Language Selection

English French German Italian Portuguese Spanish

Sci/Tech

Open source machine learning tools as good as humans in detecting cancer cases

Filed under
OSS
Sci/Tech
  • Open source machine learning tools as good as humans in detecting cancer cases

    Machine learning has come of age in public health reporting according to researchers from the Regenstrief Institute and Indiana University School of Informatics and Computing at Indiana University-Purdue University Indianapolis. They have found that existing algorithms and open source machine learning tools were as good as, or better than, human reviewers in detecting cancer cases using data from free-text pathology reports. The computerized approach was also faster and less resource intensive in comparison to human counterparts.

  • Machine learning can help detect presence of cancer, improve public health reporting

    To support public health reporting, the use of computers and machine learning can better help with access to unstructured clinical data--including in cancer case detection, according to a recent study.

FOSS and Artificial Intelligence

Filed under
OSS
Sci/Tech

RoboPhone: Sharp to Sell Real Android Phones in Japan

Filed under
Android
Sci/Tech

The Osaka-based electronics maker said Tuesday it would introduce a new mobile communication device in 2016 that is a tiny android robot. It will come with features of a smartphone including email, Internet connectivity, camera and a 2-inch display. Still to be decided is whether the device will use Google Inc.’s Android mobile operating system or another operating system.

Read more

Accelerating Scientific Analysis with the SciDB Open Source Database System

Filed under
OSS
Sci/Tech

Science is swimming in data. And, the already daunting task of managing and analyzing this information will only become more difficult as scientific instruments — especially those capable of delivering more than a petabyte (that’s a quadrillion bytes) of information per day — come online.

Tackling these extreme data challenges will require a system that is easy enough for any scientist to use, that can effectively harness the power of ever-more-powerful supercomputers, and that is unified and extendable. This is where the Department of Energy’s (DOE) National Energy Research Scientific Computing Center’s (NERSC’s) implementation of SciDB comes in.

Read more

Scientific Linux 6.7 Officially Released, Based on Red Hat Enterprise Linux 6.7

Filed under
Red Hat
Sci/Tech

The Scientific Linux team, through Pat Riehecky, has had the great pleasure of announcing the release and immediate availability for download of the Scientific Linux 6.7 computer operating system.

Read more

Female SanDisk engineer who made it in Silicon Valley offers her words of wisdom

Filed under
OSS
Sci/Tech

At Milpitas-based flash memory storage and software company SanDisk Corp., Nithya Ruff, director of the company’s open source strategy, is a huge driver behind science, technology, engineering and math initiatives to get more girls interested in the field. After growing up in Bangalore, India, Ruff learned to code at North Dakota State University, where she earned her computer science master’s degree.

Read more

Also: 8 ways Portland tech companies can follow through on diversity talk

Fedora 22 Scientific

Filed under
Red Hat
Sci/Tech

As you can see, the new home for Fedora Scientific looks amazing. The "Featured Applications" section features the most important and useful tools in Fedora Scientific. I think that is a great idea. Everyone associated with it, thank you very much.

Read more

Carl Sagan's solar-powered spacecraft is in trouble

Filed under
Linux
Sci/Tech
  • Carl Sagan's solar-powered spacecraft is in trouble
  • Software Glitch Pauses LightSail Test Mission

    But inside the spacecraft's Linux-based flight software, a problem was brewing. Every 15 seconds, LightSail transmits a telemetry beacon packet. The software controlling the main system board writes corresponding information to a file called beacon.csv. If you’re not familiar with CSV files, you can think of them as simplified spreadsheets—in fact, most can be opened with Microsoft Excel.

Syndicate content

More in Tux Machines

Android N’s navigation buttons could get a face-lift

New Zealand vs Wales Live Streaming

Android Leftovers

IT runs on the cloud, and the cloud runs on Linux. Any questions?

A recent survey by the Uptime Institute of 1,000 IT executives found that 50 percent of senior enterprise IT executives expect the majority of IT workloads to reside off-premise in cloud or colocation sites in the future. Of those surveyed, 23 percent expect the shift to happen next year, and 70 percent expect that shift to occur within the next four years. Read more

Security Leftovers

  • Teardrop Attack: What Is It And How Does It Work?
    In Teardrop Attack, fragmented packets that are sent in the to the target machine, are buggy in nature and the victim’s machine is unable to reassemble those packets due to the bug in the TCP/IP fragmentation.
  • Updating code can mean fewer security headaches
    Organizations with high rates of code deployments spend half as much time fixing security issues as organizations without such frequent code updates, according to a newly released study. In its latest annual state-of-the-developer report, Devops software provider Puppet found that by better integrating security objectives into daily work, teams in "high-performing organizations" build more secure systems. The report, which surveyed 4,600 technical professionals worldwide, defines high IT performers as offering on-demand, multiple code deploys per day, with lead times for changes of less than one hour. Puppet has been publishing its annual report for five years.
  • Over half of world's top domains weak against email spoofing
    Over half of the world's most popular online services have misconfigured servers which could place users at risk from spoof emails, researchers have warned. According to Swedish cybersecurity firm Detectify, poor authentication processes and configuration settings in servers belonging to hundreds of major online domains are could put users at risk of legitimate-looking phishing campaigns and fraudulent emails.