From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Texas Instruments' calculators use RSA digital signatures to authenticate any updates to their operating system. Unfortunately, their signing keys are too short...schneier From Schneier on Security | September 25, 2009 at 11:17 AM
As part of a larger BI package exploration I took a look at Clario Analytics SaaS (Software as a service). You start by uploading your data via a secure FTP client...Franz Dill From The Eponymous Pickle | September 25, 2009 at 05:23 AM
Honda has a Segway-like, unicycle form personal mobility device called the U-3X in the works that is more remarkable looking than the Segway. No specific dates...Franz Dill From The Eponymous Pickle | September 24, 2009 at 11:14 PM
Earlier this week Federal Communications Commission Chairman Julius Genachowski announced his intention to establish an expanded definition of net neutrality to... From U.S. Public Policy Committee of the ACM | September 24, 2009 at 09:12 PM
Some consider the P = NP problem to be the most important Theoretical Computer Science problem. It asks whether all problems whose solution can be verified quickly...Daniel Lemire From Daniel Lemire's Blog | September 24, 2009 at 08:30 PM
There have been several posts on blogs about P vs NP and two expository articles. Is there anything else to add. I'm not sure, but here are my 2 cents.
QUESTION...GASARCH From Computational Complexity | September 24, 2009 at 05:19 PM
The New Scientist reviews the current state of Augmented Reality and is a bit concerned:
“While some who back the technology think its time has now come, after...Experientia From Putting People First | September 24, 2009 at 02:09 PM
Too many emails, texts and tweets can lead to rising anxiety, lower intelligence Experientia From Putting People First | September 24, 2009 at 01:50 PM
This reminds me of the work of Brenda Laurel, game developer and systems theorist, who wrote about computers and theater. The theater of the brand: Building entertainment...Franz Dill From The Eponymous Pickle | September 24, 2009 at 12:58 PM
It's not just hackers who steal financial and medical information:
Between April 2007 and January 2008, visitors to the Kmart and Sears web sites were invitedSony...schneier From Schneier on Security | September 24, 2009 at 11:37 AM
I'm putting online a paper with Zhenming Liu and Kai-Min Chung (both graduate students at Harvard) that extends one of the results from Declaring Independence via...Michael Mitzenmacher From My Biased Coin | September 24, 2009 at 11:00 AM
Volokh posts on recently passed computer crime legislation. He quotes the entire act so that you can read it yourself. True it is legally cryptic, but you can get...Franz Dill From The Eponymous Pickle | September 24, 2009 at 06:30 AM
Stepehen Wolfram talks and does a Q&A on WolframAlpha and related topics they are working on. I need to get back to WolframAlpha to see how it is progressing. As...Franz Dill From The Eponymous Pickle | September 24, 2009 at 05:39 AM
An interesting idea in these tighter times, a convenience-based personal shopper concept by Meijer in the Chicago area. Shoppers pick up their own orders hand delivered...Franz Dill From The Eponymous Pickle | September 23, 2009 at 07:39 PM