From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
I remember seeing a non-zero amount of grumbling last year when acceptance notifications for CHI came out. In particular, those who were rejected listed all kinds...Gail Carmichael From The Female Perspective of Computer Science | December 14, 2010 at 10:03 PM
In the BBC, an article on visualizing all of the world facebook connections. What is driven home here is the impressive density of the connections world-wide. ...Franz Dill From The Eponymous Pickle | December 14, 2010 at 10:02 PM
Mindjet a vendor of mind mapping software that I have successfully used in the past, has come out with a map sharing site called Maps-for-that. Nice idea. The...Franz Dill From The Eponymous Pickle | December 14, 2010 at 07:55 PM
They're causing problems:
A white bank robber in Ohio recently used a "hyper-realistic" mask manufactured by a small Van Nuys company to disguise himself as a...schneier From Schneier on Security | December 14, 2010 at 07:12 PM
Brought to my attention for some work I am doing regarding cataloging and classification: 50 Excellent Library Science Blogs Worth Reading.Franz Dill From The Eponymous Pickle | December 14, 2010 at 06:35 PM
Doug Lautzenheiser gives another example of iPad usage, in one of my favorite areas of interests, Archaeology. As a means of simply gathering information as one...Franz Dill From The Eponymous Pickle | December 14, 2010 at 06:23 PM
As previously noted in this space, on Thursday, December 16th at 2:15 p.m. EST, the President’s Council ofErwin Gianchandani From The Computing Community Consortium Blog | December 14, 2010 at 05:20 PM
Recently I heard a British author on the radio lamenting that the world is more obsessed with what Lady Gaga wears (I would think it probably goes beyond her clothes... From Computer Science Teachers Association | December 14, 2010 at 04:19 PM
Interesting profile of Evan Kohlmann:
Evan Kohlmann spends his days lurking in the darkest corners of the Internet, where jihadists recruit sympathizers from across...schneier From Schneier on Security | December 14, 2010 at 11:35 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I “borrowed” this list from the Microsoft UK Higher Education blog (Free Microsoft ebooks) Most of these I have linked to in the past but it is nice to have a...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | December 14, 2010 at 10:24 AM
My article on learning from the Wikileaks experience and managing the risks of cloud computing is now available in the Essays section.Simon Phipps From Wild WebMink | December 14, 2010 at 09:00 AM
Most Americans don’t want to be tracked on the Internet and are unwilling to trade their privacy for web ads that are tailored to their interests. So suggest the...Experientia From Putting People First | December 14, 2010 at 08:10 AM
I have mentioned the Vinimaya virtual marketplace package in this blog a number of times. Talked to them about their system. A number of new capabilities have...Franz Dill From The Eponymous Pickle | December 14, 2010 at 05:47 AM
Introduced for the IPhone, the Google Latitude App. What this does is share information about the locations of friends that permit it. Obvious applications for...Franz Dill From The Eponymous Pickle | December 14, 2010 at 03:32 AM
A short Phil Lempert article: QR Codes as a Magnet for Tech Savvy Shoppers with some excellent examples:"Supermarkets will soon have a potentially powerful way...Franz Dill From The Eponymous Pickle | December 14, 2010 at 03:06 AM
Last Thursday the national Chief Information Officer (CIO), Vivek Kundra, issued an implementation plan for reforming federal information technology. It's a very... From U.S. Public Policy Committee of the ACM | December 13, 2010 at 10:03 PM
This shouldn't be a surprise:
Karsten Nohl's assessment of dozens of car makes and models found weaknesses in the way immobilisers are integrated with the rest...schneier From Schneier on Security | December 13, 2010 at 08:02 PM
Sex attack caught on camera.
Hamilton police have arrested two men after a sex attack on a woman early today was caught on the city's closed circuit television...schneier From Schneier on Security | December 13, 2010 at 08:01 PM
In the last month we have reported on NEW RESULTS by
Williams,
Katz and Guth,
Sanders,
and
Pinkerton and Setra.
For a change of pace lets look at some really OLD...GASARCH From Computational Complexity | December 13, 2010 at 05:51 PM
Andy Clark, professor of logic and metaphysics in the School of Philosophy, Psychology, and Language Sciences at Edinburgh University, Scotland, wonders whether...Experientia From Putting People First | December 13, 2010 at 04:15 PM