From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
After nearly 10 years, I've now left Sun. Thanks to everyone for following my blog for all these years. Please follow my new blog, Wild Webmink, where I have posted...webmink From Wild WebMink | March 8, 2010 at 05:36 PM
I joked as I left work on Friday that it was "my day of shame". I am responsible for recruiting students for a government-funded course that offers MCSE (Microsoft... From Computer Science Teachers Association | March 8, 2010 at 05:05 PM
How not to destroy evidence:
In a bold and bizarre attempt to destroy evidence seized during a federal raid, a New York City man grabbed a flash drive and swallowed...schneier From Schneier on Security | March 8, 2010 at 05:00 PM
Even if you have extensive training in Mathematics, the average Mathematics paper is undistinguishable from the ramblings of a madman. Many of these papers seek...Daniel Lemire From Daniel Lemire's Blog | March 8, 2010 at 03:41 PM
This semester I am using the following HW policy.
HW is due on Tuesday. However, your dog died!
Hence you get an extension to Thursday.
That is, for all people...GASARCH From Computational Complexity | March 8, 2010 at 03:28 PM
Indrani Medhi, an Associate Researcher at Microsoft Research India where she works in the Technology for Emerging Markets team, designed a text free user interface...Experientia From Putting People First | March 8, 2010 at 02:42 PM
Well stated, I like simple apps with a recognizable and uniform interface. Because mobile often means we don't have the time to learn a new user interface on the...Franz Dill From The Eponymous Pickle | March 8, 2010 at 02:34 PM
March 10
Hearing:
The House Foreign Affairs Committee will hold a hearing on U.S. cyberspace policy and foreign policy (rescheduled from February 10).
10 a.m.... From U.S. Public Policy Committee of the ACM | March 8, 2010 at 02:33 PM
Interesting paper: "A Practical Attack to De-Anonymize Social Network Users."
Abstract. Social networking sites such as Facebook, LinkedIn, and Xing have been...schneier From Schneier on Security | March 8, 2010 at 12:13 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Well last week was another interesting week for me. I finished it off with a short trip to Houston TX for the annual HP Code Wars high school programming competition...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | March 8, 2010 at 11:09 AM
The "final version" for our NSDI paper, Carousel: Scalable Logging for Intrusion Prevention Systems, is now up.Here's the main idea. In IPS systems, the logger...Michael Mitzenmacher From My Biased Coin | March 8, 2010 at 03:48 AM
Micro Industries is a company that does some very innovative work in the area of retail signage. We worked with them in the innovation centers. They now have...Franz Dill From The Eponymous Pickle | March 8, 2010 at 02:32 AM
Let me preface this post with a clear disclaimer: I work at Google, but the views I express on this blog are my own personal views.
Last week, Google head of webspam...Daniel Tunkelang From The Noisy Channel | March 7, 2010 at 09:34 PM
A debate in the NYT: I am the patron of a regional library that just relocated to a new modern building. There are fewer shelves of books now. There is an enormous...Franz Dill From The Eponymous Pickle | March 7, 2010 at 09:00 PM
As last year, I was glad to be able to participate in the making of the CWE Top 25. The 2010 Edition has been more systematically and methodically produced than...Pascal Meunier From CERIAS Blog | March 7, 2010 at 06:54 PM
You can now browse online the last 137 years of the magazine Popular Science for free. A good view of previous times. Pretty outrageous predictions at times, I...Franz Dill From The Eponymous Pickle | March 7, 2010 at 05:09 PM
A topic with which I developed an obsession in my last few years at Endeca is understanding how to predict query difficulty and performance–performance in the information...Daniel Tunkelang From The Noisy Channel | March 7, 2010 at 03:55 PM
We’re gearing up to officially announce the HCIR 2010 workshop, but I wanted to give folks here a heads up, as well as to put out a call for a volunteer.
The Fourth...Daniel Tunkelang From The Noisy Channel | March 7, 2010 at 05:41 AM
Body acoustics can turn hand into a tochscreen. Work at Carnegie Mellon and Microsoft produces a system called Skinput.Franz Dill From The Eponymous Pickle | March 7, 2010 at 05:23 AM
Good review on this new book. A style guide on how to do mainly quantitative graphics. " .. Dona Wong, who had stints on the graphics teams at both the Wall Street...Franz Dill From The Eponymous Pickle | March 6, 2010 at 09:01 PM