From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In Readwriteweb. A free system called Phonebooth has emerged to be a VOIP phone service similar to Google Voice. Likely interesting to small companies and startups...Franz Dill From The Eponymous Pickle | March 10, 2010 at 05:17 AM
Some interesting observations on the outsourcing, looking back ten years to the present. I have known many peoeple that were part of this and were ultimately influenced...Franz Dill From The Eponymous Pickle | March 10, 2010 at 05:08 AM
Good piece in Ars Technica that covers the current state of online grocery shopping and the current players in this space. ' ... Shopping for groceries and household...Franz Dill From The Eponymous Pickle | March 9, 2010 at 07:02 PM
Interesting commentary:
I don't think this is really a case about ISP liability at all. It is a case about the use of a person's image, without their consent,...schneier From Schneier on Security | March 9, 2010 at 06:36 PM
The news has hit the wires -- Chuck Thacker is this year's Turing Award winner.I had the great pleasure of getting to know Chuck while I worked at DEC SRC. He's...Michael Mitzenmacher From My Biased Coin | March 9, 2010 at 04:19 PM
The last blog entry had lots of good comments about
different HW policies. I enumerate them and say PROS
and CONS
Hard Deadline. PRO- uniform, no favoritism,...GASARCH From Computational Complexity | March 9, 2010 at 03:40 PM
I had a conversation with IdeaConnection recently. Have been getting their newsletter for some time and it is informative. See their writup on open innovation...Franz Dill From The Eponymous Pickle | March 9, 2010 at 02:27 PM
The list of accepted papers for EC is up. I'm happy to say that our Swoopo paper made the list. I was surprised in the acceptance letter to find that there were...Michael Mitzenmacher From My Biased Coin | March 9, 2010 at 02:16 PM
The "Microsoft Online Services Global Criminal Compliance Handbook (U.S. Domestic Version)" (also can be found here, here, and here) outlines exactly what Microsoft...schneier From Schneier on Security | March 9, 2010 at 12:59 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Over the weekend for the second time in about three weeks a teacher asked my about creating arrays of controls in Visual basic .NET. Interestingly enough both teachers...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | March 9, 2010 at 11:11 AM
I repeat this invitation. We worked with Thinkvine in the enterprise and remain impressed with their work.March 18, 2010 | 2 p.m. ET | Duration: 1 HourRegister...Franz Dill From The Eponymous Pickle | March 9, 2010 at 10:00 AM
In the World Flattener: Sammy Haroon posts about Startup Visa to USA. Always provocative. -Franz Dill From The Eponymous Pickle | March 9, 2010 at 02:55 AM
From research at MIT: Big power from tiny wires: New discovery shows carbon nanotubes can produce powerful waves that could be harnessed for new energy systems....Franz Dill From The Eponymous Pickle | March 9, 2010 at 01:56 AM
Intriguing article, by Steve Miller. I have now dealt with these 'two cultures' a number of times in various enterprises. This article and the included link are...Franz Dill From The Eponymous Pickle | March 9, 2010 at 01:38 AM
Can you have a phone read your lips and interpret what you say? Silent verbal communications. Research in that area.-Franz Dill From The Eponymous Pickle | March 8, 2010 at 09:35 PM
After nearly 10 years, I've now left Sun. Thanks to everyone for following my blog for all these years. Please follow my new blog, Wild Webmink, where I have posted...webmink From Wild WebMink | March 8, 2010 at 05:36 PM
I joked as I left work on Friday that it was "my day of shame". I am responsible for recruiting students for a government-funded course that offers MCSE (Microsoft... From Computer Science Teachers Association | March 8, 2010 at 05:05 PM
How not to destroy evidence:
In a bold and bizarre attempt to destroy evidence seized during a federal raid, a New York City man grabbed a flash drive and swallowed...schneier From Schneier on Security | March 8, 2010 at 05:00 PM
Even if you have extensive training in Mathematics, the average Mathematics paper is undistinguishable from the ramblings of a madman. Many of these papers seek...Daniel Lemire From Daniel Lemire's Blog | March 8, 2010 at 03:41 PM