• Теги
    • избранные теги
    • Компании1720
      • Показать ещё
      Международные организации59
      • Показать ещё
      Страны / Регионы397
      • Показать ещё
      Разное1159
      • Показать ещё
      Формат33
      Люди325
      • Показать ещё
      Издания115
      • Показать ещё
      Показатели54
      • Показать ещё
26 мая, 16:12

DXC Technology (DXC) Tops Q4 Earnings, Misses Revenues

DXC Technology Company (DXC) released fourth-quarter fiscal 2017 results on behalf of Computer Sciences Corporation.

25 мая, 18:24

CSRA (CSRA) Beats on Q4 Earnings, Set to Buy NES Associates

CSRA Inc. (CSRA) reported earnings of 49 cents per share in fourth-quarter fiscal 2017, surpassing the Zacks Consensus Estimate by 3 cents.

Выбор редакции
25 мая, 01:58

Без заголовка

**Comment of the Day: Tracy Lightcap**: _A Note on Coursera CEO Rick Levin's Clark Kerr Lecture..._: "I think Thoma's course is indicative of the kinds of courses that succeed on-line... >...There appear to be two varieties: required courses and puzzle courses. If an on-line course is required, then students will keep with it in hopes of fulfilling the requirement. Since most of theses courses are entry-level, they are mainly concentrated on delivering facts and fitting them into descriptions. This is admirably suited to on-line work. >The second kind of course is one that is concentrated on puzzles. Most introductory math and computer science courses are like that. Students are introduced to a variety of techniques that can be used to solve puzzles that arise in a particular field. There's good evidence that this works well. >What doesn't work very well are courses that teach how to apply the techniques found in puzzles to analytical reasoning. This is one reason why you don't hear much about success in even basic lab science courses on-line. Face-to-face courses work much better for such advanced work. Such courses can work with a "hybrid" model too: two days looking at vids and on-line material +...

23 мая, 22:08

CFA exam to add artificial intelligence, 'big data' questions

NEW YORK (Reuters) - Students of investing will need to start cramming for a new subject: computer science.

18 мая, 10:55

Почему в информационной безопасности нет «серебряной пули»? Технический анализ

Главных причин две: до сих пор нельзя достоверно сказать, как в точности работают окружающие информационные системы, и технологии информационной безопасности, выходящие за пределы криптографии, все еще не оформились в единую научную теорию

16 мая, 01:19

Why people are blaming the global cyberattack on the NSA

This week's worldwide cybersecurity crisis is just the latest black eye for the National Security Agency and its practice of stockpiling secret means of snooping into computer systems. That’s because whoever launched the global series of ransomware assaults is using a flaw in Microsoft Windows that the U.S. spy agency had apparently exploited for years — until someone leaked the NSA’s hacking tools online and allowed cyber criminals to copy them. Now, critics ranging from Microsoft to Vladimir Putin to fugitive NSA leaker Edward Snowden are denouncing the agency’s practice of stockpiling computer vulnerabilities for its own use instead of informing the developers or manufacturers so they can plug the holes. And some privacy advocates and technology experts want Congress to make the agency rein in the practice. Here’s POLITICO’s summary of where that debate stands: How did hackers get ahold of the NSA’s tools? That’s a good question. But the ransomware racing around the globe is based on a cache of apparent NSA hacking software and documents that a group calling itself “the Shadow Brokers” posted online on April 14. (Shadow Brokers first began making these kinds of dumps last year.) The Trump and former Obama administrations have refused to confirm that the NSA had lost control of its tools, but former intelligence officials say the leaked material is genuine. How the hacking tools escaped the NSA is unknown. But there are three main possibilities: An NSA employee or contractor went rogue and stole the files; a sophisticated adversary such as the Russian government hacked into the spy agency and took them; or an NSA hacker accidentally left the files exposed on a server being used to stage a U.S. intelligence operation, and someone found them. Contractors, who can lack the institutional loyalty of regular employees, have long been a source of heartache to the intelligence community, from the 2013 Snowden leaks to the arrest last year of Harold Martin, a Maryland man charged with stealing reams of classified files and hoarding them in his home. Which NSA tool are the hackers using? It appears to be a modified version of an NSA hacking tool, a software package dubbed “ETERNALBLUE,” that was buried in the Shadow Brokers’ leak. The tool took advantage of a flaw in a part of Windows called the Server Message Block, or SMB, protocol, which connects computers on a shared network. In essence, the flaw allows malware to spread across networks of unpatched Windows computers, a dangerous prospect in the increasingly connected world. After the cache leaked, cybersecurity researchers, realizing that the SMB vulnerability could expose organizations to massive hacks, “reverse engineered” the tool, checking how it worked and evaluating how to defeat it. These researchers posted their work online to crowdsource and accelerate the process. But their work also helped digital thieves. At some point, the criminals behind the ransomware attack grabbed the reverse-engineered exploit and incorporated it into their malware. This separated their attack tool from previous popular iterations of ransomware. Whereas normal ransomware locks down an infected computer’s files and stops there, this variant can jump from machine to machine, infecting entire businesses like the internet’s earliest computer worms. What did the NSA do after learning of the theft? The spy agency probably warned Microsoft about the vulnerability soon afterward. Microsoft released a patch for computer users to repair the flaw in March, a month before the Shadow Brokers leak. But that’s not good enough for civil liberties advocates, who want stricter limits on how long the government can hold onto vulnerabilities it discovers. “These attacks underscore the fact that vulnerabilities will be exploited not just by our security agencies, but by hackers and criminals around the world,” said Patrick Toomey, a national security attorney at the American Civil Liberties Union, in a statement. “Patching security holes immediately, not stockpiling them, is the best way to make everyone’s digital life safer.” The agency’s defenders disagree. “That nobody else discovered these vulnerabilities as far as we know suggests that it is right for the NSA to hold onto them if they have confidence that nobody else has a copy of their tools,” Nicholas Weaver, a researcher at the University of California in Berkeley, told POLITICO. “It actually is a problem that the NSA can’t or won’t claim credit for properly notifying Microsoft. The NSA did the right thing, and they aren’t getting the credit for it they deserve.” Is this a new controversy for the NSA? No. But the crisis that began on Friday is giving it prominence like never before. Privacy advocates and tech companies have long criticized the U.S. spy agencies for keeping knowledge of security flaws a secret and building hacking tools to exploit them. And they say it’s especially bad when the government can’t keep its secret exploits out of the hands of cyber criminals. “When [a] U.S. nuclear weapon is stolen, it’s called an ‘empty quiver,’” tweeted Snowden, whose 2013 leaks exposed the vast underbelly of the government's spying capacity. “This weekend, [the NSA’s] tools attacked hospitals.” Microsoft President Brad Smith also denounced the NSA’s inability to secure its tools. “An equivalent scenario with conventional weapons would be the U.S. military having some of its Tomahawk missiles stolen,” he wrote in a weekend blog post. Putin later picked up that theme, telling reporters in Beijing that U.S. intelligence agencies were clearly “the initial source of the virus.” “Once they're let out of the lamp, genies of this kind, especially those created by intelligence services, can later do damage to their authors and creators," the Russian leader said. But former national security officials say the government needs to build hacking tools to keep the U.S. safe. And White House homeland security adviser Tom Bossert downplayed the possible origin of the code Monday.“Regardless of the provenance of the exploit here used,” he told ABC, “who is culpable are the criminals that distributed it and the criminals that weaponized it, added additional details to it, and turned this into something that is holding ransom data but also putting at risk lives and hospitals.” What’s Congress doing? The government uses a system called the “Vulnerability Equities Process” to determine whether and when agencies must tell companies about code flaws they discover. Following recent spy agency leaks, former government officials, cyber experts and tech companies have proposed changes to the VEP that would limit the intelligence community’s ability to hoard vulnerabilities.Some are calling for Congress to act. Those include Rep. Ted Lieu, a California Democrat with a computer science degree, who has led the charge to reform the VEP. Lieu, a leading congressional voice on cybersecurity, called the process “not transparent” in a statement Friday, saying “few people understand how the government makes these critical decisions.” The ransomware campaign, he added, “shows what can happen when the NSA or CIA write malware instead of disclosing the vulnerability to the software manufacturer.” But Lieu’s bill is unlikely to become law. Not only does the intelligence community have numerous defenders in Congress, but politicians simply aren’t paying much attention to the issue. Lawmakers haven't rushed to join Lieu in calling for VEP changes. There have only been a few hearings on ransomware in recent years, and no pending legislation mentions either ransomware or the VEP.Martin Matishak contributed to this report.

Выбор редакции
12 мая, 20:18

How Prepared Do Computer Science Students Need To Be To Get Internships At A Big Software Companies?

How long do I have to be prepared before interning as a software engineer at Facebook, Google, Amazon, etc.? This question was originally answered on Quora by Eric Jang.

12 мая, 16:30

CyberArk (CYBR) Tops Q1 Earnings, Stock Dips on Soft View

Keeping its earnings streak alive for the 11th consecutive quarter, CyberArk Software Ltd. (CYBR) reported better-than-expected first-quarter 2017 results.

11 мая, 15:02

Broadridge (BR) Q3 Earnings and Revenues Beat Estimates

Broadridge Financial Solutions Inc. (BR) reported better-than-expected third-quarter fiscal 2017 results.

10 мая, 15:27

NVIDIA (NVDA) Q1 Earnings & Revenues Top, Outlook Strong

NVIDIA Corp. (NVDA) posted first-quarter fiscal 2018 adjusted earnings on a proportionate tax basis of 82 cents per share, beating the Zacks Consensus Estimate of 66 cents.

09 мая, 19:01

XJTLU breaking new ground in AI research and education

China is assuming a key position globally in the field of artificial intelligence, an area that was found by a Narrative Science survey last year to be in use by 38 percent of enterprises worldwide and

09 мая, 15:39

CyberArk (CYBR) Q1 Earnings: Will it Surprise Investors?

CyberArk Software Ltd (CYBR) is set to report first-quarter 2017 results on May 11.

08 мая, 14:50

Symantec (SYMC) to Post Q4 Earnings: Will it Miss Estimates?

Symantec Corp. (SYMC) is set to report fourth-quarter fiscal 2017 results on May 10.

07 мая, 10:30

Hackers chase likes, just like us

Is the desire to wreak global havoc online, as British teenager Adam Mudd did, really so alien?When he was 16 years old, Adam Mudd, a computer science student from Kings Langley, Hertfordshire, created a piece of software that could be used to take down even the largest, most fortified websites in the world. Mudd dubbed his tool Titanium Stresser, a name that captured both its strength and its capacity to cause niggling mischief. The software was a so-called distributed denial-of-service (DDoS) tool, a kind of digital weapon used to direct vast amounts of fake traffic to a particular website in order to cause its servers to fail and go offline – a bit like flicking every light switch in a skyscraper on at the same exact moment in order to trigger a power cut.Between December 2013 and March 2015, Mudd, who lived with his parents at the time, carried out 594 such attacks on more than 180 targets, crashing, for example, the network at his school, West Herts College. Mudd, who pleaded guilty to the charges at the Old Bailey last month, soon began selling his software online. It proved popular and profitable; more than 112,000 people bought packages from Mudd, who made £386,000 from his enterprise. Titanium Stresser soon became a notorious scourge of online institutions around the world, particularly video game companies. The fantasy game RuneScape, for example, suffered more than 25,000 attacks. Its owner company reportedly spent £6m trying to defend itself against the onslaught. Continue reading...

06 мая, 20:35

The College Majors That Don't Pay Off

If you want to make big bucks straight out of college, it's probably wise to avoid choosing any of the following majors... You will find more statistics at Statista According to Glassdoor, Criminal Justice and Kinesiology have the lowest starting salary of any U.S. college majors at $40,000. Exercise Science might keep you physically and mentally sharp but it's also at the bottom of the pay grade with the median base salary coming to $40,640. At the opposite end of the scale, Statista's Niall McCarthy notes that Computer Science ($70,000), Electrical Engineering ($68,438) and Mechanical Engineering ($66,040) are the best majors to choose if you want a lucrative salary after you graduate.

05 мая, 19:31

Российские учёные построили модель "сарафанного радио"

Специалисты Университета ИТМО создали компьютерную симуляцию, которая работает по принципу "сарафанного радио" и иллюстрирует распространение информации между абонентами мобильной сети. Об этом сообщается на сайте вуза.

05 мая, 19:23

Российские учёные построили модель "сарафанного радио"

Специалисты Университета ИТМО создали компьютерную симуляцию, которая работает по принципу "сарафанного радио" и иллюстрирует распространение информации между абонентами мобильной сети.

Выбор редакции
05 мая, 17:52

Closing The Gender Gap In Computer Science Begins In Kindergarten

Young girls exhibit the inquisitiveness inherently required in learning computer science or how to code; it’s up to us adults to harness that curiosity and apply it to something tangible that engages young minds.

05 мая, 12:15

Will Hurd Is the Future of the GOP*

*If he can hold on to the toughest seat in Texas.

05 мая, 12:05

Talking to Yourself (Out Loud) Can Help You Learn

When University of Illinois psychologist Brian Ross enrolled in a computer science course, it had been a long time since he’d even taken a class. With his beard and balding dome, he stood out. A decade older than his classmates, Ross was, to all the other students, that guy. He was nervous. But he had an advantage. Ross is a learning researcher, and he’s familiar with the effective, but often underestimated, learning strategy known as self-explaining. The approach revolves around asking oneself explanatory questions like, ”What does this mean? Why does it matter?” It really helps to ask them out loud. One study shows that people who explain ideas to themselves learn almost three times more than those who don’t. To help him outperform his younger colleagues, Ross asked himself lots of questions. He would constantly query himself as he read through the assigned texts. After each paragraph, after each sentence, he would ask himself: “What did I just read? How does that fit together? Have I come across this idea before?” By the end of the course, Ross had found that, despite his relative inexperience and unfamiliarity with computers, he could answer many questions that the other students couldn’t and understood programming in ways that they didn’t. “I sometimes had the advantage,” he told me. “I was focused on the bigger picture.” In the modern economy, there are few skills more important than the ability to learn. Around the globe, learning is highly predictive of future earnings. Companies may pay for training or reimburse educational courses, but the skill of gaining skills is rarely taught. Here’s how to employ self-explaining in your own learning: Talk to yourself. Self-talk has a bad reputation; muttering to ourselves often seems to be a sign of mental distress. It’s not cool to do in public. But talking to ourselves is crucial to self-explaining and generally helpful for learning. For one thing, it slows us down — and when we’re more deliberate, we typically gain more from an experience. You and Your Team Series Learning Learning to Learn Erika Andersen You Can Learn and Get Work Done at the Same Time Liane Davey 4 Ways to Become a Better Learner Monique Valcour Self-talk also helps us think about our thinking. When we’re engaged in a conversation with ourselves, we typically ask ourselves questions along the lines of: “How will I know what I know? What do I find confusing? Do I really know this?” Whether we hit the pause button while listening to a podcast or stop to reflect while reading a manual, we develop skills more effectively by thinking about our thinking. Ask why. Self-explaining can give voice to impulses of curiosity that may otherwise remain unexplored. It’s about asking ourselves the question, “Why?” Now, if we really know a topic, “why” questions are not that hard. If I asked you a why question about the town that you grew up in, the answer would come pretty easily. It’s when we don’t know something that why questions become more difficult — and create a way to develop an area of expertise. To illustrate the practice, let’s examine a query like, “Why are there waves?” Some of us can bumble our way to a basic answer. Maybe something like: “Well, waves have to do with the wind. When wind blows across the top of the water, it creates ripples of water.” But then comes the inevitable follow-up: “Why does the wind lift the water?” or “Why are there waves when there’s no wind?” Here we draw a blank. Or at least I do, and so I start searching for some sort of answer, spinning through the internet, reading up on how energy moves through water. In the end, I’ve learned much more. Summarize. Summarizing is a simple way to engage in self-explaining, since the act of putting an idea into our own words can promote learning. You probably have had this experience in your own life. Recall, for instance, a time when you read an article in a magazine and then detailed its argument for a friend. That’s a form of summarizing — you’re more likely to have learned and retained information from that article after you did it. For another illustration, imagine that you recently wrote an email describing your thoughts on a documentary that you saw on Netflix. In doing so, you fleshed out the idea and engaged in a more direct form of sensemaking. So, all in all, you’ll have a richer sense of the movie and its themes. You can do this in your own life. The next time a person — your boss, your spouse, a friend — gives you a set of detailed instructions, take the time to verbally repeat the directives. By reciting everything back, you’ll have taken steps to summarize that knowledge, and you’ll be far more likely to remember the information. Make connections. One of the benefits of self-explaining is that it helps people see new links and associations. Seeing connections helps improve memory. When we’re explaining an idea to ourselves, we should try to look for relationships. That’s one of the reasons that a tool like mnemonics works. We’re better able to remember the colors of the rainbow because we’ve created a link between the first letter of the names of the colors and the acronym ROYGBIV. When we spot links in an area of expertise, we can gain a richer understanding. This helps explain why Brian Ross had such success using self-explaining. As he learned about computer programming, he tried to explain ideas to himself, relying on different words or concepts. “A lot of what you’re doing in self-explanation is trying to make connections,” Ross told me. “Saying to yourself, ‘Oh, I see, this works because this leads to that, and that leads to that.’” Self-explaining should go into the learning tool kit of workers today, as the economy places new demands on making connections and adopting new insights and skills. AT&T CEO Randall Stephenson says technology workers need to learn online for at least five hours per week to fend off obsolescence. They might want to find a solitary place to do so, where they don’t feel abashed about talking out loud to themselves.

25 апреля 2014, 07:36

Тенденции в ИТ секторе США

С этой Украиной народ совсем все запустил. Учитывая степень накала можно предположить, что ньюсмейкеры искусственно нагоняют истерию, чтобы отвлечь внимание от более глобальных тенденций, как например развал Еврозоны, провал «японского чуда» и политики Абе, затяжная рецессия в США, очередной провал корпоративных отчетов. Кстати, в последнее время говорят о чем угодно, но только не о последних результатах крупнейших мировых гигантов. Что там с ними?  Из 30 наиболее крупных ИТ компаний в США 11 компаний сокращают годовую выручку по сравнению к 2013 году. Это HPQ, IBM, Intel, Western Digital, Computer Sciences, Seagate Technology, Texas Instruments и другие. Наибольшее годовое сокращение выручки у Seagate Technology – почти 15%. С оценкой 5 летних тенденций, то в наихудшем положении Hewlett-Packard, IBM, Computer Sciences и Texas Instruments, у которых выручка находится на 5 летних минимумах. В таблице данные, как сумма за 4 квартала. Но есть и те, кто вырываются вперед – Microsoft, Google, Ingram Micro, Qualcomm. Apple замедляет в росте и переходит в фазу стагнации с последующим сокрушительным обвалом на фоне роста конкуренции. Intel в стагнации, как 3 года. Данные за 1 квартал предварительные, т.к. еще далеко не все отчитались. Но общие тенденции нащупать можно. Примерно 35-40% крупных компаний сокращают бизнес активность, 25-35% компаний в стагнации и еще столько же растут. Отмечу, что рост отмечает в отрасли, связанной так или иначе с мобильными девайсами – либо производство софта, либо реклама на них, или поставки аппаратной части, как Qualcomm. По прибыли.  Здесь еще хуже. Мало компаний, показывающих приращение эффективности. Около 60% компаний сокращают прибыль, либо стагнируют. Относительно стабильный тренд увеличения прибыли у Google, Oracle, Qualcomm. Хотя темпы прироста наименьшие за 3 года.