From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Here's a new biometric I know nothing about:
The wristband relies on authenticating identity by matching the overall shape of the user's heartwave (captured via...schneier From Schneier on Security | December 5, 2013 at 02:16 PM
As part of my ongoing investigation of compliance solutions I spoke to Contract Guardian yesterday. Very impressive implementation, especially in the health care...Franz Dill From The Eponymous Pickle | December 5, 2013 at 01:58 PM
Focusing on the Customer. We were quite advanced in our enterprise, so there is nothing very new here. But it is well stated. " ... Ask anyone what the “next...Franz Dill From The Eponymous Pickle | December 5, 2013 at 01:24 PM
Computer Science Education Week is an annual program designed to show students of all ages the importance of computer science. It is observed each year, in recognition...Ann Drobnis From The Computing Community Consortium Blog | December 5, 2013 at 11:52 AM
In Fast Company: On multitasking. Our shiny new devices allow us to do this creatively, all the time. There has been debate about how ultimately this effects...Franz Dill From The Eponymous Pickle | December 5, 2013 at 11:31 AM
Two years ago I gave a lecture and posted about bitcoin. Of course what I didn't do was buy a bitcoin whose value back then was about $3 and today runs in the $1000...Lance Fortnow From Computational Complexity | December 5, 2013 at 09:13 AM
Some apps are being distributed with secret Bitcoin-mining software embedded in them. Coins found are sent back to the app owners, of course.
And to make it legal...schneier From Schneier on Security | December 5, 2013 at 07:58 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I have been teaching Visual Basic programming to my freshmen this week. It’s part of a course we call Explorations in Computer Science and its new this year. The...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | December 5, 2013 at 05:47 AM
Always interesting McKinsey quarterly, PDF Here. Reading now.For the past month, McKinsey’s clients have been reading McKinsey Quarterly 2013 Number 4, whichIn...Franz Dill From The Eponymous Pickle | December 5, 2013 at 01:01 AM
This blog is a special contribution from Sitaram Asur, a Computing Innovation Fellow from 2009-2010. When I graduated with my PhD from the Ohio State University...Ann Drobnis From The Computing Community Consortium Blog | December 4, 2013 at 09:42 PM
If face recognition fails, consider behavior biometrics: " ... The US government is challenging researchers to use cameras to ID people by unique features like...Franz Dill From The Eponymous Pickle | December 4, 2013 at 08:13 PM
Pre-term planning numbers are in for Harvard, and it looks like the undergrad Algorithms and Data Structures class has about 175 people planning to take the course...Michael Mitzenmacher From My Biased Coin | December 4, 2013 at 07:32 PM
In Wired: Not sure what this means, but Google is acquiring an army. " ... The difference between Amazon’s drone stunt and Google’s retail robot skunkworks...Franz Dill From The Eponymous Pickle | December 4, 2013 at 04:44 PM
In Junk Charts: Have never heard this term before. An example of the pretty chart, but with low density of actual information. Just a stacked bar chart. Nothing...Franz Dill From The Eponymous Pickle | December 4, 2013 at 03:49 PM
In Innovation Excellence: The top reason, and based on my experience, I agree:"A lack of a feedback loop from decision-makers to participants is the most common...Franz Dill From The Eponymous Pickle | December 4, 2013 at 03:34 PM
A relatively old story, brought to my attention by a recent startup involvement:" ... Booz & Company recently conducted the bi-annual refresh of its Customer Planning...Franz Dill From The Eponymous Pickle | December 4, 2013 at 03:29 PM
Following its November meeting, the President’s Council of Advisers on Science and Technology (PCAST) released a letter report on cybersecurity. The report follows...David B. From U.S. Public Policy Committee of the ACM | December 4, 2013 at 03:20 PM
We know that spending energy tends to release carbon in the atmosphere. In turn this warms up the Earth in the long run. This change might be detrimental. Being...Daniel Lemire From Daniel Lemire's Blog | December 4, 2013 at 10:43 AM
The news is reporting about Evan Booth, who builds weaponry out of items you can buy after airport security. It's clever stuff.
It's not new, though. Peopleexplained...schneier From Schneier on Security | December 4, 2013 at 07:28 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
TEALS is an interesting program started by a Microsoft employee some years ago. It taps the enthusiasm and expertise of industry professionals who work with classroom...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | December 4, 2013 at 06:10 AM