From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
My review of Lipton's new blog-book is
here.
It will appear in my SIGACT NEWS at some later time.
Daniel Apon's joint review of
Computational Complexity: A...GASARCH From Computational Complexity | September 28, 2010 at 04:14 PM
LibreOffice – A fresh page for OpenOffice This is a good and balanced article that is worth reading. At Sun I tried several times to get a Foundation started for...Simon Phipps From Wild WebMink | September 28, 2010 at 12:08 PM
This is no surprise:
The people behind the new study start by asking a pretty obvious question: "Why do members of the public disagreeschneier From Schneier on Security | September 28, 2010 at 11:33 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I love puzzles and small little programming projects. When you can combine those two at get a project that you can use for a good learning/teaching experience it...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | September 28, 2010 at 09:52 AM
I have been travelling this week on Europe’s low-cost airlines, and have realised that there is only one way to make air travel secure, and that is to take security...Simon Phipps From Wild WebMink | September 28, 2010 at 09:06 AM
My classic essay on Payment At The Point Of Value has finally made it on to the Essays page on this site. Now that community-centric open source is once again returning...Simon Phipps From Wild WebMink | September 28, 2010 at 07:00 AM
Dr. Dawn Xiadong Song, Associate Professor of Computer Science at U.C. Berkeley, is one of 23 recipients of the 2010 Macarthur Grants awarded by the John D. and...Ran Libeskind-Hadas From The Computing Community Consortium Blog | September 28, 2010 at 06:24 AM
I have been involved with innovation contexts in the enterprise, and had heard of the Thinkubator in Chicago, but never visited. They have established a new web...Franz Dill From The Eponymous Pickle | September 28, 2010 at 04:38 AM
Many of us are fortunate to have taught classes in which all students are active participants and teaching and learning are natural activities in the classroom... From Computer Science Teachers Association | September 28, 2010 at 12:22 AM
I just spent some time updating my Tableau Software visualization system to the latest version. I brought it into the enterprise when Tableau was first released...Franz Dill From The Eponymous Pickle | September 27, 2010 at 11:25 PM
Thinking about the ROI for business process modeling (BPM). We never directly calculated such an ROI in the enterprise. The modeling alone was useful to understand...Franz Dill From The Eponymous Pickle | September 27, 2010 at 11:02 PM
Mark Montgomery sends along a link to a talk by Dr. Donald Berwick. Provocative talk about how the scientific method is modified by social interaction in a health...Franz Dill From The Eponymous Pickle | September 27, 2010 at 09:11 PM
It's better to try to isolate parts of a terrorist network than to attempt to destroy it as a whole, at least according to this model:
Vos Fellman explains how...schneier From Schneier on Security | September 27, 2010 at 05:00 PM
September 28
The Data Privacy and Integrity Advisory Committee of the Department of Homeland Security will meet.
8:30 a.m., Carl Hayden Room, Government Printing... From U.S. Public Policy Committee of the ACM | September 27, 2010 at 02:39 PM
In AdAge: A formula for ads by Procter & Gamble's Men's grooming. Is it extensible to other categories? " ... Cracking Viral Code: Look at Your Ads. Now Look...Franz Dill From The Eponymous Pickle | September 27, 2010 at 02:14 PM
A friend and I recently discussed how we had both grown up scanning pages in the encyclopedia and dictionary. What I found interesting about that were not only...Franz Dill From The Eponymous Pickle | September 27, 2010 at 01:41 PM
Meet the Defenders of Open-Source Software I can't decide whether I am pleased there are people doing this or concerned that their actions become the focus of public...Simon Phipps From Wild WebMink | September 27, 2010 at 12:06 PM
It's serious:
The problem lies in the way that ASP.NET, Microsoft's popular Web framework, implements the AES encryption algorithm to protect the integrity ofdemo...schneier From Schneier on Security | September 27, 2010 at 11:51 AM
Derrick Stolee tweeted that the videos from the 2010 Complexity Conference are now on-line. If you want to attend a conference live, don't forget early hotel and...Lance From Computational Complexity | September 27, 2010 at 10:21 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Last week I wrote a post about the Imagine Cup. (Imagine Cup–Solving the Worlds Problems Through Software) A couple of things I should have mentioned about it though...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | September 27, 2010 at 09:26 AM