From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This reminds me of the work of Brenda Laurel, game developer and systems theorist, who wrote about computers and theater. The theater of the brand: Building entertainment...Franz Dill From The Eponymous Pickle | September 24, 2009 at 12:58 PM
It's not just hackers who steal financial and medical information:
Between April 2007 and January 2008, visitors to the Kmart and Sears web sites were invitedSony...schneier From Schneier on Security | September 24, 2009 at 11:37 AM
I'm putting online a paper with Zhenming Liu and Kai-Min Chung (both graduate students at Harvard) that extends one of the results from Declaring Independence via...Michael Mitzenmacher From My Biased Coin | September 24, 2009 at 11:00 AM
Volokh posts on recently passed computer crime legislation. He quotes the entire act so that you can read it yourself. True it is legally cryptic, but you can get...Franz Dill From The Eponymous Pickle | September 24, 2009 at 06:30 AM
Stepehen Wolfram talks and does a Q&A on WolframAlpha and related topics they are working on. I need to get back to WolframAlpha to see how it is progressing. As...Franz Dill From The Eponymous Pickle | September 24, 2009 at 05:39 AM
An interesting idea in these tighter times, a convenience-based personal shopper concept by Meijer in the Chicago area. Shoppers pick up their own orders hand delivered...Franz Dill From The Eponymous Pickle | September 23, 2009 at 07:39 PM
I already blogged about this; there's more information in this new article:
Included in the items the German army allowed humanitarian groups to distribute in...schneier From Schneier on Security | September 23, 2009 at 06:43 PM
This morning the Research and Science Education Subcommittee of the House Science and Technology Committee met to mark up legislation that would amend the Cyber... From U.S. Public Policy Committee of the ACM | September 23, 2009 at 06:16 PM
(Posted by request of Vijay V. Vazirani. Flame him for any spelling or grammar mistakes, or if you don't like the content.)
Another reason to goto FOCS:here...GASARCH From Computational Complexity | September 23, 2009 at 05:20 PM
At the first HCIR workshop in 2007, Michael Stonebraker stood up in the middle of an open discussion session and told all assembled that we needed to be thinking...Daniel Tunkelang From The Noisy Channel | September 23, 2009 at 05:10 PM
Here is the place to download the study. Standardization, Security and analytics are emphasized. Requires a minimal registration.' .. A new global study of more...Franz Dill From The Eponymous Pickle | September 23, 2009 at 03:38 PM
Machine vision has been around for a long time. For example systems in manufacturing lines that easily detect varying quality. Once you take such system in a human...Franz Dill From The Eponymous Pickle | September 23, 2009 at 02:50 PM
On the decline of cursive handwriting, in a recent article.I had discussions about this with a K-12 teacher relative, confirming the article. Little time is spent...Franz Dill From The Eponymous Pickle | September 23, 2009 at 02:21 PM
I'm not sure why, but the "there is no open source business model" discussion has woken up again, with Matthew Aslett and Stephen Walli in particular chipping in...webmink From Wild WebMink | September 23, 2009 at 02:15 PM
The ACM?s Policy Office staff and USACM?s leadership have compiled USACM?s annual report for the past fiscal year - 2009 (which ended June 30). This year?s report... From U.S. Public Policy Committee of the ACM | September 23, 2009 at 02:14 PM
The Obama Plan in 4 Minutes
A really good edit for the attention-impaired of the joint session Obama delivered.USA politics health...webmink From Wild WebMink | September 23, 2009 at 12:15 PM
This is a good thing:
An Illinois district court has allowed a couple to sue their bank on the novel grounds that it may have failed to sufficiently secure their...Schneier From Schneier on Security | September 23, 2009 at 11:00 AM