Sign up for our newsletter and get the latest HPC news and analysis.
Send me information from insideHPC:


High Performance Computing: A Business Platform at Caesars Entertainment

Les Ottolenghi from Ceasers Entertainment presented this keynote at the PBS Works Users Group meeting in Las Vegas. “Ceasers is focused on building loyalty and value with its guests through a unique combination of great service, excellent products, unsurpassed distribution, operational excellence and technology leadership.”

Podcast: Using GPUs and AI to Fight Cybercrime

“Cybersecurity is a cat-and-mouse game where the mouse always has long had the upper hand because it’s so easy for new malware to go undetected. Dr. Eli David, an expert in computational intelligence and CTO of Deep Instinct, wants to use AI to change that, bringing the GPU-powered deep learning techniques underpinning modern speech and image recognition to the vexing world of cybersecurity.”

Podcast: Cybersecurity Challenges in a World of AI

“From home assistants like the Amazon Echo to Google’s self-driving cars, artificial intelligence is slowly creeping into our lives. These new technologies could be enormously beneficial, but they also offer hackers unique opportunities to harm us. For instance, a self-driving car isn’t just a robot—it’s also an internet-connected device, and may even have a cell phone number.”

Cyber Security: IDC Study Shows Wide Range of Corporate Preparedness

“The findings of a recent IDC study on the cybersecurity practices of U.S. businesses reveal a wide spectrum of attitudes and approaches to the growing challenge of keeping corporate data safe. While the minority of cybersecurity “best practitioners” set an admirable example, the study findings indicate that most U.S. companies today are underprepared to deal effectively with potential security breaches from outside or inside their firewalls.”

2016 Predictions from Radio Free HPC

In this podcast, the Radio Free HPC team makes their tech predictions for 2016. Will secure firmware be the key differentiator for HPC vendors? Will this be the year of FPGAs? And could we see a 100 Petaflop machine on the TOP500 before the year ends?

New Cybersecurity Center of Performance Launches from SHPCP

Today the Society of HPC Professionals announced the formation of the HPC in Cybersecurity Center of Performance located in Washington, D.C. “The HPC in Cybersecurity Center of Performance (CoP) is an educational chapter focused on bringing together members of the private sector, government and academia engaged in the intersecting technologies of HPC and cybersecurity,” said Maryam Rahmani, CoP Director.

Society of HPC Professionals to Focus on Cybersecurity at December Conference

The Society of HPC Professionals will focus its 2015 Annual Technical Meeting on the applications of HPC technology to protect against cyberthreats. The one-day ‘HPC in Cybersecurity’ meeting will be held Wednesday, December 2, 2015, at a Schlumberger location in Houston. This event is free and open to all, but advanced registration is required.

Video: How the SPARC M7 Builds Security into Silicon

“The SPARC M7 incorporates silicon-embedded advancements primarily in two areas: security and performance. First, the SPARC M7 accelerates data encryption through “cryptographic units” integrated in each of its 32 cores. And by incorporating very high-performance encryption in the chip, Fowler says, the M7 is able to not only secure data quickly but also devote substantial processor resources to additional projects, resources that otherwise would be occupied encrypting data at the software layer.”

Halloween Podcast: Radio Free HPC Shares their Biggest Fears for High Performance Computing

In this special Halloween podcast, the Radio Free HPC team shares their biggest fears for HPC. From cybersecurity to a lack of funding for important research, what’s the worst that could possibly happen?

Bob Sorensen from IDC Presents: Best Practices in Private Sector Cyber Security

IDC developed a set of cybersecurity case studies of US commercial organizations in order to learn: What security problems they have experienced, changes that they have made to address them, and new underlying security procedures that they are exploring.