From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Predicting Product Launch success. We worked on this using a number of simulation based methods. Interesting case study here: " ... Back in May, Kaggle ran...Franz Dill From The Eponymous Pickle | February 1, 2014 at 12:49 PM
A T-shirt with a drawing of a squid reading.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | January 31, 2014 at 05:41 PM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
IRATEMONK
(TS//SI//REL) IRATEMONK provides software application persistence...schneier From Schneier on Security | January 31, 2014 at 03:17 PM
Where does computer science fit? At the university level I’ve seen it in Business departments/Schools of Business. I’ve seen it in various science schools – Schools...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | January 31, 2014 at 01:28 PM
Back on January 9th I attended the IBM announcement of its group for Watson applications. I tweeted the announcement at @FranzD #IBMWatson. Full announcement....Franz Dill From The Eponymous Pickle | January 31, 2014 at 12:25 PM
A discussion of the implication of security on the Internet of Things. If everything is connected, the path to us or our households brings insecurity yet closer...Franz Dill From The Eponymous Pickle | January 31, 2014 at 10:15 AM
Connecting the cloud and big data for business. A piece from Pneuron, which I am looking into. I was struck by this statement: " ... Data is more volatile than...Franz Dill From The Eponymous Pickle | January 31, 2014 at 10:00 AM
A discussion of systems that are meant to prevent deception and unethical behavior. In Knowledge@Wharton. A topic in any system that is meant to gather human"...Franz Dill From The Eponymous Pickle | January 31, 2014 at 09:53 AM
This is a pretty impressive social engineering story: an attacker compromised someone's GoDaddy domain registration in order to change his e-mail address and steal...schneier From Schneier on Security | January 31, 2014 at 07:16 AM
At the center of this kerfuffle is an anthropologist, Daniel Miller, his ethnographic research with teenagers in a small town in the UK, and a press report on a...Experientia From Putting People First | January 31, 2014 at 06:12 AM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
HOWLERMONKEY
(TS//SI//REL) HOWLERMONKEY is a custom Short to Medium rangehere...schneier From Schneier on Security | January 30, 2014 at 09:38 PM
It snowed in Atlanta, and we are closed, for the foreseeable future—where is global warming? Atlanta is frozen. Here is what we looked like the other night. Today...rjlipton From Gödel's Lost Letter and P=NP | January 30, 2014 at 02:49 PM
This CW article led me to the meaning of QA ... " ... Long undervalued, quality assurance is in the limelight -- and QA pros in demand -- following the disaster...Franz Dill From The Eponymous Pickle | January 30, 2014 at 02:22 PM
Quite obvious, people are always looking at the motivation of recommendations. Can we now get at the motivation more clearly? (In Supermarket News, requires registration...Franz Dill From The Eponymous Pickle | January 30, 2014 at 01:51 PM
The male túngara frog Physalaemus pustulosus uses calls to attract females. But croaking also causes ripples in the water, which are eavesdropped on -- both by...schneier From Schneier on Security | January 30, 2014 at 01:08 PM
Charlene Li speaks on the topic, relating to a recent study: " .... Overall, we found that investment in headcount and infrastructure have steadily grown, as companies...Franz Dill From The Eponymous Pickle | January 30, 2014 at 10:48 AM
Many of us want to be original in our work. For researchers, it is a job requirement. For software programmers, it makes little sense to redo what others did. Many...Daniel Lemire From Daniel Lemire's Blog | January 30, 2014 at 10:44 AM
This looks to be very good.
Add that to these three indexes of NSA source material, and these two summaries.
This excellent parody website has a good collection...schneier From Schneier on Security | January 30, 2014 at 07:52 AM
In Recode: Google continues to add AI gems to its capabilities. Search is a part of learning, and thus enhanced by AI. We search by pattern visually, as well...Franz Dill From The Eponymous Pickle | January 29, 2014 at 09:46 PM