From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
1) Sharon Goldberg and Nick Feamster asked me to announce the following:In the tradition of CAEC, NYCE, and etc, we are holding a "Day" on online censorship at...Michael Mitzenmacher From My Biased Coin | February 14, 2013 at 01:21 AM
This is a real story of a pair of identical twins who are suspected in a crime. There is there is CCTV and DNA evidence that could implicate either suspect. Detailed...schneier From Schneier on Security | February 13, 2013 at 07:39 PM
From a specialty in Complex Analysis Rolf Nevanlinna was one of the top complex analysts of the last century, and is widely cited as the most famous Finnish mathematician...rjlipton From Gödel's Lost Letter and P=NP | February 13, 2013 at 07:28 PM
STOC and Complexity are co-located this July in beautiful Palo Alto, California. Both conferences have just announced their accepted papers: STOC (with PDF links...Lance Fortnow From Computational Complexity | February 13, 2013 at 05:42 PM
Divided Brain, Divided World; Why the best part of us struggles to be heard is an RSA report that explores the practical significance of the scientific fact that...Experientia From Putting People First | February 13, 2013 at 04:15 PM
Nicolas Nova went skiing and saw a lot of GoPro cameras on people’s heads. He got intrigued, and wrote an Ethnography Matters column where he questions informal...Experientia From Putting People First | February 13, 2013 at 03:36 PM
How seriously should we (as researchers, practitioners, users, and members of society) seek to understand and factor in the intentions of the designers who made...Experientia From Putting People First | February 13, 2013 at 03:31 PM
There's not a lot of information -- and quite a lot of hyperbole -- in this article:
With the release of the Asrar Al Dardashah plugin, GIMF promised "secure correspondence"...schneier From Schneier on Security | February 13, 2013 at 12:13 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I found this very interesting info graphic (OK Doug Peterson tweeted the link so really he found it first) from Seattle University at Training in Technology: The...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 13, 2013 at 10:14 AM
Think of your favourite games that are about a particular character. Do you actually play that character, or are you just the coach? That is, are you able to fully...Gail Carmichael From The Female Perspective of Computer Science | February 12, 2013 at 08:33 PM
This is an amazing story. I urge you to read the whole thing, but here's the basics:
A November car chase ended in a "full blown-out" firefight, with glass and...schneier From Schneier on Security | February 12, 2013 at 06:55 PM
The other day I was reading () Desire2Learn Acquires Course-Suggestion Software Inspired by Netflix and Amazon. The article discusses a program that uses information... From Computer Science Teachers Association | February 12, 2013 at 05:28 PM
While teaching the Equiv of DFA, NDFA, Reg exps, I wanted to impress upon my students that the best way to show DFA-langs are closed under concat and * is to first...GASARCH From Computational Complexity | February 12, 2013 at 04:56 PM
February 14 Hearing: The House Select Committee on Intelligence will hold a hearing on advanced cyber threats. 10 a.m., HVC-210 Capitol Visitors Center The Research...David B. From U.S. Public Policy Committee of the ACM | February 12, 2013 at 04:36 PM
Society runs on trust. Over the millennia, we've developed a variety of mechanisms to induce trustworthy behavior in society. These range from a sense of guiltThis...schneier From Schneier on Security | February 12, 2013 at 12:53 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
The About the Program page for the CS Principles, A New First Course in Computing website has some updated documents since the last time I visited it. Of particular...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 12, 2013 at 09:49 AM
Anyone else watching Jon Stewart making fun of Harvard w/regard to the "cheating scandal".[I need the exact wording for the punch line -- "Open Internet? Is this...Michael Mitzenmacher From My Biased Coin | February 12, 2013 at 04:17 AM
This is an extremely clever man-in-the-middle timing attack against AES that exploits the interaction between how the protocol implements AES in CBC mode for encryption...schneier From Schneier on Security | February 11, 2013 at 07:25 PM
One of my clients once got upset. Indeed, the running time of our image processing algorithm grew by a factor of four when he doubled the resolution of an image...Daniel Lemire From Daniel Lemire's Blog | February 11, 2013 at 03:26 PM
Interesting article about the difficulty Google has pushing security updates onto Android phones. The problem is that the phone manufacturer is in charge, and...schneier From Schneier on Security | February 11, 2013 at 12:49 PM