From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
It comes to mind that this blog is about emerging technologies. Yet I often go back to my own and related enterprise experience and history. Examples, like AI...Franz Dill From The Eponymous Pickle | June 22, 2011 at 01:52 PM
GoogleSharing – A Special Kind Of Proxy This is the online equivalent of a group of people keeping a jar full of Tesco Clubcards by the door so they can get all...Simon Phipps From Wild WebMink | June 22, 2011 at 01:03 PM
Would you like to pilot a new game development course (or two) in your school? With free curriculum and software? Microsoft is starting a new XNA online community...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | June 22, 2011 at 09:37 AM
Seen at the recent Continuous Web meetings: A new online magazine by Fulcruum Publishing called Brilliance. The Premiere issue of June 1 is called: Escaping the...Franz Dill From The Eponymous Pickle | June 22, 2011 at 04:28 AM
In the heady AI/Knowledge Systems days of the 90s we wrote dozens of rule based systems that contained thousands of rules. These were designed to capture and reproduce...Franz Dill From The Eponymous Pickle | June 22, 2011 at 01:54 AM
From The Computing Community Consortium Blog
Today I attended a panel discussion on “The Role of the Cloud in the Smart Grid”, sponsored by Microsoft’s Innovation & Policy Center and the Digital Energy Solutions...Erwin Gianchandani From The Computing Community Consortium Blog | June 21, 2011 at 09:20 PM
Below is a list of items with policy relevance from the March issue of Communications of the ACM. As always, much of the material in CACM is premium content, and...David B. From U.S. Public Policy Committee of the ACM | June 21, 2011 at 09:11 PM
As my regular readers already know, I'm in the process of writing my next book. It's a book about why security exists: specifically, how a group of people protects...schneier From Schneier on Security | June 21, 2011 at 04:20 PM
The increased focus of Apps is revealing. Note also the integration of UPC code scanning. Here Clorox shares their green data on a smartphone App. " .... Clorox...Franz Dill From The Eponymous Pickle | June 21, 2011 at 04:01 PM
Asking for honest, anonymous feedback can be scary. Really scary. But over the years, I've learned that the benefits of getting real feedback far outweigh the possibility...Gail Carmichael From The Female Perspective of Computer Science | June 21, 2011 at 02:40 PM
Late last month, DARPA’s Information Innovation Office (I2O) issued a solicitation calling for research proposals that “investigate innovative approaches that enable...Erwin Gianchandani From The Computing Community Consortium Blog | June 21, 2011 at 01:57 PM
A reasoned and understandable explanation of the Wal-Mart discrimination case supreme court ruling. Lots of corporate implications.Franz Dill From The Eponymous Pickle | June 21, 2011 at 01:21 PM
A good article in the Harvard Blogs on really knowing you competitors by using, not just casually experiencing their products. Doing that does not imply disloyalty...Franz Dill From The Eponymous Pickle | June 21, 2011 at 01:07 PM
Disastrous Implications of New Apple Patent for Blocking Cellphone Video – storify.com What an amazingly dangerous world Apple are exploring here. The scope for...Simon Phipps From Wild WebMink | June 21, 2011 at 01:02 PM
Good paper: "Sex, Lies and Cyber-crime Surveys," Dinei Florêncio and Cormac Herley, Microsoft Research.
Abstract: Much of the information we have on cyber-crime...schneier From Schneier on Security | June 21, 2011 at 10:58 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
As I promised yesterday, here is more information about Microsoft at ISTE 2011 in Philadelphia. First off the good stuff. OK well the stuff that means the most...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | June 21, 2011 at 09:55 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I was interested last week to discover that, unknown to me, the link shortening service bit.ly was displaying a warning message when anyone clicked on one link...Simon Phipps From Wild WebMink | June 20, 2011 at 05:18 PM