From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
So you have all the patches from Microsoft applied automatically, Firefox updates itself as well as its extensions... But do you still have vulnerable, outdated... From CERIAS Blog | September 22, 2009 at 07:33 PM
I recently brought up Qwaq, which we looked at for remote visual, avatar-enabled collaboration. They announced today that they have become Teleplace. Good nameTeleplace...Franz Dill From The Eponymous Pickle | September 22, 2009 at 05:43 PM
Nearly three years ago I posted on the just announced Netflix prize. First to a 10% increase in the quality of the movie recommendations would receive a million...Lance From Computational Complexity | September 22, 2009 at 05:18 PM
From Putting People First
Tomorrow I will be speaking at an informal, but high energy Paris conference, called (somewhat predictably) Paris 2.0.
The conference takes a total of four days...Experientia From Putting People First | September 22, 2009 at 03:46 PM
Luke Wroblewski, an internationally recognized Web thought leader and Senior Director of Product Ideation & Design at Yahoo! Inc., provides a comprehensive overview...Experientia From Putting People First | September 22, 2009 at 03:25 PM
The latest issue of Interfaces Magazine, a quarterly magazine published by Interaction, the specialist HCI group of the British Computer Society (BCS), contains...Experientia From Putting People First | September 22, 2009 at 02:43 PM
Back in 2005, I wrote about the failure of two-factor authentication to mitigate banking fraud:
Here are two new active attacks we're starting to see:
Man-in-the...schneier From Schneier on Security | September 22, 2009 at 11:39 AM
I worked with Institute for the Future for years, and blogged for them as well. A new interesting report from them: Future Knowledge Ecosystems: The Next Twenty...Franz Dill From The Eponymous Pickle | September 22, 2009 at 11:07 AM
This is an important development:
Shor's algorithm was first demonstrated in a computing system based on nuclear magnetic resonance -- manipulating molecules in...schneier From Schneier on Security | September 22, 2009 at 11:01 AM
Last semester, for various reasons, I ended up "double-teaching", offering both my undergraduate algorithms class and my graduate network algorithms class. The...Michael Mitzenmacher From My Biased Coin | September 22, 2009 at 11:00 AM
I recently posted about a shopper modeling system from TNS - Sorensen called Atlas, at that link you will find more information about the method and how it is evolving...Franz Dill From The Eponymous Pickle | September 22, 2009 at 04:10 AM
Interesting:
For nine months, Eagle's team recorded data from the phones of 94 students and staff at MIT. By using blue-tooth technology and phone masts, theyabstract...schneier From Schneier on Security | September 21, 2009 at 06:41 PM
Arrr! I hope everyone had a swashbuckling day this past September 19. As you no doubt knew, September 19 is International Talk Like a Pirate Day - an unofficial... From Computer Science Teachers Association | September 21, 2009 at 05:30 PM
You can now register on-line for FOCS which includes the 50th celebration. Early registration deadline is October 1. Hotel rate good until October 9th or whilehttp...Lance From Computational Complexity | September 21, 2009 at 05:20 PM
Akin to Chernoff faces, but univariate. You can generate a smiley face in Excel that displays a range of emotions. Fun and perhaps useful if you can stand a smiley...Franz Dill From The Eponymous Pickle | September 21, 2009 at 03:44 PM
Ad Age details Procter's idea of 'store back', which they consider essential to improvement of sales competing with private label as we emerge from a recession....Franz Dill From The Eponymous Pickle | September 21, 2009 at 03:25 PM