From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
(This is a follow-up to my previous blog post.)
Any run-length encoding requires you to store the number of repetitions. In my example, AAABBBBBZWWK becomes 3A-5B...Daniel Lemire From Daniel Lemire's Blog | November 27, 2009 at 04:03 PM
In the Edge: Signatures of Consciousness. Very interesting progress: Stanislas Dehaene writes:' ... For the past twelve years my research team has been using...Franz Dill From The Eponymous Pickle | November 27, 2009 at 03:04 PM
This 1996 interview with psychiatrist Robert DuPont was part of a Frontline program called "Nuclear Reaction."
He's talking about the role fear plays in the perception...schneier From Schneier on Security | November 27, 2009 at 02:25 PM
I developed the below material for a workshop I gave to computer science teaching assistants today on how to teach computer science concepts. The workshop washttp...Gail Carmichael From The Female Perspective of Computer Science | November 27, 2009 at 02:23 PM
No, ACTA Secrecy Is Not 'Normal' -- Nor Is It A 'Distraction'
ACTA secrecy is in fact a cynical game being played by the analogue...webmink From Wild WebMink | November 27, 2009 at 12:50 PM
Nafid Imran Ahmed of the Bangladeshi newspaper The Daily Star was just at “The Way We Live Next 3.0″ event in Helsinki and reports on the company’s vision of the...Experientia From Putting People First | November 27, 2009 at 10:01 AM
Terry Winograd, the famous human-computer interaction specialist, was interviewed for Digital Revolution (working title), an open source documentary, due for transmission...Experientia From Putting People First | November 27, 2009 at 05:51 AM
This is not in the normal realm of what I write about, but I am an amateur botanist and all things botanic do interest me. It is also an interesting lesson in experimentation...Franz Dill From The Eponymous Pickle | November 26, 2009 at 06:01 PM
Nicola Morelli (blog), an associate professor at the School of Architecture and Design at Aalborg University in Denmark, reflects on the two inspirations for a...Experientia From Putting People First | November 26, 2009 at 05:54 PM
Wikileaks has published pager intercepts from New York on 9/11:
WikiLeaks released half a million US national text pager intercepts. The intercepts cover a 24nuggets...schneier From Schneier on Security | November 26, 2009 at 01:11 PM
Professor and Head of Computer Science of the School of Computing at the National University of Singapore. Before that, he was the Deputy Executive Director for...Tobias Svensson From Return 42; | November 26, 2009 at 12:08 PM
I have written before about the "Verified by VISA" program. While shopping for Thanksgiving online this year, I noticed that Verified by Visa scripts were blocked... From CERIAS Blog | November 26, 2009 at 11:49 AM
The end of the year brings upon us the celebrations that come with the holidays. This year, we have extra reason to celebrate with an added holiday.
The week of... From Computer Science Teachers Association | November 25, 2009 at 10:15 PM
PASS ID, S. 1261, is a bill introduced in June as an attempt to break through the impasse over REAL ID. That law, passed as part of a budget bill in 2005, was... From U.S. Public Policy Committee of the ACM | November 25, 2009 at 08:55 PM
A BNet article that looks at P&G past acquisitions, and speculates about future M&A in terms of retail space coverage. I like the idea of understanding products...Franz Dill From The Eponymous Pickle | November 25, 2009 at 07:57 PM
Long, detailed, and very good story of the Mumbai terrorist attacks of last year.
My own short commentary in the aftermath of the attacks.
schneier From Schneier on Security | November 25, 2009 at 07:52 PM