From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Don't see how this works without lots of operational data to leverage. And might it not be thwarted by adapting the system in some way? And a good understanding...Franz Dill From The Eponymous Pickle | February 14, 2021 at 12:08 AM
See images at the link. Improving speed and precision.Dynamic 3D Printing Process Features Light-Driven TwistBy Northwestern McCormick School of Engineering, ...Franz Dill From The Eponymous Pickle | February 13, 2021 at 03:31 PM
Researchers make inexpensive transparent wood. Our cells produce energy using their mitochondria. Researchers show that you can efficiently enrich cells with mitochondria...Daniel Lemire From Daniel Lemire's Blog | February 13, 2021 at 01:57 PM
Bloomberg News has a major story about the Chinese hacking computer motherboards made by Supermicro, Levono, and others. It’s been going on since at least 2008....Bruce Schneier From Schneier on Security | February 13, 2021 at 12:41 PM
Now for something completely different, from studies of mine long ago. Did you know that there is a near continuous shower of space dust falling down on us? https...Franz Dill From The Eponymous Pickle | February 13, 2021 at 10:56 AM
I like explanations of how a solution works in real world contexts. Lots of work to still do.Uncovering Unknown Unknowns in Machine Learning Google Blog., Thursday...Franz Dill From The Eponymous Pickle | February 13, 2021 at 10:26 AM
Brought to my attention, they link to an e-book they offer. Note the below is ad. I am unconnected, have not tried this, but the thoughts and offer looked interesting...Franz Dill From The Eponymous Pickle | February 13, 2021 at 10:16 AM
On the heels of an announcement by Arm Holdings yesterday that its silicon partners in the third quarter of 2020 shipped 6.7 billion Arm-based chips, news stories...staff From insideHPC | February 12, 2021 at 06:16 PM
Though years from potential fruition, quantum computing and its control has emerged as an issue among technology ethicists. But if a YouTube video released last...Doug Black From insideHPC | February 12, 2021 at 05:12 PM
The US Food and Drug Administration (FDA) Center for Devices and Radiological Health (CDRH) has appointed Former Computing Community Consortium (CCC) Council member...Helen Wright From The Computing Community Consortium Blog | February 12, 2021 at 03:34 PM
Hmm, caution with such causal seeming predictions. But interesting. Google Search Can Help Predict Covid-19 Spikes The Jerusalem Post, Zachary Keyser, February...Franz Dill From The Eponymous Pickle | February 12, 2021 at 02:33 PM
Just because they use the same software does not mean they will 'get along'. Still the use of software that can communicate will make them easier to update and...Franz Dill From The Eponymous Pickle | February 12, 2021 at 01:57 PM
Intriguing play here, will look into more details... pass them along and I will post an overview.Fetch.ai partners with FESTO on decentralised manufacturing marketplace...Franz Dill From The Eponymous Pickle | February 12, 2021 at 12:09 PM
Interesting research on persistent web tracking using favicons. (For those who don’t know, favicons are those tiny icons that appear in browser tabs next to the...Bruce Schneier From Schneier on Security | February 12, 2021 at 12:04 PM
The 20th Annual Workshop on the Economics of Information Security (WEIS 2021) will be held online in June. We just published the call for papers.Bruce Schneier From Schneier on Security | February 12, 2021 at 12:03 PM
Relates to my forestry work, could have been used to update inventories of species.Neural Network Has Learned to Identify Tree SpeciesBy Skolkovo Institute ofAn...Franz Dill From The Eponymous Pickle | February 12, 2021 at 11:51 AM
Interesting story about a barcode scanner app that has been pushing malware on to Android phones. The app is called Barcode Scanner. It’s been around since 2017...Bruce Schneier From Schneier on Security | February 12, 2021 at 11:25 AM
Vice is reporting on a new police hack: playing copyrighted music when being filmed by citizens, trying to provoke social media sites into taking the videos down...Bruce Schneier From Schneier on Security | February 12, 2021 at 11:24 AM
At the virtual Engima Conference, Google’s Project Zero’s Maggie Stone gave a talk about zero-day exploits in the wild. In it, she talked about how often vendors...Bruce Schneier From Schneier on Security | February 12, 2021 at 11:23 AM