From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
SAP makes plans to turn Big data into intelligence. Something we all hope to do. Some new releases from the ERP giant: " ... Using its BI market share leadership...Franz Dill From The Eponymous Pickle | August 17, 2012 at 02:03 PM
We were involved in early research done in China with retailers and universities in China. Notably with BJ Hualian, who ultimately used some our methods to develop...Franz Dill From The Eponymous Pickle | August 17, 2012 at 01:50 PM
Besides the Turing machine, Alan Turing also developed what we now call the Turing Test in Turing's seminal 1950 AI paper "Computational Machinery and Intelligenc...Lance Fortnow From Computational Complexity | August 17, 2012 at 12:42 PM
This is pretty funny:
Moving red laser beams scare away potential intruders
Laser beams move along floor and wall 180 degrees
Easy to install, 110v comes on automatically...schneier From Schneier on Security | August 17, 2012 at 11:39 AM
“On the Edge — The Future of Computing Research” was the title of a plenary session at the Computing Research Association’s (CRA) biennial Conference at Snowbird...Ed Lazowska From The Computing Community Consortium Blog | August 17, 2012 at 11:28 AM
Summer is as summer does. We didn't get enough registrations for my workshop on learning to program using Processing. Luckily, this wasn't from lack of interest...Gail Carmichael From The Female Perspective of Computer Science | August 17, 2012 at 01:48 AM
From SNCR, of which I am a senior fellow:Professionals Spend 40% of Time Online Interacting in Peer Communities according to the Society for New Communications report...Franz Dill From The Eponymous Pickle | August 16, 2012 at 08:54 PM
In the short story "A Wayside Comedy," published in 1888 in Under the Deodars, Kipling wrote:
You must remember, though you will not understand, that all lawsmy...schneier From Schneier on Security | August 16, 2012 at 06:52 PM
In the NYT: Largely obvious thoughts, but some very good links to a number of sources, including the report called Big Data, Big Impact from the World Economic...Franz Dill From The Eponymous Pickle | August 16, 2012 at 06:07 PM
A very informative piece in SC Digest, that surveys inventory turns by sector. A must for supply chain data trend understanding. " ... So, let's take an example...Franz Dill From The Eponymous Pickle | August 16, 2012 at 05:52 PM
For those of you not following the Apple-Samsung case going on right now, it's fascinating. Since I do expert witness work, it's interesting to me from that perspective...Michael Mitzenmacher From My Biased Coin | August 16, 2012 at 03:22 PM
Cheap printable chips have always been mentioned as solutions for making RFID ubiquitous. Now a cheap chips example for the 'wave and pay' revolution, that isIn...Franz Dill From The Eponymous Pickle | August 16, 2012 at 03:17 PM
In early 2009, the Computing Community Consortium (CCC), with the support of the National Science Foundation (NSF), launched the Computing Innovation Fellows Project...Erwin Gianchandani From The Computing Community Consortium Blog | August 16, 2012 at 12:43 PM
This is an analysis of Apple's disk encryption program, FileVault 2, that first appeared in the Lion operating system. Short summary: they couldn't break it....schneier From Schneier on Security | August 16, 2012 at 11:49 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
We don’t teach students how to read code. Actually we don’t event teach them that they should read code for the most part. The closest we get is sample code inprettyprint...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | August 16, 2012 at 09:11 AM
I worked on several large scale expert systems applications during the AI drive of the 1990s. One of the areas we specifically examined was the configuration of...Franz Dill From The Eponymous Pickle | August 16, 2012 at 04:21 AM
In CWorld: Continued progress in retail payment networks. " ... More that a dozen retailers including Best Buy, Walmart, Target and 7-Eleven have joined forces...Franz Dill From The Eponymous Pickle | August 15, 2012 at 11:22 PM
University of Southern California computer scientist and neuroscientist Maja Matarić is the subject of an interview appearing in today’s Nature. On the eve of the...Erwin Gianchandani From The Computing Community Consortium Blog | August 15, 2012 at 10:30 PM
Good post, not because it picks on Tesco but because it's filled with good advice on how not to do it wrong.schneier From Schneier on Security | August 15, 2012 at 07:23 PM
In recent months the federal government has expressed increasing concern about our cybersecurity, that is, with our ability to protect the complex computing and... From Computer Science Teachers Association | August 15, 2012 at 06:03 PM