From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Not a title that you might expect to see, but Richard Stallman has indeed posted a pragmatic proposal for dealing with software patents – to limit enforceability...Simon Phipps From Wild WebMink | November 9, 2012 at 12:46 PM
Interesting research from RAND:
Abstract: How do terrorist groups end? The evidence since 1968 indicates that terrorist groups rarely cease to exist as a result...schneier From Schneier on Security | November 9, 2012 at 12:41 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I’m a big fan of CSEdWeek (Computer Science Education Week) and in the past I have done school visits and hosted field trips at Microsoft offices during the week...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | November 9, 2012 at 10:29 AM
Do you have a deaf or hard of hearing student in your class who is interested in math, science and/or computing? Encourage your student to check out the Summer... From Computer Science Teachers Association | November 8, 2012 at 10:24 PM
Do you have a deaf or hard of hearing student in your class who is interested in math, science and/or computing? Encourage your student to check out the Summer... From Computer Science Teachers Association | November 8, 2012 at 10:24 PM
Some results and ideas on guessing and nondeterminism David Doty and Michael Wehar are theorists who work in different areas of computational complexity, and are...Pip From Gödel's Lost Letter and P=NP | November 8, 2012 at 10:09 PM
Good essay, making the point that cyberattack and counterattack aren't very useful -- actual cyberdefense is what's wanted.
Creating a cyber-rock is cheap. Buying...schneier From Schneier on Security | November 8, 2012 at 07:24 PM
O'Reilly talks about Square Wallet and a number of other software developments. I have also been introduced recently to some Apps that interact with health data...Franz Dill From The Eponymous Pickle | November 8, 2012 at 04:51 PM
Guest Blog by Andrew Goldberg on the recent Max Flow in O(nm) time algorithm.
Maximum Flow in O(nm) Time
Recently, Jim Orlin published an O(nm) maximum flow algorithm...GASARCH From Computational Complexity | November 8, 2012 at 03:53 PM
Here's a great concept: a micromort:
Shopping for coffee you would not ask for 0.00025 tons (unless you were naturally irritating), you would ask for 250 grams...schneier From Schneier on Security | November 8, 2012 at 12:57 PM
Here’s my interview with this month’s Oracle Java Magazine about the forces driving open source and the need for open source skills.Simon Phipps From Wild WebMink | November 8, 2012 at 11:50 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I first ran into the question of paying faculty based on the subject they taught some years ago during an industry advisory meeting for a university computer science...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | November 8, 2012 at 10:00 AM
Gave a talk at the VA Center for Applied Engineering today in Indianapolis on the integration of design and analytically driven innovation. Also got to see poster...Franz Dill From The Eponymous Pickle | November 8, 2012 at 04:39 AM
A new degree of analytic learning? An interesting interview: " ... Barbara Wixom is an associate professor at University of Virginia’s McIntire School of Commerce...Franz Dill From The Eponymous Pickle | November 8, 2012 at 04:28 AM
Charlene Li on the failure of social strategies. Why most fail. Agree with many of the points made here. It can be hard to make them work disconnected from specific...Franz Dill From The Eponymous Pickle | November 8, 2012 at 04:17 AM
It's hard for me to get too worked up about this vulnerability:
Many popular applications, HTTP(S) and WebSocket transport libraries, and SOAP and REST Web-services...schneier From Schneier on Security | November 7, 2012 at 07:39 PM
I was asked to post the following:We are pleased to announce that NYCE 2012, the fifth annual New YorkComputer Science and Economics Day, will be held in New York...Michael Mitzenmacher From My Biased Coin | November 7, 2012 at 06:52 PM
In a long post, emerging markets strategist Niti Bhan [with whom Experientia collaborates] discusses her approach to strategic design planning and concept development...Experientia From Putting People First | November 7, 2012 at 04:52 PM
This is the sort of thing I wrote about in my latest book.
The Prisoners Dilemma as outlined above can be seen in action in two variants within regulatory activities...schneier From Schneier on Security | November 7, 2012 at 02:16 PM