From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The National Science Board seeks nominations of candidates to serve 2016-2022. The National Science Board is a policy advisory body for the National Science Foundation...Renee Dopplick From U.S. Public Policy Committee of the ACM | October 6, 2015 at 11:42 AM
Tuesday, September 29, 2015 Hearing: Cybersecurity Policy and Threats Senate Armed Services Committee 9:30 am | G50 Dirksen Senate Office Building Hearing: Outside...Renee Dopplick From U.S. Public Policy Committee of the ACM | September 28, 2015 at 12:53 PM
The ACM U.S. Public Policy Council, in collaboration with four other ACM entities, submitted comments to the National Institute of Standards and Technology (NIST)...Renee Dopplick From U.S. Public Policy Committee of the ACM | September 25, 2015 at 01:19 PM
The ability to pivot is a sign of agility. As technology continue to rapidly advance, how close are Google and Apple to pivoting?
The post Are Google and AppleBLOG...Ted Lewis From Blog@Ubiquity | September 24, 2015 at 11:26 AM
The new ACM/CSTA Cutler-Bell Prize in High School Computing challenges high school seniors in the United States to develop innovative solutions using their knowledge...Renee Dopplick From U.S. Public Policy Committee of the ACM | September 22, 2015 at 09:14 AM
The FTC invites presentation proposals on consumer privacy and security issues in the commercial sector for a privacy conference, PrivacyCon, to be held on January...Renee Dopplick From U.S. Public Policy Committee of the ACM | September 22, 2015 at 08:30 AM
ACM is accepting nominations for the inaugural ACM Policy Award to honor the contributions of an individual, or a small group, who has had a significant impact...Renee Dopplick From U.S. Public Policy Committee of the ACM | September 17, 2015 at 02:47 PM
The National Telecommunications and Information Administration (NTIA) will hold the kickoff meeting for the new cybersecurity multistakeholder process on vulnerability...Renee Dopplick From U.S. Public Policy Committee of the ACM | September 17, 2015 at 02:24 PM
We're still waiting for flying cars to materialize as a mass-market product. Why? The answer lies in computer technology—or the lack thereof.
The post Will theBLOG...Ted Lewis From Blog@Ubiquity | September 16, 2015 at 10:16 AM
The National Telecommunications and Information Administration (NTIA) will convene the second meeting of the multistakeholder process on drone privacy, transparency...Renee Dopplick From U.S. Public Policy Committee of the ACM | September 16, 2015 at 08:30 AM
Wednesday, September 16, 2015 Hearing: Achieving the Promise of Health Information Technology: Improving Care Through Patient Access to Their Records Senate Health...Renee Dopplick From U.S. Public Policy Committee of the ACM | September 15, 2015 at 10:22 PM
The National Institute of Standards and Technology (NIST) is accepting public comments on a new interagency report advocating U.S. participation in international...Renee Dopplick From U.S. Public Policy Committee of the ACM | September 15, 2015 at 09:57 PM
Computing pioneer Jospeh Traub passed away on August 24. ACM recognized him as an ACM Fellow in 1994 for his research on information-based complexity and parallel...Renee Dopplick From U.S. Public Policy Committee of the ACM | September 15, 2015 at 09:54 PM
President Obama signed an Executive Order establishing the National Strategic Computing Initiative to ensure the U.S. remains on the leading-edge of research, development...Renee Dopplick From U.S. Public Policy Committee of the ACM | September 15, 2015 at 09:50 PM
Can robots be trusted to make better decisions than humans? Sometimes automation can be a matter or life or death.
The post Can Robots Be Trusted? appeared first...Lewis Perelman From Blog@Ubiquity | September 3, 2015 at 10:30 AM
The physical Internet is evolving away from resiliency toward fragility and vulnerability. A broken Internet means flawed cybersecurity.
The post Why Physical Cyber...Ted Lewis From Blog@Ubiquity | August 24, 2015 at 11:52 AM
The future of technology is government regulation—NOT unbridled technology.
The post The Future of Tech is Regulation appeared first on BLOG@UBIQUITY.Ted Lewis From Blog@Ubiquity | August 12, 2015 at 11:30 AM
Senate Floor: Cybersecurity Information Sharing Act, S. 754 Legislation pertaining to the sharing of cybersecurity threat and vulnerability information between...Renee Dopplick From U.S. Public Policy Committee of the ACM | August 4, 2015 at 11:46 AM
If we want to advance the art and science of software development, we should direct our attention to the insect world of stigmergy.
The post Why Can’t Programmers...Ted Lewis From Blog@Ubiquity | August 4, 2015 at 09:55 AM
The National Telecommunications and Information Administration (NTIA) will hold the first meeting of the new multistakeholder process on drone privacy, transparency...Renee Dopplick From U.S. Public Policy Committee of the ACM | August 3, 2015 at 11:53 AM