How fast will a quantum computer be able to calculate? While fully functional versions of these long-sought technological marvels have yet to be built, one theorist at the National Institute of Standards and Technology (NIST) has shown that, if they can be realized, there may be fewer limits to their speed than previously put forth.
The findings—described as a "thought experiment" by NIST's Stephen Jordan—are about a different aspect of quantum computing speed than another group of NIST researchers explored about two years ago. While the previous findings were concerned with how fast information can travel between two switches in a computer's processor, Jordan's new paper deals with how quickly those switches can flip from one state to another.
The rate of flipping is equivalent to the "clock speed" of conventional processors. To make computations, the processor sends out mathematical instructions known as logic operations that change the configurations of the switches. Present day CPUs have clock speeds measured in gigahertz, which means that they are capable of performing a few billion elementary logic operations per second.
Because they harness the power of quantum mechanics to make their calculations, quantum computers will necessarily have vastly different architectures than today's machines. Their switches, called quantum bits or "qubits," will be able to represent more than just a 1 or 0, as conventional processors do; they will be able to represent multiple values simultaneously, giving them powers conventional computers do not possess.
Jordan's paper disputes longstanding conclusions about what quantum states imply about clock speed. According to quantum mechanics, the rate at which a quantum state can change—and therefore the rate at which a qubit can flip—is limited by how much energy it has. While Jordan believes these findings to be valid, several subsequent papers over the years have argued that they also imply a limit to how fast a quantum computer can calculate in general.
"At first glance this seems quite plausible," Jordan said. "If you're performing more logic operations, it makes sense that your switches would need to go through more changes. In both conventional and quantum computing designs, each time a logic operation occurs"—making its switches flip—"the computer hops to a new state."
Read more at: https://phys.org/news/2017-03-quantum-higher-limits-thought.html#jCp
Why you should ALWAYS deal with a Local Company for Computer Issues - Florida Woman SCAMMED out of $5000 by Phony "Computer Virus" Call
VERO BEACH, Florida – A Vero Beach woman paid two people in China $5,000 after her computer began acting strangely.
Penny Schmutzler was prompted to call a listed phone number that popped up on her computer screen. She told a deputy with the Indian River County Sheriff’s Office that she paid $199.00 for 6 months of virus protection after calling the phone number.
However, her computer began having technical issues again. Schmutzler called the number again and spoke to an unknown male. She gave the man remote access to her computer. (RJM Staff Note: NEVER allow someone to remote into your computer unless you know who they are)
Schmutzler was told by the unknown company that they would issue her a refund for the virus protection but needed access to her banking account.
Unfortunately, she provided the unknown subject her banking information. Schmutzler then told the deputy that the unknown male conducted a balance transfer from her credit card to her checking account in the amount of $5,000.00.
The man instructed Schmutzler to go to the Vero Beach Walmart and send a MoneyGram to two different individuals in China. She was provided the names Canlun Lmo and Zexian Chen.
Schmutzler sent two MoneyGrams of $2500.00 each to the individuals.
This case is still active with the Indian River County Sheriff’s Office.
Read more here: www.sebastiandaily.com/news/vero-beach/vero-beach-woman-pays-5000-in-computer-virus-scam-5561/
With 43,000 medical journals, 79,000 clinical trials, and more than 25 million citations for biomedical literature on PubMed, the sheer volume of available medical information daunts even the most seasoned physician.
As a physician, it’s impossible to assimilate this volume of knowledge while also managing the complex cases – including diagnoses, blood tests, histories, DNA tests, algorithms, treatment plans and x-rays, CAT scans and other images – of hundreds of patients. And more is on the way; some predict the amount of medical data doctors can use to impact diagnoses and treatment will double every 73 days by 2020.
Watson, PAAbundant medical research is a good problem to have, and a solution is on the way. IBM’s Watson will help us wade through this mass of data efficiently and meaningfully. The supercomputer is still in medical school at the Cleveland Clinic Lerner College of Medicine. Upon graduation, Watson will use its cognitive computing to not just gather data, but understand, learn and find meaning in it, delivering suggested diagnoses and treatments.
Some have begun to refer to it as Watson, MD. I prefer to think of it Watson, PA, or physician’s assistant, because it will inform rather than make patient care decisions. Today’s doctors are smarter and better trained than ever. Technology will never replace the doctor, but it can make us better.
Read more here: consultqd.clevelandclinic.org/2016/06/computer-allows-doctors-human/
Click Here for more information on Intel Optane www.intel.com/content/www/us/en/architecture-and-technology/intel-optane-technology.html
April 21-23 2017
Wyndham Garden Hotel - 3300 Vista Avenue - Boise ID 83705
Seminars – Vendors - License Testing
Swap Meet - Seminars – Prizes
For More Information and Advance Registration Visit
Two Russian spies among four people charged by US Justice Department in massive Yahoo email hack
Two Russian spies are among the four people charged over the massive data breach at Yahoo in 2014 that impacted at least half-a-billion accounts.
The hack targeted the email accounts of Russian and US officials, Russian journalists, and employees of financial services and other businesses, officials said.
Using in some cases a technique known as 'spear-phishing' to dupe Yahoo users into thinking they were receiving legitimate emails, the hackers allegedly broke into at least 500 million accounts in search of personal information and financial data such as gift card and credit card numbers.
Mary McCord, acting assistant attorney general for the National Security Division, spoke to reporters in Washington DC on Wednesday morning.
She named the Russian Federal Security Service (FSB) officers as: Dmitry Aleksandrovich Dokuchaev, 33, and Igor Anatolyevich Sushchin, 43.
Read more: http://www.dailymail.co.uk/news/article-4316650/Russian-spies-facing-U-S-charges-Yahoo-hack-source.html#ixzz4bQuMd16g
Processors have one of the most important jobs in a gaming PC: getting requests from the game to the graphics card. Everything you see and do in your favorite game must first go through the CPU, and a CPU that keeps a hungry GPU fed with a constant stream of data is a delicious recipe for great performance. That relationship was a guiding light in the design of the AMD Ryzen™ processor. We built a high-throughput machine that’s great for hungry GPUs, and today I wanted to share some gaming data with you.
Performance of the flagship Ryzen 7 1800X processor makes it a great chip for gamers with high-end needs. Average framerates are >60 FPS for the titles we looked at today, and you can see that level of performance across a diverse set of graphics APIs: Vulkan®, DirectX® 12 and DirectX® 11. It’s clear that the 1800X is a processor that’s ready for APIs of today and tomorrow.
99th Percentile Frame RatesYou may not be familiar with 99th percentile frame rates (“99th%”), represented above with the dataset on the left half of the cart. This is a groundbreaking approach that objectively measures the smoothness of a game. It was pioneered by my friend and colleague Scott Wasson during his time as Editor-in-Chief and Owner of The Tech Report. His seminal work, “Inside the Second,” sought to explain why games with high framerates could still often feel choppy to users. He did so by asking the following question: how fast are frames being rendered 99% of the time, and how slow is that last 1%?
His research showed that a great many games reporting high average framerates were also frequently throwing many slow frames into the mix. That last 1% of all frames took much longer to render than average, and they happened often enough that the naked eye would perceive the game’s motion as choppy. The average FPS value was hiding problematic rendering! He also found that games with higher 99th% framerates just generally felt smoother to play. But you can cut the percentages any way you like, so he also found games that would look good 50% of the time—generating great average framerates—but run very slowly the other 50% of the time. These games felt awful to play, but nobody had objectively demonstrated why before Mr. Wasson’s work.
This is why 99th% frame rates are an essential piece of data in our gaming analysis. Higher 99th% values are simply a better measurement of a game’s true experience, because it looks past outliers that can contaminate—for good or bad—the average framerate. So, what about Ryzen? Looking great! The Ryzen™ 7 1800X is definitely a stellar chip in 99th% frame rates, especially in Battlefield™ 4 and DOOM™.
Incredible performance for your moneyThe sensitivity of 99th% frame rate also makes it a great ingredient to help measure the true value of a processor. We know value is important to PC gamers at any price; nobody wants to feel like they paid more than they had to.
To objectively measure “value,” we take the average of the 99th% FPS in the six games we just looked at, then plot that level of performance over the suggested retail price. This visualizes how much average performance you’re getting 99% of the time for your hard-earned cash. Dots towards the upper left of the chart represent a better value for you (more performance, less money). The value of the 1800X is simply extraordinary: it offers a super smooth 99th% experience at half the price.
Read more here: community.amd.com/community/gaming/blog/2017/03/02/great-gaming-on-the-new-amd-ryzen-processor
Of all the revelations from WikiLeaks’ CIA data dump this week, one of the most informative has been the intelligence agency’s views on the antivirus software we use to keep our computers and devices safe from hackers.
More than 20 security products are mentioned across the 8,000-plus pages, including some of the world’s largest computer security companies—Avast, Kaspersky, McAfee, Norton, Microsoft Security Essentials—together with comments from the CIA on how effective five of the firms are at actually protecting people from being spied on.
Many of the companies have been quick to respond to details of how the CIA uses “weaponized” hacking tools to break into phones, computers and televisions, with some offering advice on how to protect yourself from being spied on. Others said more collaboration is needed to protect people from other malicious actors that may try to exploit the vulnerabilities.
“Just like nation-states, bad actors like hackers are also looking to identify and exploit these vulnerabilities, the latest set of leaks actually serves to bring to our attention the very real challenge of securing targeted platforms,” says Vince Steckler, CEO of Czech security firm Avast.
“There is an urgent need for industry collaboration and open platforms between security vendors and mobile operating systems in order to stay ahead in this cat and mouse game.”
So what does the CIA make of the tools we use to protect our online security?
Read more here: www.newsweek.com/best-antivirus-protect-cia-spies-hackers-computer-security-565710
Read more here: “I remember walking into one of the classes at Stanford and just deciding not to take the class because I was one of only three women there, and I just felt so intimidated,” recalled Catherina Xu, one of the co-presidents for Women in Computer Science at Stanford University.
Incidents like this are happening all across the country, and partly due to the lack of women in the field, there is now a shortage of computer science majors — and it’s going to get even worse.
By 2024, the National Center for Women and Information Technology predicts that there will be 1.1 million computing-related job openings, and only 41% of those jobs will be filled.
And get this: The percentage of women in the field has been declining since the 1980s. The National Science Foundation found that in 1985, more than 35% of computer science majors were women. By 2014, that number had dropped down to just 18%.
Not only will jobs go unfilled if more women aren’t entering the field, but companies won’t be as successful. A 2015 study by McKinsey & Company showed that businesses diverse in gender and ethnicity tended to outperform less diverse businesses.
So why aren’t more women working in computer science? Three key factors are culture, the way women think and a lack of representation in the industry.
Read more here: college.usatoday.com/2017/03/08/man-computer-science-needs-more-women/
Despite being the most common way to protect computers and sensitive data, passwords are a terrible security solution. So scientists at Hong Kong Baptist University are teaching computers to read a user’s lips as a far more secure method of biometric security.
Choosing a password that’s both unique enough to be secure and simple enough to remember is getting harder and harder. That’s why many laptops and smartphones include fingerprint readers for an added layer of biometric security. However, faking fingerprints is easier than you might think, so Cheung Yiu-ming, a professor at the university’s computer science department, wants computers and smartphones to use the unique movements of a user’s lips while they say their password as another layer of authentication.
The feature would only work on devices with a user-facing camera, but it would offer advantages over voice-based authentication, which can be tripped up by background noise and other sounds, is often language-specific, and simply doesn’t work for those with a speech impairment. The lip-reading approach, which tracks lip shape, movement, and even texture, could be used almost anywhere. It would also be virtually impossible for someone else to mimic, as those qualities are unique to every user.
Read more here: gizmodo.com/your-computer-might-become-an-expert-lip-reader-to-keep-1793254001