From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
EU fears Oracle will kill MySQL, but is that even possible?
So many speculaitive stories out there, all full of half-correct opinions...webmink From Wild WebMink | September 4, 2009 at 07:04 PM
Jilyan Landon of Mathematica points me to a post in the Wolfram Blog. There something as mundane as an error message gives a hint to how well integrated Mathematica...Franz Dill From The Eponymous Pickle | September 4, 2009 at 03:24 PM
In early August, the U.S. Department of Education released the proposed structure of the $4.5 billion Race to the Top Fund. In short, this fund will distribute... From Computer Science Teachers Association | September 4, 2009 at 03:16 PM
Event Date: September 21, 2009
The Washington DC Chapter of the Association for Computing Machinery, with support from the New America Foundation, will hold a... From U.S. Public Policy Committee of the ACM | September 4, 2009 at 02:50 PM
There are several projects keeping me busy this year. First, the Student IMPACT alternative programming contest continues (www.cs.siena.edu/~maegan/impact). The...ACMW From ACM-W supporting, celebrating and advocating for Women in Computing | September 4, 2009 at 02:36 PM
I was pleased to have been involved in some of the early use of the Internet in the testing of remote Darpanet systems. It about to be 40 years old. CW makes some...Franz Dill From The Eponymous Pickle | September 4, 2009 at 02:05 PM
Data has natural layouts:
text is written from the first to the last word,
database tables are written one row at a time,
Google presents results one document... From Daniel Lemire's Blog | September 4, 2009 at 01:33 PM
Blog post from Ed Felten:
Usually when the threat model mentions subpoenas, the bigger threats in reality come from malicious intruders or insiders. The biggest...schneier From Schneier on Security | September 4, 2009 at 11:18 AM
Dean Debiase, formerly of TNS Media, has an interesting blog at Reboot Partners. ' ... which is a Strategic Execution and Market Expansion Advisory Group Helping...Franz Dill From The Eponymous Pickle | September 4, 2009 at 04:27 AM
In Small Business Trends. ' ... People use social media for a lot of things. Personally, I use it to be as loud as I possibly can. I know that probably sounds bad...Franz Dill From The Eponymous Pickle | September 4, 2009 at 01:44 AM
Unstructured code (BASIC), structured code and procedural programming (Pascal), object-oriented code (C++ or Java). We've all been through one or more of theseComputational... From Computer Science Teachers Association | September 4, 2009 at 01:42 AM
This newsletter and site were just brought to my attention. Created by Vincent Granville, his blog. Very good overview of predictive analytics, data mining, statistics...Franz Dill From The Eponymous Pickle | September 3, 2009 at 09:17 PM
If there's actually a cult out there, I want to hear about it. In an essay by that name, John Viega writes about the dangers of relying on Applied Cryptography...schneier From Schneier on Security | September 3, 2009 at 06:56 PM
Access control is difficult in an organizational setting. On one hand, every employee needs enough access to do his job. On the other hand, every time you giverole...schneier From Schneier on Security | September 3, 2009 at 05:54 PM
A good overview of the use of collaboration tools in big enterprises.. Object to combine the intellectual property of the entire enterprise. Mostly about the low...Franz Dill From The Eponymous Pickle | September 3, 2009 at 12:21 PM