From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
A little late, but OR/MS does an excellent survey of decision analysis software every year. If you are interested in the topic, take a look here. " ... Dennis...Franz Dill From The Eponymous Pickle | December 11, 2010 at 12:48 AM
My article asserting that we need to stand up for Wikileaks’ ability to exist even if we don’t like Wikileaks is now available in the Essays area.Simon Phipps From Wild WebMink | December 11, 2010 at 12:21 AM
I experienced a new TSA security check at Phoenix Airport last Thursday. The agent took my over-three-ounce bottle of saline, put a drop of it on a white cardboard...schneier From Schneier on Security | December 10, 2010 at 08:11 PM
I’m pleased to say that a 10th anniversary edition of my book with Ike Chuang on quantum computing has just been released by Cambridge University Press (Amazon...Michael Nielsen From Michael Nielsen | December 10, 2010 at 06:50 PM
Yesterday, NIST announced the five hash functions to advance to the third (and final) round in the SHA-3 selection process: BLAKE, Grøstl, JH, Keccak, and Skein...schneier From Schneier on Security | December 10, 2010 at 06:04 PM
There’s been lots of coverage elsewhere, but just a reminder that it’sErwin Gianchandani From The Computing Community Consortium Blog | December 10, 2010 at 05:33 PM
There are millions of books free for the e-reading out there. Most pay reading services include them as well for free. Now the Open Library has introduced a new...Franz Dill From The Eponymous Pickle | December 10, 2010 at 03:40 PM
I wrote about Tynt before, but this article made it clearer about what it is doing ... Find out more about what people really care about.Franz Dill From The Eponymous Pickle | December 10, 2010 at 03:27 PM
After discovering BitCoin (where such a large number of people were kind enough to send small donations to 1LfdGnGuWkpSJgbQySxxCWhv8MHqvwst3 that I’m now considering...Simon Phipps From Wild WebMink | December 10, 2010 at 03:00 PM
The ASF Resigns From the JCP Executive Committee The Apache Software Foundation quits Java’s governing body claiming that “[the] JCP is not an open specification...Simon Phipps From Wild WebMink | December 10, 2010 at 01:01 PM
Iscon uses infrared light rather than X-rays. I have no idea how well it works.
And Rapiscan has a new patent:
Abstract:
The present invention is directed towards...schneier From Schneier on Security | December 10, 2010 at 12:22 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
We have this tendency to think that learning at school takes place only between the opening and closing bells of the Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | December 10, 2010 at 10:42 AM
In Knowledge@Wharton:Marketing in China's Digital Age: How to Win Customers' Hearts?Companies worldwide are devoting more of their marketing budgets to digital...Franz Dill From The Eponymous Pickle | December 10, 2010 at 03:34 AM
An interesting proposal in the BBC that the social connections evidenced by phone calls could be used to redraw the map of the UK. " ... Regional boundaries are...Franz Dill From The Eponymous Pickle | December 9, 2010 at 08:46 PM
In Progressive Grocer: People are more inclined to purchase social media advertised brands.Franz Dill From The Eponymous Pickle | December 9, 2010 at 08:35 PM
A DHS video message, reminding people to look out for and report suspicious activity, will be displayed at WalMart stores around the country.
schneier From Schneier on Security | December 9, 2010 at 06:22 PM
(CONGRADS to all the new
ACM fellows.
Among them are theorists Jennifer Chayes, Anne Condon, Phil Klein, S. Muthu, and Dan Spielman.)
In my post about
mentoring...GASARCH From Computational Complexity | December 9, 2010 at 04:21 PM
I don't have a lot to say about WikiLeaks, but I do want to make a few points.
1. Encryption isn't the issue here. Of course the cables were encrypted, for transmission...schneier From Schneier on Security | December 9, 2010 at 11:50 AM