Pages

Friday, 9 December 2016

Unlock the cloud’s full value: Make devops mandatory:

Most people who are good with cloud technology are also good with devops. That’s not an accident: It’s impossible to get the full value out of cloud computing unless it’s done in the context of automated devops.
Why is automated devops so important? It’s a competitive advantage that creates faster time to market. Organizations that require weeks or month to deploy software are at a distinct disadvantage.

Thursday, 8 December 2016

The best hardware, software, and cloud services:

InfoWorld’s Technology of the Year Awards have celebrated the most important technology trends and the best IT products for 15 years now. Our awards have marked the rise of everything from 64-bit hardware to hardware virtualization, from Java servers to JavaScript servers, from XML Web services to REST APIs, and from Microsoft Word for Windows to Microsoft Word for iOS. We’ve seen a lot of changes.
And the changes keep coming. Among this year’s winners, handpicked by InfoWorld editors and product reviewers, you’ll find a number of “traditional” names: Cisco, IBM, Microsoft, Red Hat. But you’ll also find the names of more open source projects than we’ve ever seen in the Technology of the Year winner’s circle, thanks to the huge role open source has come to play in software development, data center (and cloud) infrastructure, and big data analytics.

Wednesday, 7 December 2016

Giant machine shows how a computer works:

A giant, fully operational 16-bit computer that aims to demystify the strange and seemingly magical mechanisms of computation has been built by students and staff from the University of Bristol.
The Big Hex Machine, specifically designed to explain how a computer works, has been built out of over 100 specially designed four-bit circuit boards and will enable students to be taught about the  of computer architecture from just a few basic components.
The computer - 'an ultimate teaching tool' - will be used as part of this year's computer architecture unit and will be an invaluable resource to enable students to get creative with what is traditionally seen as a complicated subject. The machine's instruction set requires a very small compiler, but it is powerful enough to implement useful programs.

Tuesday, 6 December 2016

 Safer, less vulnerable software is the goal of new computer publication:
We can create software with 100 times fewer vulnerabilities than we do today, according to computer scientists at the National Institute of Standards and Technology (NIST). To get there, they recommend that coders adopt the approaches they have compiled in a new publication.
The 60-page document, NIST Interagency Report (NISTIR) 8151: Dramatically Reducing Software Vulnerabilities (link is external), is a collection of the newest strategies gathered from across industry and other sources for reducing bugs in software. While the report is officially a response to a request for methods from the White House's Office of Science and Technology Policy, NIST computer scientist Paul E. Black says its contents will help any organization that seeks to author high-quality, low-defect computer code.

Monday, 5 December 2016

Team finds new method to improve predictions:

Researchers at Princeton, Columbia and Harvard have created a new method to analyze big data that better predicts outcomes in health care, politics and other fields.

The study appears this week in the journal Proceedings of the National Academy of Sciences.In previous studies, the researchers showed that significant variables might not be predictive and that good predictors might not appear statistically significant. This posed an important question: how can we find highly predictive variables if not through a guideline of statistical significance? Common approaches to prediction include using a significance-based criterion for evaluating variables to use in models and evaluating variables and models simultaneously for prediction using cross-validation or independent test data.
Visit our Site: http://shreeinfotec.in
Our Blog http://http://makeeasywithsoftware.blogspot.in/

Sunday, 4 December 2016

Suggestions for you: A better, faster recommendation algorithm
The internet is rife with recommendation systems, suggesting movies you should watch or people you should date. These systems are tuned to match people with items, based on the assumption that similar people buy similar things and have similar preferences. In other words, an algorithm predicts which items you will like based only on your, and the item's, previous ratings.
But many existing approaches to making recommendations are simplistic, says physicist and computer scientist Cristopher Moore, a Santa Fe Institute professor. Mathematically, these methods often assume people belong to single groups, and that each one group of people prefers a single group of items. For example, an algorithm might suggest a science fiction movie to someone who had previously enjoyed another different science fiction movie— - even if the movies have nothing else in common.
Visit our Site: http://shreeinfotec.in
Our Blog http://http://makeeasywithsoftware.blogspot.in/


Friday, 2 December 2016




US Military Develops 'Multi-Object Kill Vehicle' to Blast Enemy Nukes:

Defensive weapons that can intercept and destroy enemy missiles before they can harm the United States or its allies have been a key part of military strategy for decades, but the rules of the game are changing.
More countries have or are developing long-range missile technology, including systems that can carry multiple warheads, known as Multiple Independently Targetable Re-entry Vehicles (MIRVs) and/or decoys.
Visit our Site: http://shreeinfotec.in
Our Blog http://http://makeeasywithsoftware.blogspot.in/

Featured post

TSPSC LESSONS G.O.610