From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
September 18 Markup: The Cybersecurity, Infrastructure Protection and Security Technologies Subcommittee of the House Homeland Security Committee will review two...David B. From U.S. Public Policy Committee of the ACM | September 16, 2013 at 10:34 AM
EPIC 2013, the conference on “ethnographic praxis in industry”, kicked off in London today, with experts from around the world gathering for the three-day conference...Experientia From Putting People First | September 16, 2013 at 10:22 AM
Leaks from the whistleblower Edward Snowden have catapulted the NSA into newspaper headlines and demonstrated that it has become one of the most powerful government...schneier From Schneier on Security | September 16, 2013 at 07:55 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Well I was able to blog more often last week. Paying a bit for it as I had a ton of grading to do over the weekend. When inspiration (or something that feels like...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | September 16, 2013 at 05:50 AM
In Foodprocessing: " ... As retailers put more emphasis on private-label products, they are relying on packaging that sets their merchandise apart, instead of mimicking...Franz Dill From The Eponymous Pickle | September 15, 2013 at 01:01 PM
Government and industry have betrayed the Internet, and us.
By subverting the Internet at every level to make it a vast, multi-layered and robust surveillanceWe...schneier From Schneier on Security | September 15, 2013 at 12:53 PM
A piece by MJ Perry on Food Inflation and Prices in the US. Inflation in food has been down considerably since the 70s. Further instructive statistics about food...Franz Dill From The Eponymous Pickle | September 15, 2013 at 11:01 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Picture from the Facebook page of www.ilovesmartwomen.com Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | September 15, 2013 at 10:57 AM
The US army / SAIC is using Tableau for Data visualization. This appears to be a descriptive visualization, as opposed to an analytic example " ... "We have...Franz Dill From The Eponymous Pickle | September 15, 2013 at 10:49 AM
Brought to my attention. Semantic analysis work is always of interest. " .... Mills Davis is founder and managing director of Project10X — a research consultancy...Franz Dill From The Eponymous Pickle | September 15, 2013 at 10:27 AM
Now that we have enough details about how the >NSA eavesdrops on the Internet, including today's disclosures of the NSA's deliberate weakening of cryptographicits...schneier From Schneier on Security | September 15, 2013 at 09:11 AM
This method was brought to my attention my a colleague. We had looked at it some time ago and it has come back as a possible exploratory solution.The Open Graph...Franz Dill From The Eponymous Pickle | September 14, 2013 at 12:36 PM
In Mind Hacks: Why the other line in a queueing situation always moves faster than yours. A good example of how perception beats out rational thought. In mywith...Franz Dill From The Eponymous Pickle | September 14, 2013 at 12:30 PM
In Innovation Excellence: We used exactly this approach in the enterprise new product development world. Its very useful if you have many competing efforts" ....Franz Dill From The Eponymous Pickle | September 14, 2013 at 12:18 PM
Cashless Vending machines are now smarter. We examined machines like this in Japan that could adapt to supply chain and demand problems.Franz Dill From The Eponymous Pickle | September 14, 2013 at 10:34 AM
Programmers often want to count things. They typically use 32-bit counters (e.g., the int type in Java). But what if you are counting small numbers? Maybe a 16-bit...Daniel Lemire From Daniel Lemire's Blog | September 13, 2013 at 07:57 PM
Diamondback squid could be a source of food. No word on taste.
As usual, you can also use this squid post to talk about the security stories in the news that...schneier From Schneier on Security | September 13, 2013 at 05:07 PM
I've now survived the first three lectures in both my classes. Both are introductory computing classes for non-majors: one is heavier on concepts but includeseven...Gail Carmichael From The Female Perspective of Computer Science | September 13, 2013 at 04:30 PM
In the coming weeks I will be passing along some of the excellent work by correspondent Phil Hendrix. Three-part Series on Engaging Social and Mobile Consumers...Franz Dill From The Eponymous Pickle | September 13, 2013 at 12:58 PM