Amdahl’s law is a model for the relationship between the expected speedup of parallelized implementations of an algorithm relative to the serial algorithm, under the assumption that the problem size remains the same when parallelized. For example, if for a given problem size a parallelized implementation of an algorithm can run 12% of the algorithm’s operations arbitrarily quickly while the remaining 88% of the operations are not parallelizable, Amdahl’s law states that the maximum speedup of the parallelized version is 1/1 – 0.12 = 1.136 times as fast as the non-parallelized implementation.
Xerox’s CEO Wants to Shake Up the Services Market
Can you make it such that—most calls are recorded—you can look at the calls after and figure out key things, see patterns via big data? And can you actually apply that?
via Xerox’s CEO Wants to Shake Up the Services Market | MIT Technology Review.
Groupon loyalists are spending more time on the site, which could lift results
The company has been experimenting with creating the same kind of marketplace as Amazon.com Inc. and other e-commerce companies in hopes of getting its customers to shop on its website without relying solely on an email prompt.
So they’re going to compete with Amazon.com. Good luck with that.
Preorders For The Gaming-Focused Razer Edge Tablet Start March 1st, Ships Later In The Month
The Core i5 Razer Edge costs $999 while the Core i7 Razer Edge Pro costs $1299. Plus, each one of the accessories are sold separately. Just the Gamepad Controller is $249. A fully decked-out Razer Edge Pro with Gamepad Controller rings up for $1,698.
Intel Launches Hadoop Distribution And Project Rhino, An Effort To Bring Better Security To Big Data
Intel says the distribution is optimized for the Intel Xeon processor platform. In its announcement, the company states it can analyze one terabyte of data, which would previously take more than four hours to fully process, can now be done in seven minutes.
China to Provide Financial Incentives For Filing Patent Applications Abroad
Under the new Measures, patentees can be subsidized only after the patent is issued. The new regulation also requires novelty, inventiveness, utility, and a stable legal status of the foreign patent
West Virginia auditor blasts Cisco, state for “oversized” router buy
The auditor also found Cisco “showed a wanton indifference to the interests of the public” in recommending the investment in its model 3945 branch routers, the majority of which were “oversized” for the requirements of the state agencies using them, the report stated.
via West Virginia auditor blasts Cisco, state for “oversized” router buy – Network World.
Bypassing Google’s Two-Factor Authentication
TL;DR – An attacker can bypass Google’s two-step login verification, reset a user’s master password, and otherwise gain full account control, simply by capturing a user’s application-specific password (ASP).
via Bypassing Google’s Two-Factor Authentication – Blog · Duo Security.
Also From: Google Security Vulnerability Allowed Two-Step Verification Bypass – Dark Reading.
A successful attack would require first stealing a user’s ASP, which could theoretically be accomplished via malware or a phishing attack.
AT&T Opens Up for Partner Program
In the same way AT&T has started loosening up its network-based application programming interfaces (APIs) for mobile developers, the operator is giving these solutions providers its APIs to let them manage, troubleshoot, provision network services, etc. on AT&T’s network.
A Race, a Crash and the Nascar Approach to YouTube Video Takedowns
A video of the wreck, shot by a fan and uploaded almost immediately to YouTube, detailed some of the carnage that swept across the stands and the race-goers that filled them. In a particularly intense moment, one person appeared to be pinned down by an errant wheel that flew off one of the wrecked cars.
But just as quickly as it was uploaded, the video was taken down from YouTube at Nascar’s request, citing copyright concerns.
via A Race, a Crash and the Nascar Approach to YouTube Video Takedowns – Mike Isaac – Media – AllThingsD.
The copyright to any video or photograph is owned by the person taking that video or photograph. This is clearly an abuse of DMCA. Here’s an update from the above linked to site with a restored link to the video in question.
Update 7:45 pm PT: Well would you look at that. Not more than a few hours later, the video in question has been unblocked, and is now viewable on YouTube user Tyler4DX’s page.