From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Each time I am told I should unreservedly respect decisions made by authorities in secret, I remember this song by Chris Wood. I always cry. Folk music is still...Simon Phipps From Wild WebMink | March 2, 2012 at 03:09 PM
In the March CACM, Barry Cooper writes
We quote Peter J. Denning introducing the ACM Ubiquity Symposium on "What is Computation?" as saying: "Researchers in biology...Lance Fortnow From Computational Complexity | March 2, 2012 at 02:44 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Interesting new student competition from Time Warner Cable (TWC). As part of Connect a Million Minds (CAMM), the company’s five-year, $100 million commitment to...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | March 2, 2012 at 12:40 PM
Great movie-plot threat:
Financial institutions depend on timing that is accurate to the microsecond on a global scale so that stock exchanges in, say, London...schneier From Schneier on Security | March 2, 2012 at 12:11 PM
Following on from my blog post at ComputerWorldUK, InfoWorld in the US asked me if I would write a column for them about LibreOffice. I gathered together the rather...Simon Phipps From Wild WebMink | March 2, 2012 at 11:29 AM
Daniel Szuc and Josephine Wong describe the current state of UX design in Asia: “As businesses in Asia in various domains look to how they can mature, differentiate...Experientia From Putting People First | March 2, 2012 at 11:00 AM
Together with a committed group of colleagues and partners, cultural anthropologist Mimi Ito has been engaged in the MacArthur FoundationExperientia From Putting People First | March 2, 2012 at 09:55 AM
Austin Center for Design today published a new book focused on the role of design in social entrepreneurship. Titled Wicked Problems: Problems Worth Solving, the...Experientia From Putting People First | March 2, 2012 at 09:23 AM
I spent the last three days at the O’Reilly Strata Conference, an assembly of two thousand people focused on data science and its applications. While I’m wary of...Daniel Tunkelang From The Noisy Channel | March 2, 2012 at 09:15 AM
Yesterday, Cynthia Germanotta and her daughter Lady Gaga launched their new initiative to empower youth: the Born This Way Foundation. The Foundation wants to create...zephoria From Apophenia | March 2, 2012 at 03:19 AM
Brought to my attention: Building a Mobile App Is Not a Mobile Strategy In the HBR. With some thoughtful comments as well.Franz Dill From The Eponymous Pickle | March 2, 2012 at 01:23 AM
Interesting piece in the Atlantic. Regarding a Pew report: " ... The survey found, overall, what many others already have: that neuroplasticity is, indeed, a...Franz Dill From The Eponymous Pickle | March 1, 2012 at 10:52 PM
In CACM: A Comparative study of cyber attacks. Technical and quantitative view that I have not seen before.Franz Dill From The Eponymous Pickle | March 1, 2012 at 08:45 PM
The ACLU filed a FOIA request for a bunch of cables that Wikileaks had already released complete versions of. This is what happened:
The agency released redacted...schneier From Schneier on Security | March 1, 2012 at 07:32 PM
Always interested in alternative sensory interaction and engagement. Here in AdAge's blog, a note about the fragrance Gud, From Burt's Bees (A Unit of Clorox)...Franz Dill From The Eponymous Pickle | March 1, 2012 at 05:49 PM
The Raspberry Pi reminds me of my youth – it’s a gadget like that which got me interested in technology in the first place. I hope the Pi will tempt today’s generation...Simon Phipps From Wild WebMink | March 1, 2012 at 05:49 PM
The following is a special contribution to this Blog by Amr El Abbadi, Professor of Computer Science at the University of California at Santa Barbara, Christos...Erwin Gianchandani From The Computing Community Consortium Blog | March 1, 2012 at 01:51 PM