From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Many of us want to be original in our work. For researchers, it is a job requirement. For software programmers, it makes little sense to redo what others did. Many...Daniel Lemire From Daniel Lemire's Blog | January 30, 2014 at 10:44 AM
This looks to be very good.
Add that to these three indexes of NSA source material, and these two summaries.
This excellent parody website has a good collection...schneier From Schneier on Security | January 30, 2014 at 07:52 AM
In Recode: Google continues to add AI gems to its capabilities. Search is a part of learning, and thus enhanced by AI. We search by pattern visually, as well...Franz Dill From The Eponymous Pickle | January 29, 2014 at 09:46 PM
The Computer Science Teachers' Association, in partnership with Code.org, has established an award to recognize an administrator who has made an outstanding contribution... From Computer Science Teachers Association | January 29, 2014 at 06:01 PM
An unexpected snowstorm hits the city in the middle of a workday. The roads get hopelessly clogged and I'm lucky to get home--many others just abandoned theirguarantees...Lance Fortnow From Computational Complexity | January 29, 2014 at 03:52 PM
In Knowledge@Wharton. An extensive and interesting pieceFinding a Place for Market Research in a Big Data, Tech-enabled WorldThanks to social media and other technology...Franz Dill From The Eponymous Pickle | January 29, 2014 at 03:46 PM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
GINSU
(TS//SI//REL) GINSU provides software application persistence for the...schneier From Schneier on Security | January 29, 2014 at 03:28 PM
On January 22, the Presidential Commission on Election Administration issued the report requested of it by President Obama. Formed after reports of long lines...David B. From U.S. Public Policy Committee of the ACM | January 29, 2014 at 03:18 PM
Interesting paper: "The value of Online Privacy," by Scott Savage and Donald M. Waldman.
Abstract: We estimate the value of online privacy with a differentiated...schneier From Schneier on Security | January 29, 2014 at 01:26 PM
More on the crypto approach to the Jacobian Conjecture Arno van Essen is one of the world experts on the Jacobian conjecture (JC)—we have discussed his work before...rjlipton From Gödel's Lost Letter and P=NP | January 29, 2014 at 12:41 PM
I received news today that Yves Deswarte passed away on January 27th.Dr. Deswarte was a notable member of the computing community, with a career of 30+ years as...Gene Spafford From CERIAS Blog | January 29, 2014 at 12:26 PM
I received news today that Yves Deswarte passed away on January 27th.Dr. Deswarte was a notable member of the computing community, with a career of 30+ years as...Gene Spafford From CERIAS Blog | January 29, 2014 at 12:26 PM
I received news today that Yves Deswarte passed away on January 27th.Dr. Deswarte was a notable member of the computing community, with a career of 30+ years as...Gene Spafford From CERIAS Blog | January 29, 2014 at 12:26 PM
In IEEE Spectrum: The electric grid is already an internet of things. " ... Yet writing applications for these programmable machines is too hard, which blocks...Franz Dill From The Eponymous Pickle | January 29, 2014 at 10:02 AM
The National Science Foundation’s (NSF) Directorate for Computer and Information Science and Engineering (CISE) announced that it will hold a one-day CAREER proposal...Ann Drobnis From The Computing Community Consortium Blog | January 29, 2014 at 09:29 AM
This came up in a recent discussion. It remains an area which is over regulated. " ... Bio-printing human parts will spark ethical, regulatory debate ... 3D printing...Franz Dill From The Eponymous Pickle | January 29, 2014 at 09:18 AM
As the owner and operator of a consulting business I am acutely aware of the need to readily exchange information between people and multiple devices to improve...Franz Dill From The Eponymous Pickle | January 29, 2014 at 08:35 AM
This is very good:
...one might suppose that modern democratic states, with the lessons of history at hand, would seek to minimize fear or at least minimizeThey...schneier From Schneier on Security | January 29, 2014 at 07:24 AM
Reblogged from Meshed Insights & Knowledge: As I mentioned recently on Google+, I've recently installed a telephone system for Meshed Insights using a Raspberry...Simon Phipps From Wild WebMink | January 28, 2014 at 06:10 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Great new program from CSTA and code.org. We sometimes forget that administrators can have a huge role in promoting and developing computer science programs in....Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | January 28, 2014 at 04:40 PM