From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In late June the White House issued a second Draft of the National Strategy for Trusted Identities in Cyberspace. They opened a public comment process only on... From U.S. Public Policy Committee of the ACM | July 21, 2010 at 08:33 PM
I will be sending my next book review column for
SIGACT NEWS off on July 28, 2010.
It has LOTS of books on its BOOKS I WANT REVIEWED list.
YOU get a chance to look...GASARCH From Computational Complexity | July 21, 2010 at 03:16 PM
An interesting post of how Intel is increasingly adopting a social science view. It is intriguing to think of how a company of engineers can move in this direction...Franz Dill From The Eponymous Pickle | July 21, 2010 at 02:15 PM
Legal scholars, technologists and cyberthinkers are wrestling with the first great existential crisis of the digital age: the impossibility of erasing your posted...Experientia From Putting People First | July 21, 2010 at 01:45 PM
Facebook is about to celebrate its 500-millionth user, but the social media application has had wide consequences, even for those who have never signed on, writes...Experientia From Putting People First | July 21, 2010 at 01:23 PM
Design consultant Martyn Perks thinks that a UK government-backed campaign to get the entire UK adult population online “threatens to make cyber slaves of us all...Experientia From Putting People First | July 21, 2010 at 01:19 PM
Phase relationships in the standardization process James Gosling wrote in 1990: "standards are increasingly being viewed as competitive weapons rather than as technological...Simon Phipps From Wild WebMink | July 21, 2010 at 12:04 PM
(This post was written for Blogher and originally posted there.) Every time I dare to talk about race or class and MySpace & Facebook in the same breath, a public...zephoria From Apophenia | July 21, 2010 at 09:53 AM
The first day of SIGIR 2010 ended with a monster poster session–over 100 posters to see in 2 hours in a hall without air conditioning! I managed to see a handful...Daniel Tunkelang From The Noisy Channel | July 21, 2010 at 07:19 AM
I’ve always felt that parallel conference sessions are designed to optimize for anticipated regret, and SIGIR 2010 is no exception. I decided that I’d try to attend...Daniel Tunkelang From The Noisy Channel | July 21, 2010 at 07:08 AM
As promised, here are some highlights of the SIGIR 2010 conference thus far. Also check out the tweet stream with hash tag #sigir2010. I arrived here on Monday,...Daniel Tunkelang From The Noisy Channel | July 21, 2010 at 06:44 AM
Always innovative retailer Wegmans has set up a blog contributed by employees. Worth a look.Franz Dill From The Eponymous Pickle | July 21, 2010 at 03:03 AM
Growing up as a white girl in Pennsylvania, I was taught that being tan was beautiful. My wealthier classmates would go on vacations to Florida in the winter,...zephoria From Apophenia | July 21, 2010 at 12:00 AM
Two interesting research papers on website password policies.
"Where Do Security Policies Come From?":
Abstract: We examine the password policies of 75 different...schneier From Schneier on Security | July 20, 2010 at 06:52 PM
In GigaOM: Image search in Google has improved their user interface to allow you to see many more images per search. They have a reported ten billion images accessible...Franz Dill From The Eponymous Pickle | July 20, 2010 at 06:21 PM
Sponsored by Nokia, The ideas Project is a selection of video presentation by mostly well-known pundits in the area of communications and information tech. If they...Franz Dill From The Eponymous Pickle | July 20, 2010 at 05:55 PM
As you may know, my research focus for my PhD is educational games and augmented reality. But what is this educational games stuff all about, anyway? Do video games...Gail Carmichael From The Female Perspective of Computer Science | July 20, 2010 at 05:25 PM