From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
(This post is similar to
this old post.
I am posting this anyway since when I first posted I made fundamental mistake. I fixed it
the point I was trying to make...GASARCH From Computational Complexity | July 15, 2010 at 03:25 PM
Peter Lee, a past member of the CCC Council and the PI of the first CIFellows Project, today was named the Managing Director of Microsoft Research Redmond, effective...Erwin Gianchandani From The Computing Community Consortium Blog | July 15, 2010 at 03:03 PM
Last week Amy Harmon wrote the third installment of the awesome New York Times Magazine series Erwin Gianchandani From The Computing Community Consortium Blog | July 15, 2010 at 01:48 PM
A few weeks ago the Communia conference University and Cyberspace took place here in Torino, Italy, with a focus on “reshaping knowledge institutions for the networked...Experientia From Putting People First | July 15, 2010 at 11:26 AM
I haven't been blogging much; consider me on extended vacation. It's helping me prepare for giving up the blog soonish. But I thought I'd mention our newly posted...Michael Mitzenmacher From My Biased Coin | July 15, 2010 at 10:36 AM
In the BBC: All sorts of interesting implications in cinema, storytelling, marketing and games. We will soon be at a place where the real and artificial are no...Franz Dill From The Eponymous Pickle | July 15, 2010 at 10:20 AM
“The internet has not become the great leveller that it was once thought it could be,” according to Harvard academic Ethan Zuckerman at the TED Global (Technology...Experientia From Putting People First | July 15, 2010 at 09:46 AM
Clever marketing approach from Tibco, maker of Spotfire. Have not taken a look yet at exactly what it is yet. In ReadwriteWeb: " ... Tibco has launched a business...Franz Dill From The Eponymous Pickle | July 15, 2010 at 02:41 AM
This is a reposting of a blog piece written by Doug Peterson on his blog http://dougpete.wordpress.com/.
Yesterday, I had the honour of attending the 2010 CSIT... From Computer Science Teachers Association | July 15, 2010 at 12:21 AM
Very likely I think, it simplifies a number of things, and creates a new channel to the shopper. What are the implications for manufacturer and retailer?Smartphones...Franz Dill From The Eponymous Pickle | July 14, 2010 at 06:48 PM
This is interesting:
Some of the scenarios where we have installed video analytics for our clients include:
to detect someone walking in an area of their yard...schneier From Schneier on Security | July 14, 2010 at 05:54 PM
I have been asked to take a closer look at the Recorded Future site. A number of posts will follow that will track my interaction with the site and company. The...Franz Dill From The Eponymous Pickle | July 14, 2010 at 02:58 PM
A good CWorld article on the the bloom of the robotics industry. I like this because it links the challenge to artificial intelligence (AI) which I covered for...Franz Dill From The Eponymous Pickle | July 14, 2010 at 02:00 PM
I'm sure getting together every two weeks to play board games and calling it research isn't anything new, but it's definitely something I need to do. I pride myself...Gail Carmichael From The Female Perspective of Computer Science | July 14, 2010 at 02:00 PM
Insider Dave Knox on taking social engagement to a new level at Procter & Gamble's Old Spice brand. Via Walter Riker.Franz Dill From The Eponymous Pickle | July 14, 2010 at 01:46 PM
Last week, the Center
for Computational Intractability hosted a Geometric
Complexity Theory Workshop. Geometric complexity theory (GCT) is
an approach to P vs...Lance From Computational Complexity | July 14, 2010 at 12:12 PM
SugarCRM 6 Debuts with Open Source and Commercial Features While their marketing guy may claim “that overall, Sugar 6 is an open source product from an open source...Simon Phipps From Wild WebMink | July 14, 2010 at 12:07 PM
It's easy to access someone else's voicemail by spoofing the caller ID. This isn't new; what is new is that many people now have easy access to caller ID spoofing...schneier From Schneier on Security | July 14, 2010 at 11:51 AM