From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
From New Scientist and ACM: An experimental method to unmask sock-puppets (usually phony paid commenters, reviewers or contributors) based on the way they write...Franz Dill From The Eponymous Pickle | November 18, 2013 at 02:16 PM
In the past year or so, I've gotten reviews back on multiple papers with the complaint that the result was too simple. My interpretation of review: sure you might...Michael Mitzenmacher From My Biased Coin | November 18, 2013 at 01:25 PM
November 19 Hearing: The House Science, Space and Technology Committee will hold a hearing on the data security of the Healthcare.gov website. 1o a.m., 2318 Rayburn...David B. From U.S. Public Policy Committee of the ACM | November 18, 2013 at 11:33 AM
Suppose that you are researching a given issue. Maybe you have a medical condition or you are looking for the best algorithm to solve your current problem. A good...Daniel Lemire From Daniel Lemire's Blog | November 18, 2013 at 10:32 AM
This video is so beyond awesome that it deserves its own blog post. I may or may not have shed a few tears watching it. Keep on kicking butt, GoldieBlox. We need...Gail Carmichael From The Female Perspective of Computer Science | November 18, 2013 at 10:23 AM
Nicholas Weaver has a great essay explaining how the NSA's QUANTUM packet injection system works, what we know it does, what else it can possibly do, and how to...schneier From Schneier on Security | November 18, 2013 at 08:35 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I made a quick trip to Tucson AZ over the weekend for the CSTA Board meeting. Beautiful part of the country and I wish I had more time to explore it. But meeting...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | November 18, 2013 at 06:03 AM
Need help with business analytics? Big Data visualization, analysis and mining? Writing, Speaking, Managing. Strategy and Tactics. Over thirty years of experience...Franz Dill From The Eponymous Pickle | November 17, 2013 at 10:56 PM
President Barack Obama has announced his intent to nominate two new members to the President’s Council of Advisors on Science and Technology Policy (PCAST). The...Ann Drobnis From The Computing Community Consortium Blog | November 17, 2013 at 05:11 PM
After publishing a item about an infographic I liked, about products we buy, it was pointed out that some of the data was incorrect. That is true. But I wasinfographic...Franz Dill From The Eponymous Pickle | November 17, 2013 at 02:37 PM
More on the IBM giving access to Watson technologies to allow the building of cognitive Apps in the cloud. A good direction. The App style of infrastructure...Franz Dill From The Eponymous Pickle | November 17, 2013 at 10:48 AM
In the HBR: Indicating that they constantly audit their business model. Which has led to increases in the number of US warehouses, and their recent proposal to...Franz Dill From The Eponymous Pickle | November 17, 2013 at 01:46 AM
In Freebeacon: How can social media information be mined for indications of health related behavior? " ... Specifically, NLM will look at the “value of tweets...Franz Dill From The Eponymous Pickle | November 17, 2013 at 01:06 AM
As we approach the start of the new calendar year, it is time to start the CSTA Board of Directors nominations and elections process once again. CSTA is a member... From Computer Science Teachers Association | November 16, 2013 at 04:44 PM
In Adage: We have an Ikea store nearby. The number of items they have is so large that it is hard to believe anyone can recognize one that is out of place. So...Franz Dill From The Eponymous Pickle | November 16, 2013 at 02:14 PM
In the HBR: I like this argument about not being defensive in communications. Found myself in this position. And has some practical methods to implement it that...Franz Dill From The Eponymous Pickle | November 16, 2013 at 01:56 PM
An aspect I had never thought about very much, but very true. " ... Let’s look at IT in a simple way. There are users, there are applications, there is hardware...Franz Dill From The Eponymous Pickle | November 16, 2013 at 10:37 AM
The last part of our interview with Gödel two years ago src Kurt Gödel is said to have been a latecomer to appreciating the power of Model Theory. He was of course...KWRegan From Gödel's Lost Letter and P=NP | November 15, 2013 at 05:23 PM
Cool photo.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.
schneier From Schneier on Security | November 15, 2013 at 05:05 PM
News articles about me (or with good quotes by me).
My talk at the IETF Vancouver meeting on NSA and surveillance. I'm the first speaker after the administrivia...schneier From Schneier on Security | November 15, 2013 at 03:34 PM