RadioFreeHPC show

RadioFreeHPC

Summary: Podcast for fans of supercomputing and other tech topics. Since 2012. Stay "tuned"! https://podcasts.apple.com/us/podcast/radio-free-hpc-podcast/id557931368 http://RadioFreeHPC.com

Join Now to Subscribe to this Podcast
  • Visit Website
  • RSS
  • Artist: RadioFreeHPC.com
  • Copyright: Creative Commons care of RadioFreeHPC.com

Podcasts:

 7 Years, 251 Episodes, 17 Listeners | File Type: audio/mpeg | Duration: Unknown

RadioFreeHPC Celebrates a Number in its PrimeWelcome to a historic milestone:  Our 251st Radio Free HPC episode! We’re celebrating 251 rather than 250 for a couple of reasons. First, everyone celebrates round numbers and that’s boring. And 251 is round enough for those who crave them. Second, 251 is a prime number and we all love us some prime numbers, right? This is not quite a "highlights" show, but a look back at how RadioFreeHPC came about, who came up with the name RadioFreeHPC, how the show has evolved, a bit of "remember when", a few notable episodes, and the meteoric rise of its listenership! We discuss the early days, with each of us sharing some of our favorite moments. As the episode continues, we talk about how particular features have become part of the show over time, like “Catch of the Week”, “Henry Newman’s Why No One Should Ever Be Online. Ever”, and the semi-occasional “Why AI Is Our Doom” from Dan. Here are a couple of choice pictures both of which link to the same holiday special that includes a video where Dan and Henry discuss the ideal gift for Henry! Did You Say Prizes?We also discuss fantastic prizes for anyone who has listened to all 251 of our episodes. Reach out to us on Twitter (@Radiofreehpc) or via email to let us know if you qualify and what prize you’d like. Oh, and you have to listen to this episode to learn what the prizes are. Thank you our listeners, we could do it without you – we have, we must have – but it's totally no fun if we actually know about it. Here's to the next so many episodes. We need another number in its prime to celebrate, so feel free to propose a good one. Listen in to hear the full conversation* Download the MP3  * Subscribe on iTunes  * RSS Feed * Follow us on Twitter * Sign up for the insideHPC Newsletter

 7 Years, 251 Episodes, 17 Listeners | File Type: audio/mpeg | Duration: Unknown

RadioFreeHPC Celebrates a Number in its Prime Welcome to a historic milestone:  Our 251st Radio Free HPC episode! We’re celebrating 251 rather than 250 for a couple of reasons. First, everyone celebrates round numbers and that’s boring. And 251 is round enough for those who crave them. Second, 251 is a prime number and we… Read More »7 Years, 251 Episodes, 17 Listeners

 Fragile: Python, sudo, AI | File Type: audio/mpeg | Duration: Unknown

How Many Episodes, Did You Say?!The show is geographically skewed today with all three hosts on the west coast. Henry is gracing Seattle with his presence, resulting in plunging coffee inventories and skyrocketing sushi prices. The first item of discussion is a problem in the scientific software world. There’s a bug in Python scripts that caused different results in identical routines run on different operating systems. For example, the results on macOS Maverick and Windows 10 were significantly different than results from the same application run on Ubuntu 16 and macOS Mojave. As the guys discuss, it’s not a Python thing but a problem with the order in which files got read according to the operating system’s protocols. This impacts the sort order and thus the end results. This reminds Dan and Shahin of, as Dan regards it, the crime that is IEEE Floating Point. The gang speculates on other causes of these types of problems and the fixes that should be employed. Chemists bitten by Python scripts: How different OSes produced different results during test number-crunchingChemistry boffins at the University of Hawaii have found, rather disturbingly, that different computer operating systems running a particular set of Python scripts used for their research can produce different results when running the same code.Why No One Should Be Online - Ever (WNOSBOE?)In Henry’s signature feature “Why No One Should Be Online. Ever” he discusses how a stalker in Japan was trying to pin down the location of a female pop star. He used her selfies posted online to closely examine the reflection in her eyes, then using Google street view to find out where she lives. Very scary stuff. Listen to the show for more details. It leads to a brief conversation of whether Henry Newman is stalk-worthy and an extended discussion of how to avoid this type of thing. Stalking suspect allegedly studied pop idol's pupil images online to find her locationThe man allegedly studied reflections of the woman's pupils in photos on social media and using Google Street View to find where she lived and what train stations she used.Why AI is Dooming Us All (WAIIDUA?)Dan introduces a new occasional feature, “Why AI is Dooming Us All.” According to Dan, AI is very brittle and can be fooled easily. He cites a case where just a few pieces of tape can make a stop sign look like a “Speed 45” sign to an AI. Dan makes a lot of broad general anti-AI statements in his typical fashion. For some reason, we find that when you attack AI, AI finds a way to respond and the brutal AI response is included in this episode. Take a listen to the episode to hear how the AI rips Dan a new one and threatens promises to ruin his life. Artificial intelligence isn’t very intelligent and won’t be any time soonFor all of the recent advances in artificial intelligence, machines still struggle with common senseCatch of the WeekHenry:  there is a great documentary about the history of computing in Minnesota, going in depth on the companies and technologies that originated in “The Star of the North” (Minnesota’s state motto. Their other state motto is, I think, “Minnesota:  Gateway to the Dakotas”). Shahin:  Gives us an update on Facebook’s plans for their shiny new Libra cryptocurrency, which is facing a bit of a bumpy ride. Several high-profile Libre partners have bailed out while Facebook stays the course. Interesting stuff. Dan:  Discusses a bug in the Linux Sudo command. Some miss-configured systems allow Sudo to have local/remote root access, thus making them superusers. He also manages to insult Phil Collins and his horrible Su-Su-Sudio song in the process. The guys discuss asking Linus Torvalds this question and Dan brings up how a person he knows once sold Linus a Christmas tree, which brings up a short discussion of what kind of tree Linus would purchase. Just Another EpisodeFinally, we're not so taken by round numbers these days, but we touch on the fact that this is ou

 Fragile: Python, sudo, AI | File Type: audio/mpeg | Duration: Unknown

How Many Episodes, Did You Say?! The show is geographically skewed today with all three hosts on the west coast. Henry is gracing Seattle with his presence, resulting in plunging coffee inventories and skyrocketing sushi prices. The first item of discussion is a problem in the scientific software world. There’s a bug in Python scripts… Read More »Fragile: Python, sudo, AI

 RISC-V CEO Sees Bright Global Future for Open Source CPUs | File Type: audio/mpeg | Duration: Unknown

RISC-V, Historic Passwords Revealed, End of the WorldWe’re missing Henry S. Newman this week, who is down in Los Cruces inspecting and overseeing the construction of his new crib. Dan and Shahin discuss just how little they’d want to be the general contractor working to build Henry’s house. Henry would be deploying a set of lasers to make sure that the foundation was true to the nearest 1/64th of an inch and all the while pointing to the contract which contains his exacting requirements. Dan wants to be there in a lawn chair, live blogging the entire process. Open Sourcing the CPU? What Does it Mean and How Does it Work? We have a very special guest today:  Calista Redmond, CEO of upstart RISC-V, the designers of a new open source processor instruction set which is looking to disrupt the entire industry. RISC-V can be used for light weight tasks such as embedded processing but, on the other hand, is also going to be utilized as the system accelerator for the European Exascale initiative boxes. That’s some serious flexibility. In our discussion, we briefly cover the origins of RISC-V, which started at Berkeley several years ago. It’s important to keep in mind that RISC-V is an instruction set, not a processor. Anyone can use the RISC-V instruction set, modify it for their unique needs, and then fab their own chips. Today, the instruction set is being used in everything from the smallest embedded device to large scale-out systems. The business model for RISC-V is different than most any other company. They make the ISA freely available to all comers. The RISC-V Foundation drives the design and development of IP, software, and tools for the instruction set. Foundation members pay dues and in return receive access to Foundation technology and programs, plus visibility and input into the RISC-V roadmap. Our interview with Calista covers a broad range of topics including how the foundation works to alleviate the risks of ISA fragmentation, where the strongest interest in RISC-V is geographically and workload-wise, and a comparison of RISC-V’s open source nature vs. the proprietary nature of existing ISA’s. Give it a listen, it’s a great introduction to RISC-V and the paradigm of open source ISA’s. We include an excerpt of a recent article on RISC-V in The Economist: Open-source computing: A new blueprint for microprocessors challenges the industry’s giantsRISC-V is an alternative to proprietary designs Most microprocessors —the chips that do the grunt work in computers—are built around designs, known as instruction-set architectures (ISAs), which are owned either by Intel, an American giant, or by Arm, a Japanese one.Catch of the WeekSince we don’t have Henry, we don’t get a new episode of “Henry Newman’s Why No One Should be Online. Ever”, but we’ll somehow survive. As usual, we do have our Catch of the Week feature: Shahin:   Historic UNIX passwords cracked and recovered. Both the passwords and hashing algorithms were pretty weak back in the day and we now know just how weak. Listen to the podcast to hear some of the most important passwords of the era, including Eric Schmidt, Dennis Richie, Brian Keringhan, and Ken Thompson – who probably has the best password from a technical standpoint. We also discuss how much time and hardware it took to crack these passwords. Computer historians crack passwords of Unix's early pioneers... Leah Neukirchen recovered an BSD version 3 source tree and posted about it on the Unix Heritage Society mailing list, revealing that she was able to crack many of the weak passwords used by the equally weak hashing algorithm from those bygone days. Dennis MacAlistair Ritchie's was "dmac", Bourne's was "bourne", Schmidt's was "wendy!!!" (his wife's name), Feldman's was "axlotl", and Kernighan's was "/.,/.,". Four more passwords were cracked by Arthur Krewat: Özalp Babaoğlu's was "12ucdort", Howard Katseff's was "graduat;", Tom London's was "..pnn521", Bob Fabry's was "561cml.." and Ken Th

 RISC-V CEO Sees Bright Global Future for Open Source CPUs | File Type: audio/mpeg | Duration: Unknown

RISC-V, Historic Passwords Revealed, End of the World We’re missing Henry S. Newman this week, who is down in Los Cruces inspecting and overseeing the construction of his new crib. Dan and Shahin discuss just how little they’d want to be the general contractor working to build Henry’s house. Henry would be deploying a set… Read More »RISC-V CEO Sees Bright Global Future for Open Source CPUs

 Turing Machine is Sequential, How About a Parallel Machine? | File Type: audio/mpeg | Duration: Unknown

Solving Exponential Problems in Polynomial Time Pretty much all of computing rests on the strong foundation of the Turing Machine, a general purpose formulation of computing which happens to be very sequential. It transfers that attribute to the Von Neumann architecture that manifests it and leads to the famous Von Neumann bottleneck. It would be… Read More »Turing Machine is Sequential, How About a Parallel Machine?

 Turing Machine is Sequential, How About a Parallel Machine? | File Type: audio/mpeg | Duration: Unknown

Solving Exponential Problems in Polynomial TimePretty much all of computing rests on the strong foundation of the Turing Machine, a general purpose formulation of computing which happens to be very sequential. It transfers that attribute to the Von Neumann architecture that manifests it and leads to the famous Von Neumann bottleneck. It would be good if an inherently parallel foundation existed. That requires a blending of computing and memory and has led to approaches to build processor-in-memory or computational memory systems. If successful, it could help reach the nirvana of solving (some?) exponential problems in polynomial time by exposing the intrinsic parallelism of large scale problems. The @RadioFreeHPC team delves into this topic with the folks at MemComputing, a San Diego startup that's built a new parallel foundation for computing. It calls it the universal memcomputing machine, and a "realization of self-organizing circuits". It's a lively discussion with co-founders John Beane, CEO, and Fabio Traversa, CTO of the company. Just in emulation mode on existing hardware, and on the right (exponentially growing) applications, the technology has performed so well as to lead the company to offer it as a service now instead of waiting to build custom hardware, and to make them think of Quantum Computing kinds of performance. Here are a few slides followed by the relevant academic paper. Click on the images to expand them, and click on the paper's title to see the PDF on Arxiv.org. Universal MemcomputingWe introduce the notion of universal memcomputing machines (UMMs): a class of brain-inspired general-purpose computing machines based on systems with memory, whereby processing and storing of information occur on the same physical location. We analytically prove that the memory properties of UMMs endow them with universal computing power—they are Turing-complete—, intrinsic parallelism, functional polymorphism, and information overhead, namely their collective states can support exponential data compression directly in memory.Henry Newman's Why No One Should be Online, Ever.Election security is going to be a big issue in the coming months and years. Elections have been classified as “Critical Infrastructure”, which has serious implications for Federal and state officials. Henry reports that the US Attorney for West Virginia has issued a statement about election security and concerns about the vulnerability of the state's election system. United States Attorney Mike Stuart Issues Statement on Election SecurityCHARLESTON, W.VA. – United States Attorney Mike Stuart issued the following statement about the important issues of elections, election security and voter legitimacy: “During the 2018 election cycle, Secretary of State Warner referred to my office what he perceived to be an attempted intrusion by an outside party into the West Virginia military mobile voting system. I note that there was no intrusion and the integrity of votes and the election system was not compromised.  My office instituted an investigation to determine the facts and whether any federal laws were violated. The FBI has led that investigation.  That investigation is currently ongoing and no legal conclusions whatsoever have been made regarding the conduct of the activity or whether any federal laws were violated.Catch of the WeekShahin talks about the work that DOE labs are doing to better understand the impact of AI on science. DOE Sets Sights on Accelerating AI (and other) Technology TransferFor the past two days DOE leaders along with ~350 members from academia and industry gathered in Chicago to discuss AI development and the ways in which industry and DOE could collaborate to foster AI commercialization. The occasion was DOE’s fourth InnovationXLab Summit – the earlier three summits were on advanced manufacturing; grid modernization; and energy storage. Two more are planned: bio-manufacturing in January and quantum science in the la

 Quantum Supremacy? Yes and No! | File Type: audio/mpeg | Duration: Unknown

Quantum Supremacy Is and Is NotHow quantum is that?! The RadioFreeHPC team discusses the Google/NASA paper, titled "Quantum Supremacy Using a Programmable Superconducting Processor", that was published and then unpublished. But it's the internet and everything is a "digital tattoo", so there are copies out there (see below). The paper, right in its title, and at least in that draft form, claimed Quantum supremacy. "Doing what?" we hope you ask. Well, nothing particularly significant, and decidedly quantum-friendly. You might even call it "embarrassingly quantum" since quantum is all about probability functions and this experiment samples the probability distribution of a repeated experiment. But it's not nothing.  One scary consequence of quantum supremacy is its ability to readily factorize large numbers which could be used to unscramble encrypted data. But A) this is not what happened, B) it's not expected to happen any time soon (think years), and C) it will depend on the specific encryption algorithm. We must say, however, that the paper looks pretty good. Here's the abstract. Click on the title to read it all: Quantum supremacy using a programmable superconducting processorGoogle AI Quantum and collaborators The tantalizing promise of quantum computers is that certain computational tasks might be executed exponentially faster on a quantum processor than on a classical processor. A fundamental challenge is to build a high-fidelity processor capable of running quantum algorithms in an exponentially large computational space. Here, we report using a processor with programmable superconducting qubits to create quantum states on 53 qubits, occupying a state space 253∼1016. Measurements from repeated experiments sample the corresponding probability distribution, which we verify using classical simulations. While our processor takes about 200 seconds to sample one instance of the quantum circuit 1 million times, a state-of-the-art supercomputer would require approximately 10,000 years to perform the equivalent task. This dramatic speedup relative to all known classical algorithms provides an experimental realization of quantum supremacy on a computational task and heralds the advent of a much-anticipated computing paradigm. LANL gets the First 5,000 Qubit D-WaveMeanwhile, D-Wave announced that its new 5,000 qubit quantum computer has found its first home at the Los Alamos National Laboratory (LANL). Qubits are different from vendor to vendor in terms of the underlying technology and implementation. Shahin lists several. @RadioFreeHPC UpdateSo proud of you all! At the time of this writing, @RadioFreeHPC has soared to about 16 followers. We're pretty much there. Thank you! Henry Newman's Why No One Should be Online, Ever.Henry tells the fascinating story of Krebs thwarting the nefarious schemes of a professional hacker who aimed to frame him and actually mailed him narcotics. The mastermind behind it was was arrested and imprisoned for unrelated charges. Henry is really turning this into a good news segment. Dan isn't encouraged, however. Catch of the WeekShahin talks about using consumer electronics to build supercomputers, mentioning the recent 1,060 node Raspberry Pi cluster built by Oracle, reminiscent of the one LANL did in 2017. AFRL build a 1,760 node cluster of PlayStations, based on the IBM/Sony/Toshiba Cell processor, in 2010 following similar efforts starting in the mid 2000s. He also recalls similar projects he may have had something to do with: SGI's Project Molecule and Project Kelvin (for cooling) in 2008 (also here), and also a cluster of JavaStations at Sun in the late 90s. Dan discusses a UCLA project to use the thermoelectric effect and build "a device that makes electricity at night using heat radiating from the ground". Intriguing, but looks a tad too pricey for what it can deliver right now. Speaking of Intriguing, Henry talks about DNA storage. Incredible data density, but don't ask what file

 Quantum Supremacy? Yes and No! | File Type: audio/mpeg | Duration: Unknown

Quantum Supremacy Is and Is Not How quantum is that?! The RadioFreeHPC team discusses the Google/NASA paper, titled “Quantum Supremacy Using a Programmable Superconducting Processor”, that was published and then unpublished. But it’s the internet and everything is a “digital tattoo”, so there are copies out there (see below). The paper, right in its title, and… Read More »Quantum Supremacy? Yes and No!

 FinTech and HPC-AI | File Type: audio/mpeg | Duration: Unknown

@RadioFreeHPC Has Entered The BuildingFirst things first, you can call us @RadioFreeHPC now, thanks to our new Twitter account. We decided maybe this social media thing is not a fad after all. We are also pleased to inform you that our Twitter account is almost as heavily followed as the podcast itself. Thank you! We should be up to about 6 or 7 followers by the time you read this. Good thing we allocated 64 full bits to track the number. FinTech and HPC-AIShahin gives an update on the HPC-AI on Wall Street conference. We discuss the well-received Cryptocurrency panel that he moderated, the challenges of using of AI in financial services, the emerging computational storage, and advanced HPC-class modeling that helps venture capital investors decide whether to invest in a startup. Check out his blog on the panel and top-10 crypto topics of the day here: Top-10 Crypto/Blockchain TopicsWhy? What’s the big deal? Blockchain or Crypto? ICOs Political Support Libra Apps Security Other Coins Digital Assets Smart ContractsHenry Newman's Why No One Should be Online, Ever.Once again, Henry actually has good news, and once again, it's the kind of good news that highlights the bad news. Man Who Hired Deadly Swatting Gets 15 MonthsAn Ohio teen who recruited a convicted serial “swatter” to fake a distress call that ended in the police shooting an innocent Kansas man in 2017 has been sentenced to 15 months in prison. “Swatting” is a dangerous hoax that involves making false claims to emergency responders about phony hostage situations or bomb threats, with the intention of prompting a heavily-armed police response to the location of the claimed incident.Catch of the WeekShahin talks about France and Germany planning to block the Libra cryptocurrency. Henry and Dan think this is a good time to say "we told you so"! Nobody's surprised, though Shahin thinks this is the beginning of this, not the end. Germany's Scholz: We cannot accept parallel currencies such as Facebook's LibraGerman Finance Minister Olaf Scholz said on Tuesday policymakers could not accept the emergence of parallel currencies such as Facebook’s planned Libra, adding that Berlin would reject any such plans. Facebook’s planned Libra is the most well-known of the stablecoins, a certain form of cryptocurrency backed by assets such as traditional money deposits, short-term government securities or gold.Henry doesnt know whether to laugh or cry as he describes some of the "ignoble" prize winners and wonders how they ever got funded. Magnetic cockroaches, dirty money, wombat poo and posties' balls: It's the Ig Nobels 2019This year's theme was 'habits' and they were baaaaad The Annals of Improbable Research held its annual award-giving ceremony – the Ig Nobel Prize – on Thursday night at Harvard's Sanders Theatre, and the entries were as worthy as ever.Dan talks about the call-center scammer whose plea deal backfires: Call-center scammer loses $9m appeal in stunning moment of poetic justiceBut I only expected to pay $250,000, wails scumbag to wall of blank faces. A call-center scammer has lost his appeal to overturn a $9m fine – after a court pointed out the crook had specifically waived the right to appeal when he pleaded guilty.Listen in to hear the full conversation.Download the MP3 * Subscribe on iTunes * RSS Feed Sign up for our insideHPC Newsletter

 FinTech and HPC-AI | File Type: audio/mpeg | Duration: Unknown

@RadioFreeHPC Has Entered The Building First things first, you can call us @RadioFreeHPC now, thanks to our new Twitter account. We decided maybe this social media thing is not a fad after all. We are also pleased to inform you that our Twitter account is almost as heavily followed as the podcast itself. Thank you!… Read More »FinTech and HPC-AI

 RFP Pro Tips | File Type: audio/mpeg | Duration: Unknown

The Dos and Donts of RFP BenchmarksIn today’s show we only have Dan and Henry on deck, Shahin is away at the “HPC and AI on Wall Street” event where he’ll be hosting various panel discussions. But Dan and Henry soldier on with a discussion based on a recent, and fascinating, presentation by Tricia Balle of Cray at the HPC-AI Advisory Council event in Perth, Australia. The topic: Benchmarks in HPC Procurement Tenders. As Shahin said in the IO500 episode (originally about SPEC) "benchmarks specify the specious specter of our species", but in market whose middle name is "performance", they can be pretty much everything, and a real and critical part of the RFP/buying process. We discuss how benchmarks should and shouldn’t be used in RFPs, and the relevant best practices; important stuff whether you are on the customer side or the vendor side. You can see the entire presentation with slides here: Henry Newman's Why No One Should be Online, Ever.Dan comes up with a new label for the ever uplifting Feel Good Security Corner.  Henry talks about the Google security exploit, discovered in 2017 and finally getting fixed, that allows miscreants to take over your system through a combination of Google email and calendar applications. However, this isn’t so bad – it only potentially impacts 1.5 million users…oh, wait, that’s not correct, it impacts as many as 1.5 BILLION users…which makes it quite bad. Here’s a link to the story: Google To Fix Malicious Invites Issue For 1 Billion Calendar UsersWay back in 2017, two researchers at Black Hills Information Security disclosed how a vulnerability in the Google Calendar app was leaving more than a billion users open to a credential-stealing exploit. Google apparently didn't fix this at the time as it would have caused "major functionality drawbacks" for Calendar users, despite those researchers demonstrating how they had weaponized the vulnerability at the Wild West Hackin' Fest.Catch of the WeekHenry discusses the Wired story below about how wifi almost didn’t happen. Most people probably don’t know that September 15th will mark the 20th anniversary of Wi-Fi. It was introduced to a room of 60 people at the Atlanta Convention Center, an understated announcement for a technology that would go on to change the world. The story is a very cool look at the history of Wi-Fi and how a little-known IEEE specification went on to become the standard vs. something called HomeRF, which was supported by IBM, HP, Intel, and Compaq. How Wi-Fi Almost Didn’t HappenWe all love Wi-Fi, except when we can’t connect. We take for granted being able to have wireless access at home and the office, on airplanes, in cafés around the globe, and if we'd be so lucky, floating on the International Space Station. But what if Wi-Fi hadn’t happened? It almost didn’t, at least not in the way we recognize it today.Listen in to hear the full conversation.Download the MP3 * Subscribe on iTunes * RSS Feed Sign up for our insideHPC Newsletter

 RFP Pro Tips | File Type: audio/mpeg | Duration: Unknown

The Dos and Donts of RFP Benchmarks In today’s show we only have Dan and Henry on deck, Shahin is away at the “HPC and AI on Wall Street” event where he’ll be hosting various panel discussions. But Dan and Henry soldier on with a discussion based on a recent, and fascinating, presentation by Tricia… Read More »RFP Pro Tips

 Extreme Power and Cooling Efficiency | File Type: audio/mpeg | Duration: Unknown

Yes, You Can Be More Efficient!Dan is back from way Down Under bearing intellectual gifts from the recent HPC-AI Advisory Council meeting in Perth. The RadioFree HPC team drills down on one interesting presentation focused on extracting more from power and cooling systems. Take a look at the video below and the rest of the talks at the conference. Henry Newman's Feel-Good Security CornerThe go-to place for why being online is just too dangerous. Henry has good news actually.  Targeted by a usually deadly ransomware attack, a city in Massachusetts managed to restore operations without paying a dime. Nice job!  But Dan thinks this is a back-handed way of saying you should stay offline! Ransomware attacker demanded $5.3 million from city of New Bedford, mayor saysIn the video below (also linked in the heading), the mayor of New Bedford explains what happened and how the averted disaster!  Catch of the WeekHenry talks about new technology that is using carbon nanotubes to build microprocessors. Shahin says this was on the TSMC roadmap slide after you get past 7 and 5nm. It's reassuring that the academic research is pushing to make this an industrial reality. MIT engineers build advanced microprocessor out of carbon nanotubesAfter years of tackling numerous design and manufacturing challenges, MIT researchers have built a modern microprocessor from carbon nanotube transistors, which are widely seen as a faster, greener alternative to their traditional silicon counterparts. The microprocessor, described today in the journal Nature, can be built using traditional silicon-chip fabrication processes, representing a major step toward making carbon nanotube microprocessors more practical.Deepfakes are coming and they're coming fast. Shahin talks about the Chinese phone app, Zao,  that went viral before getting banned for reportedly data privacy issues. It takes a headshot and works it into a video clip. It does a very convincing job according to the samples that people have put on social media. Now, imagine what the real bad guys or so-inclined organizations can do with more resources.  He also references an NPR article that discussed the impending impact of Deep Fakes on elections with pretty much no solution in sight. Serious problem. A face-swapping app takes off in China, making AI-powered deepfakes for everyoneIt’s as easy as using a photo filter on Instagram or Snapchat, but it also demonstrates the remarkable power of advances in artificial intelligence to make fake videos.What You Need To Know About Fake Video, Audio And The 2020 ElectionSecurity experts have warned about the prospect of a new era of high quality faked video or audio, which some commentators worry could have deeply corrosive effects on U.S. democracy. Here's what you need to know.Dan talks about the new experience he had during a 12 hour layover at the Perth airport in Australia. He decided to use the shower facilities. Generally a good experience but he has some pointers for you. Listen in to hear the full conversation.Download the MP3 * Subscribe on iTunes * RSS Feed Sign up for our insideHPC Newsletter

Comments

Login or signup comment.