From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This is what happens when you're a security writer and you piss off the wrong people: they conspire to have heroin mailed to you, and then to tip off the police...schneier From Schneier on Security | July 31, 2013 at 07:25 AM
In the HBR, Avoiding the soft yes. Requires free registration to read in full. Worth doing that.Franz Dill From The Eponymous Pickle | July 30, 2013 at 09:41 PM
I've been programming since 1972 (junior year of high school, long before programming in high school was considered a normal course of events). Over the years,... From Computer Science Teachers Association | July 30, 2013 at 07:26 PM
The Axiom Of Choice, some history, some ideas Gregory Moore is a historian of mathematical logic. One connection he has to things dear to us is that he edited the...rjlipton From Gödel's Lost Letter and P=NP | July 30, 2013 at 04:38 PM
Research on why some neighborhoods feel safer:
Salesses and collaborators Katja Schechtner and César A. Hidalgo built an online comparison tool using Google Street...schneier From Schneier on Security | July 30, 2013 at 02:44 PM
In AdAge: A considerably complete program for tracking loyalty. " ... Kellogg's loyalty program brings in data on 90% of its products ... Kellogg's Family...Franz Dill From The Eponymous Pickle | July 30, 2013 at 10:51 AM
Had not heard of this, but Microsoft Virtual Academy provides free MS package training. This appears to be mostly advanced technology oriented.Franz Dill From The Eponymous Pickle | July 30, 2013 at 09:59 AM
This is a really clever social engineering attack against a bank-card holder:
It all started, according to the police, on the Saturday night where one of this...schneier From Schneier on Security | July 30, 2013 at 08:33 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Back to Canada for our interview today. Peter Beens teaches at Beamsville District Secondary School in a small town in Ontario. Peter is very active online buthere...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | July 30, 2013 at 05:39 AM
In CIO Insight: A good overview of the reasons for using encryption with personal data. The legal risks involved and current status of state laws in this area.Franz Dill From The Eponymous Pickle | July 30, 2013 at 12:12 AM
From Fast Company: Every company wants to avoid expensive mistakes. New methods of analytics with more data is leading to making better hiring choices " ... An...Franz Dill From The Eponymous Pickle | July 30, 2013 at 12:06 AM
Chris Isidore of CNN Money, wrote on July 29 about Amazon’s announcement to hire 7,000 new employees, 5,000 of which are for their nationwide distribution centers...Ann Drobnis From The Computing Community Consortium Blog | July 29, 2013 at 10:10 PM
Four hearings on Capitol Hill this week will focus on intellectual property issues related to cellphone unlocking, standard essential patents, copyright, and cross...Renee Dopplick From U.S. Public Policy Committee of the ACM | July 29, 2013 at 05:18 PM
July 30 Markup: The Senate Commerce, Science and Transportation Committee will review pending legislation. Scheduled for consideration is a new cybersecurity bill...David B. From U.S. Public Policy Committee of the ACM | July 29, 2013 at 01:05 PM
Of interest. by the SNCR which I worked with since its founding. I plan to attend.Complimentary Webinar CMO 2.0: Marketing Strategies for Dealing with Today’s...Franz Dill From The Eponymous Pickle | July 29, 2013 at 12:49 PM
For this post I will only count the operations PLUS, MINUS, MULT. They may be done on rather large numbers.
Recall that from the work coming out of Hilberts 10th...GASARCH From Computational Complexity | July 29, 2013 at 10:58 AM
In the games for change movement, what needs to change? Brenda Romero, designer in residence at UC Santa Cruz, thinks it's the games.In her Games for Change 2013...Gail Carmichael From The Female Perspective of Computer Science | July 29, 2013 at 10:39 AM
And more In Knowledge@Wharton on Mobile devices and crime. Here in much more detail about the implications of mobile to cybercrime. Your phone may be your weakest...Franz Dill From The Eponymous Pickle | July 29, 2013 at 09:50 AM
The ACM is the premier computing association in the US. It's the only major technical group that I have remained a member of for many years. This blog is mirrored...Franz Dill From The Eponymous Pickle | July 29, 2013 at 09:48 AM
In AdAge: Always thought that smartphones decreased crime by adding a new element of crowdsourced communications to inform authorities. But it turns out that...Franz Dill From The Eponymous Pickle | July 29, 2013 at 08:55 AM