From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In the BBC: there are now over 5 billion phone connections worldwide. Staggering thought. The globe is a heavily interconnected network.Franz Dill From The Eponymous Pickle | July 22, 2010 at 01:41 PM
I just returned home from my first trip to the CRA Snowbird Conference, the biennial meeting of CS chairs and other leaders in the CS community. I really enjoyed...Lance From Computational Complexity | July 22, 2010 at 12:59 PM
The second day of the SIGIR 2010 conference kicked off with a keynote by TREC pioneer Donna Harman entitled “Is the Cranfield Paradigm Outdated?”. If you are at...Daniel Tunkelang From The Noisy Channel | July 22, 2010 at 12:32 PM
ForgeRock Releases OpenAM 9.5 Software Quite a milestone – this is our first independent release, sourced entirely from community members. It's good stuff too –...Simon Phipps From Wild WebMink | July 22, 2010 at 12:08 PM
Interesting:
The use of profiling by ethnicity or nationality to trigger secondary security screening is a controversial social and political issue. Overlooked...schneier From Schneier on Security | July 22, 2010 at 11:41 AM
Today is a significant milestone for the new venture I’m helping, ForgeRock. We’ve announced availability of our first full independent release of OpenAM, the open...Simon Phipps From Wild WebMink | July 22, 2010 at 07:54 AM
Indrani Medhi, associate researcher in the Technology For Emerging Markets Group at Microsoft Research India, was recently rated one of the Experientia From Putting People First | July 22, 2010 at 05:52 AM
In Mediapost. I like the approach, will follow to see how it develops. ' ... Reckitt Benckiser has created a branded social-media game called poweRBrands, in which...Franz Dill From The Eponymous Pickle | July 22, 2010 at 03:42 AM
Dr. Ken Gabriel, the deputy director of DARPA, delivered a plenary address at CRAErwin Gianchandani From The Computing Community Consortium Blog | July 22, 2010 at 12:56 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
In late June the White House issued a second Draft of the National Strategy for Trusted Identities in Cyberspace. They opened a public comment process only on... From U.S. Public Policy Committee of the ACM | July 21, 2010 at 08:33 PM
I will be sending my next book review column for
SIGACT NEWS off on July 28, 2010.
It has LOTS of books on its BOOKS I WANT REVIEWED list.
YOU get a chance to look...GASARCH From Computational Complexity | July 21, 2010 at 03:16 PM
An interesting post of how Intel is increasingly adopting a social science view. It is intriguing to think of how a company of engineers can move in this direction...Franz Dill From The Eponymous Pickle | July 21, 2010 at 02:15 PM
Legal scholars, technologists and cyberthinkers are wrestling with the first great existential crisis of the digital age: the impossibility of erasing your posted...Experientia From Putting People First | July 21, 2010 at 01:45 PM
Facebook is about to celebrate its 500-millionth user, but the social media application has had wide consequences, even for those who have never signed on, writes...Experientia From Putting People First | July 21, 2010 at 01:23 PM
Design consultant Martyn Perks thinks that a UK government-backed campaign to get the entire UK adult population online “threatens to make cyber slaves of us all...Experientia From Putting People First | July 21, 2010 at 01:19 PM
Phase relationships in the standardization process James Gosling wrote in 1990: "standards are increasingly being viewed as competitive weapons rather than as technological...Simon Phipps From Wild WebMink | July 21, 2010 at 12:04 PM
(This post was written for Blogher and originally posted there.) Every time I dare to talk about race or class and MySpace & Facebook in the same breath, a public...zephoria From Apophenia | July 21, 2010 at 09:53 AM