From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Might Be Evil Firefox extension that allows you to keep your Google Docs private from Google if you want to. (tags: FireFox Google Docs Privacy) On Changing horses...Simon Phipps From Wild WebMink | May 10, 2011 at 01:02 PM
Below is a post I wrote in 2009 but for some reason never made it to this blog. But I had better post it now because, as I found out via Tony Wirth, Samoa is moving...Lance From Computational Complexity | May 10, 2011 at 12:20 PM
Good comment:
"We're moving into an era of 'steal everything'," said David Emm, a senior security researcher for Kaspersky Labs.
He believes that cyber criminals...schneier From Schneier on Security | May 10, 2011 at 11:20 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Pat Yongpradit, a talented young HS CS teacher I have written about before, has created a 5 week mini-course on game programming with XNA Game Studio. This course...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | May 10, 2011 at 09:58 AM
I have a firm belief that open source software communities become strong when people with many different reasons for being present are free to meet their needs...Simon Phipps From Wild WebMink | May 10, 2011 at 09:03 AM
A post about my colleague Norm Levy, who I worked with in some particularly innovative projects at the big soap company (Procter & Gamble). Norm was a pioneerRhymes...Franz Dill From The Eponymous Pickle | May 10, 2011 at 02:09 AM
In an interesting development, the game-checking environment has started to test the popular close-range RFID standard NFC. It will be curious to see what this...Franz Dill From The Eponymous Pickle | May 10, 2011 at 12:53 AM
Ron Wright of Sands Research sends along a note on Oxford doing a study on the use and impact of neuromarketing. " ... Researchers at the University of Oxford...Franz Dill From The Eponymous Pickle | May 10, 2011 at 12:47 AM
Some of what has caught my attention recently:Apple captured "a remarkable 50% value share of estimated Q1/11 handset industry operating profits among the top 8...Greg Linden From Geeking with Greg | May 9, 2011 at 10:55 PM
Facebook publishes a Guide to Marketing with Facebook. A set of best practices. Fourteen pdf pages that are worth reading. Includes a good set of resources.Franz Dill From The Eponymous Pickle | May 9, 2011 at 10:32 PM
In SASCom Voices. A talk on a definition of lifetime customer value. " ... Are we oversimplifying customer segmentation and treatment strategies? SAS Marketing...Franz Dill From The Eponymous Pickle | May 9, 2011 at 09:46 PM
@ForgeRock ForgeRock has a Twitter account! Follow us to hear all about ForgeRock's news, views and happenings. about 1 hour ago via webReplyRetweetFavoriteSimon Phipps From Wild WebMink | May 9, 2011 at 07:30 PM
This year's edition of my mini-course (Computer Science and Games: Just for Girls!) wound down at the end of last week. I made sure to get a copy of the girls'...Gail Carmichael From The Female Perspective of Computer Science | May 9, 2011 at 07:04 PM
This hack was conducted as a research project. It's unlikely it's being done in the wild:
In one attack, Wang and colleagues used a plug-in for the Firefox web...schneier From Schneier on Security | May 9, 2011 at 06:50 PM
In a previous blog entry, I argued that we should address equity in computer science from a civil rights perspective, considering the importance of computing to... From Computer Science Teachers Association | May 9, 2011 at 05:49 PM
In the fall, Alice Marwick and I went into the field to understand teens’ privacy attitudes and practices. We’ve blogged some of our thinking since then but we’re...zephoria From Apophenia | May 9, 2011 at 03:45 PM
May 12
Hearing:
The Senate Commerce, Science and Transportation Committee will hold a hearing on the economic impacts of cyber attacks (previously scheduled for... From U.S. Public Policy Committee of the ACM | May 9, 2011 at 01:40 PM
Three months ago, I announced that I was writing a book on why security exists in human societies. This is basically the book's thesis statement:
All complex...schneier From Schneier on Security | May 9, 2011 at 12:02 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I had a great week last week. Long but great. I finished up with two conferences where for once I was not presenting. On the other hand the next time I go to either...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | May 9, 2011 at 09:22 AM