From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Special report from Knowledge@Wharton: Turn the Page: What's Next for Publishing?. Excellent."Emerging technologies and strategies to reach new audiences are changing...Franz Dill From The Eponymous Pickle | June 11, 2010 at 04:05 AM
Mark Montgomery of Kyields's blog post on the Gulf spill and the need for polymath perspective/philosophy for overcoming challenges.Franz Dill From The Eponymous Pickle | June 11, 2010 at 02:47 AM
Computerworld looks at some of the early prototypes of laptops from a number of vendors. Most of what we see are multiple screens that can be used independently...Franz Dill From The Eponymous Pickle | June 11, 2010 at 02:25 AM
Ever wonder why youth have to be over 13 to create an account on Facebook or Gmail or Skype? It has nothing to do with safety.
In 1998, the U.S. Congress enacted...zephoria From Apophenia | June 10, 2010 at 11:04 PM
Representatives Rick Boucher (D-Virginia) and Cliff Stearns (R-Florida), who are the chair and ranking member of the House Subcommittee on Communications, Technology... From U.S. Public Policy Committee of the ACM | June 10, 2010 at 07:09 PM
From the CACM:" ... IBM Exploring voice-driven methods for the third-world webIBM Research India has launched the Spoken Web, a network designed to use phones,...Franz Dill From The Eponymous Pickle | June 10, 2010 at 07:05 PM
Earlier this week, the Ninth Workshop on Economics and Information Security (WEIS 2010) was held at Harvard. As always, it was a great workshop with some veryliveblogged...schneier From Schneier on Security | June 10, 2010 at 05:56 PM
In Technology Review: Text analytics method that picks stocks better than the pros. Which pro? Any pros? I have seen such methodologies of various stripes. My questions...Franz Dill From The Eponymous Pickle | June 10, 2010 at 05:24 PM
I called home last night and my daughter Molly had an exciting story to tell. She was at her friend Danielle's house (the same Molly and Danielle from the video...Lance From Computational Complexity | June 10, 2010 at 02:28 PM
Technological progress tends to increase the available information. Thus, our capacity to manage this information becomes overloaded (hence the term information...Daniel Lemire From Daniel Lemire's Blog | June 10, 2010 at 01:57 PM
Copyright: The Elephant in the Middle of the Glee Club Well worth reading this article. The TV programme 'Glee' features a singing club as the backdrop for a situational...Simon Phipps From Wild WebMink | June 10, 2010 at 12:07 PM
Any essay on hiring hackers quickly gets bogged down in definitions. What is a hacker, and how is he different from a cracker? I have my own definitions, but I'd...schneier From Schneier on Security | June 10, 2010 at 11:34 AM
In honor of being at EC, a post on branding. In theory, your research will be judged and appreciated based on its intrinsic quality, and your scientific reputation...Michael Mitzenmacher From My Biased Coin | June 10, 2010 at 10:05 AM
Second Life, the well known virtual world that attracted large investments in time and money from companies like IBM, Kraft and Circuit City, announced a 30% downsizing...Franz Dill From The Eponymous Pickle | June 10, 2010 at 02:55 AM
EC is an interesting mix of theory/AI/economics and many other things as well (data mining, social computing, user interfaces....) Definitely a bit of a hodgepodge...Michael Mitzenmacher From My Biased Coin | June 10, 2010 at 02:03 AM
Great article fronm CGT overviewing the Marketing Summit this week: " ... Kraft, P&G, J&J Unite to Share Sales & Marketing Insights June 9, 2010 - More than 200...Franz Dill From The Eponymous Pickle | June 9, 2010 at 08:52 PM
A couple of days ago, the Chronicle of Higher Education had an interesting article about Salman Khan, a fellow who quit his job as a financial analyst to startRethinking... From Computer Science Teachers Association | June 9, 2010 at 07:42 PM
This looks like a good research direction:
Is it possible that given a clean slate and likely millions of dollars, engineers could come up with the ultimate in...schneier From Schneier on Security | June 9, 2010 at 05:59 PM