XML Language Server and the VSCode Extension [Ed: Red Hat as Microsoft marketing department, helping to sell proprietary lockin Visual Studio]

read more


          Xiaomi Mi 8 Plus with 8GB RAM and 128GB Storage Smartphone      Cache   Translate Page      
Xiaomi Mi 8 Plus with 8GB RAM and 128GB Storage Smartphone

Xiaomi Mi 8 Plus with 8GB RAM and 128GB Storage Smartphone


          Decimal numbers with comma fail validation in German or Turkish      Cache   Translate Page      

Hi,

I have Language option in my project with localization. 

if I use  type="number" in Turkish Or German I get this error that "Please enter a number". Number is 1,5

if I use English, I mean 1.2 in Enlish, there is no problem ?

how to fix it ? why I can not use type="number"

public decimal Price { get; set; }
<div class="form-group">
   <label asp-for="Price"></label>
   <input asp-for="Price" class="form-control" type="number"/>
   <span asp-validation-for="Price" class="text-danger"></span>
</div>

in Turkish and Germany, Decimal Symbol is comma and 

Digit grouping symbol is dot/full stop

The following examples show the decimal separator and the thousands separator in various countries.

Style Countries
1,234,567.89 Canada (English-speaking; unofficial), China, Hong Kong, Ireland, Israel, Japan, Korea, Malaysia, México, New Zealand, Pakistan, Philippines, Singapore, Taiwan, Thailand, United Kingdom, United States.
1234567.89 SI style (English version), Australia, Canada (English-speaking), China, Sri Lanka, Switzerland (officially encouraged for currency numbers only[40]).
1234567,89 SI style (French version), Albania, Belgium (French), Bulgaria, Canada (French-speaking), Czech Republic, Estonia, Finland, France, Hungary, Italy, Kosovo, Latin Europe, Norway, Peru, Poland, Lithuania, Russia, Slovakia, South Africa, Sweden, Switzerland (officially encouraged, except currency numbers[40]), Ukraine.
1,234,567·89 Ireland, Malaysia, Malta, Philippines, Singapore, Taiwan, United Kingdom (older, typically hand written)[41]
1.234.567,89 Argentina, Austria, Belgium (Dutch: most common), Bosnia and Herzegovina, Brazil, Chile, Costa Rica, Croatia,[42][43] Denmark, Germany, Greece, Indonesia, Italy, Netherlands, Portugal, Romania, Slovenia, Spain,[44]Turkey, Vietnam.
12,34,567.89 Bangladesh, India (see Indian Numbering System).
1'234'567.89 Switzerland (computing), Liechtenstein.
1'234'567,89 Switzerland (handwriting).
1.234.567'89 Spain (handwriting).
123,4567.89 China (based on powers of 10 000—see Chinese numerals).

http://www.wikizeroo.net/index.php?q=aHR0cHM6Ly9lbi53aWtpcGVkaWEub3JnL3dpa2kvRGVjaW1hbF9tYXJr


          Microsoft and Docker CNAB takes aim at distributed computing      Cache   Translate Page      
none
          One Stop Systems Steps up GPU Servers for Ai and World’s First PCIe Gen 4 Cable Adapter      Cache   Translate Page      

In this video from SC18, Jaan Mannik from One Stop Systems describes how the company's high performance GPU system power HPC and Ai applications. At the show, the company also introduced HIB616-x16, the world's first PCIe Gen 4 cable adapter. "The OSS booth will also feature a partner pavilion where several OSS partners will be represented, including NVIDIA, SkyScale, Western Digital, Liqid, One Convergence, Intel and Lenovo. OSS and its partners will showcase new products, services and solutions for high-performance computing, including GPU and flash storage expansion, composable infrastructure solutions, the latest EOS server, cloud computing, and the company's recently introduced Thunderbolt eGPU product."

The post One Stop Systems Steps up GPU Servers for Ai and World’s First PCIe Gen 4 Cable Adapter appeared first on insideHPC.


          Job of the Week: HPC Systems Administrator at Washington State University      Cache   Translate Page      

Washington State University is seeking an HPC Systems Administrator in our Job of the Week. "This position will play a vital role in the administration of HPC clusters used by the research community at Washington State University. WSU faculty are leaders in scientific research computing in diverse areas including computational physics and chemistry, genomics, materials science, atmospheric and environment sciences, and agriculture and natural resources."

The post Job of the Week: HPC Systems Administrator at Washington State University appeared first on insideHPC.


          Das Milliardenunternehmen Salesforce verbietet seinen Personalern, Bewerber nach ihrem aktuellen Gehalt zu fragen      Cache   Translate Page      

Salesforce.PNG

Das US-amerikanische Tech-Unternehmen Salesforce geht ungewöhnliche Wege, um die gleiche Bezahlung von Frauen und Männern zu erreichen. So ist in Bewerbungsgesprächen die Frage nach dem aktuellen Gehalt verboten, erzählte Cindy Robbins, Personalleiterin bei Salesforce, an diesem Dienstag auf der Ignition-Konferenz. 

Salesforce bietet Cloud-Computing-Lösungen für Unternehmen an und hat seinen Sitz in San Francisco. Der Umsatz lag im vergangenen Jahr bei 8,4 Milliarden US-Dollar. Zudem kürte das US-Magazin „Fortune“ Salesforce zum besten Arbeitgeber 2017. 

Robbins: „Mitarbeiter vertrauen uns und erwarten, dass wir sie fair bezahlen.“

Bei ihrer Präsentation auf der Ignition-Konferenz von Business Insider in New York sprach Cindy Robbins über Equal Pay, also die gleiche Bezahlung von Frauen und Männern. Das Thema Gleichbehandlung sei dem Gründer und Geschäftsführer Marc Benioff durch ein Meeting zum besonderen Anliegen geworden, so Robbins.

Benioff sei in dem Meeting, zu dem die wichtigsten Mitarbeiter des Unternehmens versammelt waren, aufgefallen, dass „kaum Frauen im Raum anwesen waren“. Seitdem fördert er Frauen in seinem Unternehmen. Trotzdem sei er zuerst „ziemlich schockiert“ gewesen, als Robbins mit ihm über die Gehaltslücke bei Salesforce und ihre Ideen dazu sprechen wollte. Er habe das in seinem Unternehmen für unmöglich gehalten.

„Trotzdem sagte Marc: Los, macht es!“, berichtet Robbins auf der Ignition-Konferenz. Die wichtigste Maßnahme bestand in Gehaltsanpassungen, aber auch in kleineren Änderungen. So sei Recruitern und Personalern nicht mehr erlaubt worden, Bewerber nach dem aktuellen Gehalt zu fragen. Stattdessen sollte die Frage anders formuliert werden: Welches Gehalt erwarten Sie?„Das ist eine ganz andere Denkweise“, erklärt Robbins die Maßnahme. „Mitarbeiter vertrauen uns. Sie vertrauen uns ihre Karriere an und erwarten von uns, dass wir sie fair bezahlen.“

Salesforce hat insgesamt 8,7 Millionen US-Dollar für Equal Pay ausgegeben

Als die drei wichtigste Lektionen, die sie bei ihrem Kampf für Gleichbehandlung und Equal pay gelernt habe, nennt Robbins die Unterstützung des Geschäftsführers, sie sei ein absolutes „Muss“. Zudem müssten Unternehmen ihre eigenen Daten nutzen. „Jedes Unternehmen hat die Daten, es gibt keine Ausrede dafür, sie nicht anzusehen“, fordert Robbins. Außerdem müssten auch Männer in das Thema einbezogen werden.

Bisher habe Salesforce insgesamt 8,7 Millionen Dollar für Equal Pay ausgegeben, sagt Robbins. Das Unternehmen habe 34 Prozent mehr Frauen in Führungspositionen. Und 92 Prozent der Mitarbeiter sagten, dass sie sich beim Gehalt von Salesforce fair behandelt fühlen.

cm

Das könnte euch auch interessieren:

 Entscheidend in der Gehaltsverhandlung ist nicht, was ihr sagt — sondern was ihr nicht sagt

 Studie: Der häufigste Grund für eine Gehaltserhöhung hat nichts mit guter Arbeit zu tun

 Gehaltsranking: In diesen Berufen verdient ihr nach dem Studium am besten

Join the conversation about this story »


          Apple’s refurbished 15-inch MacBook Pro gets a $450 price cut on Amazon      Cache   Translate Page      

Amazon is selling Apple's 15-inch MacBook Pro with a $450 discount. The laptops, which start at $1,549 after the discount, are sold through Amazon's Woot deals, and applies to Apple's mid-2017 laptops.

The post Apple’s refurbished 15-inch MacBook Pro gets a $450 price cut on Amazon appeared first on Digital Trends.


          Systems Development Manager - AI Services - Amazon.com - Seattle, WA      Cache   Translate Page      
Our Amazon Web Services teams are innovating new ways of building massively scalable distributed systems and delivering the next generation of cloud computing...
From Amazon.com - Thu, 15 Nov 2018 19:20:20 GMT - View all Seattle, WA jobs
          System Engineer - AI Services - Amazon.com - Seattle, WA      Cache   Translate Page      
The Amazon Web Services team is innovating new ways of building massively scalable distributed systems and delivering the next generation of cloud computing...
From Amazon.com - Sat, 03 Nov 2018 01:21:44 GMT - View all Seattle, WA jobs
          Information technology : cloud computing: interoperability and portability      Cache   Translate Page      
none
          Senior Systems Development Engineer - AI Services - Amazon.com - Herndon, VA      Cache   Translate Page      
The Amazon Web Services team is innovating new ways of building massively scalable distributed systems and delivering the next generation of cloud computing...
From Amazon.com - Thu, 15 Nov 2018 08:54:36 GMT - View all Herndon, VA jobs
          PL/SQL DEVELOPER (JUNIOR / MIDDLE / SENIOR LEVEL) чрез Bulwork      Cache   Translate Page      
About us:
Bulwork is the first IT and TELCO recruitment agency in Bulgaria with more than 18 years of significant presence on the market. The company has established a reputation for delivering high quality services to both candidates and clients. The company respects the candidates and always strives to find the most suitable and challenging job for them. 

About our client:
One of the biggest technology company in Bulgaria. It sets the trend in providing innovative IT services and solutions in areas like cloud computing, big data and analytics, enterprise collaboration. The company has got its own products too, developed with the aim to satisfy corporate needs. 

Currently they are looking to expand their presence on the market and this is why together we the company, we are looking for a:


PL/SQL DEVELOPER (JUNIOR / MIDDLE / SENIOR LEVEL)


Your role:
As a PL/SQL Developer, you will be responsible for database coding and maintenance in such a way that it meets project requirements and timeline. With that purpose in mind, you would be constantly collaborating with Architects, Developers, Business Analysts and Database Administrators.

 
          Snowflake anuncia la disponibilidad general de Microsoft Azure en la región EMEA      Cache   Translate Page      

El aumento de la demanda internacional de Snowflake en Microsoft Azure por parte de los clientes ofrece el almacén de datos construido en la nube a una base de clientes mucho más amplia y global SAN MATEO, California, 5 de diciembre de 2018 /PRNewswire/ -- Snowflake Computing, el almacén...


          Industrial Computing Specialist - HyLife Foods LP - Neepawa, MB      Cache   Translate Page      
This position is based in the vibrant community of Neepawa, Manitoba which has a reputation for its beauty and high quality of life....
From HyLife Foods LP - Fri, 02 Nov 2018 02:47:34 GMT - View all Neepawa, MB jobs
          Land tender for data centre site in Tseung Kwan O expected to draw ‘strong’ interest, analysts say      Cache   Translate Page      
Hong Kong’s biggest land site earmarked for development as a data centre is expected to draw intense bidding as the growth of cloud computing drives demand for such purpose-built facilities. The 295,405 square foot site at Wan Po Road, Area 85, Tseung Kwan O will close for tender on Friday. Under a plot ratio of 4.5 times, the site will house a structure with a gross floor area of up to 1.33 million sq ft, or roughly the size of more than 19 football pitches. “We expect this would...
          Does cloud computing mean game over for Xbox and PlayStation?      Cache   Translate Page      
Hardware makers must adapt to a world where superfast broadband can stream blockbuster games without the need for a box
          "Accurate cost allocation of cloud resources and services to end users" - [Banks.com.gr]      Cache   Translate Page      
Image

Operators of complex IT infrastructure such as telecommunication networks, data centers, and clouds face demanding tasks like:computing the real cost and profit margin of each enterprise customerpreparing infrastructure for traffic growthoptimizing pricing Large virtual or physical infrastructure...


          MEA, Turkey personal computing devices market set to decline in 2019      Cache   Translate Page      
(Telecompaper) The Middle East, Turkey, and Africa (META) personal computing devices (PCD) market, covering desktop computers, notebooks, workstations and tablets,...
          XFX1 PLS2 DRIVER      Cache   Translate Page      

XFX Dual Display technology expands the traditional limits of desktop computing by multiplying your screen area. Don’t see what you’re […]

The post XFX1 PLS2 DRIVER appeared first on 4 Drivers/Minute.


          How does your first language change you?      Cache   Translate Page      

@Woo wrote:

As I’ve been learning (properly) my first functional programming language, I’ve been thinking that it might be best to teach FP first, but I’m not sure. I don’t know what I would lose by not having started with Algol 68. I’m probably aware of things that I didn’t know I’d learned. They just seem obvious: values are a place, the natural structure of code is a tree, strict typing is better, every statement returns a value. Some of the ideas have started to seem wrong now.

What was your first language and how do you think it influenced your ideas about computing, particularly if the ideas turned out to be faulty?

Posts: 1

Participants: 1

Read full topic


          Comment on AWS Sells Hardware to Enterprises to Use in Their Private Data Centers by Tim Wessels      Cache   Translate Page      
Well, it is curious that after years denying the company had any interest in hybrid or private cloud computing, AWS is announcing AWS Outposts and VMware Outposts. It looks like their work with VMware on creating a specific AWS environment to support VMware hybrid clouds influenced AWS. AWS is no longer denigrating hybrid and private clouds and planning how AWS can use them to take over private data centers one computer rack at a time offering to run the AWS stack on-premises. Looks like repatriating workloads and data from public clouds to hybrid and private clouds is gaining some credibility.
          Market for Personal Computing Devices Remains Soft Overall, But Notebooks Present A Silver Lining, According to IDC      Cache   Translate Page      
Unit shipments for the global personal computing devices market, comprised of traditional PCs (made up of desktops, notebooks and workstations) and tablets is expected to decline 3.9% in 2018, according to the latest forecast from the IDC Worldwide Quarterly Personal Computing Device Tracker.
          Middle East, Turkey, & Africa Personal Computing Devices Market Set to Decline to Lowest Levels Since 2009      Cache   Translate Page      
Dubai – The Middle East, Turkey, and Africa (META) personal computing devices (PCD) market, which is made up of desktops, notebooks, workstations, and tablets, will slump to its lowest levels in a decade next year, according to the latest insights from International Data Corporation (IDC). The global technology research and consulting firm's Quarterly PCD Tracker forecasts overall PCD shipments for the region of 19.6 million units in 2019, the lowest total since 16.5 million units were shipped in 2009.
          Practice Doesn’t Always Make Perfect      Cache   Translate Page      
Why Your Race Is a Puzzle, and How to Solve It. Practice Doesn’t Always Make Perfect

Apple made a great leap forward in communications and mobile computing in 2007 when it launched the iPhone. It couldn’t have done this by sticking to all the things that made it a pioneer in desktop computing.

The company tried to launch the Newton handheld computer in 1993. The product failed and this setback stung. It took years after for the company to accept that mobile computing would become reality and that any device it produced would eventually cannibalize sales of its then-flagship Macintosh computer line.

Continue reading Practice Doesn’t Always Make Perfect at Michael Hyatt.


          Market for Personal Computing Devices Remains Soft Overall, But Notebooks Present A Silver Lining, According to IDC      Cache   Translate Page      
...up of desktops, notebooks and workstations) and tablets, is expected to decline 3.9% in 2018, according to the latest forecast from the International Data Corporation ( IDC ) Worldwide Quarterly Personal Computing Device Tracker . This contraction is expected to continue throughout the ...


          Snowflake annonce sa disponibilité sur Microsoft Azure dans toute la zone Europe, Moyen-Orient et Afrique      Cache   Translate Page      
Snowflake Computing, l'entrepôt de données construit pour le cloud, a annoncé aujourd'hui la disponibilité de Snowflake sur Microsoft Azure dans toute l'Europe. Cette expansion reflète la demande croissante des...
          IT Peripherals Market Intelligence | Procurement Report, Procurement Market Research, Procurement Intelligence Report, Procurement Market Analysis Information Now Available from SpendEdge      Cache   Translate Page      
...peripherals, declining IT expenditure, and stiff competition from the mobile computing devices industry will deter the category growth during the forecast period. Download the Free Sample of our IT peripherals market intelligence report to get significant insights into the supply cost ...

          Business Game Changers Radio with Sarah Westall: Ex FBI Deputy Assistant Director for Software on the Realities of the Information Age and Solving Cybersecurity      Cache   Translate Page      
EpisodePerhaps if computing did not create a psychology distance between people and the work being accomplished, people would be much more nervous about the realities we are facing with cybersecurity. After all, the “Cloud” is an abstract concept that most people don’t really understand. Trillions of dollars of transactions each year and a countless number of important actions, such as drone strikes, satellite repositioning, and communications, are conducted over the internet or & ...
          (Big) Data Engineer      Cache   Translate Page      
Currently I am recruiting for a (big) data engineer who will work closely with developers, product managers and data science teams (in various projects) to develop, implement, test and measure new ideas. Requirements: • Experience with Scala and Java 8 programming languages • Hands-on experience with a big-data ecosystem – Hadoop, Yarn, Spark, Kafka, Flink, Cassandra, Kafka Streams, Luigi, Airflow • Knowledge and experience with Python is a plus • Proficient in designing efficient and robust ETL workflows • Preferred experience with a cloud computing environment – Amazon EC2, Google Cloud, Azure Do you recognize yourself in this profile or do you know anyone that could be interested? Let me know and I will reach out asap to you!...
          AMD Ryzen 3000 next-generation 16-core processors leaked - TechRadar      Cache   Translate Page      
  1. AMD Ryzen 3000 next-generation 16-core processors leaked  TechRadar
  2. AMD Ryzen 3000 Specs & Prices Leaked, Upto 16 Cores & 5.1GHz on AM4  Wccftech
  3. New Retail Data Shows AMD CPUs Outselling Intel 2:1  ExtremeTech
  4. AMD Ryzen 3850X CPU to Feature 16 Cores (32T) and 5.1 GHz Boost Clock  TechQuila
  5. View full coverage on Google News

          “Los datos son el nuevo petróleo de las comunicaciones con los clientes”      Cache   Translate Page      
Compart ha reunido a 420 especialistas en el foro Comparting 2018, donde ha hablado sobre automatización, accesibilidad, omnicanalidad, cloud computing y blockchain.
          Community Call – Governance strategies for open source research software projects      Cache   Translate Page      
🎤 Dan Sholler, rOpenSci Postdoctoral Fellow 🕘 Tuesday, December 18, 2018, 10-11AM PST; 7-8PM CET (find your timezone) ☎️ Details for joining the Community Call. Everyone is welcome. No RSVP needed. Researchers use open source software for the capabilities it provides, such as streamlined data access and analysis and interoperability with other pieces of the scientific computing ecosystem. For most complex software, generating these technical capabilities requires building and governing a community via sound management practices, activities that are often less visible than code contributions and other software development work. And unless the initial developers commit to doing all the needed work for a long time, a community needs to develop to sustain the software, and in many cases, to determine where the software should go. In this call, we’ll pull back the cover on some of the non-technical work that goes into building and sustaining a software project by highlighting the governance challenges projects face and the strategies they use to overcome them. In this call, we’ll pull back the cover on some of the non-technical work that goes into building and sustaining a software project by highlighting the governance challenges projects face and the strategies they use to overcome them. In growing and maintaining a project, people such as core contributors/maintainers, leaders, and community managers must develop guidelines for writing and documenting code, implement rules about licensing and distribution, determine methods for evaluating contributions to the project (e.g., onboarding processes), and provide venues for like-minded users to communicate and build working, trust-based relationships (e.g., Slack channels and discussion forums). These management practices sometimes work in a project’s favor by providing clear expectations and helplines for contributors and users; in other cases, they serve as a source of contention because they require researchers to change long-held behaviors due to conflicting definitions of software development best-practices. In this call, we’ll discuss these issues through the lens of governance. If you lead or hope to lead an open source research software project, are in charge of building a community for a project, or just want to know more about how projects are managed, please read on and join us on the call. Governance refers to the processes involved in developing and enforcing policies and norms for a given community or organization with the aim of structuring some set of activities (in this case, software development and use). Governance refers to the processes involved in developing and enforcing policies and norms for a given community or organization with the aim of structuring some set of activities (in this case, software development and use). We can, for simplicity’s sake, think of governance strategies as falling on a spectrum from “tight” to “loose.” Tight governance requires members of the organization or community to follow strict rules for carrying out their work, often by formalizing the work in the way of an assembly line. Loose governance encourages members to follow some agreed upon practices in certain aspects of their work and allows flexibility in others. A balance between routinization/standardization and flexibility is key for keeping members engaged and fostering innovation while moving a project in the desired direction (e.g., toward a larger number of users or use cases). Striking such a balance is especially difficult for open source research software projects because contributors and users come from various organizations, disciplines, and backgrounds, where norms of software practice may differ. A balance between routinization/standardization and flexibility is key for keeping members engaged and fostering innovation while moving a project in the desired direction So what are some of the different governance strategies used by robust, sustainable open source projects? We’ll discuss some examples in the call, based on qualitative, ethnographic research on several open source projects. Topics will include: How a project makes newcomers aware of their expectations and policies How a project evaluates potential contributions, reaches decisions about including the contributions in the project’s codebase or repositories, and engages with contributors in discussing such decisions What a project does to encourage and reward sound practices and contributions What the internal, day-to-day minutiae look like in an open source project, including which management activities tend to be “open” (i.e., visible to the public) and which tend to be “closed” (i.e., held in private meetings or repositories) Do you have a question or comment about this topic? Add it to the discussion thread. See a question you’d like to have answered? Give it a ❤️. We’re looking forward to a lively discussion on December 18. Agenda Welcome from Stefanie Butland, rOpenSci Community Manager, (5 min) Governance strategies for open source research software projects (Dan Sholler, 35 min) Q & A (20 min) Speaker Dan Sholler is a Postdoctoral Fellow with rOpenSci at UC BerkeleyDan on Twitter, Dan’s introduction and research plan on the rOpenSci blog
          Azure Delivers HPC Horsepower from the Cloud – Intel Chip Chat – Episode 618      Cache   Translate Page      
In this Intel Chip Chat audio podcast with Allyson Klein: Jason Stowe, Principal Group Program Manager for Hybrid and Cluster Computing at Microsoft, joins Chip Chat from Ignite 2018 to discuss enabling HPC workloads in the cloud. Stowe and his team are responsible for facilitating traditional HPC workloads atop Microsoft Azure cloud infrastructure. In this [...]
          Fostering Innovation in Today’s and Tomorrow’s HPC Community – Intel Chip Chat – Episode 616      Cache   Translate Page      
In this Intel Chip Chat audio podcast with Allyson Klein: Trish Damkroger, Vice President and General Manager of the Technical Computing Initiative at Intel, joins Chip Chat to share her unique perspective on enabling the high-performance computing (HPC) community. In addition to leading Technical Computing for Intel, Damkroger has since 2006 been a leader of [...]
          Microsoft Azure Confidential Computing with Intel at Ignite 2018 – Intel Chip Chat – Episode 614      Cache   Translate Page      
In this Intel Chip Chat audio podcast with Allyson Klein: In this episode of Intel Chip Chat, Christine Avanessians, Principal PM Manager of the Microsoft Azure Compute team at Microsoft, joins us to talk about Microsoft Azure’s Confidential Computing (ACC). ACC is a broad Microsoft initiative to protect applications and data while in use in [...]
          2019 Summer Internship Program at World Bank      Cache   Translate Page      
The World Bank Group - Established in 1944, the WBG is one of the world's largest sources of funding and knowledge for development solutions. In fiscal year 2017, the WBG committed $59 billion in loans, grants, equity investments and guarantees to its members and private businesses, of which $19 billion was concessional finance to its poorest members. It is governed by 188 member countries and delivers services out of 120 offices with nearly 15,000 staff located globally. Description The World Bank Internship Program offers highly motivated individuals an opportunity to be exposed to the mission and work of the World Bank Group in international development. The internship allows individuals to bring new perspectives, innovative ideas and latest research experience into the Bank's work and improve their skills while working in a diverse environment. An internship at the World Bank is an opportunity to learn while gaining practical experience. Interns generally find the experience to be rewarding and interesting. In addition, it is a way to enhance their CVs with practical work experience. Eligibility Criteria To be eligible for an Internship, candidates must have an undergraduate degree and be enrolled in a full-time graduate study program (pursuing a Master's or Ph.D.'s degrees with plans to return to school full-time). There is no age limit. Fluency in English is required. Knowledge of languages such as: French, Spanish, Russian, Arabic, Portuguese, and Chinese is desirable. Other skills such as computing skills are advantageous. We value diversity in our workplace, and encourage all qualified individuals, particularly women, with diverse professional and academic backgrounds to apply. Our aim is to attract and recruit the best talent in the World. Additional Information The WB Internship Program typically seeks candidates for: Operations (Front Line) in the following fields: economics, finance, human development (public health, education, nutrition, population), social sciences (anthropology, sociology), agriculture, environment, engineering, urban planning, natural resources management, private sector development, and other related fields; or Corporate support (Accounting, Communications, Human Resources Management, Information Technology, Treasury, and other corporate services). The Bank pays an hourly salary to all Interns and, where applicable, provides an allowance toward travel expenses. Interns are responsible for their own living accommodations. Most positions are in Washington, DC; few others are in World Bank Country offices. This is business driven and varies. Usually, internship opportunities are for a minimum of four weeks. The World Bank Group Internship is offered twice a year: Summer Internship (May - September): The application period is December 1 - January 31 each year. Winter Internship (November - March): The application period is October 1-31 each year. All applications must be submitted online and during the respective application period. (We do not accept applications by email.) J1 visa holders need to obtain a G4 visa abroad prior to starting employment or unpaid internship at the Bank Group.
          Recreating a huge 4004 microprocessor as art and history #OpenSource #VintageComputing #History #Hardware      Cache   Translate Page      
Via We-make-money-not-art, artist Quentin Destieu has re-created and magnified the inner architecture of the 4004 processor so that its size would display its inner workings. The objective of the project was also to create a technological support free of copyrights and working on an open source model.Created in 1971, Intel’s 4004 was the world’s first commercial microprocessor. It wasn’t […]
          Army AI Task Force Selects Carnegie Mellon as New Hub      Cache   Translate Page      

Image of an autonomous helicopter carrying a truck

Carnegie Mellon University has been selected as the hub of the United States Army's AI Task Force launched earlier this fall. The launch of the Task Force allows the Army to better connect with the broader artificial intelligence (AI) community as they focus their efforts in this constantly changing field. As the charter location for this national effort, the center based at Carnegie Mellon will engage universities and companies from across the nation and tap into the vibrant robotics and AI community in Pittsburgh.

"As the host site for this important effort, Carnegie Mellon will leverage its distinct strengths in artificial intelligence to assist the Army in building a vibrant AI innovation network with industry and university partners from across the nation," said Carnegie Mellon President Farnam Jahanian. "This partnership builds upon the university's long history of collaboration with the Department of Defense and industry partners. It is also a reflection of Pittsburgh's strengths as a hub for innovation and home to the world's top talent in emerging technologies."

"The Army is moving rapidly to develop and apply breakthroughs in AI to impact all aspects of Army operations," said Brig. Gen. Matthew Easley, director of Army Artificial Intelligence within Army Futures Command. "Carnegie Mellon is an excellent partner to help advance research and education initiatives and engage researchers throughout the nation to support and safeguard the men and women serving our nation."

The partnership will support projects responsible for the future force modernization that are initiated by the Army Futures Command. The Task Force will form agile teams of operational technical experts to rapidly develop prototype capabilities and create a talent management plan to enable the Army to hire, develop, and retain the necessary skills to support and foster AI development well into the future. Another benefit of this location is engagement with the local innovation ecosystem of defense companies, small businesses, and startups in the Pittsburgh region. The military's current priorities are for applications of artificial intelligence to equipment maintenance/logistics; situational awareness; and humanitarian assistance and disaster relief.

Carnegie Mellon's strengths in artificial intelligence span many disciplines across campus, with AI experts and researchers embedded in almost every school and college. The School of Computer Science, the first college in the world devoted solely to computing, is home to the world's first Ph.D. program in machine learning as well as the top ranked graduate program in AI. This fall, the school also launched the nation's first undergraduate degree program in artificial intelligence. CMU's expertise ranges from machine learning and language understanding to ethics and policy ramifications of emerging technologies. In 2017, a Carnegie Mellon-led team submitted the winning proposal for the Manufacturing USA Advanced Robotics for Manufacturing Institute, which also is directed by the Army and has its main site in Pittsburgh.

"Carnegie Mellon has long been a leader in fundamental research in AI, largely because of our interdisciplinary approach blending computer science, psychology, engineering, ethics and other disciplines," said Tom Mitchell, interim dean of the School of Computer Science. "This new effort will further strengthen our ability to partner with other universities, companies and government agencies to bring in even more diverse perspectives to move the field forward."

Carnegie Mellon and the Task Force will have a joint event to mark the opening of the location early in 2019.


          "Uni" 5-in-1 Lens Set, MC, for Smartphones and Tablets      Cache   Translate Page      
"Uni" 5-in-1 Lens Set, MC, for Smartphones and Tablets

"Uni" 5-in-1 Lens Set, MC, for Smartphones and Tablets


          Getting Started with Serverless Computing Using AWS Lambda      Cache   Translate Page      

With serverless computing, you can build and run applications without the need for provisioning or managing servers. Serverless computing means that you can build web, mobile, and IoT backends, run stream processing or big data workloads, run chatbots, and more. In this session, learn how to get started with serverless computing with AWS Lambda, which lets you run code without provisioning or managing servers. We introduce you to the basics of building with Lambda. As part of that, we show how you can benefit from features such as continuous scaling, built-in high availability, integrations with AWS and third-party apps, and subsecond metering pricing. We also introduce you to the broader portfolio of AWS services that help you build serverless applications with Lambda, including Amazon API Gateway, Amazon DynamoDB, AWS Step Functions, and more.

Learning Objectives:

  • Understand the benefits of serverless computing, architectures, and applications
  • Learn the basics of using AWS Lambda for running code
  • Learn basic patterns and architectures for building apps with Lambda

Suited For: Developers, Software Engineers, DevOps Engineers, IT, Architects

Speaker(s): Chris Munns, Senior Developer Advocate - Serverless, AWS



Request Free!

          eBook discusses the state of cyber security - Bizcommunity.com      Cache   Translate Page      

Bizcommunity.com

eBook discusses the state of cyber security
Bizcommunity.com
On the 30th November 1988, the Association for Computing Machinery (ACM) championed Computer Security Day. Since then technology breakthroughs have revolutionised the way we do business and communicate across borders.


          Fraud Analytics for Open Banking: Behavioral Profiling      Cache   Translate Page      

Bank on sea of data

Digital banking channels are increasingly popular, and behavioral profiling of customers is vital in preventing new types of fraud. The open banking revolution makes understanding each customer’s behavior even more important in preventing fraud by considering all the aspects of transactions. Transactions in the world of open banking contain data not previously seen in the payments ecosystem.

Behavioral profiling approaches are extremely important in tackling fraud that happens when banks share financial data with third parties through application programming interfaces. The behavioral profiling in the FICO Falcon Platform leverages historical details to track a customer’s patterns, including:

  • typical spending velocity
  • the hours and days when they tend to transact
  • which foreign countries they have transferred to before
  • favorite beneficiaries

Transaction Profiles

Transaction profiles enable FICO Falcon Platform to detect subtle, yet anomalous changes in behavior and elevate the score on the transaction. Each profile is a continuous learning cognitive “mini-model” that uses machine learning to interpret behavior in real-time.

Profiles compactly summarise each customer’s transactional history, which is too big to be retrieved when a decision has to be made in milliseconds (Figure 1). This is why we require streaming analytics.

FICO chart

Transaction profiling, applying Kalman filter principles, creates a profile for each customer. This is updated in real time, with each transaction, to account for behavioral changes.

Profiles are:

  • Recursively updated; computing the estimate for the current profile state only requires the estimated profile state from the previous transaction and the information connected with the current transaction.
  • Composed of numerous monetary and non-monetary parameters that are continuously updated to enable adaptive behavioral profiling.
  • Memory-efficient and do not require extensive storage space.

In practice, when a transaction enters the FICO Falcon Platform, the system pulls a profile connected with that transaction. The system updates the variables stored in that profile, and uses the updated profile to produce the final score, which indicates the likelihood of fraud.

Understanding Recurring Behavior

People form habits, and by looking at their transactional history we can learn their frequent behaviors. Generally, customers use the same devices, such as computer or mobile phones, go to the same online merchants and transfer money to repeated beneficiaries. These recurrences can be analysed and understood to shine further light on normal behavior, and thus on fraud.

To understand recurrences, FICO Falcon Platform maintains behavior-sorted lists or B-LISTS, which enable the system to create a real-time ranking of features associated with each customer’s most frequent behaviors.

By using machine learning, the system makes sure that only the activities that keep recurring remain in each customer’s B-LIST. Frequent activities have higher ranks and are less likely to be fraudulent.

FICO chart

In Figure 2, money transfers to the same beneficiaries have higher weights in a customer’s B-LIST and are less likely to be fraudulent. On the other hand, money transfers to destinations that are not included in the customer’s B-LIST are substantially riskier. FICO’s B-LIST technology is a powerful facet of the transaction profile.

The open banking changes, specifically the need to fight fraud and keep genuine customers happy, means that behavioral profiling at the individual customer level is crucial. Each customer’s profile, including transaction profiling and B-LIST technology, is a “mini-model” that uses machine learning in order to learn highly detailed behavioral patterns of that customer in real time.

Learn More

For more information, see my previous post on fraud analytics, and my white papers on how AI and machine learning address the open banking revolution.

The post Fraud Analytics for Open Banking: Behavioral Profiling appeared first on FICO.


          Pindrop raises $90M to bring its voice-fraud prevention to IoT devices and Europe      Cache   Translate Page      
When it comes to how humans communicate with each other or with machines, voice is a major interface, with growth in the latter fuelled by the rise of artificial intelligence, faster computing technology and an explosion of new devices — some of which only, or primarily, work with voice commands. But the supreme reign of voice has […]
          Impacted Claims Reporting Data Management Senior - (Englewood, Colorado, United States)      Cache   Translate Page      
Includes design, testing, implementation, control and maintenance of organization's logical and relational databases across platforms and computing environments. Essential Functions: - Project Management: Manages small to medium size projects. Develops and executes project plans. Provides project reporting to project sponsor under guidance of higher level resource. - Meta Data Repository: Develops data definitions consistent with data management standards and conventions. Defines meta data structures for information repository and performs model management. - Data Design (logical): Analyzes business information requirements and translates these into logical database designs. Collaborates with physical database designers to develop alternative solutions for meeting complex and conflicting requirements. Develops data definitions consistent with data management standards and conventions. Participates in model integration and convergence activities. - Database Development (physical): Develops, tests and implements the organization's physical databases across multiple platforms, technologies and computing environments. - Database Performance: Provides support to Lead in capacity planning, forecasting, and tuning. Develops performance/tuning evaluation reports. - Communications: Communicates business/information models to clients, developers and database designers. Communicates database designs to data analyst and application programming staff. - Technology Evaluation: Researches and evaluates alternative database solutions and recommends the most efficient and cost-effective solution for the project, ensuring consistency with enterprise direction. - Methodologies and Standards: Recommends development of or adoption/incorporation of new methodologies and standards for supporting information management. - Database Management and Support Tools: Implements, configures and customizes database management and support tools. - Client Consulting: Consults with clients and development areas in the design and implementation of small to medium projects. Consults with clients to determine information management requirements. - Training/Mentoring: Provides direction, guidance, and technical support to clients, applications, and operations areas. Develops technical and analytical skills of lower level resources. - Data Transformation: Designs, develops and tests complex transformation extract s and load routines. - Database Maintenance: Provides second level diagnosis and resolution of database problems. Works with vendor personnel, if necessary, to achieve timely solutions of database problems. Escalates as necessary and provides problem resolutions.
          L'immeuble du futur : une première mondiale au Grand Parc      Cache   Translate Page      
C'est dans la quartier du Grand Parc que devrait être inaugurée en fin d'année, la future Maison du Département de Gironde. Un édifice qui accueillera également les quarante-neuf logements sociaux de la Résidence Florestine de Gironde Habitat. Conçu grâce à une innovation technologique mise au point par la société Qarnot Computing, il offre notamment une solution de chauffage gratuit et écologique pour les logements et bureaux qu'il abritera. Une première mondiale dans laquelle le Département de la Gironde s'est fortement investi en raison tant des économies d'énergies générées que de l'aspect social du projet. Un chantier dont la première pierre a été posée en juillet 2017 et qui a reçu hier, la visite du Président de Département.
          How to use TensorFlow with AMD GPU's      Cache   Translate Page      

How to use TensorFlow with AMD GPU’s

Most machine learning frameworks that run with a GPU support Nvidia GPUs, but if you own a AMD GPU you are out of luck.

Recently AMD has made some progress with their ROCm platform for GPU computing and does now provide a TensorFlow build for their gpus.

Since I work with tensorflow and own a AMD GPU it was time to give it a try. I stumpled upon these instructions for TensorFlow 1.8 but since they are outdated, I decided to write down what I did.

1. Set up Linux

It looks like there is currently no ROCm support for Windows. And no, WSL aka Bash for Windows does not work. But there are packages for CentOS/RHEL 7 and Ubuntu. I used Ubuntu 18.04.

2. Install ROCm

Just follow the ROCm install instructions.

3. Install TensorFlow

AMD provides a special build of TensorFlow. Currently they support TensorFlow 1.12.0. You can build it yourself, but the most convenient way to use it, is to install the package from PyPI:

sudo apt install python3-pip 
pip3 install --user tensorflow-rocm

4. Train a Model

To test your setup you can run the image recognition task from the Tensorflow tutorials.

git clone https://github.com/tensorflow/models.git
cd models/tutorials/image/imagenet
python3 classify_image.py

and the result should look like this:

giant panda, panda, panda bear, coon bear, Ailuropoda melanoleuca (score = 0.89103)
indri, indris, Indri indri, Indri brevicaudatus (score = 0.00810)
lesser panda, red panda, panda, bear cat, cat bear, Ailurus fulgens (score = 0.00258)
custard apple (score = 0.00149)
earthstar (score = 0.00141)

Extra: Monitor your GPU

If you like to check that your model fully utilize your GPU, you can use the (radeontop)[https://github.com/clbr/radeontop] tool:

Install it with

sudo apt-get install radeontop

and run it

sudo radeontop

This will dump the statistics to the command line.

sudo radeontop -d -

          MFM Distance Learning Webinar To Provide Update on Accounting & Financial Reporting Rules and Practices      Cache   Translate Page      
Professionals from Ernst & Young LLP (EY) will discuss the latest FASB updates ranging from cloud computing to credit losses to episodic television arrangements during an upcoming webinar from MFM, the Media Financial Management Association. Scheduled for Tuesday, December 11 from 1:00 - 2:00 ...
          congatec präsentiert neue Edge-Server-Plattformen für Flugzeuge      Cache   Translate Page      
congatec präsentiert neue Edge-Server-Plattformen für Flugzeuge Toulouse, Frankreich/Deggendorf, Deutschland, 4 Dezember 2018 * * * congatec – ein führender Anbieter standardisierter und kundenspezifischer Embedded Computer Boards und Module – präsentiert auf der Aeromart Toulouse (Halle 6, Stand B24-C25) seine neuen modularen Luftfahrt-Computing-Plattformen für vernetzte

          Pindrop raises $90M to bring its voice-fraud prevention to IoT devices and Europe      Cache   Translate Page      
When it comes to how humans communicate with each other or with machines, voice is a major interface, with growth in the latter fuelled by the rise of artificial intelligence, faster computing technology and an explosion of new devices — some of which only, or primarily, work with voice commands. But the supreme reign of voice has […]
          The Pros and Cons of SD-WAN for Public Cloud Computing      Cache   Translate Page      
In this expert e-guide, we explore how SD-WAN is positioned to help keep up with the dramatic changes that public cloud has wrought on enterprise network traffic flows – but not with a blind eye. Learn about both the benefits and the pitfalls of SD-WAN in an increasingly cloud-first, digitally transformative business world. Published by: VMware and Intel
          The Gigatron – a TTL microcomputer without a microprocessor #VintageComputing #8bit      Cache   Translate Page      
One of our readers wrote in to let us know about the Gigatron TTL microcomputer, a minimalistic retro computer available today.It is special in its own oddball way, because it has absolutely no complex logic chips in it, not even a microprocessor! Instead, its CPU is built out of a handful of classic 7400-series chips, […]
          This Impressively Powerful Mini PC Is A Great Gift For Under $160      Cache   Translate Page      

Desktop computers are notorious for being bulky, towering machines that take up a ton of desk space and are no fun to transport. The Fusion C Mini PC, however, is looking to change that. You can get it on sale and save an extra 15% when you use the code MERRY15 at check out, lowering the final price to only $153.

The Fusion C is a fully realized personal computer that runs all your favorite productivity apps with ease but is small and lightweight enough that you can take it wherever you go. It’s perfect for students, business professionals on the go, and everyone in between. If you need portable computing power, the Fusion C is exactly what you’ve been searching for.

To read this article in full, please click here


          OSS Leftovers      Cache   Translate Page      
  • Bypassing Procurement Can Introduce Some Unwanted Visitors

    The federal IT procurement safety net may be developing some holes. Many federal developers are forgoing traditional software purchasing in favor of going directly to the source and downloading code from tens of millions of open source repositories and libraries. While this can certainly expedite innovation, it also has the potential to expose agencies to security risks if they’re not careful.

    This backdoor approach to code procurement can let in some unwanted visitors through that door: unknown and dangerous vulnerabilities that may have gone undetected in the code. Without the checks and balances of procurement, how can they be sure that the code they are downloading does not contain some form of malware or another bad actor? How can they stay agile while keeping their applications and networks safe?

  • Red Hat’s David Egts: Agencies Should Screen Open Source Code for Cyber Risks

    David Egts, chief technologist for Red Hat’s North American public sector, has said federal agencies should assess open source code for cyber vulnerabilities prior to adoption.

    Egts wrote in a Nextgov piece published Monday that agencies should monitor open-source libraries and repositories that developers use to download the code and deploy a code analyzer to detect memory corruptions, resources leaks and other issues that could be leveraged by adversaries.

    “Agencies can also participate in crowdsourced security initiatives designed to test the efficacy of their defenses and reinforce the notion that security must be taken seriously by everyone, including developers,” he noted.

  • 2019 Telecoms Forecast: The Year Of 5G And Open Source

    2019 looks set to be a pivotal year for the telecoms industry. 5G edges ever closer to a full launch, while new use cases in cloud computing and IoT are coming to light and driving greater-than-ever demand for high capacity, low latency connectivity.

    As we reach 2019, it’s important look at how these new demands are shaping the telecoms industry. There has been a distinct move away from just providing faster network speeds to consumers, and towards enabling a whole host of new technologies on mobile networks, meaning it’s vital for companies to assess which are simply hype, and which will lead to fruition in 2019.

  • Al Lowe reveals his Sierra source code collection—then puts all of it on eBay

     

    As of press time, Lowe has listed auctions for the first two Leisure Suit Larry games' source code, with bids already climbing (both well above the $400 mark after they went live). Lowe indicated to Lindsey that more games' code will follow on eBay, and this will likely include a stunning treasure trove: Lowe's other Leisure Suit Larry games, King's Quest III, Police Quest I, and Lowe's games based on Disney franchises Winnie The Pooh and Black Cauldron.

  • SQLite Release 3.26.0
  • SQLite 3.26 Adds Defensive Option & Optimizations

    The SQLite 3.26 release features an optimization around updates on tables with indexes on expressions, a new SQLITE_DBCONFIG_DEFENSIVE option to disable the ability to create corrupt database files with basic SQL, support for read-only shadow tables in the new defensive mode, a table_xinfo PRAGMA that can show hidden columns on virtual tables, enhanced triggers, improvements to the SQLite Geopoly extension, additions to the SQLite Session extension, and various other changes.

  • Microsoft Open Sources SEAL Homomorphic Encryption Library [Ed: This is the company that puts back doors in everything it makes, even disk encryption. Now it is openwashing this to make it a 'standard']

          Snowflake gibt allgemeine Verfügbarkeit auf Microsoft Azure in Region EMEA bekannt      Cache   Translate Page      

Anstieg internationaler Kundennachfrage für Snowflake auf Microsoft Azure stellt Cloud-Datenbanksystem deutlich mehr Kunden zur Verfügung SAN MATEO, Kalifornien, 5. Dezember 2018 /PRNewswire/ -- Snowflake Computing, das Datenbanksystem speziell für die Cloud, hat heute die allgemeine...


          So 10,500 bots can't be wrong      Cache   Translate Page      
Or can they?
I posted about my son's engagement.  Maybe the title caught someone's eye (an algorithm probably)
One commentator said they were probably bots.

Wikipedia has this to say about bots:

Malicious Bots:

A malicious use of bots is the coordination and operation of an automated attack on networked computers, such as a denial-of-service attack by a botnet. Internet bots can also be used to commit click fraud and more recently have seen usage around MMORPG games as computer game bots.[citation needed] A spambot is an internet bot that attempts to spamlarge amounts of content on the Internet, usually adding advertising links. More than 94.2% of websites have experienced a bot attack.[2]

  • There are malicious bots (and botnets) of the following types:
  1. Spambots that harvest email addresses from contact or guestbook pages
  2. Downloader programs that suck bandwidth by downloading entire websites
  3. Website scrapers that grab the content of websites and re-use it without permission on automatically generated doorway pages
  4. Viruses and worms
  5. DDoS attacks
  6. Botnetszombie computers, etc.
  • Bots are also used to buy up good seats for concerts, particularly by ticket brokers who resell the tickets.[10] Bots are employed against entertainment event-ticketing sites. The bots are used by ticket brokers to unfairly obtain the best seats for themselves while depriving the general public of also having a chance to obtain the good seats. The bot runs through the purchase process and obtains better seats by pulling as many seats back as it can.
  • Bots are often used in Massively Multiplayer Online Roleplaying Games to farm for resources that would otherwise take significant time or effort to obtain; this is a concern for most online in-game economies.[citation needed]
  • Bots are also used to increase views for YouTube videos.
  • Bots are used to increase traffic counts on analytics reporting to extract money from advertisers. A study by comScore found that 54 percent of display ads shown in thousands of campaigns between May 2012 and February 2013 never appeared in front of a human being.[11]
  • in 2012, reporter Percy von Lipinski reported that he discovered millions of bot or botted or pinged views at CNN iReport. CNN iReport quietly removed millions of views from the account of so-called superstar iReporter Chris Morrow.[12] It is not known if the ad revenue received by CNN from the fake views was ever returned to the advertisers.
  • Bots may be used on internet forums to automatically post inflammatory or nonsensical posts to disrupt the forum and anger users.
The most widely used anti-bot technique is the use of CAPTCHA, which is a form of Turing test used to distinguish between a human user and a less-sophisticated AI-powered bot, by the use of graphically-encoded human-readable text. Examples of providers include Recaptcha, and commercial companies such as Minteye, Solve Media, and NuCaptcha. Captchas, however, are not foolproof in preventing bots as they can often be circumvented by computer character recognition, security holes, and even by outsourcing captcha solving to cheap laborers.

Helpful Bots:

Companies and customers can benefit from internet bots. Internet bots are allowing customers to communicate with companies without having to communicate with a person. KLM Royal Dutch Airlines has produced a chatbot that allows customers to receive boarding passes, check in reminders, and other information that is needed for a flight.[9] Companies have made chatbots that can benefit customers. Customer engagement has grown since these chatbots have been developed.
Chat bots are used on a daily basis. Google Assistant and Siri are considered forms of chat bots. Google Assistant and Siri allow people to ask questions and get a response using an AI system. These technological advances are positively benefiting people's daily lives.

SOURCE: Wikipedia.

So the announcing post got about 2000 hits (is that the right term?)  Blogger says these are pageviews.
My other bog about pottery is the one that got 10,500 pageviews, the same day.
And the blog about living in Black Mountain NC got 1500 pageviews...same day and time.
My kind-of inactive blog about my ancestors did have a spike on the chart, of 54 pageviews.

Does anyone know if there's a problem? I worry.  I'm 76, I'm allowed to worry.
But I haven't been in a computer class, like most of my grandkids have.  

          Pentagram Has Managed To Make The Ugly Computer Chip Look Good      Cache   Translate Page      


Processing chips are often overlooked, as long as they serve their purpose of helping you surf the internet, stream videos, and game to your heart’s content. Working arduously behind the scenes, these chips almost never come with noteworthy aesthetics.

Design agency Pentagram and industrial design studio Map Project Office have embarked on a novel project to change all that for British startup Graphcore.

As cloud computing takes a larger share of the market, Graphcore chips—designed specifically to run machine learning algorithms mostly located on server farms—is determined to stand out on the increasingly-crowded server farm racks with an extremely distinguishable appearance.

According to Jon Marshall, who worked on the industrial design of the chip named ‘IPU’, the changing of technology has resulted in the increasing development of hardware. As such, visibility for consumer brands on server racks is increasing in demand.

With this in mind, the company embarked on a series of plastic tiles that are easily installed on the Graphcore microprocessor—similar to how a LEGO brick works.

Each of the plastic tiles has an algorithmically generated pattern and their colors alternate between pink, navy blue and pale blue. The tiles are also embossed with subtle geometric shapes.

This willingness to be unique in something which is typically utilitarian encourages a brand new way to market your products in a historically bland market.

Additionally, the ability to differentiate the microprocessors enables IT engineers to locate the said chips with greater efficiency.

Scroll down to take a look at the unique designs.

Pentagram partners @LJ_HUDSONPOWELL & @jonmarshalll have collaborated on the industrial design of @graphcoreai’s intelligent processing unit (IPU) and Rack Mount Chassis, translating the tech startup's dynamic identity into highly customisable hardware. pic.twitter.com/opjrcH2Dpn

— Pentagram Design (@pentagram) November 26, 2018












[via Fast Company, images via Pentagram]
          Senior Software Engineer - Security and Platform Distribution - Cray - Bloomington, MN      Cache   Translate Page      
Who is Cray? Our business is supercomputing. We are seeking an engineer in Cray R&amp;D who is responsible for the distributions of Linux used in Cray Products and...
From Cray - Tue, 30 Oct 2018 20:18:46 GMT - View all Bloomington, MN jobs
          Artificial Intelligence Solutions Architect Team Lead - Cray - San Jose, CA      Cache   Translate Page      
This position is responsible for understanding and complying with Cray internal controls. Our business is supercomputing....
From Cray - Thu, 13 Sep 2018 02:18:21 GMT - View all San Jose, CA jobs
          Will Quantum Computing Break Blockchain?      Cache   Translate Page      
Recent research on quantum computing has shown that in the coming years, quantum computers will be able to break blockchain encryption.
          Don’t go overboard at the edge in edge computing      Cache   Translate Page      

The whole idea of edge computing is to push some processing and data retention out to the edge of the network. As we move to internet of things (IoT) devices that are gathering gobs of data, it makes sense to process that data close to where it’s gathered. In some cases—like managing a jet engine—you want to return results directly from the edge device, reducing the need for bandwidth and decreasing response latency.

Today, most major public cloud providers are pushing their own edge computing services. But pushing everything out the edge is not always possible—and not always a good idea.

To read this article in full, please click here


          Hewlett Packard Envy Photo 6230 Inkjet Printer, Black      Cache   Translate Page      
Hewlett Packard Envy Photo 6230 Inkjet Printer, Black

Hewlett Packard Envy Photo 6230 Inkjet Printer, Black


          Helvetia Seguros launches Watson-powered virtual assistant to support sales staff      Cache   Translate Page      

Everyone knows that sinking feeling: to get to the information you want on a website, you’re presented with a long form with dozens of questions. It’s a real turn-off for customers. In general, around 51 percent of customers will not fill out a long form once they see it. But this is still how many […]

The post Helvetia Seguros launches Watson-powered virtual assistant to support sales staff appeared first on Cloud computing news.


          Snowflake gibt allgemeine Verfügbarkeit auf Microsoft Azure in Region EMEA bekannt      Cache   Translate Page      

Snowflake Computing (https://snowflake.com/), das Datenbanksystem speziell für die Cloud (https://www.snowflake.com/product), hat heute die allgemeine Verfügbarkeit von Snowflake auf Microsoft Azure in Europa bekannt gegeben. Diese Expansion spiegelt die steigende Nachfrage der Kunden nach Snowflake auf Azure in Europa wieder, welche dem Bedarf großer Organisationen entspricht, in der Auswahl einer Cloud-Plattform flexibel zu sein, die Tätigkeit […]

Der Beitrag Snowflake gibt allgemeine Verfügbarkeit auf Microsoft Azure in Region EMEA bekannt erschien zuerst auf IT-I-Ko.


          Video: Oracle Steps Up with Bare Metal for HPC Cloud Infrastructure      Cache   Translate Page      

In this video from SC18 in Dallas, Taylor Newill from Oracle describes the company's new Bare Metal for HPC Cloud Infrastructure. "Oracle Bare Metal Cloud Services (BMCS) public cloud infrastructure. Oracle BMCS is a new generation of scalable, inexpensive and performant compute, network and storage infrastructure that combines internet cloud scale architecture with enterprise scale-up bare metal capabilities, providing the ideal platform for demanding High Performance Computing workloads."

The post Video: Oracle Steps Up with Bare Metal for HPC Cloud Infrastructure appeared first on insideHPC.


           Comment on The General Purpose Blocks Programming Language, GP, is now in beta by MicroBlocks Joins Conservancy #CSEdWeek | Computing Education Research Blog       Cache   Translate Page      
[…] is great news for fans of GP and John Maloney’s many cool projects. MicroBlocks is a form of GP. This means that GP can be […]
          Snowflake gibt allgemeine Verfügbarkeit auf Microsoft Azure in Region EMEA bekannt      Cache   Translate Page      
Snowflake Computing: San Mateo, Kalifornien (ots/PRNewswire) - Anstieg internationaler Kundennachfrage für Snowflake auf Microsoft Azure stellt Cloud-Datenbanksystem deutlich mehr Kunden zur Verfügung Snowflake Computing, das Datenbanksystem speziell für die Cloud, hat ...
          Snowflake gibt allgemeine Verfügbarkeit auf Microsoft Azure in Region EMEA bekannt      Cache   Translate Page      
Snowflake Computing: Anstieg internationaler Kundennachfrage für Snowflake auf Microsoft Azure stellt Cloud-Datenbanksystem deutlich mehr Kunden zur Verfügung San Mateo, Kalifornien (ots/PRNewswire) - Snowflake Computing (https://snowflake.com/), das Datenbanksystem ...
          Incident and Problem Management Manager at Huawei Technologies Company (Nigeria) Limited      Cache   Translate Page      
<p>Huawei is a leading global ICT solutions provider. Through our dedication to customer-centric innovation and strong partnerships, we have established end-to-end capabilities and strengths across the carrier networks, enterprise, consumer, and cloud computing fields. Our products and solutions have been deployed in over 170 countries, serving more than one third of the worldand#39;s population.a

          Comment on Social Computing Training Is All About Changing People’s Behaviours by Liens de la semaine (weekly)      Cache   Translate Page      
[…] The trick then becomes 1) Aggregating the user experience of both styles of collaboration as to not add clutter to already inundated employees and 2) Education on easily identifying the unique merits of each method and how to make choices to maximize…. […]
          Accountant at Descasio Nigeria      Cache   Translate Page      
<p>Descasio is the leading cloud computing solutions provider in the sub region. We are the bridge between cloud based solutions and legacy On-Premise solutions. We harness cloud-computing technologies by helping organizations of all sizes dramatically improve employee productivity and focus on key business operations by removing the need for expertise and cost of expensive IT Infrastructure and p

          Practice Doesn’t Always Make Perfect      Cache   Translate Page      
Why Your Race Is a Puzzle, and How to Solve It. Practice Doesn’t Always Make Perfect

Apple made a great leap forward in communications and mobile computing in 2007 when it launched the iPhone. It couldn’t have done this by sticking to all the things that made it a pioneer in desktop computing.

The company tried to launch the Newton handheld computer in 1993. The product failed and this setback stung. It took years after for the company to accept that mobile computing would become reality and that any device it produced would eventually cannibalize sales of its then-flagship Macintosh computer line.

Continue reading Practice Doesn’t Always Make Perfect at Michael Hyatt.


          Microsoft open-sources WPF, Windows Forms, and WinUI; opens up the .NET Foundati ...      Cache   Translate Page      

At its Microsoft Connect(); 2018 virtual event today, Microsoft made some open source announcements, as is now common at the company’s developer shindigs. Microsoft open-sourced three popular windows UX frameworks on GitHub: Windows Presentation Foundation (WPF) , Windows Forms , and Windows UI XAML Library (WinUI) . Additionally, Microsoft announced the expansion of the .NET Foundation ‘s membership model.

The open-sourcing of WPF, Windows Forms, and WinUI means developers can contribute new features back to each framework, debug and fix issues that impact their apps, build a private copy of the UI stack, and of course report bugs and other issues.

WPF isn’t being completely open-sourced immediately ― Microsoft says it is starting with some smaller components first (System.Xaml) ― but Windows Forms and WinUI are fully open source starting today.

.NET Foundation

Starting today, the governance, participation, and projects of the .NET Foundation are open to anyone in the open source community. Microsoft is letting members of the community directly guide foundation operations.

(Speaking of .NET, Microsoft today released Visual Studio 2019 Preview 1, .NET Core 2.2, and .NET Core 3.0 Preview 1 .)

At its Build 2014 developer conference, Microsoft created the .NET Foundation, a group for overseeing the open-sourcing of .NET. In March 2016, Microsoft formed the Technical Steering Group to share the direction of .NET’s core components with other companies and interested parties. Unity, JetBrains, and Red Hat joined the foundation at that point, and Samsung followed in June. In November 2016, Google joined the .NET Foundation , at which point hell completed its process of freezing over.

In addition to existing members, the .NET Foundation today welcomed Pivotal, Progress Telerik, and Insight Enterprises. The board is expanding from three seats to seven, including a member appointed by Microsoft. Board elections will begin in January.

Microsoft promises that anyone who has contributed in any way to any .NET Foundation open source project is eligible to vote. The hope is that this new structure will help the .NET Foundation scale to meet the needs of the growing .NET open source ecosystem.

Microsoft made other open source announcements at today’s event. Along with Docker, Microsoft announced an open source, cloud-agnostic specification for packaging and running distributed applications called Cloud Native Application Bundle (CNAB) . Microsoft donated Virtual Kubelet, an open source application that makes it easier for developers to connect a Kubernetes node with other services, to the Cloud Native Computing Foundation (CNCF). And finally, Microsoft open-sourced Open Neural Network Exchange (ONNX) Runtime, a high-performance inference engine for machine learning models.


          How Docker plans to help businesses get around Windows Server 2008      Cache   Translate Page      

Containerisation can help business move applicationslift and shift legacy windows Server 2008, and Docker regards this as a big opportunity . The Microsoft server operating system reaches end of support after 14 January 2020.

During his keynote presentation at Dockercon in Barcelona, Steve Singh, CEO and chairman, Docker, said: “Legacy systems have critical data, but they are siloed. You need to leverage this data, and deliver innovation in real time through a continuous improvement cycle. This requires a brand new mindset and a next generation computing platform to unleash innovation.”

Containers provide the platform on which organisations can speed up innovation using DevOps. According to analyst Forrester, many companies use enterprise container platforms, mainly to speed up software development and mature software development and IT operations.

Singh said the goal of the Docker container platform is to deliver a platform that enables innovation at a global scale. “Containers are everywhere. Software containers will be at heart of innovation in fourth industrial revolution.”

Part of this innovation involves encapsulating legacy applications in containers and using application programming interfaces (APIs) to access core services built into these applications in a controlled manner.

This is one of the key benefits for enterprises, according to Forrester’s New Wave forcontainer platforms published in October 2018. “An enterprise container platform is popular for modernising both traditional and microservices applications.

“Docker offers a secure container supply chain from the developer’s desktop to production and simplifies multi-OS and multischeduler container clusters,” Forrester’s New wave for enterprise container platform software suites, Q4 2018 report said.

Read more about containerisation Windows-only Docker Enterprise Edition prospects struggle with linux requirements and a shift to a container-first mindset as they plan to modernise legacy Microsoft applications. Docker and Windows are now compatible , but there's more work to do before they will provide everything a developer needs. Expert Christopher Tozzi breaks down the issues.

According to Singh, 85% of IT budgets are already spent on maintaining existing systems. IT needs to reduce this cost to free up budget for innovation. For Singh, one way this can be achieved is to use containers. “Containerised legacy IT makes it easier to manage,” he said.

Estimates from Docker suggest 70% of Windows .Net code run on legacy Windows Server 2003 and Server 2008 software. The challenge for IT, according to a Docker blog post, is that there are software dependencies in these applications, that mean they cannot easily be shifted to a modern server operating system platform like Windows Server 2019, as this would cause application incompatibility issues.

Docker regards end of support of Windows Server 2008 as a big opportunity to use its Docker Enterprise platform to run these old applications in their own Docker containers on top of supported server environments like Windows Server 2016 or Windows Server 2019. The legacy code effectively runs in the environment it has always used such as Windows Server 2008 but the container is actually running on a modern platform like Windows Server 2019.

In November, Docker announced the Windows Server Application Migration Program. At the time, Scott Johnston, chief product officer for Docker, said: “Windows Server customers come to us for help designing a container strategy for their legacy applications that will help mitigate end of support issues.

“Through this programme, many customers experience a 50% reduction in the total cost of ownership (TCO) of applications using Docker Enterprise, freeing up budget for strategic IT initiatives such as cloud migration or edge computing.”

Consumer demand driving change

In a demonstration at the Dockercon Barcelona conference, Raj Mistry, head of MuleSoftfor Emea, discussed how a Windows Server 2008 e-commerce application could be migrated to the latest Windows Server 2019 release using a Docker container and theMuleSoft API gateway.

“Our demand as consumers is driving companies to do things differently. IT isn’t working,” he said. “How do you unlock internal data and externalise it for an ecosystem to future proof it?”

Through a new partnership with Docker, he showed how MuleSoft could be used to access the legacy application.

For Singh, customers can begin by containerising legacy code using Docker Enterprise. But over time, he hopes they will start to make use of additional features, such as the tie-up with MuleSoft,which enables the containerised legacy applications to be part a modern application architecture.

Once implemented, the Docker Enterprise container platform and methodologies enable organisations to both modernise existing applications and adopt new technologies based on business requirements and customer needs.

Docker Enterprise enables companies to standardise the software platform and adopt new technology stacks and architectures without changing how they operate.

According to Docker, Docker Enterprise enables organisations to have a secure, repeatable model that does not lock them into a specific infrastructure or cloud, enabling companies to modernise applications and adopt new technologies as business requirements evolve.


          Getting Started with Serverless Computing Using AWS Lambda      Cache   Translate Page      

With serverless computing, you can build and run applications without the need for provisioning or managing servers. Serverless computing means that you can build web, mobile, and IoT backends, run stream processing or big data workloads, run chatbots, and more. In this session, learn how to get started with serverless computing with AWS Lambda, which lets you run code without provisioning or managing servers. We introduce you to the basics of building with Lambda. As part of that, we show how you can benefit from features such as continuous scaling, built-in high availability, integrations with AWS and third-party apps, and subsecond metering pricing. We also introduce you to the broader portfolio of AWS services that help you build serverless applications with Lambda, including Amazon API Gateway, Amazon DynamoDB, AWS Step Functions, and more.

Learning Objectives:

  • Understand the benefits of serverless computing, architectures, and applications
  • Learn the basics of using AWS Lambda for running code
  • Learn basic patterns and architectures for building apps with Lambda

Suited For: Developers, Software Engineers, DevOps Engineers, IT, Architects

Speaker(s): Chris Munns, Senior Developer Advocate - Serverless, AWS



Request Free!

          Pindrop raises $90M to bring its voice-fraud prevention to IoT devices and Europe      Cache   Translate Page      
When it comes to how humans communicate with each other or with machines, voice is a major interface, with growth in the latter fuelled by the rise of artificial intelligence, faster computing technology and an explosion of new devices — some of which only, or primarily, work with voice commands. But the supreme reign of voice has […]
          Infrastructure As A Service (IaaS) Market by Top Manufacturers – IBM, Oracle, Microsoft, Rackspace, Fujitsu, NTT Communications, Amazon Web Services, Vmware, Computer Sciences, Virtustream      Cache   Translate Page      
Infrastructure As A Service (IaaS) Market by Top Manufacturers – IBM, Oracle, Microsoft, Rackspace, Fujitsu, NTT Communications, Amazon Web Services, Vmware, Computer Sciences, Virtustream Infrastructure as a service (IaaS) refers to online services that provide high-level APIs used to dereference various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc. Pools of hypervisors within the cloud

          Latest Issue of Mouser’s Methods Technology E-zine Explores Smarter Edge Computing for IoT      Cache   Translate Page      
December 4, 2018 – Mouser Electronics, Inc., the New Product Introduction (NPI) leader empowering innovation, announces the newest issue of its …
          Azure Delivers HPC Horsepower from the Cloud – Intel Chip Chat – Episode 618      Cache   Translate Page      
In this Intel Chip Chat audio podcast with Allyson Klein: Jason Stowe, Principal Group Program Manager for Hybrid and Cluster Computing at Microsoft, joins Chip Chat from Ignite 2018 to discuss enabling HPC workloads in the cloud. Stowe and his team are responsible for facilitating traditional HPC workloads atop Microsoft Azure cloud infrastructure. In this [...]
          Fostering Innovation in Today’s and Tomorrow’s HPC Community – Intel Chip Chat – Episode 616      Cache   Translate Page      
In this Intel Chip Chat audio podcast with Allyson Klein: Trish Damkroger, Vice President and General Manager of the Technical Computing Initiative at Intel, joins Chip Chat to share her unique perspective on enabling the high-performance computing (HPC) community. In addition to leading Technical Computing for Intel, Damkroger has since 2006 been a leader of [...]
          Microsoft Azure Confidential Computing with Intel at Ignite 2018 – Intel Chip Chat – Episode 614      Cache   Translate Page      
In this Intel Chip Chat audio podcast with Allyson Klein: In this episode of Intel Chip Chat, Christine Avanessians, Principal PM Manager of the Microsoft Azure Compute team at Microsoft, joins us to talk about Microsoft Azure’s Confidential Computing (ACC). ACC is a broad Microsoft initiative to protect applications and data while in use in [...]
          Does AI pose a threat to society?      Cache   Translate Page      

This event took place on 1 Mar 2017 at UWE Exhibition and Conference Centre, Bristol, as part of the British Academy's season on Robotics, AI and Society.

The idea of a robotic takeover - a staple of Hollywood sci-fi - taps into the fear that machines will eventually surpass humans in general intelligence. Yet does artificial intelligence really pose a risk to society, especially when current technology is nowhere near those science fiction scenarios and when AI actually offers many opportunities, in areas ranging from transportation to medicine? We ask whether recent developments in AI technology raise fresh concerns, if these fears are justified, and how they might be addressed.

Speakers:
Professor Christian List FBA, Professor of Political Science and Philosophy, LSE
Professor Maja Pantic, Professor of Affective and Behavioural Computing, Imperial College London
Samantha Payne, CEO, Open Bionics
Professor Alan Winfield, Professor of Robot Ethics, Bristol Robotics Laboratory, UWE Bristol

Chair:
Dr Claire Craig, Director of Policy, The Royal Society

Does AI pose a threat to society?This event took place on 1 Mar 2017 at UWE Exhibition and Conference Centre, Bristol, as part of the British Academy's season on Robotics, AI and Society. The idea of a robotic takeover - a staple of Hollywood sci-fi - taps into the fear that machines will eventually surpass humans in general intelligence. Yet does artificial intelligence really pose a risk to society, especially when current technology is nowhere near those science fiction scenarios and when AI actually offers many opportunities, in areas ranging from transportation to medicine? We ask whether recent developments in AI technology raise fresh concerns, if these fears are justified, and how they might be addressed.RoboticsBritish Academy Debateshttps://www.youtube.com/watch?v=jotAih7adWQDoes AI pose a threat to society?
          Does AI pose a threat to society?      Cache   Translate Page      

This event is part of the British Academy's season on Robotics, AI and Society

The idea of a robotic takeover - a staple of Hollywood sci-fi - taps into the fear that machines will eventually surpass humans in general intelligence. Yet does artificial intelligence really pose a risk to society, especially when current technology is nowhere near those science fiction scenarios and when AI actually offers many opportunities, in areas ranging from transportation to medicine? We ask whether recent developments in AI technology raise fresh concerns, if these fears are justified, and how they might be addressed.

Speakers:
Professor Christian List FBA, Professor of Political Science and Philosophy, LSE
Professor Maja Pantic, Professor of Affective and Behavioural Computing, Imperial College London
Samantha Payne, CEO, Open Bionics
Professor Alan Winfield, Professor of Robot Ethics, Bristol Robotics Laboratory, UWE Bristol

Chair: 
Dr Claire Craig, Director of Policy, The Royal Society

With thanks to the University of the West of England

Organised in partnership with:

Media partner:

The idea of a robotic takeover - a staple of Hollywood sci-fi - taps into the fear that machines will eventually surpass humans in general intelligence. Yet does artificial intelligence really pose a risk to society, especially when current technology is nowhere near those science fiction scenarios and when AI actually offers many opportunities, in areas ranging from transportation to medicine? We ask whether recent developments in AI technology raise fresh concerns, if these fears are justified, and how they might be addressed.Wednesday, March 1, 2017 - 18:30 to 20:00UWE Exhibition and Conference Centre, North Entrance, Frenchay Campus, Filton Road, Bristol, BS34 8QZhttps://www.eventbrite.co.uk/e/does-ai-pose-a-threat-to-society-tickets-29404971060RoboticsBritish Academy DebatesDebateDoes AI pose a threat to society?Does AI pose a threat to society?SociologyPhilosophyPolitics
          Getting Started with Serverless Computing Using AWS Lambda      Cache   Translate Page      

With serverless computing, you can build and run applications without the need for provisioning or managing servers. Serverless computing means that you can build web, mobile, and IoT backends, run stream processing or big data workloads, run chatbots, and more. In this session, learn how to get started with serverless computing with AWS Lambda, which lets you run code without provisioning or managing servers. We introduce you to the basics of building with Lambda. As part of that, we show how you can benefit from features such as continuous scaling, built-in high availability, integrations with AWS and third-party apps, and subsecond metering pricing. We also introduce you to the broader portfolio of AWS services that help you build serverless applications with Lambda, including Amazon API Gateway, Amazon DynamoDB, AWS Step Functions, and more.

Learning Objectives:

  • Understand the benefits of serverless computing, architectures, and applications
  • Learn the basics of using AWS Lambda for running code
  • Learn basic patterns and architectures for building apps with Lambda

Suited For: Developers, Software Engineers, DevOps Engineers, IT, Architects

Speaker(s): Chris Munns, Senior Developer Advocate - Serverless, AWS



Request Free!

          Google Wave: Social Networking or Cloud Computing?      Cache   Translate Page      

What will Google Wave's primary power be in? Will it be Social Networking and thus competing with Facebook or will it be Cloud Computing and thus computing with Microsoft Live and Yahoo? Just a note for anyone reading this and willing to give his / her opinion.

To get more information about Google's Wave, visit the URL below:
https://wave.google.com/wave


          Post-doctoral Fellowship - CSIR - Pretoria, Gauteng      Cache   Translate Page      
Implement climate model simulations on national computer infrastructures such as the Centre for High Performance Computing, for the purpose of generating...
From CSIR - Fri, 16 Nov 2018 13:36:44 GMT - View all Pretoria, Gauteng jobs
          Australia races towards commercial quantum computing      Cache   Translate Page      
none
          Best Linux Marketing Campaigns      Cache   Translate Page      

I have long held the opinion that one of the biggest problems holding back Linux-based systems from dominating (market-share-wise) in the desktop computing space...is marketing. Our lack of attention-grabbing, hearts-and-minds-winning marketing is, in my oh-so-humble opinion, one of the most glaring weaknesses of the Free and Open Source Software world.

But, in a way, me saying that really isn't fair.

The reality is that we have had some truly fantastic marketing campaigns through the years. A few even managed to break outside of our own Linux-loving community. Let's take a stroll through a few of my favorites.

From my vantage point, the best marketing has come from two places: IBM (which is purchasing Red Hat) and SUSE. Let's do this chronologically.

IBM's "Peace. Love. Linux."

Back in 2001, IBM made a major investment in Linux. To promote that investment, obviously, an ad campaign must be launched! Something iconic! Something catchy! Something...potentially illegal!

Boy, did they nail it.

"Peace. Love. Linux." Represented by simple symbols: peace sign, a heart and a penguin, all in little circles next to each other. It was visually pleasing, and it promoted happiness (or, at least, peace and love). Brilliant!

IBM then paid to have more than 300 of these images spray-painted across sidewalks all over San Francisco. The paint was supposed to be biodegradable and wash away quickly. Unfortunately, that didn't happen—many of the stencils still were there months later.

And, according to the mayor, "Some were etched into the concrete, so, in those cases, they will never be removed."

The response from the city was...just as you'd expect.

After months of discussion, the City of San Francisco fined Big Blue $100,000, plus any additional cleanup costs, plus legal fees.

On the flip-side, the stories around it made for a heck of a lot of advertising!

IBM's "The Kid"

Remember the Linux Super Bowl ad from IBM? The one with the little boy sitting in a room of pure white light?

"He's learning. Absorbing. Getting smarter every day."

When that hit in 2004, it was like, whoa. Linux has made it. IBM made a Super Bowl ad about it!

"Does he have a name? His name...is Linux."

That campaign included Penny Marshall and Muhammad Ali. That's right. Laverne from Laverne & Shirley has endorsed Linux in a Super Bowl ad. Let that sink in for a moment.


          Double Shot #2229      Cache   Translate Page      
 A Fresh Cup : Announcing the Bitnami Kubernetes Production Runtime (BKPR) Standardized monitoring, alerting, and HTTP ingress services out of the box. Firecracker 'Secure and fast microVMs for serverless computing' aka the technology behind AWS Lambda. What's in a Docker image? An investigation of what's in that mysterious file. Google Container Put your Goo
          Business Development for Artificial Intelligence and Accelerated Computing - Amazon.com - Seattle, WA      Cache   Translate Page      
AWS is seeking a Business Development Manager (BDM) to drive our Accelerated Computing Business. AWS customers are looking for ways to change their business...
From Amazon.com - Thu, 22 Nov 2018 01:19:18 GMT - View all Seattle, WA jobs
          Principal Business Development Manager, High Performance Computing - Amazon.com - Seattle, WA      Cache   Translate Page      
AWS is seeking a Business Development Manager (BDM) to support our Emerging Technology and High-Performance Computing (HPC) business....
From Amazon.com - Thu, 15 Nov 2018 07:37:36 GMT - View all Seattle, WA jobs
          Software licensing: The blind spot in public cloud costs      Cache   Translate Page      

Over the last five years, as enterprise IT teams have implemented better cloud governance, they have moved from “cloud bill shock” to actively managing and optimizing their public cloud spend. In fact, the RightScale 2018 State of the Cloud Report found that optimizing cloud costs is the top initiative for the second year in a row for all cloud users.

However, the additional costs of licensed software running on public cloud instances is still a blind spot for many organizations. In some cases, the cost of the licensed software may far exceed the cost of the cloud infrastructure on which it runs. Cloud has also become a hub for applications that connect to edge devices for mobile and IoT. These edge devices may also run licensed software components that need to be included in the overall cost of a service. Without a complete picture of all of the costs of cloud workloads, including software license costs, organizations risk ballooning costs caused by un-optimized spend.

To read this article in full, please click here

(Insider Story)
          Docker, Microsoft unveil deployment standard for cloud-native applications      Cache   Translate Page      

Microsoft and Docker have jointly announced a new project to create “an open-source, cloud-agnostic specification for packaging and running distributed applications,” according to Microsoft’s press notes.

A Cloud Native Application Bundle (CNAB), as it’s called, provides a standard way for developers to package and run containerized applications in many computing environments, from Docker on a workstation to Kubernetes in a cloud instance.

CNAB’s specification describes “bundles,” or groups of resources that constitute an application. Bundles also describe how apps are to be installed, upgraded, or removed, and how they are to be moved between environments, even when the target environment isn’t online (e.g., an air-gapped system). Microsoft claims it will be possible to digitally sign and verify app bundles “even when the underlying technology doesn’t natively support it.” Bundles can be deployed within organizations or at large by way of existing distribution systems, such as Docker Hub and Docker Trusted Registry.

To read this article in full, please click here


          Don’t go overboard at the edge in edge computing      Cache   Translate Page      

The whole idea of edge computing is to push some processing and data retention out to the edge of the network. As we move to internet of things (IoT) devices that are gathering gobs of data, it makes sense to process that data close to where it’s gathered. In some cases—like managing a jet engine—you want to return results directly from the edge device, reducing the need for bandwidth and decreasing response latency.

Today, most major public cloud providers are pushing their own edge computing services. But pushing everything out the edge is not always possible—and not always a good idea.

To read this article in full, please click here


          Full Time Staff Pharmacist - Woodstock, Ontario - Loblaw Companies Limited - Woodstock, ON      Cache   Translate Page      
Bachelor of Science, Pharmacy and a Class A Pharmacists license a must. Strong personal computing skills, as well as knowledge of KROLL Pharmacy Computer system...
From Loblaw Companies Limited - Fri, 23 Nov 2018 02:02:18 GMT - View all Woodstock, ON jobs
          Marketing Coordinator - Dedicated Computing - Waukesha, WI      Cache   Translate Page      
Leverage Salesforce, Social Media, and HubSpot to disseminate actionable information. Advanced experience with Microsoft Office, Salesforce, and Marketing...
From Dedicated Computing - Mon, 29 Oct 2018 16:25:34 GMT - View all Waukesha, WI jobs
          415,000 routers worldwide hijacked to secretly mine cryptocurrency      Cache   Translate Page      

Researchers have discovered over 415,000 routers across the globe have been infected with malware designed to steal their computing power and secretly mine cryptocurrency.

The attack, which is still ongoing, affects MikroTikrouters in particular. For the record, the string of crypto-jacking attacks on the brand first began in August, when security experts discovered over 200,000 devices had been infected. The number has more than doubled since then.


415,000 routers worldwide hijacked to secretly mine cryptocurrency
415,000 routers worldwide hijacked to secretly mine cryptocurrency
415,000 routers worldwide hijacked to secretly mine cryptocurrency
415,000 routers worldwide hijacked to secretly mine cryptocurrency
415,000 routers worldwide hijacked to secretly mine cryptocurrency
415,000 routers worldwide hijacked to secretly mine cryptocurrency

While the majority of affected devices was initially concentrated in Brazil, data suggests there are tons of affected devices worldwide.

It is worth pointing out that the number of breacheddevices might be slightly off, since the data reflects IP addresses known to have been infected with crypto-jacking scripts. Still, the total amount of compromised routers is still pretty high.

“I t wouldn’t surprise me if the actual number of actual infected routers in total would be somewhere around 350,000 to 400,000,” security researcher VriesHD told Hard Fork.

Interestingly, while attackersused to favor CoinHive a mining software for privacy-oriented cryptocurrency Monero (XMR) the researcher notes there has been a significant shift to other mining software.

“ CoinHive, Omine, and CoinImp are the biggest services used,” VriesHD told Hard Fork. “It used to be like 80-90 percent CoinHive, but a big actor has shifted to using Omine in recent months.”

Cryptocurrency mining malware epidemic

The swath of compromised routers was first discovered in August, after researchers reportedover 200,000 devicesin Brazil had been hijacked to secretly mine cryptocurrency.

By September, the total number of vulnerable devices had increased to a staggering 280,000 .

The good thing is that there is something victims can do to protect themselves. Security expert Troy Mursch from Bad Packets Report advises owners of the affected MikroTik devices to immediately download the latest firmware version available for their device.

VriesHD additionally points out that internet service providers (ISPs) can also help battle the spread of malware by forcing over-the-air updates to the routers.

“ Users should indeed update their routers, yet the biggest bunch of them are distributed by ISPs to their customers, who often have no idea what to do or how to update the router,” the researcher told Hard Fork. “Often these distributed routers are limited in their rights as well, not allowing users to update the routers themselves.”

“The patch for this specific problem has been out for months and I’ve seen ISPs with thousands of infections disappear from the list,” he added. Unfortunately, it appears tons of ISPs simply won’t take action to mitigate the attacks.

You can find the latest version of RouterOS on MikroTik’s website here .

Published December 4, 2018 ― 17:38 UTC


          Tech Data Partners With Seagate For Value-Added Cloud Storage Solutions      Cache   Translate Page      
Global Computing Components (GCC), a specialized solution business of Tech Data (Nasdaq: TECD) providing specialized component-based solutions, today announced that it has signed a first-of-its-kind distribution agreement for the U.S. and Canada with Seagate Enterprise Data Solutions (EDS).
          Incontro AUSED: quale strategia di sourcing perseguire?      Cache   Translate Page      

f-t-logoIl nono appuntamento con i “First Thursday” del 2018 propone un incontro sul tema delle strategie di sourcing
Giovedì 13 dicembre l’associazione AUSED organizza presso il Centro Copernico di via Copernico 38 a Milano (zona Stazione Centrale) il nono First Thursday dal titolo “Quale strategia di sourcing perseguire?”
Per iscrizioni: https://goo.gl/YvHbCS
Come più volte ricordato durante l’anno, ogni mese l’AUSED propone un tema di confronto tra CIO, sistema dell’offerta e mondo della ricerca. Si tratta di incontri informali, senza microfoni, fotografi o scalette predefinite, per condividere esperienze e idee gustando insieme un buon aperitivo nella cornice dello Spazio Copernico. Il prossimo appuntamento del 13 dicembre sarà dedicato alle strategie di sourcing.
Su questo tema la Direzione IT ricopre un ruolo di primaria importanza a supporto del percorso di Digital Transformation e, tipicamente, si trova a doversi giostrare tra necessità “tradizionali” di continuità, affidabilità, sicurezza ed esigenze di innovazione, velocità, flessibilità, che spesso richiedono l’adozione di nuovi paradigmi tecnologici e modalità di lavoro.
Per far fronte a questa complessità e abilitare nel contempo la trasformazione, il sourcing rappresenta una leva fondamentale a garanzia di scalabilità, accesso a competenze, flessibilizzazione dei costi. Per trasformare questa leva in un alleato è però necessario avere chiarezza rispetto alla strategia di sourcing da perseguire, saper adottare le opportune modalità per gestire al meglio la relazione con i partner tecnologici e avere piena consapevolezza degli impatti dell’introduzione di attori terzi in azienda. Infatti, i principali trend nelle politiche di sourcing e le offerte derivanti dalle nuove forme di Outsourcing e Cloud Computing rappresentano opportunità da cogliere con le dovute cautele, a causa di rischi ad esse connessi che, oltre alle consuete problematiche e dinamiche contrattuali che emergono nei processi di negoziazione, si infittiscono alla luce delle più recenti normative in materia.
Obiettivi
  • Indagare le componenti che caratterizzano la spesa delle Direzione IT e le implicazioni a livello di organizzazione e strategie di sourcing;
  • Presentare i modelli per la gestione dell’innovazione digitale e metodologie per la valorizzazione delle competenze interne;
  • Approfondire le criticità nella negoziazione di un contratto per l’acquisto di servizi in cloud, anche in relazione al GDPR (Regolamento UE 2016/679);
  • Presentare le modalità di gestione dei Cyber Risk e valutazione degli investimenti di prevenzione e/o protezione.
Relatori:

Marco Pozzoni | Partner|P4I
Carlo Leggio | Senior Consultant|P4I
Gabriele Faggioli | CEO P4I
Anna Italiano Senior Legal Consultant | P4I
Luca Bechelli Information & Cyber Security Advisor | P4I
Moderatore:
Alessandro Caleffi | CIO Guna Spa |
Al termine aperitivo conviviale.
N.B. Per un confronto produttivo il numero massimo degli ammessi è di 20 con priorità per i CIO Soci AUSED.

          macOS 10.14 Mojave Release Notes      Cache   Translate Page      
October 9, 2018
After weeks of testing, Information Systems & Computing (ISC) believes macOS 10.14 Mojave is safe for general use.
          Win the new Sonos One speaker with Amazon Alexa in Simply’s ultimate tech gift guide      Cache   Translate Page      
Consider Simply Computing your one-stop-shop for all your holiday shopping needs
 

          eBook discusses the state of cyber security - Bizcommunity.com      Cache   Translate Page      

Bizcommunity.com

eBook discusses the state of cyber security
Bizcommunity.com
On the 30th November 1988, the Association for Computing Machinery (ACM) championed Computer Security Day. Since then technology breakthroughs have revolutionised the way we do business and communicate across borders.


          How the Cloud Powers Consolidation With Data Lakes, Data Hubs      Cache   Translate Page      

For a growing number of agencies, cloud computing provides the elasticity and scale needed to correctly consolidate data.

The post How the Cloud Powers Consolidation With Data Lakes, Data Hubs appeared first on GovLoop.


          PICO-ITX® SBC mit besonderem Kühlkonzept !      Cache   Translate Page      
PICO-ITX® SBC mit besonderem Kühlkonzept ! Edge-Computing Plattform für Embedded Systeme oder HMI ! - Intel® 14nm Apollo Lake Celeron® SoC - Dual Display HDMI und LVDS - Intel® HD Graphics Gen9 Engine - DDR3L SDRAM bis 8 GB - M.2 (B Key) & M.2 (A key) Slot für Erweiterungen - USB,

          Video: Oracle Steps Up with Bare Metal for HPC Cloud Infrastructure      Cache   Translate Page      

In this video from SC18 in Dallas, Taylor Newill from Oracle describes the company's new Bare Metal for HPC Cloud Infrastructure. "Oracle Bare Metal Cloud Services (BMCS) public cloud infrastructure. Oracle BMCS is a new generation of scalable, inexpensive and performant compute, network and storage infrastructure that combines internet cloud scale architecture with enterprise scale-up bare metal capabilities, providing the ideal platform for demanding High Performance Computing workloads."

The post Video: Oracle Steps Up with Bare Metal for HPC Cloud Infrastructure appeared first on insideHPC.


          Video: Cray Steps up with Shasta Platform for Exascale Supercomputing      Cache   Translate Page      

In this video from SC18 in Dallas, Per Nyberg from Cray describes the company's new Shasta supercomputing architecture for exascale. "Shasta is an entirely new design and is set to be the technology that underpins the next era of supercomputing, characterized by exascale performance capability, new data-centric workloads, and an explosion of processor architectures. With sweeping hardware and software innovations, Shasta incorporates next-generation Cray system software to enable modularity and extensibility, a new Cray-designed system interconnect, unparalleled flexibility in processing choice within a system, and a software environment that provides for seamless scalability."

The post Video: Cray Steps up with Shasta Platform for Exascale Supercomputing appeared first on insideHPC.


          One Stop Systems Steps up GPU Servers for Ai and World’s First PCIe Gen 4 Cable Adapter      Cache   Translate Page      

In this video from SC18, Jaan Mannik from One Stop Systems describes how the company's high performance GPU system power HPC and Ai applications. At the show, the company also introduced HIB616-x16, the world's first PCIe Gen 4 cable adapter. "The OSS booth will also feature a partner pavilion where several OSS partners will be represented, including NVIDIA, SkyScale, Western Digital, Liqid, One Convergence, Intel and Lenovo. OSS and its partners will showcase new products, services and solutions for high-performance computing, including GPU and flash storage expansion, composable infrastructure solutions, the latest EOS server, cloud computing, and the company's recently introduced Thunderbolt eGPU product."

The post One Stop Systems Steps up GPU Servers for Ai and World’s First PCIe Gen 4 Cable Adapter appeared first on insideHPC.


          Order Processing Specialist - Pure Storage - Salt Lake City, UT      Cache   Translate Page      
The world is experiencing a technological revolution driven by AI, machine learning, virtual reality, quantum computing and self-driving cars -- all of which...
From Pure Storage - Tue, 28 Aug 2018 06:24:19 GMT - View all Salt Lake City, UT jobs
          Technical Support Engineer II - NAS/ Storage - Pure Storage - Lehi, UT      Cache   Translate Page      
The world is experiencing a technological revolution driven by AI, machine learning, virtual reality, quantum computing and self-driving cars -- all of which...
From Pure Storage - Fri, 30 Nov 2018 08:21:49 GMT - View all Lehi, UT jobs
          Flash Blade Designated Support Engineer - Pure Storage - Lehi, UT      Cache   Translate Page      
The world is experiencing a technological revolution encouraged by AI, machine learning, virtual reality, quantum computing and self-driving cars -- all of...
From Pure Storage - Fri, 09 Nov 2018 16:33:07 GMT - View all Lehi, UT jobs
          Technical Support Engineer II - FlashArray (Second Shift) - Pure Storage - Lehi, UT      Cache   Translate Page      
The world is experiencing a technological revolution encouraged by AI, machine learning, virtual reality, quantum computing and self-driving cars -- all of...
From Pure Storage - Fri, 19 Oct 2018 22:33:21 GMT - View all Lehi, UT jobs
          Technical Support Engineer II/III - Pure Storage - Lehi, UT      Cache   Translate Page      
The world is experiencing a technological revolution driven by AI, machine learning, virtual reality, quantum computing and self-driving cars -- all of which...
From Pure Storage - Sun, 07 Oct 2018 06:44:59 GMT - View all Lehi, UT jobs
          Solution Architect - Data & Analytics - Neudesic LLC - New York, NY      Cache   Translate Page      
Machine Learning Solutions:. The explosion of big data, machine learning and cloud computing power creates an opportunity to make a quantum leap forward in...
From Neudesic LLC - Mon, 15 Oct 2018 09:58:30 GMT - View all New York, NY jobs
          Enterprise Pursuit Manager - Pure Storage - Boston, MA      Cache   Translate Page      
The world is experiencing a technological revolution driven by AI, machine learning, virtual reality, quantum computing and self-driving cars -- all of which...
From Pure Storage - Wed, 03 Oct 2018 22:31:54 GMT - View all Boston, MA jobs
          Sales Executive, Quantum Computing Solutions - QxBranch - Washington, DC      Cache   Translate Page      
Experience in Business to Business selling. This role will be responsible for executing and refining a sales strategy to grow QxBranch’s quantum computing...
From QxBranch - Tue, 04 Dec 2018 04:36:47 GMT - View all Washington, DC jobs
          Sales Executive, Quantum - QxBranch - Washington, DC      Cache   Translate Page      
Experience in Business to Business selling. This role will be responsible for executing and refining a sales strategy to grow QxBranch’s quantum computing...
From QxBranch - Tue, 27 Nov 2018 22:10:31 GMT - View all Washington, DC jobs
          Nvidia Open Sources PhysX, With a Few Caveats Attached      Cache   Translate Page      
PhysX-Freature

Nvidia has taken steps to open source its PhysX implementation. Even with a few caveats, it's still not something we ever thought we'd see.

The post Nvidia Open Sources PhysX, With a Few Caveats Attached appeared first on ExtremeTech.


          Quanta, Wiwynn see no impact from Intel CPU shortages on cloud server market      Cache   Translate Page      
Although PC sales in the second half of 2018 have been seriously undermined by Intel's CPU shortages, the cloud computing server market has been little affected, with Quanta Computer and Wiwynn both saying they have not seen any impact on their white-box server businesses.
          Taichung Software Park unveiled       Cache   Translate Page      
The Ministry of Economic Affairs (MOEA) has unveiled Taichung Software Park in central Taiwan, aiming to attract enterprises engaged in AI, big data, IoT, cloud computing, information and communication technology, system integration and cultural innovation to station there.
          Top 10 November must-reads: Python libraries for data science, getting started with serverless computing, command-line tools, and more       Cache   Translate Page      
Book list, favorites

Thanks for another fun month of content and community on Opensource.com! Last month the site brought in 1,004,107 unique visitors who generated 1,524,240 page views. We published 84 articles in November and welcomed 17 new writers:


read more
          Nvidia Open-sources PhysX SDK Under BSD license      Cache   Translate Page      
Nvidia Open-sources PhysX SDK Under BSD license

Besides gaming purposes, PhysX engine can be used in multiple fields within computing for physics simulations including AI, robotics, computer vision, self-driving vehicles, and high-performance computing. Nvidia has released its physics simulation engine, PhysX, on GitHub under an open source BSD license for developers to advance the capabilities of various applications. The PhysX SDK is […]

The post Nvidia Open-sources PhysX SDK Under BSD license appeared first on Open Source For You.


          Senior Future Labs Scientist (w/m) Dev Lab      Cache   Translate Page      
Jobangebot: Mehr Infos und bewerben unter: https://www.campusjaeger.de/jobs/8799?s=18121178+ Wir haben uns in den letzten Jahren zum deutschen Marktführer für Kundenbeziehungsmanagement (CRM) im Mittelstand entwickelt. Über 400.000 Menschen in mehr als 20.000 Unternehmen und Organisationen nutzen heute die Vorteile der Softwarelösungen: Beste Ergonomie, flexible Adaptions- und Integrationsfähigkeit, qualifiziertes Partnernetz, tausendfach praxisbewährt und ein sehr gutes Preis/Leistungsverhältnis.+ Dein Gestaltungsspielraum: * Im Dev Lab werden Trends in der Software Entwicklung wie Continuous Integration, Delivery und Deployment, DevOps Themen wie Container, Orchestrierung, Skalierung und Elastizität, sowie Cloud und Edge Computing, erforscht und erprobt. * Du ... 0 Kommentare, 41 mal gelesen.
          New cryptography must be developed and deployed now, even if quantum threats are a decade away      Cache   Translate Page      
12/5/18
Cybersecurity
Enable IntenseDebate Comments: 
Enable IntenseDebate Comments

Given the current state of quantum computing and the significant challenges that still need to be overcome, it is highly unlikely that a quantum computer that can compromise public-key cryptography – a basis for the security of most of today’s computers and networks – will be built within the next decade, says a new report by the National Academies of Sciences, Engineering, and Medicine.

read more


          COMUNICADO: Snowflake anuncia la disponibilidad general de Microsoft Azure en la región EMEA      Cache   Translate Page      
El aumento de la demanda internacional de Snowflake en Microsoft Azure por parte de los clientes ofrece el almacén de datos construido en la nube a una base de clientes mucho más amplia y global SAN MATEO, California, 5 de diciembre de 2018 /PRNewswire/ -- Snowflake Computing [https://snowflake.
          Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals      Cache   Translate Page      

Pick your books posted a photo:

Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals



Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals
Bart R. McDonough (Author)
Release Date: January 7, 2019
Buy new: $19.95 $16.95

(Visit the Hot New Releases in Networking & Cloud Computing list for authoritative information on this product’s current rank.)

Buy now: Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals

www1.pickyourbook.net/2018/12/05/2-cyber-smart-five-habit...


          Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals      Cache   Translate Page      

Pick your books posted a photo:

Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals



Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals
Bart R. McDonough (Author)
Release Date: January 7, 2019
Buy new: $19.95 $16.95

(Visit the Hot New Releases in Networking & Cloud Computing list for authoritative information on this product’s current rank.)

Buy now: Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals

www1.pickyourbook.net/2018/12/05/2-cyber-smart-five-habit...


          Land tender for data centre site in Tseung Kwan O expected to draw ‘strong’ interest, analysts say      Cache   Translate Page      
Hong Kong’s biggest land site earmarked for development as a data centre is expected to draw intense bidding as the growth of cloud computing drives demand for such purpose-built facilities. The 295,405 square foot site at Wan Po Road Area 85 Tseung Kwan O will close for tender on Friday. ... Reported by S.China Morning Post 22 hours ago.
          Installation & Service Coordinator - ADGA Group - Ottawa, ON      Cache   Translate Page      
ADGA delivers strategic insight, world-class technology and service excellence in Defence, Security and Enterprise Computing to clients in the Federal...
From ADGA Group - Thu, 29 Nov 2018 21:15:43 GMT - View all Ottawa, ON jobs
          Comment on Cyber is to electronic warfare as rain is to a dam by My Infosec Wish for 2013: A Balanced Cyberwarfare Debate - CTOvision.com      Cache   Translate Page      
[…] cyber offense and defense. Trends in computing may shift towards biological and analog computing, complicating current technical assumptions. Big data as a form of cyberpower can aid in uncovering patterns of vulnerability that targets may […]
           ePrint Report: Lossy Trapdoor Permutations with Improved Lossiness       Cache   Translate Page      

ePrint Report: Lossy Trapdoor Permutations with Improved Lossiness
Benedikt Auerbach, Eike Kiltz, Bertram Poettering, Stefan Schoenen

Lossy trapdoor functions (Peikert and Waters, STOC 2008 and SIAM J. Computing 2011) imply, via black-box transformations, a number of interesting cryptographic primitives, including chosen-ciphertext secure public-key encryption. Kiltz, O'Neill, and Smith (CRYPTO 2010) showed that the RSA trapdoor permutation is lossy under the Phi-hiding assumption, but syntactically it is not a lossy trapdoor function since it acts on Z_N and not on strings. Using a domain extension technique by Freeman et al. (PKC 2010 and J. Cryptology 2013) it can be extended to a lossy trapdoor permutation, but with considerably reduced lossiness.

In this work we give new constructions of lossy trapdoor permutations from the Phi-hiding assumption, the quadratic residuosity assumption, and the decisional composite residuosity assumption, all with improved lossiness. Furthermore, we propose the first all-but-one lossy trapdoor permutation from the Phi-hiding assumption. A technical vehicle used for achieving this is a novel transform that converts trapdoor functions with index-dependent domain into trapdoor functions with fixed domain.
           Comment on Kubernetes cloud computing bug could rain data for attackers by Mahhn       Cache   Translate Page      
At least in these virtual empires when a piece of the foundation is broke you can fix it before the building falls, that is if you catch and patch it before the rats eat all your grain.
           Comment on Kubernetes cloud computing bug could rain data for attackers by David       Cache   Translate Page      
Do people run Kubernetes exposed to the public internet? Personally, I try to limit all command and control to be only available behind a firewall or VPN.
           Comment on Kubernetes cloud computing bug could rain data for attackers by David       Cache