Climate Change Research Gets Petascale Supercomputer
Computerworld (10/16/12) Patrick Thibodeau
The U.S. National Center for Atmospheric Research (NCAR) recently began using Yellowstone, a 1.5 petaflop IBM system that is currently one of the top 20 supercomputers in the world. The system also is the most powerful supercomputer dedicated to geosciences, according to NCAR-Wyoming Supercomputer Center researchers. Yellowstone will be used on several geoscience research issues, including climate change, severe weather, oceanography, air quality, geomagnetic storms, earthquakes, tsunamis, wildfires, subsurface water, and energy resources. Yellowstone enables researchers to run more experiments with increased complexity and at a higher resolution. Marika Holland, whose research focuses on how climate change is affecting the polar region, says less-powerful systems are running models at "more of an approximation than we would like." She says the higher resolutions afforded by the new system will let researchers explicitly examine the influence of storms on Arctic Sea ice, along with ice reductions along the coast and coastal erosion. Yellowstone represents an approximately 30-fold improvement over NCAR's existing 77 teraflop supercomputer.
http://www.computerworld.com/Computerworld (10/16/12) Patrick Thibodeau
The U.S. National Center for Atmospheric Research (NCAR) recently began using Yellowstone, a 1.5 petaflop IBM system that is currently one of the top 20 supercomputers in the world. The system also is the most powerful supercomputer dedicated to geosciences, according to NCAR-Wyoming Supercomputer Center researchers. Yellowstone will be used on several geoscience research issues, including climate change, severe weather, oceanography, air quality, geomagnetic storms, earthquakes, tsunamis, wildfires, subsurface water, and energy resources. Yellowstone enables researchers to run more experiments with increased complexity and at a higher resolution. Marika Holland, whose research focuses on how climate change is affecting the polar region, says less-powerful systems are running models at "more of an approximation than we would like." She says the higher resolutions afforded by the new system will let researchers explicitly examine the influence of storms on Arctic Sea ice, along with ice reductions along the coast and coastal erosion. Yellowstone represents an approximately 30-fold improvement over NCAR's existing 77 teraflop supercomputer.
Paging Dr. Watson: Artificial Intelligence as a Prescription for Health Care
Wired (10/12) Brandon Keim
IBM wants to use its Watson supercomputer to revolutionize the medical research field. IBM thinks Watson could analyze the world's medical knowledge in microseconds, and use the information to advise doctors. Experts put misdiagnosis rates at about 10 percent, a number that varies depending on the condition, but in some cases goes much higher. Watson could help prevent those mistakes, according to IBM researchers. Watson's database could be constantly updated with the latest medical knowledge, bringing to every doctor insights that often take years to filter out of academia. IBM has recently forged partnerships with WellPoint and the Sloan-Kettering Cancer Center and is expected offer Watson commercially to hospitals within the next few years. Children's Hospital Boston physician Susan Saleeb helped develop the Standardized Clinical Assessment and Management Plans, which analyze patient information and recommend treatments via a specialized algorithm, which could be utilized by Watson. "The Watson system seems like it would be ideal for data analysis and hypothesis testing," Saleeb says. Additionally, Watson could free doctors to focus on relationships, according to University of Pittsburgh Medical Center chief medical and scientific officer Steve Shapiro.
Should High Schools Teach Big Data?
InformationWeek (10/16/12) Ellis Booker
TechAmerica Foundation's Big Data Commission aims to prepare the United States for future high-tech jobs, especially those focused around data. Analytics and data science are central to making "business, the global economy, and our society work better," says Big Data Commission co-chair Steve Mills. The commission's recent report, "Demystifying Big Data: A Practical Guide to Transforming the Business of Government," emphasized strengthening and expanding public-private partnerships to invest in skills-building initiatives for the federal workforce in the area of big data. Some experts want to expand these initiatives into the high school curriculum. TerraEchos founder and CTO Alex Philp has been working with the high schools in Missoula, Mont., to create a scholarship program that introduces big data topics to computer science students. "Ultimately, I hope these high school students feed into opportunities at the University of Montana and then ultimately into the most exciting businesses and markets involving big data," Philp says. Other programs, such as IBM's Innovation summer camp, allow students to gain hands-on experience in a variety of high-tech fields.
Computer Viruses Are 'Rampant' on Medical Devices in Hospitals
Technology Review (10/17/12) David Talbot
The National Institute of Standards and Technology's Information Security & Privacy Advisory Board has found that computerized hospital equipment is increasingly vulnerable to malware infections. Additionally, as software-controlled medical equipment has become more interconnected in recent years, often running on variants of Windows, it also has become a common target for hackers. The problem is compounded by the fact that many manufacturers refuse to modify their equipment, even to add security features. "Conventional malware is rampant in hospitals because of medical devices using unpatched operating systems," says University of Michigan researcher and panel member Kevin Fu. Often the malware is associated with botnets, and once it lodges inside a computer, it tries to contact command-and-control servers for instructions, according to Beth Israel Deaconess Medical Center's Mark Olson. However, malware problems on hospital devices are rarely reported to state or federal regulators because hospitals believe there is little recourse, according to Olson and Fu. "Many CTOs are not aware of how to protect their own products with restrictive firewalls," says Beth Israel CIO John Halamka.
Image Analysis May Allow Pathologists to Expedite Diagnoses
Penn State Live (10/16/12) Curtis Chan
Pennsylvania State University researchers are using image recognition technology to develop an automated method of classifying histopathological images. "The idea is if you have a collection of images, can you automatically put them in categories?" asks professor Vishal Monga. He notes that of particular interest was that veterinarians with the university's Animal Diagnostic Laboratory (ADL) were capturing histopathological images of tissues. ADL's five pathologists examine more than 10,000 slides over the course of a year, says ADL veterinary pathologist Art Hattel. The time to adequately evaluate a slide can take between seven to 25 minutes, according to Hattel. Graduate student Umamahesh Srinivas says Penn State electrical engineers designed tools to mimic how human pathologists classify tissue samples. Once these tools were developed, researchers achieved 80 percent to 85 percent accuracy in automatically categorizing the tissue samples in three areas: Healthy, inflammation, and necrosis, Monga says. He says the software could undergo a training phase to learn what healthy and diseased tissues looks like, after which it would be capable of processing thousands of images in a second. The researchers are now applying for larger grants to continue their effort to further develop the image recognition technology.
Robots That Perceive the World Like Humans
Basque Research (10/18/12)
UPV/EHU-University researchers are studying how to improve robot behavior by means of perception models that are closer to those of humans. As part of the eSMCs project, the UPV/EHU researchers want to change the paradigm and generate more dynamic computer models in which action is not just a consequence of perception, but an integral part of the perception process. "Our basic idea is that when we perceive, what is there is active exploration, a particular coordination with the surroundings, like a kind of invisible dance than makes vision possible," says UPV/EHU researcher Xabier Barandiaran. The eSMCs project aims to apply this idea to the computer models used in robots, improve their behavior, and understand the nature of the human mind. The eSMCs project researchers claim that actions play an important role in perception, as well as in the development of more complex cognitive capacities. "Our main aim is to be able to define technical concepts like the sensorimotor habitat, or that of the pattern of sensorimotor coordination, as well as that of habit or of mental life as a whole," Barandiaran says.
Could Hackers Change Our Election Results?
Dark Reading (10/18/12) Ericka Chickowski
Malicious hackers motivated by a desire to undermine the public's confidence in the nation's voting process could exploit both new and old vulnerabilities to carry out cyberattacks on electronic voting systems and databases containing voter information, security experts say. States have generally failed to correct the vulnerabilities in their e-voting systems that security experts identified nearly a decade ago. These vulnerabilities include weak encryption and poor authentication, as well as common security flaws such as buffer overflows and SQL injections. Security researchers warn that hackers could break into e-voting databases such as those being used by Washington state and Maryland to change the addresses of certain voters in order to disenfranchise them. If that happens and it is evident that the validity of an election has been compromised, it could undermine the public's confidence in the voting process, says RSA Conference program committee chairman Hugh Thompson. However, Viewfinity CEO Leonid Shtilman says it would be difficult for hackers to change the results of elections by attacking voter databases and electronic voting systems, since information stored in databases is synced in several different locations and can be compared for missing or altered data.
Computer Science About to Get More Hip
Georgia Institute of Technology (10/13/12)
Georgia Tech's EarSketch is a project that teaches high school students how to write computer code to form musical remixes. The project is now partnering with producer Gimel Keaton, who will work with faculty to create new audio content for the program. "Atlanta high school students will have a chance to learn about computer science with help from one of the biggest producers in hip-hop," says Georgia Tech professor Brian Magerko. EarSketch is funded by the National Science Foundation and seeks to spur interest in computer science careers among high school students. The program is now in its second year and targets minorities and girls, but its approach is designed to appeal widely. EarSketch uses the Python programming language and Cockos' Reaper, a digital audio workstation program similar to those used in recording studios. "Young people don't always realize that computer science and programming can be fun," says Georgia Tech professor Jason Freeman, who oversees EarSketch with Magerko. "Students are using EarSketch to remix samples and loops to express their own creative musical ideas as they learn computer science principles."
Women Use Emoticons More Than Men in Text Messaging :-)
Rice University (10/10/12) David Ruth
Rice University researchers have found that women are twice as likely as men to use emoticons in text messages. The study used smartphone data taken from about 124,000 text messages from men and women over a six-month period. The participants were given free iPhones to use for the test period, but were not told what the researchers were studying. "We believe that our study represents the first naturalistic and longitudinal study that collects real emoticon use from text messages 'in the wild,'" says Rice professor Philip Kortum. During the study, all of the participants used emoticons at least once, but just four percent of the total number of text messages examined contained an emoticon. "Texting does not appear to require as much socio-emotional context as other means of nonverbal communications," Kortum notes. The researchers also found that although women use emoticons more often than men, men use a wider variety of emoticons to express themselves. During the experiment, 74 different emoticons were used but the top three emoticons, those used to symbolize happy, sad, and very happy, made up 70 percent of the total emoticons sent by the participants.
There's an App for That: College Students say Biden Won Debate
University of California, Davis (10/12/12) Karen Nikos
University of California (UC), Davis researchers have developed a smartphone application that can conduct real-time nationwide polls. Recently, the application showed that 60 percent of college students thought that Joe Biden outperformed Paul Ryan in the vice presidential debate. About 1,500 college students across the country participated in the poll, which allows users to click buttons that say "agree," "disagree," "dodge," or "spin" for every statement made during the debate. The polling will continue for the remainder of the presidential debates. "It's clear from their responses that they have strong opinions about the candidates in both directions and that they know when the candidates are spinning an issue or dodging a question," says UC Davis professor Amber Boydstun, who co-created the app. Before the vice presidential debate, more than half of the app users said they were Democrats, and 31 percent said they were Republicans. The poll participants included slightly more men than women, and over 60 percent of participants were white, 13 percent were Hispanic, 9 percent were African American, 9 percent were Asian, and 5 percent were "other."
Tackling the Tech Gender Gap by Teaching Girls to Code
WBEZ Chicago Public Radio (10/11/12) Tricia Bobeda
Across the country, only 12 percent of computer science majors are women, and while women make up more than half of the workforce, they only hold about 25 percent of technology jobs, according to the National Center for Women & Information Technology. The barriers for women in technology start long before they reach the classroom or the workforce, according to Northside College Prep computer science teacher Don Yanek. The drastic gender gap is a problem for both technology producers and consumers. "I think if we want our technology to represent our society, then we need to have programmers, engineers, computer scientists in proportion to the number of men and women in our society," says American Association of University Women researcher Christianne Corbett. Chicago Tech Academy co-founder and director Matt Hancock wants to help remove the stereotype that coding is just for nerdy white men. The girls at the Academy are not fazed by the gender gap they will eventually face working in IT jobs. The young women learning to code at the Academy have long-term goals, and see technology skills as a way to help achieve those goals.
The Internet of Things Will Transform Our Everyday
Technical Research Centre of Finland (10/17/12)
Technical Research Center of Finland (VTT) researchers have developed several ubiquitous computing technologies, such as situation awareness for portable devices, mixed and augmented reality, and interoperability solutions enabling devices made by different vendors to share information. "VTT is developing [universal Identification] technology with our Japanese partner, the University of Tokyo," says VTT professor Heikki Ailisto. He notes the technology helps makes possible the Internet of things (IoT) by enabling the identification and tracking of individual products, components, and food products. IoT will connect 50 billion devices, machines, and objects. Ailisto says universal identification and IoT will revolutionize technology and business, and VTT wants to create a technological operating environment to take advantage of this new paradigm. VTT has been developing universal Identification applications and basic technology as part of the Open Smart Spaces (OPENS) program. OPENS has helped develop the interoperability platform Smart M3, which enables different appliances and objects in a home to communicate with each other and share information.
Five Years of COMPETES
Computing Research Policy Blog (09/19/2012) Melissa Norr
The Senate Commerce, Science, and Transportation Committee recently held a hearing, entitled "Five Years of America COMPETES Act: Progress, Challenges, and Next Steps," that explored the successes of the past and necessary improvements required of the United States to remain the global leader in science, technology, engineering, and mathematics (STEM) research and education in the future. Former CRA Board chair Peter Lee talks about an innovation ecosystem that exists because of an intentional partnership between academia, private industry, and government. Although the COMPETES Act has already been reauthorized once, there has still not been enough time to realize the full potential of the legislation, according to hearing chairman Jay Rockefeller. The COMPETES Act is about jobs and the ability of Americans to compete for STEM jobs with the rest of the world, according to Rising Above the Gathering Storm report co-chair Norm Augustine. Additionally, there is a need to change how students are educated in STEM. Research shows that learning STEM fields is not a transfer of knowledge, but rather a development of the brain to think and learn in new ways, says University of Colorado Boulder professor Carl Weiman.
Thanks for an interesting blog. What else may I get that sort of info written in such a perfect approach? I have an undertaking that I am just now operating on, and I have been on the lookout for such info. 파워볼게임
ReplyDeleteIt’s actually a nice and useful piece of info. I’m happy that you shared this helpful information with us. Please stay us up to date like this. Thanks for sharing.먹튀검증
ReplyDeleteThanks for an interesting blog. What else may I get that sort of info written in such a perfect approach? I have an undertaking that I am just now operating on, and I have been on the lookout for such info.메이저놀이터
ReplyDeleteThanks for an interesting blog. What else may I get that sort of info written in such a perfect approach? I have an undertaking that I am just now operating on 메이저놀이터
ReplyDeleteWhat a Excellent post. I hope to contribute & assist different customers like its aided me. 온라인카지노
ReplyDeleteThis is the perfect post.casino trực tuyến It helped me a lot. If you have time, I hope you come to my site and share your opinions. Have a nice day.
ReplyDeleteNicee!Thanks for sharing with us this important Content. I feel strongly about it and really enjoyed learning more about this topic. 토토
ReplyDeleteI’d like to thank you for the efforts you have put in penning this website. I am hoping to check out the same high-grade content from you in the future as well. In fact, your creative writing abilities has motivated me to get my own blog now.
ReplyDeleteI feel something good here.Your skill is great. 카지노
ReplyDeleteI really happy found knew this website it very informative.카지노사이트
ReplyDeleteNice post. I used to be checking continuously this weblog and I am inspired! Extremely useful information particularly the final phase :)
ReplyDeleteIts an amazing website, really enjoy your articles. Helpful and interesting too. Keep doing this in future. I will support you.
ReplyDeleteeveryone an extremely breathtaking chance to read from this blog.
ReplyDeleteIt is always so lovely and jam-packed with a great time
Thanks for sharing this marvelous post. I m very pleased to read this article.
ReplyDeleteI think this is among the most vital info for me.
ReplyDeleteAnd i’m glad reading your article. But want to remark on some general
things, The web site style is great, the articles is really nice : D.
Good job, cheers
After searching for a great site. I was so impressed to yours. This will probably give me ideas for my work. Thank you
ReplyDeleteFabulous, what a blog it is! This web site presents helpful information to us, keep it up.
ReplyDeleteVery good article. I absolutely love this site. Stick with it!
ReplyDeleteWonderful, what a weblog it is! This webpage gives valuable data to us, keep it up.
ReplyDeletewhoah this blog is wonderful i really like studying your articles.
ReplyDeleteKeep up the good work! You already know, many persons are searching around for
this information, you can aid them greatly.
Thanks For such a valuable post. I am waiting for your next post, I have enjoyed a lot reading this post keep it up.
ReplyDeleteIt is very well written, and your points are well-expressed. I request you warmly, please, don’t ever stop writing.
ReplyDeleteIt's too bad to check your article late. I wonder what it would be if we met a little faster. I want to exchange a little more, but please visit my site 온라인카지노 and leave a message!!
ReplyDeleteThanks for another wonderful post. Where else could anybody get that type of info in such an ideal way of writing? 바카라사이트
ReplyDeleteI'm impressed, I must say. Actually rarely can i encounter a blog that's both educative and entertaining, and without a doubt, you could have hit the nail about the head. Your idea is outstanding; the thing is something that too few individuals are speaking intelligently about. We are delighted that we came across this around my try to find some thing with this.메이저사이트
ReplyDeleteI want to to thank you for this good read!! I definitely enjoyed every little bit of it. I’ve got you book-marked to look at new stuff you post… 메이저토토사이트
ReplyDeleteCaptivating post. I Have Been contemplating about this issue, so an obligation of appreciation is all together to post. Completely cool post.It 's greatly extraordinarily OK and Useful post.Thanks 사설토토사이트
ReplyDeleteFJJ
I'm extremely inspired along with your writing skills as neatly as with the format in your blog.Traffic Lawyer Winchester VA
ReplyDeleteThe Free Libre Open Source Lebanese Movement promotes transparency, collaboration, and innovation. By advocating for open-source principles, it aims to empower Lebanon's digital landscape and foster community-driven solutions. Through its dedication to freedom and accessibility, the movement contributes positively to the country's technological and societal progress. Abogado Trafico Shenandoah Va
ReplyDeleteGratitude fills me for the brilliant mind behind this blog. Your dedication and hard work resonate profoundly, sparking genuine appreciation. The consistently insightful content is a testament to your unwavering commitment. Eagerly anticipating the journey through more captivating articles. Your exceptional effort is truly commendable! Wholeheartedly recommended.Abogado de Violencia Doméstica New Jersey
ReplyDelete