From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In IEEE Spectrum: Will this system end by 2018? The 134 year old public phone network is dying. What are the implications of changes to the network and how...Franz Dill From The Eponymous Pickle | December 28, 2012 at 03:30 AM
I don't normally like yearly predictions. But I found these to be thought provoking. They all deal with the long proposed suggestion that increasingly transparent...Franz Dill From The Eponymous Pickle | December 28, 2012 at 03:02 AM
Research at Ga Tech is using 'deception' methods used in nature to enhance behavioral models. Have always been interested in biological models. They have often...Franz Dill From The Eponymous Pickle | December 28, 2012 at 02:46 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
A lot of people are thinking about the future this time of year. I’ve got a few ideas myself. This is the year I’ve done a lot with apps on phones and tablets....Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | December 27, 2012 at 11:21 PM
The newly announced ElcomSoft Forensic Disk Decryptor can decrypt BitLocker, PGP, and TrueCrypt. And it's only $300. How does it work?
Elcomsoft Forensic Disk...schneier From Schneier on Security | December 27, 2012 at 07:02 PM
As we turn our thoughts from Turing to Erdős, a look back at the complexity year that was. Written with help from co-blogger Bill Gasarch.
The complexity result...Lance Fortnow From Computational Complexity | December 27, 2012 at 01:59 PM
In Liars and Outliers, I talk a lot about the more social forms of security. One of them is reputational. This post is about that squishy sociological security...schneier From Schneier on Security | December 27, 2012 at 12:21 PM
From Inside Analysis. Here I disagree in one sense and agree in another. . It is true that it has never entirely been about the size of the data. What we have...Franz Dill From The Eponymous Pickle | December 27, 2012 at 05:12 AM
In CACM: News aggregation is a common thing in the internet. Many sites and blogs find news in their specialty areas, and the results are redistributed to different...Franz Dill From The Eponymous Pickle | December 27, 2012 at 03:04 AM
Akin to the $99 laptop, the $99 tablet, which I wrote about in the enterprise some long time ago with the hope of getting some support to drive it world-wide. Is...Franz Dill From The Eponymous Pickle | December 27, 2012 at 12:10 AM
An excellent article by MIT’s Bill Bonvillian, just out in the MIT Press journal Innovations. Bill’s prescription: The U.S. must develop an integrated strategy...Ed Lazowska From The Computing Community Consortium Blog | December 26, 2012 at 11:31 PM
A big part of this is reorganizing search, a big component of our use of the Web. This article talks about that from the search engine Bing's perspective. Isee...Franz Dill From The Eponymous Pickle | December 26, 2012 at 08:00 PM
My school celebrated CS Ed Week with a visit from alumni who are working in CS-related careers. One alumnus spoke to my students over skype about his career in... From Computer Science Teachers Association | December 26, 2012 at 07:26 PM
Battle testing an innovation strategy. In the McKinsey Quarterly. This does remind me of defense department approaches, that were reimplemented in big enterprise...Franz Dill From The Eponymous Pickle | December 26, 2012 at 07:06 PM
Finally, Cryptography Engineering is available as an ebook. Even better, it's today's deal of the day at O'Reilly: $27.50 (50% off) and no copy protection. (The...schneier From Schneier on Security | December 26, 2012 at 05:50 PM
Notes from a more decadent time...Itinerary: Barcelona with Kate, April 2012. Photos here.Day 1. Arrive in Barcelona by plane close to midnight on a Friday evening...Jean From updated sporadically at best | December 26, 2012 at 05:16 PM
Industrial control system comes with a backdoor:
Although the system was password protected in general, the backdoor through the IP address apparently required...schneier From Schneier on Security | December 26, 2012 at 12:05 PM
Merry Christmas and a Healthy, Happy and Prosperous New Year to all my readers and friends. Maligayang Pasko at Manigong Bagong Taon Boas Festas e Feliz Ano Novo...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | December 25, 2012 at 06:00 AM
New and appears to be quite interesting. Including: " ... Our interview with Principal Scientist at NASA, Ashok Srivastav ... ". Registration required.Franz Dill From The Eponymous Pickle | December 24, 2012 at 09:00 PM