From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Long on my stack, just making my way through: The Text Mining Handbook: Advanced Approaches in Analyzing Unstructured Data by Ronen Feldman and James Sanger. A...Franz Dill From The Eponymous Pickle | November 15, 2009 at 09:50 AM
Apple recently filed for technology to deliver a rather compelling ad-supported business model. Or perhaps the better word is compulsory. You can read an analysis...Daniel Tunkelang From The Noisy Channel | November 15, 2009 at 09:49 AM
Always thought there was something wrong with using US college students for determining universal psychological facts about populations, except when determining...Franz Dill From The Eponymous Pickle | November 14, 2009 at 07:58 PM
From MIT, an interesting piece about representing the real world, always a good thing to think about. I never thought that game theory could accurately represent...Franz Dill From The Eponymous Pickle | November 14, 2009 at 07:23 PM
Just what is computer science? Is it a science course? Is it a math course? Is it a business course?
These questions pop up more frequently now that states... From Computer Science Teachers Association | November 14, 2009 at 05:58 PM
Do music artists fare better in a world with illegal file-sharing?
Answer: Yes. So why do the labels want to kill it off? Because they don't. Translation...webmink From Wild WebMink | November 14, 2009 at 09:48 AM
I spoke this morning at the South Tyrol Free Software Conference in Bolzano, Italy. My subject was the idea of a "software freedom scorecard", a list of indicators...webmink From Wild WebMink | November 13, 2009 at 10:44 PM
Microsoft Corp. is counting on Ms. Larson-Green, its head of Windows Experience, to deliver an operating system that delights the world’s PC users as much as its...Experientia From Putting People First | November 13, 2009 at 08:56 PM
The algorithm is mentioned in Von Neumann's War, by John Ringo and Travis Taylor.
P. 495:
The guy was using a fairly simple buffer overflow attack but withEvery...schneier From Schneier on Security | November 13, 2009 at 08:43 PM
Here's an interview with me, conducted at the Information Security Decisions conference in Chicago in October.
schneier From Schneier on Security | November 13, 2009 at 07:47 PM
I see that the Tide Stain Brain is now available as an IPhone App. This work has a long history at P&G and I had several involvements in the knowledge being delivered...Franz Dill From The Eponymous Pickle | November 13, 2009 at 04:33 PM
And an application proposed by NASA that converts an IPhone into a chemical sensor. Looks like a very rough mashup, but I much like the direction. Could something...Franz Dill From The Eponymous Pickle | November 13, 2009 at 04:11 PM
Current practical database compression techniques stress speed over compression:
Vectorwise is using Super-scalar RAM-CPU cache compression which includes a carefully...Daniel Lemire From Daniel Lemire's Blog | November 13, 2009 at 02:55 PM
This is worthwhile for just general caution if you are into Google applications. ' ... Google may know more about you than your mother does. Got a problem with...Franz Dill From The Eponymous Pickle | November 13, 2009 at 02:48 PM
As many university's still feel the effect of the financial crises, many have limited or no positions to hire new tenure-track faculty so I expect the academicUniversity...Lance From Computational Complexity | November 13, 2009 at 11:54 AM
This post is about surveys. It's motivated by one of my tasks last night, as I has to spend some time going over the final proofs for the survey Hash-Based Techniques...Michael Mitzenmacher From My Biased Coin | November 13, 2009 at 11:34 AM
[I was asked to write this essay for the New Internationalist (n. 427, November 2009, pp. 10–13). It's nothing I haven't said before, but I'm pleased with howessay...schneier From Schneier on Security | November 13, 2009 at 11:31 AM