Craig Mundie, Microsoft's chief research and strategy officer, doesn't speak Chinese. But on Tuesday he did, via a life-like virtual avatar shown at the company's offices in Beijing that can simulate his voice and speak in other languages.
With the five-year anniversary of September 11, 2001 upon us, network vendors have been putting their latest IP hardware, software and services to the test in a series of combined military and civilian operations designed to simulate worst-case disaster scenarios.
Big Linux systems plot climate change, simulate nuclear explosions, and secure bragging rights. But IT customers are starting to find that high-performance computing technologies make a difference in the real world, from clustered processing to data center greening.
Rather unpredictably, hail pounds U.S. crops and property to the tune of about US$1 billion in damage each year, according to the National Weather Service. These icy agents of chaos account for just one of many catastrophic scenarios that Guy Carpenter & Co. must simulate and model, if the company is to protect its policyholders and stay one step ahead of disasters.
An art installation in Coney Island that uses robots to simulate waterboarding, a torturous interrogation tactic that's been used on detainees at the U.S. Guantanamo Bay detention center, is creating a national stir as it raises public awareness about the controversial practice.
AlgoSec is releasing new software that enables its Firewall Analyzer to simulate the effect multiple firewalls have on traffic, making simpler to determine the net effect of the firewalls and to streamline their rule sets.
Choosing and buying clothes via a cell phone is getting easier in Japan with the launch of a new service that allows shoppers to simulate an outfit before they buy.
Gambit Communications in September introduced Mimic Virtual Lab Enterprise, targeted at enterprise users seeking to simulate real-world networks primarily for developing and evaluating SNMP-based management products.
An innovative approach to security awareness training is to use simulated attacks on workers. A recent Naked Security survey shows that 85% of IT security professionals say it's good to send workers fake phishes with the aim of educating them about their vulnerability and getting them to change their behavior. Is there benefit in this approach to user education?
Is there a tool that we can use in the designing of a WLAN implementation that helps simulate the environment where the access points (either 802.11a, b or g) will be located; the behavior of these access points given the map of the area (including obstacles). As a result of the tool, we could estimate more accurately if a specific theoretical design is accurate. Any help?
The goal of the program -- Computational Simulation of Online Social Behavior (SocialSim) is to develop what the agency calls “innovative technologies for high-fidelity computational simulation of online social behavior. SocialSim will focus specifically on information spread and evolution. Current computational approaches to social and behavioral simulation are limited in this regard.” DARAP said such highly accurate, scalable computerized simulation of how online information spreads would help analyz
We discovered that there are some limitations to Rackspace CloudFiles. You can build large file objects, but they can't be larger than 5GB. There are no subdirectories, per se, but it's easy to build subdirectory translation into filenames, and the third party client software we used can simulate folders pretty simply.
Scientists were able to simulate one percent of human brain activity for a single second using 82,000 processors from the fourth most powerful supercomputer in the world.
UniSim can also simulate rare events, a feature that is particularly useful in robotics and self-driving car applications, where data collection can be costly and risky.
“Virtual Memory” is a computer memory management technique that uses disk space to simulate additional RAM, allowing programs to run when the RAM is limited.
Gyrators are impedance converters usually used to simulate inductance in circuits. Though they are rarely used in discrete electronics, they are interesting circuits looking like pole dancers in...
As part of tests for the Artemis program, SpaceX test-fired its Raptore engine last month after chilling its components to simulate temperature at a lunar landing. The Raptor will be […]
Learn how to simulate a database connection in PHP and handle exceptions if the connection fails. Enhance your PHP database programming skills with this code example.
Existing benchmark datasets in real-world distribution shifts are generally synthetically generated via augmentations to simulate real-world shifts such as weather and camera rotation. The UCF101-DS dataset consists of real-world distribution shifts from user-generated videos without synthetic augmentation. It has videos for 47 UCF-101 classes with 63 different distribution shifts that can be categorized into 15 categories. A total of 536 unique videos split into a total of 4,708 clips. Each clip ranges fr