From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Most readers of this blog are early adopters of technology. In the past we would have had to go to a computer store or mail order something to try it out. Now within...Franz Dill From The Eponymous Pickle | March 11, 2010 at 06:36 PM
Another very innovative idea out of Google: . " ... Google launched on Tuesday evening Google Apps Marketplace, providing a venue for third-party, cloud-based applications...Franz Dill From The Eponymous Pickle | March 11, 2010 at 04:15 PM
There are some theorems that are surprising.
I've already blogged on that (I can't seem to find the link).
However, there are some theorems that some people
simply...GASARCH From Computational Complexity | March 11, 2010 at 03:42 PM
It's good to dream:
IARPA's five-year plan aims to design experiments that can measure trust with high certainty -- a tricky proposition for a psychological study...schneier From Schneier on Security | March 11, 2010 at 12:17 PM
The Socio-Digital Systems (SDS) group of Microsoft Research aims to use an understanding of human values to help to change the technological landscape in the 21st...Experientia From Putting People First | March 11, 2010 at 11:45 AM
Twenty years after the emergence of the world wide web, Rory Cellan-Jones of the BBC World Service’s Discovery series looks at the science driving its third decade...Experientia From Putting People First | March 11, 2010 at 10:42 AM
Among cell-phone users in developed countries, IBM is betting the market with the biggest growth potential is…people over the age of 65. Fast Company reports.
IBM’s...Experientia From Putting People First | March 11, 2010 at 09:17 AM
At the request of the Office of the Director of National Intelligence, the National Research Council (NRC) is undertaking a project entitled Ed Lazowska From The Computing Community Consortium Blog | March 11, 2010 at 05:31 AM
From The Computing Community Consortium Blog
A CACM “Viewpoints” column by Cameron Wilson (ACM) and Peter Harsha (CRA), inspired by the Transition Team white papers commissioned by the Computing Community...Ed Lazowska From The Computing Community Consortium Blog | March 11, 2010 at 05:01 AM
In the area of Computing Architectures there are some well known discontinuity-inducing trends staring us in the face. The entire computing community is planning...Ran Libeskind-Hadas From The Computing Community Consortium Blog | March 11, 2010 at 04:55 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
In StoreFrontBackTalk, a discussion of manufacturers direct selling to consumers online. This has been avoided for a long time in big CG to avoid antagonizing the...Franz Dill From The Eponymous Pickle | March 10, 2010 at 07:59 PM
Really:
Since they are hard to conceal, the study says, noses would work well for identification in covert surveillance.
The researchers say noses have been overlooked...schneier From Schneier on Security | March 10, 2010 at 07:47 PM
I was recently asked the following question:Suppose you're the PC chair, and someone who has submitted a paper asks you NOT to have the paper reviewed by a specific...Michael Mitzenmacher From My Biased Coin | March 10, 2010 at 06:05 PM
New insights from science and behaviour change could lead to significantly improved outcomes, and at a lower cost, than the way many conventional policy tools are...Experientia From Putting People First | March 10, 2010 at 05:20 PM
As Lance tweeted:
The Turing Award for 2009 was given recently to
Chuck Thacker LINK. See
here.
He developed the first modern PC.
The Alan T. Waterman award...GASARCH From Computational Complexity | March 10, 2010 at 05:02 PM
An idea discussed at Procter & Gamble for years, but always shied away from due to security and data ownership issues. Driven in part by complaints from new-hires...Franz Dill From The Eponymous Pickle | March 10, 2010 at 04:14 PM