From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Cybersecurity legislation is sort of popular in this Congress. Several bills have been introduced, but there are enough cybersecurity bills working through the... From U.S. Public Policy Committee of the ACM | June 11, 2010 at 08:20 PM
Boaz Barak asked to give a guest post on the recent STOC/FOCS issue and the question of accepting more papers. So I hand the floor over to Boaz:Do we really need...Michael Mitzenmacher From My Biased Coin | June 11, 2010 at 06:56 PM
The weekly links post over at Games Alfresco - a blog about the latest and greatest industry and research advances in augmented reality - had a link to a documentary...Gail Carmichael From The Female Perspective of Computer Science | June 11, 2010 at 05:09 PM
This essay in The New York Times is refreshingly cogent:
You've seen it over and over. At a certain intersection in a certain town, there'll be an unfortunate...schneier From Schneier on Security | June 11, 2010 at 05:08 PM
Special report from Knowledge@Wharton: Turn the Page: What's Next for Publishing?. Excellent."Emerging technologies and strategies to reach new audiences are changing...Franz Dill From The Eponymous Pickle | June 11, 2010 at 04:05 AM
Mark Montgomery of Kyields's blog post on the Gulf spill and the need for polymath perspective/philosophy for overcoming challenges.Franz Dill From The Eponymous Pickle | June 11, 2010 at 02:47 AM
Computerworld looks at some of the early prototypes of laptops from a number of vendors. Most of what we see are multiple screens that can be used independently...Franz Dill From The Eponymous Pickle | June 11, 2010 at 02:25 AM
Ever wonder why youth have to be over 13 to create an account on Facebook or Gmail or Skype? It has nothing to do with safety.
In 1998, the U.S. Congress enacted...zephoria From Apophenia | June 10, 2010 at 11:04 PM
Representatives Rick Boucher (D-Virginia) and Cliff Stearns (R-Florida), who are the chair and ranking member of the House Subcommittee on Communications, Technology... From U.S. Public Policy Committee of the ACM | June 10, 2010 at 07:09 PM
From the CACM:" ... IBM Exploring voice-driven methods for the third-world webIBM Research India has launched the Spoken Web, a network designed to use phones,...Franz Dill From The Eponymous Pickle | June 10, 2010 at 07:05 PM
Earlier this week, the Ninth Workshop on Economics and Information Security (WEIS 2010) was held at Harvard. As always, it was a great workshop with some veryliveblogged...schneier From Schneier on Security | June 10, 2010 at 05:56 PM
In Technology Review: Text analytics method that picks stocks better than the pros. Which pro? Any pros? I have seen such methodologies of various stripes. My questions...Franz Dill From The Eponymous Pickle | June 10, 2010 at 05:24 PM
I called home last night and my daughter Molly had an exciting story to tell. She was at her friend Danielle's house (the same Molly and Danielle from the video...Lance From Computational Complexity | June 10, 2010 at 02:28 PM