From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Today, the United States is conducting offensive cyberwar actions around the world.
More than passively eavesdropping, we're penetrating and damaging foreign networks...schneier From Schneier on Security | June 21, 2013 at 04:43 PM
In the HBR Blog. Provocative piece on the number of changes occurring that could influence the near term future of P&G. And many other consumer goods companies...Franz Dill From The Eponymous Pickle | June 21, 2013 at 02:00 PM
In Nature: We thought of using teams of robots to gather information from the plant and manufacturing spaces and outdoor staging yard floor. We did use satellite...Franz Dill From The Eponymous Pickle | June 21, 2013 at 01:00 PM
Lessons from Japan's response to Aum Shinrikyo:
Yet what's as remarkable as Aum's potential for mayhem is how little of it, on balance, they actually caused. Don't...schneier From Schneier on Security | June 21, 2013 at 11:25 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
A recent report on the quality of teacher training has stirred up a lot of discussion about how teachers should be prepared. With the ongoing shortage of qualified...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | June 21, 2013 at 09:33 AM
When you are a Computer Science teacher there is a universe of knowledge that you can transfer to your students, depending on the interest they show. You can teach... From Computer Science Teachers Association | June 21, 2013 at 12:43 AM
The Informs Analytics e-Newsletter. Always informative. Subscribe. Latest articles:- Continuing education for analytics professionals- Big data paying off for...Franz Dill From The Eponymous Pickle | June 21, 2013 at 12:15 AM
Is a key to polynomial versus exponential complexity lurking here? Cropped from Abel Prize source Mikhail Gromov is a French-Russian mathematician who has made...Pip From Gödel's Lost Letter and P=NP | June 20, 2013 at 09:21 PM
Thinking about real time processing. Getting more important every day. We addressed this for complex high speed manufacturing lines. Linking advanced analytics...Franz Dill From The Eponymous Pickle | June 20, 2013 at 09:17 PM
In IEEE Spectrum: An energy savings idea, but one that does increase the complexity of the smart home. Visited Corning some years ago and enjoyed their approaches...Franz Dill From The Eponymous Pickle | June 20, 2013 at 08:54 PM
This article, on the cozy relationship between the commercial personal-data industry and the intelligence industry, has new information on the security of Skype...schneier From Schneier on Security | June 20, 2013 at 07:42 PM
An economist friend asked me if there were still productivity gains to be had for office workers (like us). After all, we have email, social networks, skype and...Lance Fortnow From Computational Complexity | June 20, 2013 at 06:10 PM
A fine piece: "A Love Letter to the NSA Agent who is Monitoring my Online Activity."
A similar sentiment is expressed in this video.schneier From Schneier on Security | June 20, 2013 at 05:19 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
A recent interview in the New York Times with Laszlo Bock, senior vice president of people operations at Google had some interesting things to say about the value...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | June 20, 2013 at 03:03 PM
A long time interest of mine is covered in the current Knowledge @ Wharton, why and when do people balk in a queue? What are the dynamics involved and how can...Franz Dill From The Eponymous Pickle | June 20, 2013 at 02:38 PM
In Ad Age: Insightful, thinking now how about the interaction of privacy and big data. Are the algorithms involved also privacy sensitive?  " ... In addition...Franz Dill From The Eponymous Pickle | June 20, 2013 at 02:28 PM
Companies allow US intelligence to exploit vulnerabilities before it patches them:
Microsoft Corp. (MSFT), the world's largest software company, provides intelligence...schneier From Schneier on Security | June 20, 2013 at 11:04 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Last week there was an announcement of a multi-year $5.2 million grant from the NSF to fund creation of a new Advanced Placement Computer Science course calledCS...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | June 19, 2013 at 10:30 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Mark Guzdial is one of the people I most respect in the area of computer science education so when he says something is good or bad I tend to take it very seriously...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | June 19, 2013 at 10:29 PM
Trust is a Choice – Prolegomena of Anthropology of Trust(s) by Stephanie A. Krawinkler 189 pages, 2013 Carl-Auer Verlag (Publisher) [Amazon link] [Extract] Trust...Experientia From Putting People First | June 19, 2013 at 10:27 PM