From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Eric FrewUnmanned aircraft systems. Aerial robots. Drones. Regardless of the name, this new technology is being developed to revolutionize the sampling and understanding... From XRDS | February 28, 2014 at 07:00 PM
Wayne Woldt, Eric Frew, George MeyerThe fusion of next generation sensors and advanced information systems, combined with advances in unmanned aircraft systems... From XRDS | February 28, 2014 at 07:00 PM
Matt WaiteThe use of unmanned aerial drones will revolutionize news reporting, but many issues need to be resolved before things can really take off. From XRDS | February 28, 2014 at 07:00 PM
Michael ZubaOceans cover a majority of our planet and are currently lacking in regards to exploration and technological innovations. One technology that can help... From XRDS | February 28, 2014 at 07:00 PM
Bong-Huan Jun, Hyungwon ShimCrabster CR200 is a giant crab robot with six legs and 30 powerful joints developed at the Korea Research Institute of Ships and Ocean... From XRDS | February 28, 2014 at 07:00 PM
Wenlong Zhang, Yi-Hung Wei, Quan Leng, Song HanCombining advanced technologies in real-time wireless communication, control theory, sensor and actuator design,... From XRDS | February 28, 2014 at 07:00 PM
Yaser P. FallahA cyber-physical systems perspective on the design of vehicular networking solutions for safer and greener transportation. From XRDS | February 28, 2014 at 07:00 PM
Aveek Dutta, Dola SahaIn the future, our radio devices will adapt to deal with new types of signals. The challenge is to describe those signals so that devices... From XRDS | February 28, 2014 at 07:00 PM
Thought provocative SXSW accelerator finalists. In particular the big data in the enterprise section, but more beyond that. " ... For the 2014 SXSW Accelerator...Franz Dill From The Eponymous Pickle | February 28, 2014 at 05:57 PM
Pretty.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | February 28, 2014 at 05:38 PM
As part of the government response to public concerns over national security surveillance programs, the President announced in January that there would be a review...David B. From U.S. Public Policy Committee of the ACM | February 28, 2014 at 05:02 PM
The National Science Foundation (NSF) Directorate for Computer and Information Science and Engineering (CISE) is pleased to announce a Distinguished Lecture on...Ann Drobnis From The Computing Community Consortium Blog | February 28, 2014 at 03:27 PM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
NEBULA
(S//SI//FVEY) Multi-Protocol macro-class Network-In-a-Box (NIB) system...schneier From Schneier on Security | February 28, 2014 at 03:16 PM
Regrettably presented as an infographic, but an interesting view of consumer segmentation. Points through to a white paper that requires registration. " .... The...Franz Dill From The Eponymous Pickle | February 28, 2014 at 02:48 PM
Can you trademark a phrase? To the extent to which you are willing to sue. In Language Log. A list of phrases and their defenders. Here the defenders are promoters...Franz Dill From The Eponymous Pickle | February 28, 2014 at 02:34 PM