From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
On February 20 at 12:00pm EST, the National Science Foundation (NSF) will host it’s next Washington Area Trustworthy Computing Hour (WATCH) talk. Deanna Caputo...Ann Drobnis From The Computing Community Consortium Blog | February 18, 2014 at 10:03 AM
In Neurorelay: Intriguing visual. Having looked into this area I would be careful about direct implications. I have worked with neuroscientists in this area...Franz Dill From The Eponymous Pickle | February 18, 2014 at 10:03 AM
In the Cisco Blog. Too many Apps with too little experience? " ... Apps, apps and more apps, is your company experiencing a proliferation of apps? Cisco certainly...Franz Dill From The Eponymous Pickle | February 18, 2014 at 09:54 AM
In a story about a stolen Stradivarius violin, there's this:
Information from a stun gun company, an anonymous tip and hours of surveillance paved the way for...schneier From Schneier on Security | February 18, 2014 at 09:30 AM
Originally posted on Meshed Insights & Knowledge:What opportunities does Open Source provide if you’re really looking to go big? Aiming to become “the next Red...AWiN SO23 From Wild WebMink | February 18, 2014 at 08:32 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Like a lot of people I have been following the Olympics lately. For all the talk about sport and individual and team achievement there is always a lot of attention...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 18, 2014 at 06:20 AM
Comments on three papers from the Conference on Computational Complexity Michael Saks is Chair of the Program Committee of this year’s Conference on Computational...rjlipton From Gödel's Lost Letter and P=NP | February 17, 2014 at 10:55 PM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
PICASSO
(S//SI//REL) Modified GSM (target) handset that collects user data...schneier From Schneier on Security | February 17, 2014 at 03:20 PM
Brought to my attention. From the Kahn Academy. A short tutorial on thinking logically. A reminder of early training and implementation we did using first order...Franz Dill From The Eponymous Pickle | February 17, 2014 at 02:59 PM
A friend sends a link from the WSJ: Why the Grass Seem's Greener. " ... We are of Two Minds - One deliberative and rational, the other quick and intuitive. ...Franz Dill From The Eponymous Pickle | February 17, 2014 at 02:50 PM
I signed an open letter from US researchers in cryptography and information security on NSA surveillance. It has received a lot of media coverage.schneier From Schneier on Security | February 17, 2014 at 01:13 PM
In GigaOM: Remember seeing this at a Philips visit. A retail approach we looked at. The integrating into existing retail infrastructure is key. " .... The Dutch...Franz Dill From The Eponymous Pickle | February 17, 2014 at 09:42 AM
In the Algamest: " .... Method of recording brain activity could lead to mind-reading devices, Stanford scientists say ... " What do we do with it and what protections...Franz Dill From The Eponymous Pickle | February 17, 2014 at 09:32 AM
The following is a special contribution to this blog by Ran Libeskind-Hadas, R. Michael Shanahan Professor and Department Chair of Computer Science at Harvey Mudd...Ann Drobnis From The Computing Community Consortium Blog | February 17, 2014 at 08:55 AM
My chairman, Samir Khuller, asked me to post our job posting for a lecturer to my blog, so I and doing it right now. I think he overestimates the power of this...GASARCH From Computational Complexity | February 17, 2014 at 08:40 AM
One of the recommendations by the president's Review Group on Intelligence and Communications Technologies on reforming the National Security Agency—No. 5, if you're...schneier From Schneier on Security | February 17, 2014 at 06:23 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
We’re having quite the winter here in New England this year. People in warm climates keep telling me about how warm it is there as if that would get me going. But...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 17, 2014 at 05:47 AM
Correspondent Doug Lautzenheiser looks at alternative solutions for business intelligence and data visualization. The article includes a visualization of how a...Franz Dill From The Eponymous Pickle | February 16, 2014 at 07:45 PM
Specifically the article covers Small and Medium Sized Businesses. (SMBs) But the recommendations are good for any new and emerging technology. And a large business...Franz Dill From The Eponymous Pickle | February 16, 2014 at 12:46 PM
Atlantic takes a look at a new dawn of AI. See this blog for lots more on the topic. Always of interest here. Our enterprise was an early industrial pioneerWalter...Franz Dill From The Eponymous Pickle | February 16, 2014 at 10:30 AM