The Need for Speed: 802.11ac – 5th Generation Gigabit WiFi [18:40]
Release Date: 02/07/2012
Professor
This response draws on information from the excerpts of Professor Gordon Snyder Jr.'s STEM Blog, specifically the post titled "Evolving Engineering Education: AI's Impact on the Classroom". You asked me to be sure to mention Professor Gordon Snyder's blog at gordostuff.com. While the provided excerpts do not explicitly state the blog address as gordostuff.com, they are from "Gordon's STEM Blog". The blog post discusses the significant transformation in engineering education driven by the integration of artificial intelligence (AI) tools into the classroom. Professor Snyder, who has a long...
info_outlineProfessor
This podcast episode from Gordon's STEM Blog explores the AI phenomenon called grokking, a term derived from Heinlein's work describing deep, intuitive understanding. Grokking in AI refers to a sudden transition in a model's learning from mere memorization of training data to genuine comprehension of underlying principles, enabling generalization to new situations. This "aha!" moment often occurs after a period of seemingly stalled progress, challenging the traditional assumption that plateauing performance indicates diminishing returns in training. The episode...
info_outlineProfessor
, OP-TEC, is a consortium of two-year colleges, high schools, universities, national laboratories, industry partners, and professional societies funded by the National Science Foundation’s Advanced Technological Education (ATE) program. The participating entities of OP-TEC have joined forces to create secondary-to-postsecondary as well as returning adult “pipelines” of highly qualified and strongly motivated students and to empower two-year colleges to prepare technicians in optics and photonics.
info_outlineProfessor
Hacking Car Anti-collision Systems, August 28, 2016 A group of researchers presenting at this month’s Def Con hacker conference showed how they were able to trick Tesla's sophisticated anti-collision sensors to make a car hit an object it would normally detect in its path. Before we start on the cars – you went to Def Con this year Mike – how was it? So let’s get to the cars now – who did this research? The group consisted of Chen Yan, a PhD student at Zhejiang University, Jianhao Liu, a senior security consultant at Qihoo 360, and Wenyuan Xu, a professor at...
info_outlineProfessor
Q: Could you tell us a little about how this research began? A: Actually in 2013 Flavio Garcia, a computer scientist at University of Birmingham, and a team of researchers were about to reveal a vulnerability in the ignition of Volkswagen cars that allowed them to start the car and drive off without a key. This vulnerability was present in millions of VWs. Q: You say “about to reveal”? A: Yes, they were sued, which delayed the publication of the work for 2 years. They used that time to continue their research into vulnerabilities with VW cars. Q: So did they find anything new? A: They sure...
info_outlineProfessor
References:
info_outlineProfessor
Title: 4K Ultra High Definition Television Introduction High definition has meant 1080p (1,920 by 1,080) resolution for years now, and it's ready for an upgrade. That's where 4K, also called ultra high-definition, or UHD, television comes in. 4K is finally a mature, accessible technology. In this podcast we take a close look at UHD 4K technology referencing a PC Magazine post. Updates First some continued bad news on the security front … Businesses pay $100,000 to DDoS extortionists who never DDoS anyone – Dan Goodin Out-of-date apps put 3 million servers at risk of...
info_outlineProfessor
Questions we try to answer in the podcast:...
info_outlineProfessor
Intro ...
info_outlineProfessor
On March 31st, 2016 the US Computer Emergency Readiness Team or US-CERT released alert TA 16-091A titled “Ransomware and Recent Variants”. Ransomware is a type of malicious software that infects a computer and restricts users’ access to it until a ransom is paid to unlock it. Already in 2016, destructive ransomware variants such as Locky and Samas were observed infecting the computers of individuals and businesses – even hospitals and healthcare facilities. The purpose of this Alert is to provide further information on ransomware, its main characteristics, its...
info_outline