From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
While it may come as a surprise, today RISC architecture computer systems dominate the mobile computing landscape. It has been 40 years in the making.
The post ...Ted Lewis From Blog@Ubiquity | October 30, 2015 at 12:59 PM
While grappling with mechanics of writing, we all too often lose sight of another important insight into effective communication.
The post What Can Paragons ofBLOG...Philip Yaffe From Blog@Ubiquity | October 14, 2015 at 12:34 PM
The ability to pivot is a sign of agility. As technology continue to rapidly advance, how close are Google and Apple to pivoting?
The post Are Google and AppleBLOG...Ted Lewis From Blog@Ubiquity | September 24, 2015 at 11:26 AM
We're still waiting for flying cars to materialize as a mass-market product. Why? The answer lies in computer technology—or the lack thereof.
The post Will theBLOG...Ted Lewis From Blog@Ubiquity | September 16, 2015 at 10:16 AM
Can robots be trusted to make better decisions than humans? Sometimes automation can be a matter or life or death.
The post Can Robots Be Trusted? appeared first...Lewis Perelman From Blog@Ubiquity | September 3, 2015 at 10:30 AM
The physical Internet is evolving away from resiliency toward fragility and vulnerability. A broken Internet means flawed cybersecurity.
The post Why Physical Cyber...Ted Lewis From Blog@Ubiquity | August 24, 2015 at 11:52 AM
The future of technology is government regulation—NOT unbridled technology.
The post The Future of Tech is Regulation appeared first on BLOG@UBIQUITY.Ted Lewis From Blog@Ubiquity | August 12, 2015 at 11:30 AM
If we want to advance the art and science of software development, we should direct our attention to the insect world of stigmergy.
The post Why Can’t Programmers...Ted Lewis From Blog@Ubiquity | August 4, 2015 at 09:55 AM
In pursuit of scientific understanding, too often we forget our level of know-how is far more important than our know-what.
The post Why We Don’t Know Know-HowBLOG...Peter Denning From Blog@Ubiquity | July 22, 2015 at 02:44 PM
Computer systems used to be weak, so we had to make their world simple and standardized. They now can handle almost endless complexity—but we still need to understand...Espen Andersen From Blog@Ubiquity | July 15, 2015 at 06:14 PM
The NSA's track record on government surveillance, which many argue violates fundamental constitutional rights, may lead to a fragmented Internet.
The post Government...Ted Lewis From Blog@Ubiquity | June 23, 2015 at 01:23 PM
Many people in the Western world believe Internet freedom equals freedom of social and political life. The more access we get, the more freedom and democracy we...Ted Lewis From Blog@Ubiquity | June 11, 2015 at 10:00 AM
The notion that creating ideas and imagining new worlds fashioned around these ideas are the keys to innovation is all wrong. Ideation is not innovation
The post...Peter Denning From Blog@Ubiquity | June 4, 2015 at 10:59 AM
The tech world is caught in a repeating, self-similar fractal, where the gadgets may be new, but the business models are as old as the Industrial Revolution itself...Ted Lewis From Blog@Ubiquity | May 27, 2015 at 01:19 PM
In the 1990's Manindra Agrawal and V. Arvind published a paper claiming that if SAT is reducible to a (non-uniform) weighted threshold function then P = NP. Their...Lance From Computational Complexity | October 15, 2009 at 04:59 PM
This week Bill and I are both at the Dagstuhl Workshop on Algebraic Methods in Computation Complexity. I'll try to cover some of the talks and discussions on the...Lance From Computational Complexity | October 12, 2009 at 05:12 PM
Bill and I battle it out over what should be taught in a complexity course in our new vidcast.
Lance From Computational Complexity | October 9, 2009 at 05:14 PM
On the New York Times website, John Markoff writes an article Prizes Aside, the P-NP Puzzler has Consequences motivated by my CACM article on The Status of the....Lance From Computational Complexity | October 8, 2009 at 05:14 PM
When you get an invitation via email should you accept? How well targeted is it? Some real examples that I got.
EXAMPLE ONE:
I would like to invite you toclick...GASARCH From Computational Complexity | October 6, 2009 at 05:15 PM
In a prior post (a while back) I pondered if Mahaney's theorem (SAT \le_m S, S Spare, implies P=NP) should be taught in a basic grad course in complexity. I thought...GASARCH From Computational Complexity | October 5, 2009 at 05:16 PM