From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
A $1.99 IPhone App called IP Camera can take a picture every 12 to 15 seconds and then posts the picture to a local network via WiFi. Effectively a security camera...Franz Dill From The Eponymous Pickle | October 6, 2009 at 02:56 PM
This is brilliant:
The sophisticated hack uses a Trojan horse program installed on the victim's machine that alters html coding before it's displayed in the user's...schneier From Schneier on Security | October 6, 2009 at 11:40 AM
Digital Revolution (working title) is an open source documentary, due for transmission on BBC Two in 2010, that will take stock of 20 years of change brought about...Experientia From Putting People First | October 6, 2009 at 06:55 AM
The HCIR 2009 proceedings are now available on the workshop web site. We’re planning toDaniel Tunkelang From The Noisy Channel | October 6, 2009 at 03:29 AM
As has been anticipated for a while–and discussed during the Ethics of Blogging panel–the United States Federal Trade Commission (FTC) has published explicit guidelines...Daniel Tunkelang From The Noisy Channel | October 6, 2009 at 03:19 AM
I decided to read Outliers by Malcolm Gladwell as it was recommended to me by several people. That in turn let me to read his first book Tipping Point. This may... From Computer Science Teachers Association | October 5, 2009 at 10:32 PM
Wow. It's over 2,000 pages, so it'll take time to make any sense of. According to Ross Anderson, who's given it a quick look over, "it seems to be the bureaucratic...schneier From Schneier on Security | October 5, 2009 at 08:10 PM
It's a security risk:
The crate was hoisted onto the flatbed with a 120-ton construction crane. For security reasons, there were no signs on the truck indicating...schneier From Schneier on Security | October 5, 2009 at 06:29 PM
Microsoft is exploring the concept of multi-touch mice, a new research paper reveals.
The paper is being presented today as part of the User Interface Software...Experientia From Putting People First | October 5, 2009 at 06:13 PM
Kevin Anderson reports in The Guardian on how a new generation of monitors can generate data about your energy use and help you cut your costs and carbon.
“These...Experientia From Putting People First | October 5, 2009 at 06:06 PM
Roger Dooley suggests that the recent mention of using brain scans to provide accurate and specific predictions for scary movie content really shows a further failure...Franz Dill From The Eponymous Pickle | October 5, 2009 at 05:51 PM
In a prior post (a while back) I pondered if Mahaney's theorem (SAT \le_m S, S Spare, implies P=NP) should be taught in a basic grad course in complexity. I thought...GASARCH From Computational Complexity | October 5, 2009 at 05:16 PM
Steve King writes an excellent blog: Small Business Labs on small business and entrepreneurial topics that is useful. Notable is a recent article on the increasing...Franz Dill From The Eponymous Pickle | October 5, 2009 at 02:15 PM
Computer Science can be taken a natural science: the study of how the universe processes information. If it is a natural science, then does it build on Physics?...Daniel Lemire From Daniel Lemire's Blog | October 5, 2009 at 02:00 PM
October 7
Meeting:
The Information Security and Privacy Advisory Board will meet. The focus of the meeting will be on the NIST Information Technology Laboratory... From U.S. Public Policy Committee of the ACM | October 5, 2009 at 12:58 PM
Stefan Savage made an insightful comment related to the issue of jobs:
I've long felt that its a fallacy that there exists a fine-grained Platonic ideal of "goodness"...Michael Mitzenmacher From My Biased Coin | October 5, 2009 at 10:51 AM
The Cybersecurity Myth
Cringely on why the US claim to be in the process of hiring 1,000 "cybersecurity experts" is unlikely to impress any real...webmink From Wild WebMink | October 5, 2009 at 10:11 AM