From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The NYT discusses how and why people can be given individualized prices for goods. If course this has been done for a long time. Through promotions. Loyalty...Franz Dill From The Eponymous Pickle | August 11, 2012 at 01:57 AM
Boeing demonstrates swarming drones. Which reminds me of long ago projects that looked at how simple,uni-purpose, cheap and even disposable robotics could be...Franz Dill From The Eponymous Pickle | August 11, 2012 at 12:07 AM
The sex life of the dumpling squid.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | August 10, 2012 at 09:02 PM
Several directorates within the National Science Foundation (NSF) — including Computer and Information Science and Engineering (CISE) — issued a Dear Colleague...Erwin Gianchandani From The Computing Community Consortium Blog | August 10, 2012 at 06:13 PM
Of Interest: Another DARPA example I have just examined. Automated, deep natural-language understanding technology may hold a solution for more efficiently processing...Franz Dill From The Eponymous Pickle | August 10, 2012 at 01:21 PM
My article for InfoWorld this week considers three different projects – OmniOS (derived from Illumos, the new name given to OpenSolaris), GitHub and OpenStack –...Simon Phipps From Wild WebMink | August 10, 2012 at 01:17 PM
Sure, stories like this are great fun, but I don't think it's much of a security concern. Terrorists can't build a plot around random occasional security failures...schneier From Schneier on Security | August 10, 2012 at 10:51 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
http://aka.ms/fzytjrTopicTechBytes Windows 8 Development for Government, Healthcare...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | August 10, 2012 at 09:38 AM
Jeff Erickson gets the blame for pointing out this amusing/disturbing video on counting. I feel like I should make it a background video before my undergraduate...Michael Mitzenmacher From My Biased Coin | August 10, 2012 at 03:00 AM
In the Supply Chain Digest. David Schneider suggests that the one best supply chain metric is Operating Cash flow, or OCF. I admit I had to think about that...Franz Dill From The Eponymous Pickle | August 10, 2012 at 02:50 AM
An interesting article on Wired.com today, featuring Google computer scientists Jeff Dean and Sanjay Ghemawat: Time and again, we hear the story of Xerox PARC,...Erwin Gianchandani From The Computing Community Consortium Blog | August 9, 2012 at 06:33 PM
Impossible but true: a new approach to linear systems Prasad Raghavendra is an expert in many aspects of complexity theory, especially the foundations of approximation...rjlipton From Gödel's Lost Letter and P=NP | August 9, 2012 at 04:27 PM
Received:If you haven't already found it, take a look at the P&G Alumni Bookstore. Books published by your fellow alumni. Just go to the Book Directory tab on the...Franz Dill From The Eponymous Pickle | August 9, 2012 at 03:01 PM
There’s been a lot written about NASA’s Mars Science Laboratory this week, in light of its successful landing on the surface of Mars early Monday morning — including...Erwin Gianchandani From The Computing Community Consortium Blog | August 9, 2012 at 02:59 PM
On entity analytics. An explanatory video. "... If you haven’t heard IBM Fellow Jeff Jonas talk about how the right algorithm can help you figure out who’s...Franz Dill From The Eponymous Pickle | August 9, 2012 at 01:56 PM
Marc Pritchard touts the use of Facebook in the Olympics 'Thank You Mom' campaign as a perfect storm ... Good example of the use of integrated social media. ...Franz Dill From The Eponymous Pickle | August 9, 2012 at 01:43 PM
This year's Grace Hopper Celebration of Women in Computing is drawing nearer and nearer, and our call for Community Volunteers has gone out! I was a volunteer each...Gail Carmichael From The Female Perspective of Computer Science | August 9, 2012 at 12:52 PM
This is the latest in the arms race between spoofing GPS signals and detecting spoofed GPS signals.
Unfortunately, the countermeasures all seem to be patent pending...schneier From Schneier on Security | August 9, 2012 at 11:32 AM