Jump to content
Search In
  • More options...
Find results that contain...
Find results in...

InsertPi

Member
  • Content Count

    11
  • Joined

  • Last visited

Awards

This user doesn't have any awards

About InsertPi

  • Title
    Newbie
  • Birthday Jun 20, 1999

Profile Information

  • Location
    Huntsville, Alabama
  • Gender
    Other
  • Interests
    High-performance computing, GPGPU, computer architecture
  • Biography
    Graduate student researcher at The University of Alabama in Huntsville studying high-performance computing and general purpose GPU programming.
  • Occupation
    Graduate Research Assistant

System

  • CPU
    Xeon E5-1660 v3
  • RAM
    32GB DDR4
  • GPU
    GTX 980 4GB
  • Storage
    500GB SSD + 2TB HDD
  • Operating System
    RedHat 8

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Sure, feel free to message me on here so we don't clutter up this thread. I can send some code over if you're interested.
  2. I'm not actually doing machine learning or anything that can make use of the tensor cores easily, but reading numbers online the A100 seems to be at least 50% faster than the V100 for my use case, and up to 250% faster in some cases. And like I said since I don't do machine learning I don't have any good resources at the moment. I would prioritize learning the fundamentals like algorithms and data structures first (and if you pursue a computer science education that'll be the majority of your computer science classes the first two years). Only after you have those fundamentals woul
  3. There is something novel about this because all other known ways to encrypt photos prior to this would be destroyed when uploaded to the cloud because the cloud performs lossy compression on images. I would recommend at least giving a glance over the paper. This method of encryption is resistant to compression which is pretty neat. Besides, if it wasn't novel to at least some extent, it wouldn't be featured by ACM.
  4. I get my GPU resources through the Alabama Supercomputing Authority. Currently I'm using Tesla V100s for my Master's thesis research, but supposedly the Dense Memory Cluster is getting a couple Ampere A100 GPUs later this year, so I'll probably switch over to those as soon as they're available.
  5. The paper talks a bit about performance metrics and it seems that, while there is measurable overhead, it isn't terrible. It would be little different from having your password leaked. No security measure is immune to social engineering, so at some point it's up to you to protect your password.
  6. A brief skim of their journal article shows that the reason this hasn't been done before is because cloud services like to compress images which can destroy encrypted images, making them impossible to recover. This new tech supposedly is resistant to the kind of compression that Google Photos or iCloud does which is what makes this development so novel. Very cool tech. I agree, the encrypted images would have totally different hashes which would make hash matching impossible. My main concern at this point is how they're going to get this on Apple devices. All their t
  7. Summary Computer scientists at Columbia University have engineered a technique to encrypt user photos stored on the cloud in places like Google Photos or iCloud (especially relevant right now). The technique generates three encrypted images-- one containing data about the red, one with data about the green, and one with data about the blue. Viewing the encrypted images shows images that appear to just be black and white static, but with the proper authentication will reveal the original image. This actually came out around July 15, but with the recent developments from Apple regarding sca
  8. Likely these are debugging instructions that Intel engineers use when developing CPUs. By only enabling their execution when in debug mode, it's "in theory" safe, so they never removed them before production.
  9. Summary As said in the title, Mark Ermolov, Dmitry Sklyarov, and Maxim Goryachy together have allegedly found two undocumented x86 instructions that can modify the architectural state of Intel CPUs. This means that they can modify microcode (for those unaware, this is effectively the code that makes your CPU do what it does). Mark claims that it's decoded in all modes, including user mode, but that the "[microcode] in MSROM throws #UD if not in Red Unlocked state." Ermolov says that details will be posted "a little later." Will add to this post with updates as I see them.
  10. Original link: https://www.theverge.com/2020/5/22/21266251/nvidia-ai-gamegan-recreate-pac-man-virutal-environment TLDR: Some gameplay is previewed here: This is a pretty nice leap forward with generative adversarial networks (the type of neural network used in this project), and is yet another testament to how they can generate rich, complex results. As Sanja Fidler said in the article, this could be beneficial for game developers. Potentially, it could mean that GANs could be used to create games out of a handf
×