Computing Result – Formes http://formes.asia/ Tue, 28 Jun 2022 02:29:28 +0000 en-US hourly 1 https://wordpress.org/?v=5.9.3 https://formes.asia/wp-content/uploads/2021/06/icon-1-150x150.png Computing Result – Formes http://formes.asia/ 32 32 Google officially kills another chat app https://formes.asia/google-officially-kills-another-chat-app/ Mon, 27 Jun 2022 22:24:04 +0000 https://formes.asia/google-officially-kills-another-chat-app/ Google Hangouts is finally going away for everyone in November 2022, and Google Chat is ready to step in as a full replacement. Once reserved for Google Workspace subscribers, Chat usually offers more features, so it’s a good trade-off. Every change involves learning how the new system works, and the small details can sometimes be […]]]>

Google Hangouts is finally going away for everyone in November 2022, and Google Chat is ready to step in as a full replacement. Once reserved for Google Workspace subscribers, Chat usually offers more features, so it’s a good trade-off.

Every change involves learning how the new system works, and the small details can sometimes be frustrating. Starting early is the best way to take control of the situation and manage the transition on your own schedule.

Google began phasing out Hangouts for Workspace customers in February 2022 and is now encouraging all Hangouts users to switch to Google Chat by November. In most cases, Hangouts messages and contacts should automatically appear in Chat, making it easy to continue ongoing conversations and reference past information.

When you open Hangouts in a web browser, a message appears at the top of the page with a link to open Google Chat and another that provides additional information. A similar transition is recommended when using the Hangouts Chrome extension, with the Google Chat progressive web app offered as an alternative to just loading Chat into a tab. The Hangouts mobile app will also be shutting down in November, and a Google Chat app is available for iPhone and Android phones.

The Google Chat transition warning in the Hangouts window.

Chat offers more features, including easy access to Google Meet – its video conferencing solution – and Google Spaces – an environment for sharing Google Drive files and Google to-do lists among multiple people and integrating them with messaging text, photo and video. In Gmail settings, chat can be enabled in a sidebar so that it can be accessed without loading a separate webpage.

As far as forced changes go, switching to chat really isn’t that bad. One of the few drawbacks is that the video call ringtone only works in the Gmail mobile app. however, a Google Meet invite can be sent from Chat to achieve a similar result.

Google has been notoriously unclear about which messaging app to use for any situation, often launching several competing solutions at once. A single thoughtful response to the common need to communicate with friends, family, and co-workers would likely have been far more popular, and perhaps cutting out Google Talk, Duo, and Hangouts will help resolve the confusion once and for all.

Google Chat and Meet are the future and integrate more with other Google apps and services. So you need to start the transition now.

Editors’ Recommendations






]]>
Faster Business Results: A Tale of Two Transformations https://formes.asia/faster-business-results-a-tale-of-two-transformations/ Thu, 23 Jun 2022 22:59:00 +0000 https://formes.asia/faster-business-results-a-tale-of-two-transformations/ By: John Gray, Data Center Marketing Manager, Aruba, a Hewlett Packard Enterprise Company. Businesses today know the world has changed and they must change with it, especially in how they approach business process improvements through the network. They want to choose and build the right capabilities to centrally host applications and data in distributed locations, […]]]>

By: John Gray, Data Center Marketing Manager, Aruba, a Hewlett Packard Enterprise Company.

Businesses today know the world has changed and they must change with it, especially in how they approach business process improvements through the network.

They want to choose and build the right capabilities to centrally host applications and data in distributed locations, and they want to connect their people, devices, and resources the way they need to limit disruption and smooth operations to the growth.

The answers lie at the intersection of hybrid cloud and next-generation data centers, technology that is transforming IT operations and organizations.

The end goal is to drive faster business results through the implementation of technology that dramatically simplifies management and operational complexity, allowing them to not worry about underlying network protocols, topologies and the associated complexity. Instead, they can focus on higher-impact projects and the priorities needed to run the business.

Two companies recently improved business processes and results by better integrating edge and data center networks.

ONGC, India’s largest oil and natural gas company, was looking for a pay-as-you-go model that could be implemented quickly with no impact on security and availability. He chose an HPE Superdome Flex on the HPE GreenLake Platform because it can process more real-time data, accelerate analytics, and maintain fault-tolerant operations with in-memory computing, resulting in higher performance for SAP S/4 HANA workloads..

CGSB The HPE GreenLake Extended Agreement also supports a new deployment of edge networking solutions to deliver faster, more reliable connectivity and to reduce network latency. The result is that ONGC’s complete edge-to-cloud infrastructure for the SAP environment now runs on a consistent platform, making it both easier to manage and support.

Another story is that of Australia’s leading container terminal operator, Patrick Terminals. The terminal offers precise orchestration between ships, cranes and heavy ground vehicles. Patrick Terminals streamlines a complex operation with autonomous machines that maximize efficiency, improve customer service, reduce costs and improve human safety, all orchestrated from a private cloud. Patrick Terminals recently transformed its private cloud with HPE Synergy Composable Infrastructure, HPE Primera Storage, HPE StoreOnce Backup, HPE Cloud Bank Storage, and Aruba Networking. The result is faster, more reliable service. These improvements have resulted in time and fuel savings for the terminal and its customers.

These are just two of many examples where integrating technology from HPE and Aruba solutions helps deliver a cloud-like experience to IT operators with simplicity, speed, and security in flexible consumption models as service.

HPE and Aruba offer dozens of highly differentiated pre-engineered IT infrastructure solutions offering a wide variety of HPE compute, storage and networking products that cover a range of offerings including virtualization, vSAN, l hyperconverged infrastructure, high performance computing, system critical applications, Microsoft solutions, SAP HANA and VMware. These integrated, ready-to-deploy IT data center solutions help simplify and accelerate IT.

Tangible and lasting benefits

Organizations undergoing digital transformation want proven paths to success first. HPE Reference Architectures document fully tested and validated workload architectures based on decades of HPE technical experience and ISV expertise, providing the following benefits:

First, to reduce the complexity of planning, designing, and implementing infrastructure across a variety of workloads and infrastructure platforms.

Second, to achieve rapid deployment with less risk by using a repeatable benchmark of best practices to determine optimized configurations.

Finally, achieving 75% faster deployment of complex, integrated IT stacks.

In addition, here are some additional examples of HPE reference architectures powered by Aruba Data Center Networking technology:

An upcoming conversation will be at HPE Discover 2022, Next Generation Architecture and Management for Data Centers – Session ID: DEMO501. Here you can listen and learn how Aruba can help you modernize the data center with simplified and automated distributed services architectures built around a host of pre-engineered HPE compute, storage and networking solutions.

  • Learn how Aruba’s networking solutions bring cloud-like operations to data centers – Session ID: BB5334
    This session will discuss how Aruba solutions bring cloud-like operations to enterprise data centers, simplifying operations and accelerating service delivery.
  • Next Generation Ethernet Data Center Fabrics – Session ID: T4811
    The next wave of data center connectivity requires higher performance 25/100 and 100/400 GbE fabrics to support workloads running on more powerful compute and faster storage.

Copyright © 2022 IDG Communications, Inc.

]]>
New Technique Significantly Speeds Up Computer Programs Without Fear of Errors https://formes.asia/new-technique-significantly-speeds-up-computer-programs-without-fear-of-errors/ Tue, 21 Jun 2022 22:33:25 +0000 https://formes.asia/new-technique-significantly-speeds-up-computer-programs-without-fear-of-errors/ Researchers have created a technique that increases the speed of programs that run in the Unix shell, a ubiquitous programming environment created 50 years ago, by parallelizing programs. Credit: Christine Daniloff, MIT Computer scientists have developed a new system capable of accelerating the execution of computer programs, while guaranteeing precision. Researchers have developed a technique […]]]>

Researchers have created a technique that increases the speed of programs that run in the Unix shell, a ubiquitous programming environment created 50 years ago, by parallelizing programs. Credit: Christine Daniloff, MIT

Computer scientists have developed a new system capable of accelerating the execution of computer programs, while guaranteeing precision.

Researchers have developed a technique that can dramatically speed up certain types of computer programs automatically, while ensuring that program results remain accurate.

Their system increases the speed of programs that run in the Unix shell, a ubiquitous programming environment that was created 50 years ago and is still widely used today. Their method parallelizes these programs, which means that it divides the program components into chunks that can be executed simultaneously on multiple computer processors.

This allows programs to perform tasks such as web indexing, natural language processing, or data analysis in a fraction of their original runtime.

“There are so many people who use these types of programs, like data scientists, biologists, engineers and economists. Now they can automatically speed up their programs without worrying about getting incorrect results,” says Nikos Vasilakis, a researcher at the Computer Science and Artificial Intelligence Laboratory (CSAIL) of MIT.

The system also makes it easier for programmers to develop tools used by data scientists, biologists, engineers and others. They don’t need to make any special adjustments to their program commands to enable this automatic, error-free parallelization, adds Vasilakis, who chairs a committee of researchers from around the world who have been working on this system for nearly two years.

Vasilakis is lead author of the group’s latest research paper, which includes MIT co-author and CSAIL graduate student Tammam Mustafa, and will be presented at the USENIX Symposium on Operating Systems Design and Implementation . Co-authors include lead author Konstantinos Kallas, a graduate student at the University of Pennsylvania; Jan Bielak, student at Staszic high school in Warsaw; Dimitris Karnikis, software engineer at Aarno Labs; Thurston HY Dang, a former MIT postdoc who is now a software engineer at Google; and Michael Greenberg, assistant professor of computer science at Stevens Institute of Technology.

A decades-old problem

This new system, known as PaSh, focuses on programs or scripts that run in the Unix shell. A script is a sequence of commands that instructs a computer to perform a calculation. The correct and automatic parallelization of shell scripts is a thorny problem that researchers have faced for decades.

The Unix shell remains popular, in part because it is the only programming environment that allows a script to be composed of functions written in multiple programming languages. Different programming languages ​​are better suited to specific tasks or data types; if a developer uses the right language, solving a problem can be much easier.

“People also like to develop in different programming languages, so composing all of these components in one program is something that happens very frequently,” Vasilakis adds.

While the Unix shell allows for multilingual scripting, its flexible and dynamic structure makes such scripts difficult to parallelize using traditional methods.

Parallelizing a program is usually tricky because some parts of the program depend on other parts. This determines the order in which the components should run; get the command wrong and the program fails.

When a program is written in a single language, developers have explicit information about its functionality and the language that helps them determine which components can be parallelized. But these tools do not exist for scripts in the Unix shell. Users cannot easily see what is going on inside components or extract information that would aid parallelization.

A just-in-time solution

To overcome this problem, PaSh uses a preprocessing step that inserts simple annotations on program components that it thinks might be parallelizable. Then PaSh attempts to parallelize these parts of the script while the program is running, at the exact moment it reaches each component.

This avoids another problem in shell programming – it’s impossible to predict a program’s behavior in advance.

By parallelizing the program components “just in time”, the system avoids this problem. It is able to efficiently accelerate many more components than traditional methods that attempt to perform parallelization in advance.

Just-in-time parallelization also ensures that the accelerated program always returns accurate results. If PaSh happens to a program component that cannot be parallelized (maybe it depends on a component that hasn’t been executed yet), it just executes the original version and avoids causing an error.

“No matter the performance benefits – if you promise to get something working in a second instead of a year – if there’s a chance of returning incorrect results, no one will use your method,” says Vasilakis.

Users do not need to make any changes to use PaSh; they can simply add the tool to their existing Unix shell and tell their scripts to use it.

Acceleration and precision

Researchers have tested PaSh on hundreds of scripts, from classic to modern programs, and it hasn’t broken a single one. The system was able to run programs six times faster, on average, compared to unprecedented scripts, and it reached a peak speedup of almost 34 times.

It also increased the speed of scripts that other approaches were unable to parallelize.

“Our system is the first that shows this type of transformation quite correct, but there is also an indirect benefit. The way our system is designed allows other researchers and industry users to build on this work,” says Vasilakis.

He is excited to get additional feedback from users and see how they improve the system. The open-source project joined the Linux Foundation last year, making it widely available to users in industry and academia.

In the future, Vasilakis wants to use PaSh to solve the problem of distribution – dividing a program to run on multiple computers, rather than multiple processors within a single computer. It also seeks to improve the annotation scheme so that it is more user-friendly and can better describe the complex components of the program.

“Unix shell scripts play a key role in data analysis and software engineering tasks. These scripts could run faster by making the various programs they invoke use the multiple processing units available in modern processors. However, the dynamic nature of the hull makes it difficult
design parallel execution plans in advance,” says Diomidis Spinellis, professor of software engineering at the Athens University of Economics and Business and professor of software analysis at the Technical University of Delft, who did not participate in this research. “Through just-in-time parsing, PaSh-JIT successfully conquers the dynamic complexity of the shell and thus reduces script execution times while maintaining the accuracy of the corresponding results.”

“As a direct replacement for a regular shell that orchestrates steps, but doesn’t reorder or divide them, PaSh provides a simple way to improve the performance of big data processing jobs,” adds Douglas McIlroy, Assistant Professor in the Department of Computer Science at Dartmouth College, which previously ran the Computer Science Research Department at Bell Laboratories (which was the birthplace of the Unix operating system). “Manual optimization to exploit parallelism must be done at a level for which ordinary programming languages ​​(including shells) do not provide abstractions of their own. The resulting code mixes questions of logic and efficiency. It is difficult to read and difficult to maintain in the face of changing requirements. PaSh intelligently intervenes at this level, preserving the original logic on the surface while achieving efficiency when the program is running.

Reference: “Practically Correct, Just-in-Time Shell Script Parallelization” by Konstantinos Kallas, Tammam Mustafa, Jan Bielak, Dimitris Karnikis, Thurston HY Dang, Michael Greenberg and Nikos Vasilakis.
PDF

This work was supported, in part, by the Defense Advanced Research Projects Agency and the National Science Foundation.

]]>
The belief system of the super-rich, by Yemi Adetayo https://formes.asia/the-belief-system-of-the-super-rich-by-yemi-adetayo/ Mon, 20 Jun 2022 03:17:03 +0000 https://formes.asia/the-belief-system-of-the-super-rich-by-yemi-adetayo/ The truth is, if you know what the rich know and do what they do, you will get the same result. You must realize that the super-rich know that life will not give them what they deserve but what they desire. The first thing they do then is to positively affect their belief systems. Your […]]]>

The truth is, if you know what the rich know and do what they do, you will get the same result. You must realize that the super-rich know that life will not give them what they deserve but what they desire. The first thing they do then is to positively affect their belief systems. Your belief system will affect your drive in life. In order for your desires to work for yourself, you must believe that you too can be rich.

Life does not give you what you deserve; he gives you what you want. If you look around you will see many contradictions. Do you know how many graduates and masters work for illiterate bosses, all because they don’t believe in themselves?

Life doesn’t care about having a first degree or a master’s degree. The basic question is: What are your desires? What exactly do you want to become in life? Are you living your dreams? The worst thing that can happen to a living soul is to believe that the super-rich aren’t ready to welcome more people into their fold. This kind of thinking can kill his dreams and cause him to develop a three square meal mentality. Turn on your dreams and wake up to make your dreams come true.

Life will not give what you deserve but what you desire

The truth is, if you know what the rich know and do what they do, you will get the same result. You must realize that the super-rich know that life will not give them what they deserve but what they desire. The first thing they do then is to positively affect their belief systems. Your belief system will affect your drive in life. In order for your desires to work for yourself, you must believe that you too can be rich.

The common belief of the poor is that the rich get richer and the poor get poorer. You need to know why the rich get richer and the poor get poorer. The fundamental factor that works against the poor is their belief system. It is not the diploma that will pave the way for you. The fact that you don’t have a degree can’t be a stumbling block either. Positive beliefs have a way of empowering you to succeed.

Just because you change your belief system doesn’t mean your situation will change overnight. But gradually things will start to change, you will start meeting positive people and you will start encountering challenges that will bring out the best in you. Also, know that if everyone believes in you and you don’t believe in yourself, you won’t make it.

Is success more difficult than failure?

Some people think that it is harder to succeed than to fail. Is it true ? Nope! Failure is a habit and so is success. Your state of life is generally consistent with your belief system. If you are to succeed you must realize that success is not more difficult, it might be difficult at first but with time it becomes easy, while failure is easy but will definitely make life difficult.

Incremental improvements

Just because you change your belief system doesn’t mean your situation will change overnight. But gradually things will start to change, you will start meeting positive people and you will start encountering challenges that will bring out the best in you. Also, know that if everyone believes in you and you don’t believe in yourself, you won’t make it. But if nobody believes in you but you believe in yourself, you will certainly succeed.

Wealth is a matter of decision and the decision is personal. I have a cousin who has not passed her WAEC exam once. When we finished our school certificate exam, she only got three credits. She tried again twice and got the same result. In her church, a prophet said she was not cut out for the academic world, and she was advised to learn a trade. But she believed she would get there. She took the exam for the fourth time and still earned three credits. At that time, her father said that he had no more money to waste, that until she decided to learn a trade, she should forget about getting more money from him. She quickly looked for a job, so that she could finance the retake exams herself. She wrote it the fifth time and was able to do five credits, excluding English and math. She took the opportunity to enroll in an evening computer program with the help of one of our uncles. She was able to complete her diploma program. She then rewrote the SSCE exam and got enough credits this time. Later, she was admitted to study computer science in one of the polytechnics. She was able to raise money and went to school. Her father was still watching events unfold and he eventually had to support her when her success became too obvious to ignore. He had to be part of the success story!

The truth is, not everyone needs to believe in you for you to be successful. Believe in yourself and never give up, like my cousin did. People will eventually believe in you when they see you succeed.

Believe in yourself!

The truth is, not everyone needs to believe in you for you to be successful. Believe in yourself and never give up, like my cousin did. People will eventually believe in you when they see you succeed.

People have said that it is not easy to succeed in Nigeria, that everything was easier in the “good old days”. The problem is that we didn’t have the privilege of being there at the time, so we have to make good use of our own days.

Back in my university days, tuition was only 90 naira and I graduated by paying 120 naira. But now, in the same school, people pay up to 125,000 naira. If you haven’t had the privilege of going to school, does that mean you won’t go to school? Not at all, it just means you have to pay more. This means you have to find ways to make it happen. Let’s want good things, even if the economy is tough, and let’s make sure we get them.

You can make impossibilities possible

When Ali Baba got into stand-up, this art form was not in vogue. Some people would have laughed at him, others would have told him to go get a good job. But due to his strong self-confidence, he worked hard on himself and made sure not to give up. He made sure to study hard, do what was necessary, and was eventually able to give birth to the comedy industry. Some have used Ali Baba’s model to become rich and very rich comedians. It became possible because someone believed in themselves. Just by believing in yourself, you could even make our country better. Remember that life doesn’t give you what you deserve, it only gives you your desire. Wealth is not a game of what you deserve, life only gives you what you want. Your desires begin with what you believe. Believe you will get there and you will. You will succeed!

Yemi Adetayo, Success Strategist and Leadership Expert, can be reached at: counseloryemi@gmail.com.

ADVERTISING CITIZEN-FM


Support the integrity and credibility journalism of PREMIUM TIMES

Good journalism costs a lot of money. Yet only good journalism can guarantee the possibility of a good society, an accountable democracy and a transparent government.

For free and continued access to the best investigative journalism in the country, we ask that you consider providing modest support to this noble endeavour.

By contributing to PREMIUM TIMES, you help sustain relevant journalism and keep it free and accessible to everyone.

Make a donation


ANNOUNCEMENT TEXT: Call Willie – +2348098788999






Announcement of the PT Mag campaign

]]>
WBJEE Results: Record Passing Percentage of 98.5, CBSE Students Dominate Top 10 List https://formes.asia/wbjee-results-record-passing-percentage-of-98-5-cbse-students-dominate-top-10-list/ Fri, 17 Jun 2022 21:51:24 +0000 https://formes.asia/wbjee-results-record-passing-percentage-of-98-5-cbse-students-dominate-top-10-list/ The West Bengal Joint Entrance Examination Board (WBJEEB) announced the results of the West Bengal Joint Entrance Examination (WBJEE) on Friday, with 98.5% of students settling their papers. Students affiliated with the Central Board for Secondary Education (CBSE) topped the “Top-10” merit list by securing the top two spots. WBJEEB President Malayendu Saha announced the […]]]>

The West Bengal Joint Entrance Examination Board (WBJEEB) announced the results of the West Bengal Joint Entrance Examination (WBJEE) on Friday, with 98.5% of students settling their papers. Students affiliated with the Central Board for Secondary Education (CBSE) topped the “Top-10” merit list by securing the top two spots.

WBJEEB President Malayendu Saha announced the top 10 list comprising six students from CBSE board and two students from Council of Indian School Certificate Examinations (CISCE) and West Bengal Board of Secondary Education superior (WBCHSE). Incidentally, the first and second tier holders shared the same name – Himanshu Shekhar from Barrackpore Central Model School in North 24 Parganas District dominated the exam while his namesake from Nirman Vidya Jyoti School in Siliguri, in North Bengal, was second.

“The announcement confused me because I couldn’t figure out if I was first or second. But when the name of my school was announced, I realized that I was ahead of the exam. It feels good to secure the front row. Congratulations to my namesake who is second,” said Himanshu, the first-rank holder. His namesake, Himansu, the second-rank holder, said he wanted to study computer science in an IIT. “I never thought I would get such a good result. I want to study computer science.

Saptarshi Mukherjee from the Future Foundation School in Kolkata – affiliated with CISCE – was third. Janhvi Shaw from South Point School in Kolkata finished fourth.

The best of Express Premium
Prime
Explained: What are the ED and IT cases against Rahul and Sonia Gandhi?Prime
Prayagraj demolition falls under Allahabad HC order, says ex-CJPrime
Behind the protest against the Agnipath regime: Temporary passage, no pension or health insurance...Prime

Fifth position, however, went to Koustav Chowdhury of Cooch Behar Jenkins School, which is affiliated with the WBCHSE.

This year, the WBJEE was held on April 30 in 277 centers – 274 in West Bengal, two in Assam and one in Tripura. A total of 1,14,013 students registered for the exam, of whom 81,393 (80.26%) sat.

A total of 80,132 students (98.5%) passed the exam, of which 58,623 (73.2%) are male and 21,509 (26.8%) are female. Out of the total number of successful students, 61,794 are from West Bengal while 18,338 are from other states.

Of the successful students, 41,839 (52.2%) are from the WBCHSE council, 22,227 (27.74%) from the CBSE council, and 2,146 (2.68%) from the CISCE council and 13,920 (17. 37%) from other state councils. .

According to district performance in West Bengal, North 24 Parganas, Kolkata, West Midnapore, East Midnapore and Hooghly topped the list.

“This year, 20% more students sat for the exam than last year. Registration for the successful student council will begin the third week of August,” Saha said.

]]>
Exro Refutes Unsubstantiated Patent Infringement Allegations and Files for ePropelled Patent Review https://formes.asia/exro-refutes-unsubstantiated-patent-infringement-allegations-and-files-for-epropelled-patent-review/ Wed, 15 Jun 2022 20:30:00 +0000 https://formes.asia/exro-refutes-unsubstantiated-patent-infringement-allegations-and-files-for-epropelled-patent-review/ In response to the claims made by ePropelled, Exro filed a petition with the United States Patent and Trademark Office for examination of ePropelled’s patent. Exro claims that the patent that ePropelled claims to have infringed is invalid. Exro also submitted an in-depth independent analysis of the patent by the award-winning MIT professor. CALGARY, Alta., […]]]>
  • In response to the claims made by ePropelled, Exro filed a petition with the United States Patent and Trademark Office for examination of ePropelled’s patent.
  • Exro claims that the patent that ePropelled claims to have infringed is invalid.
  • Exro also submitted an in-depth independent analysis of the patent by the award-winning MIT professor.

CALGARY, Alta., June 15, 2022 /CNW/ – Exro Technologies Inc. (TSX: EXRO) (OTCQB: EXROF) (the “Company” or “Exro”), a leading cleantech company that has developed a new class of power electronics for electric motors and batteries, is issuing this statement in response to the lawsuit filed by ePropelled against the Company on January the 21st2022.

Exro has filed a petition with the United States Patent and Trademark Office for inter partes Review (“IPR”) of U.S. Patent No. 7,382,103 (“the ‘103 Patent”), assigned to patentee ePropelled, Inc. A inter partes examination is used to challenge the patentability of US patent claims based on prior art, which is evidence that an invention was already known before an application for patent protection was filed. The filing follows a thorough analysis by an independent engine expert and concludes that ePropelled’s ‘103 patent, which Exro allegedly infringed, is itself invalid.

The independent analysis was conducted by a professor of electrical engineering and computer science and mechanical engineering at Massachusetts Institute of Technology (MIT) who is an expert in the field of power electronics. The expert holds a Bachelor of Science, a Master of Science, a Master of Science in Electrical Engineering and a Doctor of Philosophy from MIT, where he has been teaching since 1993. His work has been widely published in specialized journals. The expert has also received numerous awards and honors for his research and teaching and holds more than 20 patents for energy conversion controls and power systems. The results of this independent review are included in DPI filed by Exro IPR2022-01154.

Based on the results of the independent review, Exro asserts that, unlike the patents held by Exro, there are numerous prior art references that demonstrate that ePropelled’s ‘103 patent is invalid. Revocation of the ‘103 patent would render ePropelled’s infringement claims moot. As such, the Company anticipates that upon completion of the IPR, the ‘103 patent awarded to ePropelled, Inc. will be voided, resulting in an immediate resolution of ePropelled’s claim and a full vindication by Exro.

In addition to filing the IPR, Exro also filed a separate defamation lawsuit against ePropelled Inc. on February 15, 2022in the Superior Court of the County of Middlesex in the Commonwealth of Massachusetts. This litigation concerns a defamatory statement against Exro in a press release published on January 24, 2022and the Company is actively committed to maintaining its reputation, the validity of its technology and the protection of its shareholders.

“We are confident in our ability to defeat the claims made against us and this IPR filing will confirm the fact that ePropelled’s patent is invalid, making it impossible for any entity to infringe it,” said Exro’s CEO. Sue Ozdemir. “Our goal remains to continue to successfully develop and commercialize our products with our partners. As we vigorously defend our technology and reputation against this undeserved patent infringement action, we are not distracted from executing our strategy. commercial and our commitment to providing an innovative generation technology solution to the electric mobility market.

About Exro Technologies Inc.

Exro is a cleantech company pioneering smart power electronics control solutions to help solve the toughest problems in electrification. Exro has developed a new class of control technology that extends the capabilities of electric motors, generators and batteries. Exro allows the app to do more with less power consumed.

Exro’s advanced motor control technology, the Coil DriverMT, extends the capabilities of electric powertrains by enabling intelligent optimization for efficient energy consumption. Exro works with many partners around the world to bring their technology to the electric mobility industries and beyond.

For more information, visit our website at www.exro.com.

To view our corporate presentation, visit www.exro.com/investors

Visit us on social media @exrotech.

CAUTION REGARDING FORWARD-LOOKING STATEMENTS

This press release contains forward-looking statements and forward-looking information (together, “forward-looking statements”) within the meaning of applicable securities laws. All statements, other than statements of historical fact, are forward-looking statements. Generally, forward-looking statements can be identified by the use of terms such as “plans”, “expects”, “estimates”, “intends”, “anticipates”, “believes” or variations thereof. of such words, or statements that certain actions, events, or results “could”, “could”, “would”, “could”, “will be taken”, “occur”, or “will be achieved”. Forward-looking statements involve risks, uncertainties and other factors disclosed under “Risk Factors” and elsewhere in the Company’s filings with Canadian securities regulators, which could cause results, performance Actual prospects, prospects and opportunities differ materially from those expressed or implied by such statements. forward-looking statements. Although the Company believes that the assumptions and factors used in preparing these forward-looking statements are reasonable based on information currently available to management as of the date hereof, actual results and developments may differ materially from those contemplated by such statements. statements. Readers are therefore cautioned not to place undue reliance on such statements, which speak only as of the date of this press release, and no assurance can be given whether such events will occur within the time frames stated or not. at all. Except as required by applicable law, the Company disclaims any intention or obligation to update or revise any forward-looking statement, whether as a result of new information, future events or otherwise.

This information is qualified in its entirety by the cautionary statements and disclosure of risk factors contained in the Company’s filings with the Canadian securities authorities, including the Company’s Annual Information Form for the year ended December 31, 2021and the financial statements and related MD&A for the year ended December 31, 2021filed with the securities authorities of certain provinces of Canada and available at www.sedar.com. Should one or more of these risks or uncertainties materialize, or should assumptions underlying the forward-looking information prove incorrect, actual results may differ materially from those described herein as anticipated, planned, anticipated, believed, estimated or expected. Although the Company has attempted to identify important risks, uncertainties and factors that could cause actual results to differ materially, there may be others that cause results not to be those anticipated, estimated or planned. The Company does not intend and undertakes no obligation to update this forward-looking information, except as otherwise required by applicable law.

Neither the Toronto Stock Exchange nor the Investment Industry Regulatory Organization of Canada accepts responsibility for the adequacy or accuracy of this press release.

SOURCE Exro Technologies Inc.

For more information: Investor enquiries: [email protected]Canadian Investors: Jake Bouma at 604-317-3936, US Investors: Vic Allgeier at 646-841-4220, Media Inquiries: [email protected]

]]>
Oracle Gets Best Estimates on Cloud Boom https://formes.asia/oracle-gets-best-estimates-on-cloud-boom/ Mon, 13 Jun 2022 20:32:00 +0000 https://formes.asia/oracle-gets-best-estimates-on-cloud-boom/ June 13 (Reuters) – Cloud and enterprise software firm Oracle Corp (ORCL.N) beat Wall Street estimates for quarterly profit and revenue on Monday as more companies rose their spending on cloud services while moving to a hybrid work environment. Shares of the Austin, Texas-based company, which have fallen about 27% so far this year, are […]]]>

June 13 (Reuters) – Cloud and enterprise software firm Oracle Corp (ORCL.N) beat Wall Street estimates for quarterly profit and revenue on Monday as more companies rose their spending on cloud services while moving to a hybrid work environment.

Shares of the Austin, Texas-based company, which have fallen about 27% so far this year, are up nearly 9% in extended trade.

Oracle’s total cloud revenue, which includes its infrastructure-as-a-service and software-as-a-service businesses, rose 3% to $7.61 billion.

Join now for FREE unlimited access to Reuters.com

“We believe this spike in revenue growth indicates that our infrastructure business has now entered a phase of hyper-growth,” Oracle CEO Safra Catz said in a statement.

Catz attributed the rise in revenue to the company’s Fusion and NetSuite cloud applications and strong demand for its infrastructure cloud business.

The company has expanded its data center operations across the world as it seeks to capture the surge in demand for cloud computing and enterprise software.

Oracle is working to increase its cloud regions, or geographies that allow customers to get faster access from a local data center, to better compete with companies like Microsoft (MSFT.O), Amazon .com (AMZN.O) and Alphabet Inc. (GOOGL.O) Google.

Revenue for the fourth quarter ended May 31 rose 5% to $11.84 billion, above analysts’ average estimate of $11.66 billion, according to IBES data from Refinitiv.

Excluding items, the company earned $1.54 per share, beating estimates of $1.37 per share.

Join now for FREE unlimited access to Reuters.com

Reporting by Akash Sriram and Chavi Mehta in Bengaluru; Editing by Vinay Dwivedi

Our standards: The Thomson Reuters Trust Principles.

]]>
Data encryption strategies become mainstream as the amount of cloud-based data grows https://formes.asia/data-encryption-strategies-become-mainstream-as-the-amount-of-cloud-based-data-grows/ Sat, 11 Jun 2022 15:01:09 +0000 https://formes.asia/data-encryption-strategies-become-mainstream-as-the-amount-of-cloud-based-data-grows/ The number of organizations consistently applying a data encryption strategy has risen sharply in the space of a year, while many are finding it easier to locate the data they need for their work. Organizations saying they have a cohesive enterprise-wide encryption strategy in the Middle East rose from 29% to 63% between last year […]]]>

The number of organizations consistently applying a data encryption strategy has risen sharply in the space of a year, while many are finding it easier to locate the data they need for their work.

Organizations saying they have a cohesive enterprise-wide encryption strategy in the Middle East rose from 29% to 63% between last year and this year, as many seek greater control over dispersed data cloud-based.

These are the main findings of a recent survey of security and IT professionals, which was conducted by the Ponemon Institute.

The study involved 6,000 companies from various industries and countries, including the United Arab Emirates and Saudi Arabia, and the response indicated that many are prioritizing their investments in digital security to regain control of data in dynamic cloud environments and growing cybersecurity threats.

Jump the gap

Although they have seen a steady level of adoption over the past few years amid the growing prevalence of cloud-based systems, encryption strategies have now become the go-to part of fintech, especially in the Middle East. East, where the rate of consistent application within a company jumped dramatically from 29% to 63%.

Similarly, 70% of respondents in the Middle East rated their senior executives’ level of support for enterprise-wide encryption strategy as “significant” or “very significant.”

The data also shows a significant 39% decrease in the number of people struggling to locate the right data; be identified as one of the key challenges in planning and executing an effective data encryption strategy.

Hamid Qurechi

“With an unprecedented amount of cybersecurity threats challenging organizations today, coupled with dynamic new cloud environments, it has never been more important to have an enterprise-wide encryption strategy in place. “, comments Hamid QurechiRegional Sales Manager, Middle East, Africa and South Asia at Entrust.

“This [report] is indicative of a new awakening to the need for more consistent and proactive data security.

While the results indicate that organizations have moved from assessing the problem to taking action, they also reveal gaps in the implementation of encryption across many categories of sensitive data.

For example, while half of respondents in the Middle East say encryption is widely deployed in containers, only 31% say the same for big data repositories and 32% on IoT platforms.

Similarly, while 71% consider hardware security modules (HSMs) an important part of an encryption and key management strategy, 37% still do not have an HSM.

These results highlight the acceleration of digital transformation underpinned by the move to the cloud, as well as the increased focus on data protection.

Enterprises seek greater control over their cloud data

The sensitive nature of data stored in multiple cloud environments requires companies to strengthen their security strategy. This notably includes containerized applications, where HSM usage has reached an all-time high of 35%.

More than half of Middle Eastern respondents to the report admitted that their organizations transfer sensitive or confidential data to the cloud, whether or not it is encrypted or rendered unreadable through some other mechanism such as tokenization or data masking. .

Worryingly, an additional 23% said they expected to do so within one to two years.

“The growing adoption of multi-cloud environments, containers and serverless deployments, as well as IoT platforms, is creating a new kind of IT security headache for many organizations,” Qureshi added.

“This is compounded by the growth of ransomware and other cybersecurity attacks. This year’s research shows that organizations respond by seeking to maintain control over encrypted data rather than letting platform providers manage it. to secure.

When it comes to protecting some or all of their data at rest in the cloud, 41% of respondents in the Middle East said encryption is done in the cloud using keys generated and managed by the cloud provider; an improvement from the 28% recorded in 2021.

A further 32% said encryption was done on-premises before sending data to the cloud using keys generated and managed by their organization, while a quarter used some form of Bring Your Own (BYOK) approach. key). These two models remained at the same level as last year’s results.

Together, these results indicate that the benefits of cloud computing outweigh the risks associated with moving sensitive or confidential data to the cloud, but also that encryption and data protection in the cloud are handled more directly.

The employee threat to sensitive data

In terms of threat sources, respondents identified employee error as the top threat that could lead to exposure of sensitive data, although this figure is only down 2% from the last year.

Threat from temporary or contract workers increased by 10% to highest level on record; reaching 42 percent. The other top-ranked threats identified were system or process malfunction (19%) and hackers (33%).

These results make it clear that threats come from all directions, so it’s distressing but not surprising that 64% of respondents in the Middle East admitted to having experienced at least one data breach in 2020, and roughly half (49%) to have experienced one. over the past 12 months.

“In 17 years of conducting this study, we have seen fundamental changes across the industry. Findings from the Entrust 2022 Global Encryption Trends study indicate that organizations are more proactive with cybersecurity rather than simply reactive,” said Dr. Larry Pomonpresident and founder of the Ponemon Institute.

“While the sentiment is very positive, the results also indicate an increasingly complex and dynamic IT landscape with growing risks that require a practical approach to data security and a pressing need to turn cybersecurity strategies into action as needed. as soon as possible. ”

“As more enterprises migrate applications across multi-cloud deployments, monitoring this activity is necessary to ensure security policies are enforced and compliance with regulatory requirements. Likewise, encryption is essential to protect company and customer data. It’s encouraging to see such a big leap in enterprise-wide adoption,” said Cindy Provin, SVP for Identity and Data Protection at Entrust.

“However, encryption management and associated key protection are growing issues as organizations use multiple cloud services for critical functions. As the workforce becomes more transient, organizations need a holistic approach to security based on identity, zero trust, and strong encryption rather than older models that rely on perimeter security and passwords.

]]>
How does our brain process and store movements? Scientists find the answer, with implications for multiple diseases as well as machine learning https://formes.asia/how-does-our-brain-process-and-store-movements-scientists-find-the-answer-with-implications-for-multiple-diseases-as-well-as-machine-learning/ Thu, 09 Jun 2022 22:02:43 +0000 https://formes.asia/how-does-our-brain-process-and-store-movements-scientists-find-the-answer-with-implications-for-multiple-diseases-as-well-as-machine-learning/ From our birth, and even before, we interact with the world through movement. We move our lips to smile or to speak. We reach out to touch. We move our eyes to see. We squirm, we walk, we gesture, we dance. How does our brain remember this wide range of motion? How does he learn […]]]>

From our birth, and even before, we interact with the world through movement. We move our lips to smile or to speak. We reach out to touch. We move our eyes to see. We squirm, we walk, we gesture, we dance. How does our brain remember this wide range of motion? How does he learn new ones? How does it do the calculations necessary for us to grab a glass of water, without dropping it, smashing it, or missing it?

Ruth and Bruce Rappaport Medical School Technion Professor Jackie Schiller and his team examined the brain at the level of a single neuron to shed light on this mystery. They discovered that computation occurs not only in the interaction between neurons (nerve cells), but within each individual neuron. It turns out that each of these cells is not a simple switch, but a complicated calculating machine. This discovery, recently published in the Science magazine, promises changes not only in our understanding of how the brain works, but also in a better understanding of conditions ranging from Parkinson’s disease to autism. And as if that weren’t enough, these same discoveries should advance machine learning, inspiring new architectures.

Movement is controlled by the primary motor cortex of the brain. In this field, researchers are able to identify exactly which neuron(s) are firing at any given time to produce the movement we see. Professor Schiller’s team was the first to get even closer, examining the activity not of the entire neuron as a single unit, but of its parts.

Each neuron has branching extensions called dendrites. These dendrites are in close contact with the terminals (called axons) of other nerve cells, allowing communication between them. A signal travels from the dendrites to the cell body and then is transferred through the axon. The number and structure of dendrites vary greatly between nerve cells, as the crown of one tree differs from the crown of another.

The particular neurons Professor Schiller’s team focused on were the largest pyramidal neurons in the cortex. These cells, known to be strongly involved in movement, have a large dendritic tree, with many branches, sub-branches and sub-sub-branches. What the team discovered is that these branches don’t just pass on information. Each sub-sub-branch performs a calculation on the information it receives and passes the result to the larger sub-branch. The sub-branch then performs a calculation on the information received from all its subsidiaries and transmits it. Additionally, multiple dendritic branches can interact with each other to amplify their combined calculus product. The result is a complex calculation performed within each individual neuron. For the first time, Professor Schiller’s team has shown that the neuron is compartmentalized, and that its branches carry out calculations independently.

“We used to think of each neuron as a kind of whistle, whistling or not,” says Professor Schiller. “Instead, we’re looking at a piano. Its keys can be struck simultaneously or in sequence, producing endless different melodies.” This intricate symphony playing in our brain is what allows us to learn and perform endless different, complex and precise movements.

Multiple neurodegenerative and neurodevelopmental disorders are likely to be linked to alterations in the neuron’s ability to process data. In Parkinson’s disease, it has been observed that the dendritic tree undergoes anatomical and physiological changes. In light of the Technion team’s new findings, we understand that as a result of these changes, the neuron’s ability to perform parallel computations is reduced. In autism, it seems possible that the excitability of dendritic branches is impaired, leading to the many effects associated with the condition. The new understanding of how neurons work opens up new avenues of research into these and other disorders, in hopes of alleviating them.

These same results can also serve as inspiration for the machine learning community. Deep neural networks, as their name suggests, attempt to create software that learns and functions somewhat similarly to a human brain. Although their advances are constantly in the news, these networks are primitive compared to a living brain. A better understanding of how our brains actually work can help design more complex neural networks, allowing them to perform more complex tasks.

This study was led by two of the MD-Ph.D. of Prof. Schiller. candidate students Yara Otor and Shay Achvat, who contributed equally to the research. The team also included postdoctoral fellow Nate Cermak (now a neuroengineer) and Ph.D. Hadas Benisty, along with three collaborators: Professors Omri Barak, Yitzhak Schiller, and Alon Poleg-Polsky.

The study was partially funded by the Israel Science Foundation, Prince Funds, Rappaport Foundation and the Zuckerman Postdoctoral Fellowship.

]]>
How they made movies with computers in 1963 – The New Stack https://formes.asia/how-they-made-movies-with-computers-in-1963-the-new-stack/ Sun, 05 Jun 2022 13:03:13 +0000 https://formes.asia/how-they-made-movies-with-computers-in-1963-the-new-stack/ In Mountain View, California, a museum aims to offer “unique perspectives” on software, emphasizing the belief that “our computing past informs our digital present” and declaring its goal to “preserve our collective history”. Or, to put it another way, we can appreciate how far we’ve come by appreciating artifacts from another era – and the […]]]>

In Mountain View, California, a museum aims to offer “unique perspectives” on software, emphasizing the belief that “our computing past informs our digital present” and declaring its goal to “preserve our collective history”.

Or, to put it another way, we can appreciate how far we’ve come by appreciating artifacts from another era – and the people who created them.

IBM 1401 - July 25, 2015 at the Computer History Museum (photo by David Cassel)

In 2015, the museum restored a 1959 IBM mainframe computer to working order.

The most recent exhibit from the Computer History Museum of Silicon Valley is “Early computer films: 1963-1972.”

From Wednesday – and until September 1 – the museum offers a one-hour program with the dizzying thrill of stepping back in time. It’s a time when computers were “expensive, big, and rare,” according to a blog post on the museum’s website. (Most were from government organizations, universities, corporations, and labs.) Yet a few brave souls found their way to the machines of their time and then used them to create a whole new way of communicating.

And as the museum’s blog post explains, “The decisions and details of their programs often led to surprising results, even problems that turned out to be interesting or beautiful.”

Beyond vertigo

One of the first computer animations of all time was the opening credits of Alfred Hitchock’s 1958 thriller. Vertigo. A spinning spiral in the pupil of an eye leads to a series of other circular shapes…

But that was 64 years ago, when producing even that simple effect proved incredibly difficult, according to an article by Rhizome, a new media arts nonprofit. To create the perfect abstractions, American graphic designer Saul Bass eventually turned to computer graphics pioneer John Whitney, who in turn had to adapt elaborate 850-pound World War II military equipment used to aim anti-aircraft fire.

An unsung ancestor of computer animation, Whitney continued to experiment with digital art, and the museum notes that he would eventually receive an “Artist in Residence” grant from IBM in 1965.

Their film program features another early computer-animated film created by Whitney in 1972 – titled “Matrix III”.

But the museum begins its computer animation story with the three-minute “Simulation of a Dual-Gyro-Gravity Attitude Control System” — a film that, oddly enough, has a listing on IMDB.com. It was created in the legendary Bell Labs by researcher Edward E. Zajac (who also provides the film’s narration), aided by fellow math researcher Frank Sinden.

Their idea was to show how an orbiting satellite could be oriented so that it was always pointed at Earth – a feat they accomplished using only technology available in 1963. According to the description of the video on YouTube, their calculations had to be fed into a central computer. using punched cards, the result being then printed on microfilm. Then a microfilm plotter drew the results onto a cathode ray tube, where the images were photographed sequentially, to create the animated effect.

“Wow…this was made 32 years before Toy Story…” wrote one commenter on YouTube, adding “pretty awesome”.

The Computer History Museum cites Zajac as praising 1963 animation’s “ability to see process evolve over time” – something scientists had never had before in any other medium.

Zajac’s film inspired Ken Knowlton, who was then working in the computer research group at Bell Labs. The Computer History Museum quotes Knowlton as saying he was excited by the prospect of “technically accurate” animations – and Knowlton later explained the technique in detail in “A Computer Technique for the Production of Animated Movies”, a 1964 film (available on YouTube from the AT&T Archive).

It’s a groundbreaking moment in the history of digital cinema, as the 16-minute film was produced entirely with computer animation (and artwork, in the case of its non-animated title cards). So this film ultimately documents its own production process in clear, painstaking detail – with some simple, charming descriptions.

“The instructions for the desired film enter the computer in the form of a deck of punched cards… The work of producing a film thus becomes the work of punching a suitable sequence of instructions on cards .”

Electrical engineer Nestor Burtnyk and physicist Marceli Wein were experimenting with computer graphics — and had heard how Disney animators drew the first and last frame of a sequence, then had assistant animators draw the frames in between. They have developed software to perform the same task

This process has even involved the creation of what is said to be the world’s first domain-specific embedded language: BEFLIX. (The Museum reports that the language’s name was an abbreviated version of the phrase “Bell Flicks.”) And that language is also described in Knowlton’s video. Calling it at one point the “language of film,” another title card explains that “the language speaks of images like mosaics. Each image is made up of small square dots of varying shades of gray…”

It’s an animation technique later used in 1965 by engineer A. Michael Noll, who explains the process in a documentary (also excerpted on YouTube by “The Ultimate History of CGI”).

Within seven years, “the art and technology of computer-animated motion pictures had changed dramatically and were poised to have their future enormous influence on the motion picture industry, the gaming industry, and the fine arts. “, explained the museum blog, arguing that computer animation “has blurred the lines between technologist and artist”.

In 1968, the Museum of Modern Art even presented a first exhibit on computer art, titled “The Machine Seen at the End of the Mechanical Age.”) According to a short film from the Computer History Museum, artist Lillian Schwartz had contributed to an interactive multimedia sculpture exhibit – and that led to a collaboration with programmers like Knowlton at Bell Labs. The result were several animated shorts that she eventually turned into “a series of art films” in the 1970s.

“His films have been widely shown in important museums with great success, expanding the aesthetic space of computer films.”

One of Peter Foldes’ most notable films from 1971, “Metadata”, and the museum tells the story of its origins. Electrical engineer Nestor Burtnyk and physicist Marceli Wein were experimenting with computer graphics — and had heard how Disney animators drew the first and last frame of a sequence, then had assistant animators draw the frames in between. They developed software to perform the same task (using keyframes drawn with Douglas Engelbert’s newly invented technological gadget – the mouse.)

A project for the National Film Board of Canada led to their collaboration with Foldes (released in 1971).

nose pencil pusher

Another artist using the BEFLIX language to create computer-animated shorts was Stan VanDerBeek.

The Computer History Museum recalls that VanDerBeek already had experience with hand-drawn (and collage-based) animation, and while visiting Bell Labs he created a series of shorts called Poemfields. One of the challenges was that the artist couldn’t see what his film looked like until it was finished. The museum quotes VanDerBeek as saying that making computer movies “is like learning to draw by pushing a pencil with your nose”.

But the results were freeform visual art marvels, especially when VanDerBeek began to use existing film processing techniques to add color to his films. The Museum points out that for Poemfiled, No. 7, “VanDerBeek commissioned legendary composer John Cage to create the score for the film.

On YouTube, the AT&T Tech channel created a video putting together Poemfield #1 (1965) with Poemfield #8 (likely sometime after 1971).

Search the web long enough and you’ll find an excerpt from a 1972 documentary (supposedly copied from a VHS tape) showing a candid assessment of VanDerBeek himself. “I’ve been experimenting with the computer since 1965, trying to figure out a way to use this machine,” VanDerBeek told his audience, adding, “Frankly, I don’t understand it, and I’m trying to understand it…

“There are a lot of difficulties about this thing. It is a man-machine relationship, involving new languages, new thought structures and a new approach. What does the artist do to a machine…?

Historical hand

It’s funny how compelling those early films can be. On a YouTube channel called “Everything has its first time” there is an archived version of the world’s first 3D rendered film. In 1972, two young computer scientists named Ed Catmull and Frederic Parke created a rendering of Ed’s left hand.

The six-minute film explains how a model was made by hand, specifically with 350 triangles and polygons, drawn in ink, according to the video’s description.

Screenshot from Ed Catmull's Frederic Parke 1972 film Halftone Animation

The video shows how the lines of the polygons can be captured and then transformed into a realistic looking hand simply by adding a “smooth shading” effect.

The video also includes an eerie view of the computer-generated hand from on the inside fingers.

As the film continues, the team renders an artificial heart valve, then a face – Parke’s wife – and finally, a pair of faces. Even the film’s opening credits were computer generated. But as simple as that sounds, the film’s official Library of Congress entry notes that in achieving this feat in 1972, “Catmull crafted concepts that became the basis for the computer graphics that followed.”

And the curator of the YouTube channel adds a historical note at the start of the film. “The clip was eventually discovered by a Hollywood producer and incorporated into the 1976 film future world.”

This movie is historic in another way. In 1982, young Ed Catmull landed a job at Lucasfilm Graphics Group where he worked on Star Trek II: Wrath of Khan. (The One Star Trek wiki acknowledges him as being “largely responsible” for the CGI animation showing the film’s “Project Genesis”.)

Catmull’s story provides the ultimate proof that our past plants the seed of our present. Because in the years to come, Ed Catmull became the co-founder of Pixar – and later, the president of Walt Disney Animation Studios.

Creativity_inc book cover

In 2014, Catmull reflected on a life spent turning technology into art

Presentation image: Screenshot of the film from ATT Archives A computer technique for the production of animated films (Bell Labs 1964).

]]>