From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The U.S. Public Policy Council of the Association for Computing Machinery (USACM) has developed an issue brief on internet voting as it relates to military and... From U.S. Public Policy Committee of the ACM | June 29, 2010 at 10:45 PM
This does not seem like it should work, our reaction to 'free' as it is, but the article claims it does, to be seen how much they replicate this.Franz Dill From The Eponymous Pickle | June 29, 2010 at 08:43 PM
I needed to learn how to develop for the iPhone since the projects I want to work on next will be games for the device. This task was somewhat daunting, givenStanford...Gail Carmichael From The Female Perspective of Computer Science | June 29, 2010 at 08:01 PM
Space terrorism? Yes, space terrorism. This article, by someone at the European Space Policy Institute, hypes a terrorst threat I've never seen hyped before....schneier From Schneier on Security | June 29, 2010 at 04:42 PM
Some random thoughts about quiz shows.
THOUGHT ONE: There could be a quiz show based on P and NP.
We all think that FINDING an answer is harder than VERIFYING...GASARCH From Computational Complexity | June 29, 2010 at 02:13 PM
The open core model is being feted as the new default open source business model. But I assert it does not deliver and sustain the principle that delivers cost...Simon Phipps From Wild WebMink | June 29, 2010 at 01:55 PM
In the CACM:, technical but interesting, The last sentence is telling, if you have to explain it, is it a good visualization? Yes, the underlying technology you...Franz Dill From The Eponymous Pickle | June 29, 2010 at 01:50 PM
This, from Congressman Louie Gohmert of Texas, is about as dumb as it gets:
I talked to a retired FBI agent who said that one of the things they were looking at...schneier From Schneier on Security | June 29, 2010 at 11:28 AM
The July/August issue of Analytics Magazine cover enterprise forecasting. A tricky area I spent much time working in. This magazine is always a practical place...Franz Dill From The Eponymous Pickle | June 28, 2010 at 05:53 PM
Several major players built alternatives to conventional database systems: Google created BigTable, Amazon built Dynamo and Facebook initiated Cassandra. There...Daniel Lemire From Daniel Lemire's Blog | June 28, 2010 at 04:46 PM
There was a
Women in Theory Workshop at Princeton From
June 19-23.
***SORELLE***, who was there, has some intelligent and interesting
things to say about it...GASARCH From Computational Complexity | June 28, 2010 at 03:04 PM
GigaOhm does a good job providing a case study of how to best understand your Twitter followers. This starts to answer a question I have had recently: Just who...Franz Dill From The Eponymous Pickle | June 28, 2010 at 02:49 PM
A cautionary tale about password use. Cory Doctorow gets Phished. Cory Doctorow: Persistence Pays ParasitesFranz Dill From The Eponymous Pickle | June 28, 2010 at 02:48 PM
UPI article on the increasing use of private label by cost conscious consumers. Useful statistics.Franz Dill From The Eponymous Pickle | June 28, 2010 at 02:41 PM
July 1
Hearing:
The House Oversight and Government Reform Committee will hold a hearing on using cloud computing for federal information technology needs.
10... From U.S. Public Policy Committee of the ACM | June 28, 2010 at 02:34 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I have been told that once upon a time the ISTE conference (back when it was still called NECC) had a lot of computer science education content. ThatAlfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | June 28, 2010 at 01:06 PM
Yesterday was more or less the opening of ISTE. These conference are sort of interesting in that they start gradually. Wednesday ISTE will end somewhat abruptly...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | June 28, 2010 at 09:44 AM
I'm at SHB 2010, the Third Interdisciplinary Workshop on Security and Human Behavior, at Cambridge University. This is a two-day gathering of computer securityprogram...schneier From Schneier on Security | June 28, 2010 at 09:02 AM