From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
I think this is a good move on Microsoft's part:
Microsoft is recommending that customers and CA's stop using SHA-1 for cryptographic applications, including use...schneier From Schneier on Security | November 13, 2013 at 03:17 PM
The last battle? In Knowledge@Wharton. For dominance in retail. " ... In the retail realm, it’s a clash of the titans: Walmart, the world’s largest retailer,But...Franz Dill From The Eponymous Pickle | November 13, 2013 at 03:03 PM
For both my classes, I put together a study guide that included some general tips on studying as well as what topics to focus on. Since the general advice works...Gail Carmichael From The Female Perspective of Computer Science | November 13, 2013 at 12:31 PM
It has been some time since I looked at the vendor Pentaho. Examined it for use in the enterprise. I noticed that they have something called the data blend of...Franz Dill From The Eponymous Pickle | November 13, 2013 at 10:26 AM
A post this week in AmStatNews, the membership magazine of the American Statistical Association, is a ringing endorsement of CCC’s activities: “On the topic of...Ed Lazowska From The Computing Community Consortium Blog | November 13, 2013 at 10:25 AM
On Tuesday, November 12, 2013, the first non-human rang the closing bell on the NASDAQ stock market. A robotic arm was selected to ring the bell to mark the launch...Shar Steed From The Computing Community Consortium Blog | November 13, 2013 at 10:17 AM
Can a semi-structured text database like the Wikipedia be used to extract structured data? This is the goal of the DbPedia: " ... DBpedia is a crowd-sourced community...Franz Dill From The Eponymous Pickle | November 13, 2013 at 10:05 AM
What are the cultural and social aspects of wearable computing? A Ga Tech researcher addresses. While I agree this is an issue, you could, and some did make the...Franz Dill From The Eponymous Pickle | November 13, 2013 at 09:57 AM
Der Speigel is reporting that the GCHQ used QUANTUMINSERT to direct users to fake LinkedIn and Slashdot pages run by -- this code name is not in the article --reacted...schneier From Schneier on Security | November 13, 2013 at 07:46 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
This went out to the CSTA Member mailing list tonight. Thought it was worth sharing. Beginning Monday, November 18th, 13-17 year old pre-university studentsgoogle...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | November 12, 2013 at 09:05 PM
Register now to attend the 2013 Business Intelligence Symposium offered through the Center for Business Analytics in the Carl H. Lindner College of Business atThe...Franz Dill From The Eponymous Pickle | November 12, 2013 at 03:02 PM
Some of us work hard to generate new ideas. All of us train on how to implement ideas. But our days look like this: I have 100 ideas. I write down 50 of them. The...Daniel Lemire From Daniel Lemire's Blog | November 12, 2013 at 02:40 PM
In Smartblogs: The rise of the omni-channel shopper in the millennial. The link below is also of interest and new to me." ... The Coca-Cola Company sponsors this...Franz Dill From The Eponymous Pickle | November 12, 2013 at 02:17 PM
Adobe lost 150 million customer passwords. Even worse, they had a pretty dumb cryptographic hash system protecting those passwords. schneier From Schneier on Security | November 12, 2013 at 02:04 PM
Mostly Netflix and Youtube. Not surprising, being heavily used video resources. While I am a litte surprised at this: " ... Meanwhile, peer-to-peer file sharing...Franz Dill From The Eponymous Pickle | November 12, 2013 at 11:25 AM
In my last post I asked you to solve the following question which
was from the Maryland Math Competition:
The inequalities 1/2 + 1/3 + 1/6 = 1 and 1/2 + 1/3 +...GASARCH From Computational Complexity | November 12, 2013 at 11:15 AM
Recent research had me take a look back on the Cyc project, which we had examined during our AI explorations. We talked to Lenat's Cycorp. The system promised...Franz Dill From The Eponymous Pickle | November 12, 2013 at 11:15 AM
In Wired: As you might expect, the primary uses here are military. " ... This Drone Can Fly, Swim, Drive, and Hop Its Way Through a Mission .. " But it points...Franz Dill From The Eponymous Pickle | November 12, 2013 at 09:32 AM
Thinking Future architecture. " ... Doing Enterprise Architecture is different from managing other type of IT or business project, as it includes from abstract...Franz Dill From The Eponymous Pickle | November 12, 2013 at 09:27 AM
This article argues that online gambling is a strategic national threat because terrorists could use it to launder money.
The Harper demonstration showed the technology...schneier From Schneier on Security | November 12, 2013 at 07:35 AM