From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Report on the recent Coding, Complexity, and Sparsity Workshop Martin Strauss and Anna Gilbert and Atri Rudra are the organizers of the just-held Coding, Complexity...rjlipton From Gödel's Lost Letter and P=NP | August 10, 2013 at 04:53 PM
Hackaday is an interesting site to follow. New uses of information technology hardware and software. Which naturally cobble together many well known techniques...Franz Dill From The Eponymous Pickle | August 10, 2013 at 02:28 PM
In the Future of the CIO Series: Some very good thoughts here. I particular: Simplicity. Not to say that I follow that recommendation well. As a follower of...Franz Dill From The Eponymous Pickle | August 10, 2013 at 12:31 PM
What ants know. And what complex networks of things can be made to 'know'. Known as Agent Based Models. We studies this a decade ago in the enterprise. Though...Franz Dill From The Eponymous Pickle | August 10, 2013 at 09:22 AM
A detailed look. With a number of recent examples, such as Microsoft. Starting to see it everywhere. " ... As the name indicates, flat design is defined by flatness...Franz Dill From The Eponymous Pickle | August 9, 2013 at 11:28 PM
With a squid.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | August 9, 2013 at 05:16 PM
Why is it that there are still so few video games stories with awesome female protagonists that don't play into the usual gender stereotypes? What's a gamer toZelda...Gail Carmichael From The Female Perspective of Computer Science | August 9, 2013 at 03:44 PM
Since the President issued an Executive Order on cybersecurity information sharing back in February, several groups have worked on implementing parts of that order...David B. From U.S. Public Policy Committee of the ACM | August 9, 2013 at 03:26 PM
For several of my classes, I open Facebook groups so that my students can exchange online. In some instances, it has worked great. Facebook tends to do a better...Daniel Lemire From Daniel Lemire's Blog | August 9, 2013 at 01:40 PM
Lavabit, the more-secure e-mail service that Edward Snowden -- among others -- used, has abruptly shut down. From the message on their homepage:
I have been forced...schneier From Schneier on Security | August 9, 2013 at 12:45 PM
On Bits vs atoms: Nothing new here, our enterprise did this for years, and is one of the supporters of this effort, the post below does give a good overview of...Franz Dill From The Eponymous Pickle | August 9, 2013 at 11:37 AM
As a young professor, I wrote a grant proposal and took it to a senior theory professor for comments. He told me to take out the line "The ultimate goal of computational...Lance Fortnow From Computational Complexity | August 9, 2013 at 09:52 AM
It's being reported, although there's no indication of where this rumor is coming from or what it's based on.
...the new tactic allows terrorists to dip ordinary...schneier From Schneier on Security | August 9, 2013 at 07:04 AM
I used the Prezi presentation and storytelling tool for a project some years ago. Just revisited it. An introductory video. With many useful examples. It now...Franz Dill From The Eponymous Pickle | August 9, 2013 at 12:14 AM
Useful R Resources. Books, online, lists, videos, examples. Will add this to my list. I find R similar to Mathematica and APL (from long ago). First language...Franz Dill From The Eponymous Pickle | August 8, 2013 at 03:17 PM
I had cause to download Bunchball's whitepaper on gamification (registration required). Logically done, as a non technical review of the underlying idea of using...Franz Dill From The Eponymous Pickle | August 8, 2013 at 01:35 PM
Brought to my attention, In The Financial Express, from Jyothi Satyanathan, director Mid-market & Inside Sales, IBM India/South Asia. I much agree with his opening...Franz Dill From The Eponymous Pickle | August 8, 2013 at 01:21 PM
Twitter just rolled out a pretty nice two-factor authentication system using your smart phone as the second factor:
The new two-factor system works like this....schneier From Schneier on Security | August 8, 2013 at 01:20 PM
Cursory look at the implications for security of Bring Your Own Device (BYOD) implementations. We were early experimenters with the BYOD concept, and security...Franz Dill From The Eponymous Pickle | August 8, 2013 at 10:03 AM
In Google Operating System: An indication that Google is now showcasing long form articles. We have become very used to small sized nuggets of information on...Franz Dill From The Eponymous Pickle | August 8, 2013 at 08:47 AM