From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
I already blogged about this; there's more information in this new article:
Included in the items the German army allowed humanitarian groups to distribute in...schneier From Schneier on Security | September 23, 2009 at 06:43 PM
This morning the Research and Science Education Subcommittee of the House Science and Technology Committee met to mark up legislation that would amend the Cyber... From U.S. Public Policy Committee of the ACM | September 23, 2009 at 06:16 PM
(Posted by request of Vijay V. Vazirani. Flame him for any spelling or grammar mistakes, or if you don't like the content.)
Another reason to goto FOCS:here...GASARCH From Computational Complexity | September 23, 2009 at 05:20 PM
At the first HCIR workshop in 2007, Michael Stonebraker stood up in the middle of an open discussion session and told all assembled that we needed to be thinking...Daniel Tunkelang From The Noisy Channel | September 23, 2009 at 05:10 PM
Here is the place to download the study. Standardization, Security and analytics are emphasized. Requires a minimal registration.' .. A new global study of more...Franz Dill From The Eponymous Pickle | September 23, 2009 at 03:38 PM
Machine vision has been around for a long time. For example systems in manufacturing lines that easily detect varying quality. Once you take such system in a human...Franz Dill From The Eponymous Pickle | September 23, 2009 at 02:50 PM
On the decline of cursive handwriting, in a recent article.I had discussions about this with a K-12 teacher relative, confirming the article. Little time is spent...Franz Dill From The Eponymous Pickle | September 23, 2009 at 02:21 PM
I'm not sure why, but the "there is no open source business model" discussion has woken up again, with Matthew Aslett and Stephen Walli in particular chipping in...webmink From Wild WebMink | September 23, 2009 at 02:15 PM
The ACM?s Policy Office staff and USACM?s leadership have compiled USACM?s annual report for the past fiscal year - 2009 (which ended June 30). This year?s report... From U.S. Public Policy Committee of the ACM | September 23, 2009 at 02:14 PM
The Obama Plan in 4 Minutes
A really good edit for the attention-impaired of the joint session Obama delivered.USA politics health...webmink From Wild WebMink | September 23, 2009 at 12:15 PM
This is a good thing:
An Illinois district court has allowed a couple to sue their bank on the novel grounds that it may have failed to sufficiently secure their...Schneier From Schneier on Security | September 23, 2009 at 11:00 AM
So you have all the patches from Microsoft applied automatically, Firefox updates itself as well as its extensions... But do you still have vulnerable, outdated... From CERIAS Blog | September 22, 2009 at 07:33 PM
I recently brought up Qwaq, which we looked at for remote visual, avatar-enabled collaboration. They announced today that they have become Teleplace. Good nameTeleplace...Franz Dill From The Eponymous Pickle | September 22, 2009 at 05:43 PM
Nearly three years ago I posted on the just announced Netflix prize. First to a 10% increase in the quality of the movie recommendations would receive a million...Lance From Computational Complexity | September 22, 2009 at 05:18 PM
From Putting People First
Tomorrow I will be speaking at an informal, but high energy Paris conference, called (somewhat predictably) Paris 2.0.
The conference takes a total of four days...Experientia From Putting People First | September 22, 2009 at 03:46 PM
Luke Wroblewski, an internationally recognized Web thought leader and Senior Director of Product Ideation & Design at Yahoo! Inc., provides a comprehensive overview...Experientia From Putting People First | September 22, 2009 at 03:25 PM
The latest issue of Interfaces Magazine, a quarterly magazine published by Interaction, the specialist HCI group of the British Computer Society (BCS), contains...Experientia From Putting People First | September 22, 2009 at 02:43 PM
Back in 2005, I wrote about the failure of two-factor authentication to mitigate banking fraud:
Here are two new active attacks we're starting to see:
Man-in-the...schneier From Schneier on Security | September 22, 2009 at 11:39 AM