From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
People have asked me how much the alleged proof of P NE NP was
discussed at Barriers II.
Actually, nobody discussed the proof; however, we did discuss
the aftermath...GASARCH From Computational Complexity | September 1, 2010 at 02:41 PM
The End of OpenSolaris Patrick Finch with an informed view of what happened in the past and informed conjecture about the present and future. (tags: OpenSolaris...Simon Phipps From Wild WebMink | September 1, 2010 at 12:06 PM
Skein is my new hash function. Well, "my" is an overstatement; I'm one of the eight designers. It was submitted to NIST for their SHA-3 competition, and oneselected...schneier From Schneier on Security | September 1, 2010 at 11:01 AM
The City of Dublin and the Institute of Art, Design & Technology (IADT) will act as co-hosts for Interaction 12, the annual conference of the Interaction Design...Experientia From Putting People First | September 1, 2010 at 10:53 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Contributor agreements that aggregate the copyrights of open source code in favour of a single corporate sponsor are a sure sign of a community where one member...Simon Phipps From Wild WebMink | September 1, 2010 at 07:00 AM
"Protecting your daily in-home activity information from a wireless snooping attack," by Vijay Srinivasan, John Stankovic, and Kamin Whitehouse:
Abstract: In...schneier From Schneier on Security | August 31, 2010 at 05:39 PM
Many of you are familiar with the Exploring Computer Science (ECS) curriculum, developed in partnership with CSTA as part of an NSF grant. Though initially developed... From Computer Science Teachers Association | August 31, 2010 at 03:57 PM
Mark Montgomery of KYield posts about Realizing the Theory: Yield Management of Knowledge. He defines it as: " ... Yield Management of Knowledge: The process by...Franz Dill From The Eponymous Pickle | August 31, 2010 at 03:26 PM
A short article on how to manage time for social media presence. Mostly common sense, but also worth a look.Franz Dill From The Eponymous Pickle | August 31, 2010 at 02:41 PM
A good article in AdAge: My thoughts: Listening, whether it be to consumers, trends, the pulse of technology, is very important. Maybe it should be called observing...Franz Dill From The Eponymous Pickle | August 31, 2010 at 02:30 PM
In a very interesting development a version of the very well known CAD system will become available for the IPhone and IPad, available by this fall.... I used AutoCad...Franz Dill From The Eponymous Pickle | August 31, 2010 at 01:53 PM
On Thursday Aug 26 Lance stated
Bill is at
Barriers II in Princeton and promises a full report upon his return.
Not quite sure I promised that, or what a full report...GASARCH From Computational Complexity | August 31, 2010 at 01:39 PM
Thirty researchers met August 11-13 to discuss the future of interactive systems. This workshop was sponsored by the Computing Community Consortium, ACM/SIGCHI...Erwin Gianchandani From The Computing Community Consortium Blog | August 31, 2010 at 12:58 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Or is it “mind” the data? Last week I read a blog post by Stacey Armstrong (CS News – Video Game Data Mining) that linked to an article about how game companies...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | August 31, 2010 at 12:14 PM
I started blogging a little over 3 years ago, as something of an experiment. Lance had given up blogging, and I had been a reasonably frequent and opinionatedKleinberg's...Michael Mitzenmacher From My Biased Coin | August 31, 2010 at 11:48 AM
In Australia:
A high school teacher who assigned her class to plan a terrorist attack that would kill as many innocent people as possible had no intent to promote...schneier From Schneier on Security | August 31, 2010 at 11:42 AM
Some people scoff at those who have too many friends on Facebook. "They probably just friend a bunch of people they don't know to look popular," they say. While...Gail Carmichael From The Female Perspective of Computer Science | August 31, 2010 at 09:47 AM
In response to several comments, I’ve just extracted my discussion of direct and indirect causality from my recent article on why “which licence” is now the wrong...Simon Phipps From Wild WebMink | August 31, 2010 at 02:38 AM