From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The Computing Community Consortium (CCC) invites nominations for members to serve on its 20-person Council. We are looking for individuals who have ideas, energy...Ann Drobnis From The Computing Community Consortium Blog | February 11, 2014 at 10:58 AM
What are the advantages and challenges inherent in working with children in the design process for creating games or apps? How do you stop them getting bored, and...Experientia From Putting People First | February 11, 2014 at 10:38 AM
In Technology Review. Google seeking Deep learning. More on the DeepMind acquisition. With some concerns by those doing academic research. And motivation: ...Franz Dill From The Eponymous Pickle | February 11, 2014 at 10:04 AM
In the Forrester Blog: About Bosch making acquisitions to set themselves up for this integration. Worth thinking. Not sure there is enough difference betweensmart...Franz Dill From The Eponymous Pickle | February 11, 2014 at 09:30 AM
Via Stefan Conrady of Bayesia: Modeling Vehicle Choice and Simulating Market Share with Bayesian Networks Useful example of the technical application of Bayesian...Franz Dill From The Eponymous Pickle | February 11, 2014 at 09:18 AM
Cory Doctorow gives a good history of the intersection of Digital Rights Management (DRM) software and the law, describes how DRM software is antithetical to end...schneier From Schneier on Security | February 11, 2014 at 08:15 AM
We’ve got a new nation-state espionage malware. "The Mask" was discovered by Kaspersky Labs:
The primary targets are government institutions, diplomatic offices...schneier From Schneier on Security | February 11, 2014 at 07:57 AM
Talking to Strangers: Chinese Youth and Social Media by Tricia Wang Doctor of Philosophy in Sociology, University of California, San Diego, 2013 Professor Richard...Experientia From Putting People First | February 11, 2014 at 07:07 AM
Consumers want value for personal information. The survey specifics are interesting. " ... A new IBM (NYSE: IBM) study of more than 30,000 global consumers...Franz Dill From The Eponymous Pickle | February 10, 2014 at 06:14 PM
Assisting the blind with sonification, changing sensory information to sound. " ... Researchers at Universidad Carlos III de Madrid (UC3M) have developed an assistive...Franz Dill From The Eponymous Pickle | February 10, 2014 at 05:51 PM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
WISTFULTOLL
(TS//SI//REL) WISTFULTOLL is a UNITEDRAKE and STRAITBIZZARE plug...schneier From Schneier on Security | February 10, 2014 at 03:58 PM
BASF's internal network. An area we also worked in the enterprise, and were influenced by both BASF and IBM. Worth a closer look now regarding where they have...Franz Dill From The Eponymous Pickle | February 10, 2014 at 02:41 PM
DARPA’s new Memex program seeks user-defined, domain-specific search of public information, and plans to use its groundbreaking research to fight human trafficking...Shar Steed From The Computing Community Consortium Blog | February 10, 2014 at 02:11 PM
Farnam Jahanian, Assistant Director at the National Science Foundation (NSF) for the Computer and Information Science and Engineering (CISE) Directorate has sent...Ann Drobnis From The Computing Community Consortium Blog | February 10, 2014 at 09:10 AM
Open science and its implications. See Open Science Foundation, and its twitter feed. " ... The Open Science Federation is a nonprofit alliance working to improve...Franz Dill From The Eponymous Pickle | February 10, 2014 at 08:52 AM
There has been a lot of news about Bengian cryptographer Jean-Jacques Quisquater having his computer hacked, and whether the NSA or GCHQ is to blame. It's a lot...schneier From Schneier on Security | February 10, 2014 at 07:57 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
A lot of people seem the be ready for spring. I’m enjoying the snow in my yard and around the area. Inspired in part by the Winter Olympics going on my family and...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 10, 2014 at 06:15 AM
(Stephen Colbert tells me that NFL guards their copyright of the name of the game they played on Sunday, which is why stores say they have a `big game sale on beer'...GASARCH From Computational Complexity | February 9, 2014 at 10:52 PM
Currently thinking about how a visual could be used to provide an easily scan-able graphic. Consider the infographic as an easy to refer to summary of the data...Franz Dill From The Eponymous Pickle | February 9, 2014 at 07:34 PM